0% found this document useful (0 votes)
36 views59 pages

WRP400 V10 Ug B-Web

Uploaded by

bghs.sa.office
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views59 pages

WRP400 V10 Ug B-Web

Uploaded by

bghs.sa.office
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

USER GUIDE

Wireless-G Broadband Router


with 2 Phone Ports
Model: WRP400
About This Guide

About This Guide


Icon Descriptions
While reading through the User Guide you may see
various icons that call attention to specific items. Below is
a description of these icons:

NOTE: This check mark indicates that there is


a note of interest and is something that you
should pay special attention to while using the
product.

WARNING: This exclamation point indicates


that there is a caution or warning and it is
something that could damage your property or
product.

WEB: This globe icon indicates a noteworthy


website address or e-mail address.

Online Resources
Website addresses in this document are listed without
http:// in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add http:// in front of the web address.

Resource Website

Linksys www.linksys.com

Linksys International www.linksys.com/international

Glossary www.linksys.com/glossary

Network Security www.linksys.com/security

Copyright and Trademarks


Linksys is a registered trademark or
trademark of Cisco Systems, Inc. and/
or its affiliates in the U.S. and certain
other countries. Copyright © 2008
Cisco Systems, Inc. All rights reserved.
Other brands and product names are
trademarks or registered trademarks
of their respective holders.

Wireless-G Broadband Router with 2 Phone Ports i


Table of Contents

Chapter 1: Product Overview 4


Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Side Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Placement Positions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Chapter 2: Wireless Security Checklist 7


General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Chapter 3: Advanced Configuration 8


Setup > Basic Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Setup > DDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Setup > MAC Address Clone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Setup > Advanced Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Wireless > Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Wireless > Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Wireless > Wireless MAC Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Wireless > Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Security > Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Security > VPN Passthrough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Access Restrictions > Internet Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Applications and Gaming > Single Port Forwarding . . . . . . . . . . . . . . . . . . . . . . . 22
Applications and Gaming > Port Range Forward . . . . . . . . . . . . . . . . . . . . . . . . . 22
Applications & Gaming > Port Range Triggering . . . . . . . . . . . . . . . . . . . . . . . . . .23
Applications and Gaming > DMZ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Applications and Gaming > QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Administration > Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Administration > Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Administration > Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Administration > Factory Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Administration > Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Administration > Config Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Status > Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Status > Local Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Status > Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Access to the Voice Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Voice > Info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Voice > System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Voice > User 1/2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Voice > Admin Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Wireless-G Broadband Router with 2 Phone Ports ii


Table of Contents

Chapter 4: Interactive Voice Response Menu 36


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Appendix A: Troubleshooting 37
Appendix B: Specifications 39
Appendix C: Warranty Information 41
Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Exclusions and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Appendix D: Regulatory Information 43


FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Safety Notices and Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Avis d’Industrie Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Avis de non-responsabilité concernant les appareils sans fil . . . . . . . . . . . . . . . . . . 44
Telepermit Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) . . 45
CE Marking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
National Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Product Usage Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Technical Documents on www.linksys.com/international . . . . . . . . . . . . . . . . . . . . 47
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Appendix E: Software License Agreement 52


Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Wireless-G Broadband Router with 2 Phone Ports iii


Chapter 1 Product Overview

Chapter 1: Wireless (Green) The Wireless LED lights up


when the wireless feature is enabled. It flashes
Product Overview when the Router is actively sending or receiving
data over the network.
Thank you for choosing the Linksys Wireless-G Broadband Ethernet 1-4 (Green) These numbered LEDs,
Router with 2 Phone Ports. The Router lets you access corresponding with the numbered ports on the
the Internet via a wireless connection or through one of Router’s back panel, serve two purposes. If the
its four switched ports. You can also use the Router to LED is solidly lit, the Router is connected to a
share resources such as computers, printers and files. The device through that port. It flashes to indicate
built‑in phone adapter enables Voice-over-IP (VoIP) calls network activity over that port.
even while you are using the Internet.
Internet (Green) The Internet LED lights up
and stays on when there is a connection made
Front Panel through the Internet port. It flashes to indicate
network activity over the Internet port.

Back Panel

USB The USB port is reserved for future use.

Wi-Fi Protected Setup (White/Orange) If you


have client devices, such as wireless adapters, Internet The Internet port is where you will
that support Wi-Fi Protected Setup, then you connect your cable or DSL Internet connection.
can use Wi-Fi Protected Setup to automatically
Phone 1-2 The Phone ports connect standard
configure wireless security for your wireless
analog telephones to the Router.
network(s).
To use Wi-Fi Protected Setup, run the Setup Ethernet 1, 2, 3, 4 These Ethernet ports (1, 2, 3,
Wizard, or refer to the “Wireless > Basic Wireless 4) connect the Router to wired computers and
Settings” section of “Chapter 3: Advanced other Ethernet network devices.
Configuration”. Power The Power port is where you will
connect the power adapter.
The Wi-Fi Protected Setup button lights up
white and stays on while wireless security is
enabled on your wireless network(s). The LED
lights up orange if there is an error during the
Wi‑Fi Protected Setup process. Make sure the
client device supports Wi‑Fi Protected Setup.
Wait until the LED is off, and then try again.
Power (Green/Red) The Power LED lights up
green and stays on while the Router is powered
on. When the Router goes through its self-
diagnostic mode during every boot-up, the LED
will flash. When the diagnostic is complete, it
will be solidly lit green. If the LED lights up red,
make sure the correct power adapter is used.
If the LED remains red, contact your service
provider for support.
Phone 1-2 (Green) The Phone 1 or 2 LED lights
up and stays on when an active line is registered
to the corresponding port on the Router’s back
panel. The LED slowly flashes when voicemail
messages are waiting.

Wireless-G Broadband Router with 2 Phone Ports 4


Chapter 1 Product Overview

Side Panel Vertical Placement


The Router has a stand on the panel opposite to the
antenna. Rotate the stand 90 degrees, and place the
Router on a level surface near an electrical outlet.

Reset There are two ways to reset the Router’s


factory defaults. Either press and hold the Reset
button for approximately ten seconds, or restore
the defaults from the Administration > Factory
Defaults screen of the Router’s web-based
utility. (The Factory Defaults screen allows
you to restore the Router and voice defaults
separately.)

NOTE: Restoring the voice defaults


may require your login (the default
user name and password are admin). If
the defaults do not work, contact your
service provider for more information.
Stand To place the Router in a vertical position,
rotate the stand 90 degrees.

