Linksys WRT120N manual Table of Contents

Page 3

Table of Contents

Chapter 1:

 

 

Product Overview

 

1

Front Panel

 

1

Back Panel

.

. 1

Chapter 2:

 

 

Wireless Security Checklist

 

3

General Network Security Guidelines

 

3

Additional Security Tips

.

. 3

Chapter 3:

 

 

Advanced Configuration

 

4

Setup > Basic Setup

.

. 4

Setup > DDNS

 

8

Setup > MAC Address Clone

 

9

Setup > Advanced Routing

. .

9

Wireless > Basic Wireless Settings

.

10

Wireless > Wireless Security

. .

12

Wireless > Wireless MAC Filter

 

14

Wireless > Advanced Wireless Settings

.

15

Security > Firewall

. .

16

Security > VPN Passthrough

 

17

Access Restrictions > Internet Access

. .

17

Applications and Gaming > Single Port Forwarding

 

19

Applications and Gaming > Port Range Forwarding

.

19

Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .20

Applications and Gaming > DMZ

.

20

Applications and Gaming > QoS

. .

21

Administration > Management

 

23

Administration > Log

.

.24

Administration > Diagnostics

.

24

Administration > Factory Defaults

 

25

Administration > Firmware Upgrade

. .

25

Status > Router

.

26

Status > Local Network

. .

26

Status > Wireless Network

.

.27

Appendix A:

 

 

Troubleshooting

 

28

Appendix B:

 

 

Specifications

 

30

Appendix E:

Wireless-N Home Router

ii

Image 3
Contents Wireless-N Home Router Icon Descriptions Online ResourcesCopyright and Trademarks Table of Contents Warranty Information Appendix D Regulatory InformationAppendix E Software End User License Agreement Horizontal Placement Front PanelBack Panel Suggested Mounting Hardware Wall-Mounting PlacementAdditional Security Tips General Network Security GuidelinesLanguage Access the Browser-Based UtilitySetup Basic Setup Internet SetupPptp Automatic Configuration DhcpStatic IP PPPoEOptional Settings L2TPTelstra Cable Dhcp Reservation Network SetupDhcp Server Setting Router IPDynDNS.org Setup DdnsTime Settings Ddns ServiceAdvanced Routing Setup MAC Address CloneSetup Advanced Routing MAC Address CloneWireless Basic Wireless Settings Basic Wireless Settings ManualRouting Table Wi-Fi Protected Setup Method #1Method #2 Method #3 Wireless Wireless SecurityWireless Security Security ModeWPA Enterprise WPA2 EnterpriseRadius MAC Address Filter List Wireless Wireless MAC FilterWireless MAC Filter Access RestrictionWireless Client List Advanced WirelessWeb Filter Security FirewallFirewall Internet FilterSummary Internet Access PolicySecurity VPN Passthrough VPN PassthroughSummary Port Range Forwarding Applications and Gaming Single Port ForwardingApplications and Gaming Port Range Forwarding Single Port ForwardingApplications & Gaming Port Range Triggering Applications and Gaming DMZPort Range Triggering Applications and Gaming QoS QoS Quality of ServiceVoice Device Online GamesMAC Address Ethernet PortRemote Management Access Administration ManagementRouter Access Local Management AccessLog Administration LogAdministration Diagnostics System RebootFactory Defaults Administration Factory DefaultsAdministration Firmware Upgrade DiagnosticsStatus Local Network Status RouterWireless Network Status Wireless NetworkAppendix a Troubleshooting Troubleshooting Appendix B Specifications Limited Warranty Obtaining Warranty ServiceExclusions and Limitations General Technical SupportSafety Notices FCC StatementFCC Radiation Exposure Statement Wireless Disclaimer Industry Canada StatementAvis d’Industrie Canada Изисквания Приложими Wireless Equipment Wireless-N/G/A/B Products CE MarkingNational Restrictions Third-Party Software or Firmware Product Usage RestrictionsItaly Latvia GHz RestrictionsDansk Danish Miljøinformation for kunder i EU Regulatory Information Norsk Norwegian Miljøinformasjon for kunder i EU Regulatory Information Cisco Products Software LicensesSchedule Cisco Software License Agreement Software End User License Agreement Software End User License Agreement GNU General Public License Schedule Network Magic FeaturesSchedule Open Source and Third Party Licenses Schedule 3-APreamble Software End User License Agreement No Warranty Schedule 3-BEND of Schedule 3-A GNU Lesser General Public License Software End User License Agreement Software End User License Agreement Software End User License Agreement END of Schedule 3-B Schedule 3-COriginal SSLeay License OpenSSL LicenseEND of Schedule 3-C