Placement Positions
There are three ways to physically install the Router. The
first way is to place the Router horizontally on a surface.
The second way is to stand the Router vertically on a Wall-Mounting Placement
surface. The third way is to mount the Router on a wall. The Router has four wall-mount slots on its back panel.
The distance between two adjacent slots is 60 mm
Horizontal Placement (2.36 inches).
The Router has four rubber feet on its bottom panel. Place Two screws are needed to mount the Router.
the Router on a level surface near an electrical outlet.
Suggested Mounting Hardware
2.5-3.0 mm

4-5 mm 1-1.5 mm

††Note: Mounting hardware illustrations are not


true to scale.

NOTE: Linksys is not responsible for damages


incurred by insecure wall-mounting hardware.

Follow these instructions:


1. Determine where you want to mount the Router. Make
sure that the wall you use is smooth, flat, dry, and
sturdy. Also make sure the location is within reach of
an electrical outlet.
2. Drill two holes into the wall. Make sure the holes are
60 mm (2.36 inches) apart.

Wireless-G Broadband Router with 2 Phone Ports 5


Chapter 1 Product Overview

3. Insert a screw into each hole and leave 3 mm


(0.12 inches) of its head exposed.
4. Maneuver the Router so two of the wall-mount slots
line up with the two screws.
5. Place the wall-mount slots over the screws and slide
the Router down until the screws fit snugly into the
wall-mount slots.

60 mm

Print this page at 100% size. Cut along


the dotted line, and place on the wall
to drill precise spacing.
Wall Mounting Template

Wireless-G Broadband Router with 2 Phone Ports 6


Chapter 2 Wireless Security Checklist

Chapter 2: 4. Enable encryption


Wireless Security Checklist Encryption protects data transmitted over a wireless
Wireless networks are convenient and easy to install, so network. Wi-Fi Protected Access (WPA/WPA2) and Wired
homes with high-speed Internet access are adopting them Equivalency Privacy (WEP) offer different levels of security
at a rapid pace. Because wireless networking operates by for wireless communication.
sending information over radio waves, it can be more A network encrypted with WPA/WPA2 is more secure
vulnerable to intruders than a traditional wired network. than a network encrypted with WEP, because WPA/WPA2
Like signals from your cellular or cordless phones, signals uses dynamic key encryption. To protect the information
from your wireless network can also be intercepted. Since as it passes over the airwaves, you should enable the
you cannot physically prevent someone from connecting highest level of encryption supported by your network
to your wireless network, you need to take some additional equipment.
steps to keep your network secure.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
1. Change the default wireless support WPA.
network name or SSID
General Network Security Guidelines
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This is Wireless network security is useless if the underlying
the name of your wireless network, and can be up to 32 network is not secure.
characters in length. To distinguish your wireless network •• Password protect all computers on the network and
from other wireless networks that may exist around you, individually password protect sensitive files.
you should change the default wireless network name to
something easily recognizable, but do not use personal •• Change passwords on a regular basis.
information (such as your Social Security number) because •• Install anti-virus software and personal firewall
this information may be available for anyone to see when software.
browsing for wireless networks.
•• Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
2. Change the default password knowledge.

For wireless products such as access points and routers, Additional Security Tips
you will be asked for a password when you want to change
•• Keep wireless routers, access points, or gateways away
their settings. These devices have a default password set
from exterior walls and windows.
by the factory. The Linksys default password is admin.
Hackers know these defaults and may try to use them •• Turn wireless routers, access points, or gateways
to access your wireless device and change your network off when they are not being used (at night, during
settings. To thwart any unauthorized changes, customize vacations).
the device’s password so it will be hard to guess.
•• Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
3. Enable MAC address filtering
Linksys routers give you the ability to enable Media Access WEB: For more information on wireless
Control (MAC) address filtering. The MAC address is a security, visit www.linksys.com/security
unique series of numbers and letters assigned to every
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.

Wireless-G Broadband Router with 2 Phone Ports 7


Chapter 3 Advanced Configuration

Chapter 3:
Advanced Configuration
After setting up the Router with the Setup Wizard (located
on the CD-ROM), the Router will be ready for use. However,
if you’d like to change its advanced settings, use the
Router’s web-based utility. This chapter describes each
web page of the utility and each page’s key functions. You
can access the utility via a web browser on a computer
connected to the Router.
The web-based utility has these main tabs: Setup, Wireless,
Security, Access Restrictions, Applications & Gaming,
Administration, Status, and Voice. Additional tabs will be
available after you click one of the main tabs.

NOTE: When first installing the Router, you


should use the Setup Wizard on the Setup CD-
ROM. If you want to configure advanced settings,
use this chapter to learn about the web-based
utility.

How to Access the Web-Based Utility Setup > Basic Setup

To access the web-based utility, launch the web browser on


your computer, and enter the Router’s default IP address,
Internet Setup
192.168.15.1, in the Address field. Then press Enter. The Internet Setup section configures the Router to your
Internet connection. Most of this information can be
NOTE: If you place the Router behind a primary obtained through your service provider.
router with the IP address of 192.168.15.1, then
the Router will automatically assume a new Internet Connection Type
default IP address, 192.168.16.1. Select the type of Internet connection your service
provider supports from the drop-down menu. These are
A login screen appears. The first time you open the the available types:
web-based utility, use the default user name and
password, admin. (You can set a new password from the •• Automatic Configuration - DHCP
Administration tab’s Management screen.) Click OK to •• Static IP
continue.
•• PPPoE
•• PPTP
•• L2TP
•• Telstra Cable

Automatic Configuration - DHCP


By default, the Router’s Internet Connection Type is set to
Automatic Configuration - DHCP, which should be kept
only if your service provider supports DHCP or you are
Login Screen connecting through a dynamic IP address. (This option
usually applies to cable connections.)

Setup > Basic Setup


The first screen that appears is the Basic Setup screen. This Internet Connection Type > Automatic Configuration - DHCP
allows you to change the Router’s general settings.
Wireless-G Broadband Router with 2 Phone Ports 8
Chapter 3 Advanced Configuration

Static IP this option, select Keep Alive. In the Redial Period field,
you specify how often you want the Router to check
If you are required to use a permanent IP address to the Internet connection. The default Redial Period is
connect to the Internet, select Static IP. 30 seconds.

PPTP
Point-to-Point Tunneling Protocol (PPTP) is a service that
applies to connections in Europe only.

Internet Connection Type > Static IP

Internet IP Address This is the Router’s IP address, when


seen from the Internet. Your service provider will provide
you with the IP address you need to specify here.
Subnet Mask This is the Router’s Subnet Mask, as seen
by users on the Internet (including your service provider).
Your service provider will provide you with the Subnet
Mask. Internet Connection Type > PPTP
Default Gateway Your service provider will provide you
Internet IP Address This is the Router’s IP address, as
with the IP address of the service provider server.
seen from the Internet. Enter the IP address provided by
PPPoE your service provider.

Some DSL-based service providers use PPPoE (Point- Subnet Mask This is the Router’s Subnet Mask, as seen
to-Point Protocol over Ethernet) to establish Internet by users on the Internet (including your service provider).
connections. If you are connected to the Internet through Enter the Subnet Mask provided by your service provider.
a DSL line, check with your service provider to see if they Default Gateway Enter the IP address of the service
use PPPoE. If they do, you will have to enable PPPoE. provider server, which is provided by your service
provider.
User Name and Password Enter the User Name and
Password provided by your service provider.
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If
Internet Connection Type > PPPoE your Internet connection has been terminated due to
inactivity, Connect on Demand enables the Router to
User Name and Password Enter the User Name and automatically re-establish your connection as soon as you
Password provided by your service provider. attempt to access the Internet again. To use this option,
Service Name (Optional) If provided by your service select Connect on Demand. In the Max Idle Time field,
provider, enter the Service Name. enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Connect on Demand: Max Idle Time You can configure Max Idle Time is 5 minutes.
the Router to cut the Internet connection after it has been
inactive for a specified period of time (Max Idle Time). If Keep Alive: Redial Period If you select this option, the
your Internet connection has been terminated due to Router will periodically check your Internet connection. If
inactivity, Connect on Demand enables the Router to you are disconnected, then the Router will automatically
automatically re-establish your connection as soon as you re-establish your connection. To use this option, select
attempt to access the Internet again. To use this option, Keep Alive. In the Redial Period field, you specify how often
select Connect on Demand. In the Max Idle Time field, you want the Router to check the Internet connection. The
enter the number of minutes you want to have elapsed default value is 30 seconds.
before your Internet connection terminates. The default
Max Idle Time is 5 minutes.
Keep Alive: Redial Period If you select this option,
the Router will periodically check your Internet
connection. If you are disconnected, then the Router
will automatically re-establish your connection. To use
Wireless-G Broadband Router with 2 Phone Ports 9
Chapter 3 Advanced Configuration

L2TP inactive for a specified period of time (Max Idle Time). If


your Internet connection has been terminated due to
L2TP is a service that applies to connections in Europe and inactivity, Connect on Demand enables the Router to
Israel. automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select Connect on Demand. In the Max Idle Time field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is 5 minutes.
Keep Alive: Redial Period If you select this option,
Internet Connection Type > L2TP the Router will periodically check your Internet
connection. If you are disconnected, then the Router
Server IP Address This is the IP address of the L2TP Server. will automatically re-establish your connection. To use
Enter the IP address provided by your service provider. this option, select Keep Alive. In the Redial Period field,
you specify how often you want the Router to check
User Name and Password Enter the User Name and
the Internet connection. The default Redial Period is
Password provided by your service provider.
30 seconds.
Connect on Demand: Max Idle Time You can configure
the Router to cut the Internet connection after it has been Optional Settings
inactive for a specified period of time (Max Idle Time). If
Some of these settings may be required by your service
your Internet connection has been terminated due to
provider. Verify with your service provider before making
inactivity, Connect on Demand enables the Router to
any changes.
automatically re-establish your connection as soon as you
attempt to access the Internet again. To use this option,
select Connect on Demand. In the Max Idle Time field,
enter the number of minutes you want to have elapsed
before your Internet connection terminates. The default
Max Idle Time is 5 minutes.
Keep Alive: Redial Period If you select this option,
the Router will periodically check your Internet Optional Settings
connection. If you are disconnected, then the Router
will automatically re-establish your connection. To use Host Name and Domain Name These fields allow you
this option, select Keep Alive. In the Redial Period field, to supply a host and domain name for the Router. Some
you specify how often you want the Router to check service providers, usually cable service providers, require
the Internet connection. The default Redial Period is these names as identification. You may have to check with
30 seconds. your service provider to see if your broadband Internet
service has been configured with a host and domain
Telstra Cable name. In most cases, leaving these fields blank will work.
Telstra Cable is a service used in Australia only. MTU MTU is the Maximum Transmission Unit. It specifies
the largest packet size permitted for Internet transmission.
Select Manual if you want to manually enter the largest
packet size that is transmitted. To have the Router select
the best MTU for your Internet connection, keep the
default setting, Auto.
Size When Manual is selected in the MTU field, this option
is enabled. Leave this value in the 576 to 1500 range. The
Internet Connection Type > Telstra Cable
default size depends on the Internet Connection Type:
Heart Beat Server This is the IP address of the Heart •• DHCP or Static IP: 1500
Beat Server. Enter the IP address provided by your service
provider. •• PPPoE: 1492

User Name and Password Enter the User Name and •• PPTP or L2TP: 1460
Password provided by your service provider. •• Telstra Cable: 1500
Connect on Demand: Max Idle Time You can configure Static DNS 1-3 The Domain Name System (DNS) is how
the Router to cut the Internet connection after it has been the Internet translates domain or website names into

Wireless-G Broadband Router with 2 Phone Ports 10


Chapter 3 Advanced Configuration

Internet addresses or URLs. Enter the IP address of the DNS


server, which is provided by your service provider. If you
wish to use a different DNS server, enter its IP address in
one of these fields. You can enter up to three DNS server IP
addresses here. The Router will use these for quicker access
to functioning DNS servers. By default, the Router uses
192.168.15.1 for DNS.

Network Setup
The Network Setup section changes the settings on the
network connected to the Router’s Ethernet ports. Wireless
setup is performed through the Wireless tab.

Router IP
DHCP Reservation
This presents both the Router’s Local IP Address and
Subnet Mask as seen by your network. •• Select Clients from DHCP Table Click the Select
check box to reserve a client’s IP address. Then click
Add Clients.
•• Manually Adding Client To manually assign an IP
Router IP
address, enter the client’s name in the Enter Client
Name field. Enter the IP address you want it to have in
DHCP Server Setting the Assign IP Address field. Enter its MAC address in the
The settings allow you to configure the Router’s Dynamic To This MAC Address field. Then click Add.
Host Configuration Protocol (DHCP) server function. The Clients Already Reserved
Router can be used as a DHCP server for your network. A
DHCP server automatically assigns an IP address to each A list of DHCP clients and their fixed local IP addresses
computer on your network. If you choose to enable the will be displayed at the bottom of the screen. If you
Router’s DHCP server option, make sure there is no other want to remove a client from this list, click Remove.
DHCP server on your network.
Click Save Settings to apply your changes, or click
Cancel Changes to cancel your changes. To view the
most up-to-date information, click Refresh. To exit this
screen, click Close.
DNS Proxy The DNS proxy relays DNS requests to the
current public network DNS server for the proxy, and
it replies as a DNS resolver to the client device on the
network. To enable the DNS Proxy feature, select Enabled.
DHCP Server Setting To disable the DNS Proxy feature, keep the default,
Disabled.
DHCP Server DHCP is enabled by factory default. If you
Starting IP Address Enter a value for the DHCP server
already have a DHCP server on your network, or you don’t
to start with when issuing IP addresses. Because the
want a DHCP server, then select Disabled (no other DHCP
Router’s default IP address is 192.168.15.1, the Starting
features will be available).
IP Address must be 192.168.15.2 or greater, but smaller
DHCP Reservation Click this button if you want to assign than 192.168.15.253. The default Starting IP Address is
a fixed local IP address to a MAC address. 192.168.15.100.
DHCP Reservation Maximum DHCP Users Enter the maximum number of
computers that you want the DHCP server to assign IP
You will see a list of DHCP clients with the following addresses to. This number cannot be greater than 253.
information: Client Name, Interface, IP Address, and The default is 50.
MAC Address.
IP Address Range Displayed here is the range of available
IP addresses.
Client Lease Time The Client Lease Time is the amount
of time a network user will be allowed connection to the

Wireless-G Broadband Router with 2 Phone Ports 11


Chapter 3 Advanced Configuration

Router with their current dynamic IP address. Enter the www.dyndns.org or www.TZO.com. If you do not want to
amount of time, in minutes, that the user will be “leased” use this feature, keep the default setting, Disabled.
this dynamic IP address. After the time is up, the user will
be automatically assigned a new dynamic IP address. The DDNS
default is 0 minutes, which means one day.
DDNS Service
Static DNS The Domain Name System (DNS) is how the
Internet translates domain or website names into Internet If your DDNS service is provided by DynDNS.org, then
addresses or URLs. Enter the local IP address of the DNS select DynDNS.org from the drop-down menu. If your
server, which is provided by your service provider. If you DDNS service is provided by TZO, then select TZO.com.
wish to use a different DNS server, enter that IP address The features available on the DDNS screen will vary,
in this field. The Router will use this for quicker access to a depending on which DDNS service provider you use.
functioning DNS server.
DynDNS.org
WINS The Windows Internet Naming Service (WINS)
manages each PC’s interaction with the Internet. If you
use a WINS server, enter that server’s IP address here.
Otherwise, leave this blank.

Time Setting
Time Zone Select the time zone in which your network
functions from this drop-down menu.
Automatically adjust clock for daylight saving
changes Select this option if you want the Router to
automatically adjust for daylight saving time. This option
is enabled by default.
Time Server Address If you want to use the Router’s
default Network Time Protocol (NTP) server, keep the
default, Auto. If you want to specify the NTP server, select
Manual, and enter the URL or IP address of the NTP server Setup > DDNS > DynDNS
you want to use.
User Name Enter the User Name for your DDNS account.
Resync Timer The timer controls how often the Router
resyncs with the NTP server. Enter the number of seconds Password Enter the Password for your DDNS account.
you want the interval to be, or keep the default, 3600 Host Name The is the DDNS URL assigned by the DDNS
seconds. service.
System Select the DynDNS service you use: Dynamic,
Static, or Custom. The default selection is Dynamic.
Mail Exchange (Optional) Enter the address of your mail
exchange server, so e-mails to your DynDNS address go to
your mail server.
Time Setting
Backup MX This feature allows the mail exchange server
Click Save Settings to apply your changes, or click Cancel to be a backup. To disable this feature, keep the default,
Changes to cancel your changes. Disabled. To enable the feature, select Enabled. If you
are not sure which setting to select, keep the default,
Setup > DDNS Disabled.

The Router offers a Dynamic Domain Name System (DDNS) Wildcard This setting enables or disables wildcards
feature. DDNS lets you assign a fixed host and domain for your host. For example, if your DDNS address is
name to a dynamic Internet IP address. It is useful when myplace.dyndns.org and you enable wildcards, then
you are hosting your own website, FTP server, or other x.myplace.dyndns.org will work as well (x is the wildcard).
server behind the Router. To disable wildcards, keep the default, Disabled. To enable
wildcards, select Enabled. If you are not sure which setting
Before you can use this feature, you need to sign to select, keep the default, Disabled.
up for DDNS service with a DDNS service provider,
Internet IP Address The Router’s Internet IP address is
displayed here. Because it is dynamic, it will change.
Wireless-G Broadband Router with 2 Phone Ports 12
Chapter 3 Advanced Configuration

Status The status of the DDNS service connection is MAC Address Clone
displayed here.
Enabled/Disabled To have the MAC address cloned,
Update To manually trigger an update, click this button. select Enabled.
Click Save Settings to apply your changes, or click Cancel MAC Address Enter the MAC address registered with
Changes to cancel your changes. your service provider here.
TZO.com Clone Your PC’s MAC Click this button to clone the MAC
address of the computer you are using.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Setup > Advanced Routing


This screen is used to set up the Router’s advanced
functions. Operating Mode allows you to select the
type(s) of advanced functions you use. Dynamic Routing
automatically adjusts how packets travel on your network.
Static Routing sets up a fixed route to another network
destination.

Setup > DDNS > TZO

E-mail Address, TZO Key, and Domain Name Enter the


settings of the account you set up with TZO.
Internet IP Address The Router’s Internet IP address is
displayed here. Because it is dynamic, it will change.
Status The status of the DDNS service connection is
displayed here.
Update To manually trigger an update, click this button.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Setup > MAC Address Clone


A MAC address is a 12-digit code assigned to a unique piece
Setup > Advanced Routing
of hardware for identification. Some service providers will
require you to register a MAC address in order to access
the Internet. If you do not wish to re-register the MAC Advanced Routing
address with your service provider, you may assign the
MAC address you have currently registered with your PPPoE Relay
service provider to the Router with the MAC Address Enabled/Disabled The PPPoE Relay feature enables an
Clone feature. L2TP Access Concentrator (LAC) to relay active discovery
and service selection functionality for PPP over Ethernet
(PPPoE), over a Layer 2 Tunneling Protocol (L2TP) control
channel, to an L2TP Network Server (LNS) or tunnel switch
(multihop node). The relay functionality of this feature
allows the LNS or tunnel switch to advertise the services it
offers to the client, thereby providing end-to-end control
of services between the LNS and a PPPoE client.
To enable the PPPoE Relay feature for the Internet side,
select Enabled. To disable the PPPoE Relay feature, keep
the default, Disabled.
Setup > MAC Address Clone

Wireless-G Broadband Router with 2 Phone Ports 13


Chapter 3 Advanced Configuration

NAT
Enabled/Disabled If this Router is hosting your network’s
connection to the Internet, keep the default, Enabled. If
another router exists on your network, select Disabled.
When the NAT setting is disabled, dynamic routing will be
enabled.

Dynamic Routing (RIP)


Enabled/Disabled This feature enables the Router to Advanced Routing > Routing Table
automatically adjust to physical changes in the network’s
layout and exchange routing tables with the other Routing Table
router(s). The Router determines the network packets’ For each route, the Destination LAN IP address, Subnet
route based on the fewest number of hops between Mask, Gateway, and Interface are displayed. Click
the source and the destination. When the NAT setting is Refresh to update the information. Click Close to exit
enabled, the Dynamic Routing feature is automatically this screen.
disabled. When the NAT setting is disabled, this feature
is available. Select Enabled to use the Dynamic Routing Click Save Settings to apply your changes, or click Cancel
feature. Changes to cancel your changes.

Static Routing Wireless > Basic Wireless Settings


A static route is a pre-determined pathway that network The basic settings for wireless networking are set on this
information must travel to reach a specific host or network. screen.
Enter the information described below to set up a new
static route.
Route Entries To set up a static route between the Router
and another network, select a number from the drop-
down list. Click Delete This Entry to delete a static route.
Enter Route Name Enter a name for the Route here,
using a maximum of 25 alphanumeric characters.
Destination LAN IP The Destination LAN IP is the address
of the remote network or host to which you want to assign
a static route.
Subnet Mask The Subnet Mask determines which
portion of a Destination LAN IP address is the network
portion, and which portion is the host portion.
Gateway This is the IP address of the gateway device that
allows for contact between the Router and the remote
network or host.
Interface This interface tells you whether the Destination
LAN IP address is on the LAN and Wireless (Ethernet and
wireless networks) or the Internet (WAN).
Click Show Routing Table to view the static routes you Wireless > Basic Wireless Settings
have already set up.
There are two ways to configure the Router’s wireless
network(s), manual and Wi-Fi Protected Setup.
Wi-Fi Protected Setup is a feature that makes it easy to set
up your wireless network. If you have client devices, such
as wireless adapters, that support Wi-Fi Protected Setup,
then you can use Wi-Fi Protected Setup.
Wireless Configuration To use Wi-Fi Protected Setup,
keep the default, Wi-Fi Protected Setup. Proceed to the

Wireless-G Broadband Router with 2 Phone Ports 14


Chapter 3 Advanced Configuration

“Wi-Fi Protected Setup” section. To manually configure


your wireless network, select Manual. Proceed to the
“Wireless Network” section.

NOTE: Wi-Fi Protected Setup is available


for your primary wireless network
(SSID1) only. To configure your second
wireless network (SSID2), select Manual.

If you are unable to configure the second wireless


network, contact your service provider for more
information (these settings may be controlled by
your service provider).

Wi-Fi Protected Setup


There are three methods available. Use the method that
applies to the client device you are configuring.

Wi-Fi Protected Setup > Congratulations

NOTE: Wi-Fi Protected Setup configures one


client device at a time. Repeat the instructions
for each client device that supports Wi-Fi
Protected Setup.

Method #1
Use this method if your client device has a Wi-Fi Protected
Setup button.
1. Click or press the Wi-Fi Protected Setup button on
the client device.
2. Click the Wi‑Fi Protected Setup button on this
screen.
3. After the client device has been configured, click
OK. Then refer back to your client device or its
documentation for further instructions.
Wireless > Basic Wireless Settings (Wi-Fi Protected Setup)
Method #2
Use this method if your client device has a Wi-Fi Protected
Setup PIN number.
1. Enter the PIN number in the field on this screen.
2. Click Register.
3. After the client device has been configured, click
OK. Then refer back to your client device or its
documentation for further instructions.
Method #3
Use this method if your client device asks for the Router’s
PIN number.

Wireless-G Broadband Router with 2 Phone Ports 15


Chapter 3 Advanced Configuration

1. Enter the PIN number listed on this screen. (It is also


listed on the label on the bottom of the Router.) To create a second wireless network, select Network
2. After the client device has been configured, click Enabled for the SSID2 setting. Then enter a unique
OK. Then refer back to your client device or its Wireless Network Name.
documentation for further instructions.
The Wi-Fi Protected Setup Status, Network Name (SSID), NOTE: If you are unable to configure the SSID2
Security, Encryption, and Passphrase are displayed at the settings, contact your service provider for more
bottom of the screen. information.

•• SSID Broadcast Enabled When wireless clients


NOTE: If you have client devices that do not
survey the local area for wireless networks to associate
support Wi-Fi Protected Setup, note the wireless
with, they detect the SSID broadcast by the Router. If
settings, and then manually configure those
you want to broadcast the SSID, keep the check box
client devices.
selected. If you do not want to broadcast the SSID,
deselect the check box.
Wireless Network •• For Internet Access Only On your second wireless
network (SSID2), you can set up guest access, which
allows guests Internet access while blocking them
from access to your local network. (For example, guests
will be blocked from access to your local computers
and their private data.) To limit guests to Internet
access only, keep the check box selected. To allow local
network access, deselect the check box.

NOTE: SSID1 does not support the For Internet


Access Only feature.

•• Network Enabled To enable the wireless network,


Wireless > Basic Wireless Settings (Manual Setup)
select the check box. To disable the wireless network,
deselect the check box.
Wireless Network Click Save Settings to apply your changes, or click Cancel
Network Mode From this drop-down menu, you can Changes to cancel your changes.
select the wireless standards running on your network(s).
If you have Wireless-G and Wireless-B devices in your Wireless > Wireless Security
network(s), keep the default setting, Mixed. If you have
only Wireless-G devices, select Wireless-G only. If you The Wireless Security screen configures the security
have only Wireless-B devices, select Wireless-B only. of your wireless network(s). The Router supports the
following wireless security mode options: WPA Personal,
Wireless Channel Select the channel you want to use. WPA Enterprise, WPA2 Personal, WPA2 Enterprise, and
To allow the Router to select the best available wireless WEP. (WPA stands for Wi-Fi Protected Access, which is a
channel, keep the default, Auto. security standard stronger than WEP encryption. WEP
SSID1/2 The SSID is the network name shared among all stands for Wired Equivalent Privacy.) These options
devices in a wireless network. The Router can support up are briefly discussed here. For detailed instructions on
to two wireless networks. By default, one wireless network configuring wireless security for the Router, refer to
is enabled, and you can create a second wireless network. “Chapter 2: Wireless Security.”
Configure the following settings for each wireless
network: NOTE: If you used Wi-Fi Protected Setup to
configure your wireless network(s), then wireless
•• Wireless Network Name (SSID) The default security has already been set up for your primary
wireless network uses this name: “linksys” followed wireless network. Do not make changes to the
by the last four digits of the Router’s wireless MAC Wireless Security screen for your primary wireless
address. To rename the default wireless network, network.
enter a unique Wireless Network Name, which is
case-sensitive and must not exceed 32 characters
(use any of the characters on the keyboard).
Wireless-G Broadband Router with 2 Phone Ports 16
Chapter 3 Advanced Configuration

Wireless Security WPA Algorithms WPA2 supports two encryption


methods, TKIP and AES, with dynamic encryption keys.
Select a SSID Select the appropriate SSID. (If you enabled Select the type of algorithm, AES or TKIP + AES. The
the second wireless network on the Basic Wireless Settings default is TKIP + AES.
screen, then set up wireless security for each SSID.)
WPA Shared Key Enter a WPA Shared Key of 8-63
Security Mode characters.

Select the security method for your wireless network. Group Key Renewal Enter a Group Key Renewal period,
Proceed to the appropriate instructions. If you do not which instructs the Router how often it should change the
want to use wireless security, keep the default, Disabled. encryption keys. The default is 3600 seconds.

WPA Personal WPA Enterprise


This option features WPA used in coordination with a
NOTE: If you are using WPA, always remember RADIUS server. (RADIUS stands for Remote Authentication
that each device in your wireless network MUST Dial-In User Service. This option should only be used when
use the same WPA method and shared key, or a RADIUS server is connected to the Router.)
else the network will not function properly.

Security Mode > WPA Enterprise


Security Mode > WPA Personal

WPA Algorithms WPA supports two encryption methods, WPA Algorithms WPA supports two encryption methods,
TKIP and AES, with dynamic encryption keys. Select the TKIP and AES, with dynamic encryption keys. Select the
type of algorithm, TKIP or AES. The default is TKIP. type of algorithm, TKIP or AES. The default is TKIP.

WPA Shared Key Enter a WPA Shared Key of 8-63 RADIUS Server Address Enter the IP address of the
characters. RADIUS server.

Group Key Renewal Enter a Group Key Renewal period, RADIUS Port Enter the port number of the RADIUS
which instructs the Router how often it should change the server. The default value is 1812.
encryption keys. The default is 3600 seconds. Shared Key Enter the key shared between the Router
and the server.
WPA2 Personal
Key Renewal Timeout Enter a Key Renewal Timeout
period, which instructs the Router how often it should
change the encryption keys. The default is 3600 seconds.

WPA2 Enterprise
This option features WPA2 used in coordination with a
RADIUS server. (It should only be used when a RADIUS
server is connected to the Router.)

Security Mode > WPA2 Personal

Wireless-G Broadband Router with 2 Phone Ports 17


Chapter 3 Advanced Configuration

Key 1-4 If you did not enter a Passphrase, enter the WEP
key(s) manually.
TX Key Select which TX (Transmit) Key to use. The default
is 1.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Wireless > Wireless MAC Filter


Wireless access can be filtered by using the MAC addresses of
the wireless devices transmitting within your network’s radius.

Security Mode > WPA2 Enterprise

WPA Algorithms WPA2 supports two encryption


methods, TKIP and AES, with dynamic encryption keys.
Select the type of algorithm, AES or TKIP + AES. The
default is TKIP + AES.
RADIUS Server Address Enter the IP address of the
RADIUS server.
RADIUS Port Enter the port number of the RADIUS
server. The default value is 1812.
Shared Key Enter the key shared between the Router
and the server.
Key Renewal Timeout Enter a Key Renewal Timeout
period, which instructs the Router how often it should
change the encryption keys. The default is 3600 seconds.

WEP
WEP is a basic encryption method, which is not as secure
as WPA.

Wireless > Wireless MAC Filter

Wireless MAC Filter


Select a SSID Select the appropriate SSID. (If you enabled
the second wireless network on the Basic Wireless Settings
screen, then set up wireless MAC filtering for each SSID.)
Wireless MAC Filter To filter wireless users by MAC address,
either permitting or blocking access, select Enabled. If you
do not wish to filter users by MAC address, keep the default
setting, Disabled.
Security Mode > WEP
Access Restriction
Encryption Select a level of WEP encryption, 64 bits 10 Prevent Select this to block wireless access by MAC
hex digits or 128 bits 26 hex digits. The default is 64 bits address. This button is selected by default.
10 hex digits.
Permit Select this to allow wireless access by MAC
Passphrase Enter a Passphrase to automatically generate address. This button is not selected by default.
WEP keys. Then click Generate.

Wireless-G Broadband Router with 2 Phone Ports 18


Chapter 3 Advanced Configuration

MAC Address Filter List Advanced Wireless


Wireless Client List Click this to open the Wireless Client Authentication Type The default is set to Auto, which
List screen. allows either Open System or Shared Key authentication
to be used. With Open System authentication, the sender
and the recipient do NOT use a WEP key for authentication.
With Shared Key authentication, the sender and recipient
use a WEP key for authentication. Select Shared Key to
only use Shared Key authentication.
Transmission Rate The rate of data transmission should
be set depending on the speed of your wireless network(s).
You can select from a range of transmission speeds, or you
can select Auto to have the Router automatically use the
fastest possible data rate and enable the Auto-Fallback
feature. Auto-Fallback will negotiate the best possible
Wireless Client List
connection speed between the Router and a wireless
client. The default is Auto.
Wireless Client List CTS Protection Mode The Router will automatically
use CTS (Clear-To-Send) Protection Mode when your
This screen shows the online and offline devices of the
Wireless‑G products are experiencing severe problems and
wireless network(s). The device information includes
are not able to transmit to the Router in an environment
Client Name, IP Address, MAC Address, and Status.
with heavy 802.11b traffic. This function boosts the
Select Save to MAC Address Filter List for any device Router’s ability to catch all Wireless-G transmissions but
you want to add to the MAC Address Filter List. Then will severely decrease performance. The default is Auto.
click Add.
Beacon Interval Enter a value between 1 and 65,535
To retrieve the most up-to-date information, click milliseconds. The Beacon Interval value indicates the
Refresh. To exit this screen and return to the Wireless frequency interval of the beacon. A beacon is a packet
MAC Filter screen, click Close. broadcast by the Router to synchronize the wireless
network(s). The default value is 100.
MAC 01-40 Enter the MAC addresses of the devices
whose wireless access you want to block or allow. DTIM Interval This value, between 1 and 255, indicates
the interval of the Delivery Traffic Indication Message
Click Save Settings to apply your changes, or click Cancel
(DTIM). A DTIM field is a countdown field informing
Changes to cancel your changes.
clients of the next window for listening to broadcast
and multicast messages. When the Router has buffered
Wireless > Advanced Wireless Settings broadcast or multicast messages for associated clients, it
The Advanced Wireless Settings screen is used to set up sends the next DTIM with a DTIM Interval value. Its clients
the Router’s advanced wireless functions. These settings hear the beacons and awaken to receive the broadcast
should only be adjusted by an expert administrator as and multicast messages. The default value is 1.
incorrect settings can reduce wireless performance. RTS Threshold Should you encounter inconsistent data
flow, only minor reduction of the default value, 2347, is
recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission. The RTS
Threshold value should remain at its default value of
2347.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.
Wireless > Advanced Wireless Settings

Wireless-G Broadband Router with 2 Phone Ports 19


Chapter 3 Advanced Configuration

Security > Firewall ActiveX ActiveX is a programming language for websites.


If you deny ActiveX, you run the risk of not having access to
The Firewall screen is used to configure a firewall that can Internet sites created using this programming language.
filter out various types of unwanted traffic on the Router’s Select this feature to enable ActiveX filtering. Deselect the
local network. feature to allow ActiveX usage.
Cookies A cookie is data stored on your computer and
used by Internet sites when you interact with them. Select
this feature to filter cookies. Deselect the feature to allow
cookie usage.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Security > VPN Passthrough


The VPN Passthrough screen allows you to enable VPN
tunnels using IPSec, PPTP, or L2TP protocols to pass through
the Router’s firewall.

Security > Firewall

Firewall
SPI Firewall Protection To use firewall protection, keep
the default, Enabled. To turn off firewall protection, select
Disabled.

Internet Filter Security > VPN Passthrough


Filter Anonymous Internet Requests This feature
makes it more difficult for outside users to work their VPN Passthrough
way into your network. This feature is selected by default.
Deselect the feature to allow anonymous Internet IPSec Passthrough Internet Protocol Security (IPSec) is
requests. a suite of protocols used to implement secure exchange
of packets at the IP layer. To allow IPSec tunnels to pass
Filter Internet NAT Redirection This feature uses port through the Router, keep the default, Enabled.
forwarding to block access to local servers from local
networked computers. Select this feature to filter Internet PPTP Passthrough Point-to-Point Tunneling Protocol
NAT redirection. It is not selected by default. (PPTP) allows the Point-to-Point Protocol (PPP) to be
tunneled through an IP network. To allow PPTP tunnels to
Filter IDENT (Port 113) This feature keeps port 113 from pass through the Router, keep the default, Enabled.
being scanned by devices outside of your local network.
This feature is selected by default. Deselect this feature to L2TP Passthrough Layer 2 Tunneling Protocol is the
disable it. method used to enable Point-to-Point sessions via the
Internet on the Layer 2 level. To allow L2TP tunnels to pass
Web Filter through the Router, keep the default, Enabled.
Click Save Settings to apply your changes, or click Cancel
Proxy Use of WAN proxy servers may compromise the
Changes to cancel your changes.
Router’s security. Denying Proxy will disable access to any
WAN proxy servers. Select this feature to enable proxy
filtering. Deselect the feature to allow proxy access. Access Restrictions > Internet Access
Java Java is a programming language for websites. If you The Internet Access screen allows you to block or allow
deny Java, you run the risk of not having access to Internet specific kinds of Internet usage and traffic, such as Internet
sites created using this programming language. Select access, designated services, and websites during specific
this feature to enable Java filtering. Deselect the feature days and times.
to allow Java usage.

Wireless-G Broadband Router with 2 Phone Ports 20


Chapter 3 Advanced Configuration

Summary

Status Policies are disabled by default. To enable a policy,


select the policy number from the drop-down menu, and
select Enabled.
To create a policy, follow steps 1-11. Repeat these steps to
create additional policies, one at a time.
1. Select a number from the Access Policy drop-down
menu.
2. Enter a Policy Name in the field provided.
3. To enable this policy, select Enabled.
4. Click Edit List to select which computers will be
affected by the policy. The List of PCs screen appears.
Access Restrictions > Internet Access
You can select a PC by MAC address or IP address. You
can also enter a range of IP addresses if you want this
policy to affect a group of computers. After making your
Internet Access Policy changes, click Save Settings to apply your changes, or
Access Policy Access can be managed by a policy. Use the click Cancel Changes to cancel your changes. Then
settings on this screen to establish an access policy (after click Close.
Save Settings is clicked). Selecting a policy from the drop-
down menu will display that policy’s settings. To delete a
policy, select that policy’s number and click Delete This
Policy. To view all the policies, click Summary.

Summary
The policies are listed with the following information:
No., Policy Name, Access, Days, Time of Day, and status
(Enabled). To enable a policy, select Enabled. To delete
a policy, click Delete. Click Save Settings to save your
changes, or click Cancel Changes to cancel your changes.
To return to the Internet Access Policy screen, click Close.

List of PCs

5. Select the appropriate option, Deny or Allow,


depending on whether you want to block or allow
Internet access for the computers you listed on the List
of PCs screen.

Wireless-G Broadband Router with 2 Phone Ports 21


Chapter 3 Advanced Configuration

6. Decide which days and what times you want this policy
to be enforced. Select the individual days during which
the policy will be in effect, or select Everyday. Then
enter a range of hours and minutes during which the
policy will be in effect, or select 24 Hours.
7. You can block websites with specific URL addresses.
Enter each URL in a separate URL field.
8. You can also block websites using specific keywords.
Enter each keyword in a separate Keyword field.
9. You can filter access to various services accessed
over the Internet, such as FTP or telnet. (You
can block up to three applications per policy.)

From the Applications list, select the application you


want to block. Then click the >> button to move it to
the Blocked List. To remove an application from the
Blocked List, select it and click the << button.
Applications and Gaming > Single Port Forwarding
10. If the application you want to block is not listed
or you want to edit a service’s settings, enter the
application’s name in the Application Name field. Enter
Single Port Forwarding
its range in the Port Range fields. Select its protocol Common applications are available for the first five
from the Protocol drop-down menu. Then click Add. entries. Select the appropriate application. Then enter the
IP address of the server that should receive these requests.
To modify a service, select it from the Select Enabled to activate this entry.
Application list. Change its name, port range,
For additional applications, complete the following fields:
and/or protocol setting. Then click Modify.
Application Name Enter the name you wish to give the
To delete a service, select it from the Application list. application. Each name can be up to 12 characters.
Then click Delete. External Port Enter the external port number used by
11. Click Save Settings to save the policy’s settings. To the server or Internet application. Check with the Internet
cancel the policy’s settings, click Cancel Changes. application documentation for more information.
Internal Port Enter the internal port number used by
Applications and Gaming > Single Port the server or Internet application. Check with the Internet
Forwarding application documentation for more information.

The Single Port Forwarding screen allows you to customize Protocol Select the protocol used for this application,
port services for common applications on this screen. either TCP, UDP, or Both.

When users send these types of requests to your network via To IP Address For each application, enter the IP address
the Internet, the Router will forward those requests to the of the PC that should receive the requests. If you assigned
appropriate servers (computers). Before using forwarding, a static IP address to the PC, then you can click DHCP
you should assign static IP addresses to the designated Reservation on the Basic Setup screen to look up its static
servers (use the DHCP Reservation feature on the Basic Setup IP address.
screen). Enabled For each application, select Enabled to enable
port forwarding.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Applications and Gaming > Port Range


Forward
The Port Range Forward screen allows you to set up public
services on your network, such as web servers, ftp servers,
e-mail servers, or other specialized Internet applications.
(Specialized Internet applications are any applications
Wireless-G Broadband Router with 2 Phone Ports 22
Chapter 3 Advanced Configuration

that use Internet access to perform functions such as


videoconferencing or online gaming. Some Internet
Applications & Gaming > Port Range
applications may not require any forwarding.) Triggering
When users send these types of requests to your network via The Port Range Triggering screen allows the Router to
the Internet, the Router will forward those requests to the watch outgoing data for specific port numbers. The IP
appropriate servers (computers). Before using forwarding, address of the computer that sends the matching data is
you should assign static IP addresses to the designated remembered by the Router, so that when the requested
servers (use the DHCP Reservation feature on the Basic Setup data returns through the Router, the data is pulled back
screen). to the proper computer by way of IP address and port
If you need to forward all ports to one computer, click the mapping rules.
DMZ tab.

Applications and Gaming > Port Range Triggering

Applications and Gaming > Port Range Forward


Port Range Triggering
Port Range Forward Application Name Enter the application name of the
To forward a port, enter the information on each line for trigger.
the criteria required. Triggered Range For each application, enter the starting
Application Name In this field, enter the name you and ending port numbers of the triggered port number
wish to give the application. Each name can be up to 12 range. Check with the Internet application documentation
characters. for the port number(s) needed.

Start~End Port Enter the number or range of port(s) Forwarded Range For each application, enter the starting
used by the server or Internet applications. Check and ending port numbers of the forwarded port number
with the Internet application documentation for more range. Check with the Internet application documentation
information. for the port number(s) needed.

Protocol Select the protocol used for this application, Enabled Select Enabled to enable port triggering for the
either TCP, UDP, or Both. applications you have defined.

To IP Address For each application, enter the IP address Click Save Settings to apply your changes, or click Cancel
of the PC running the specific application. If you assigned Changes to cancel your changes.
a static IP address to the PC, then you can click DHCP
Reservation on the Basic Setup screen to look up its static Applications and Gaming > DMZ
IP address.
The DMZ feature allows one network computer to be
Enabled Select Enabled to enable port forwarding for exposed to the Internet for use of a special-purpose
the applications you have defined. service such as Internet gaming or videoconferencing.
DMZ hosting forwards all the ports at the same time to
Click Save Settings to apply your changes, or click Cancel
one PC. The Port Range Forwarding feature is more secure
Changes to cancel your changes.
because it only opens the ports you want to have opened,
while DMZ hosting opens all the ports of one computer,
exposing the computer to the Internet.

Wireless-G Broadband Router with 2 Phone Ports 23


Chapter 3 Advanced Configuration

Click Save Settings to apply your changes, or click Cancel


Changes to cancel your changes.

Applications and Gaming > QoS


Quality of Service (QoS) ensures better service to
high-priority types of network traffic, which may
involve demanding, real-time applications, such as
videoconferencing.

Applications and Gaming > DMZ

DMZ
Any PC whose port is being forwarded must have its DHCP
client function disabled and should have a new static IP
address assigned to it because its IP address may change
when using the DHCP function.
Enabled/Disabled To disable DMZ hosting, select
Disabled. To expose one PC, select Enabled. Then
configure the following settings:
Source IP Address If you want any IP address to be the
source, select Any IP Address. If you want to specify an IP
address or range of IP addresses as the designated source,
Applications and Gaming > QoS
select and complete the IP address range fields.
Destination If you want to specify the DMZ host by IP
address, select IP Address and enter the IP address in
QoS (Quality of Service)
the field provided. If you want to specify the DMZ host Wireless
by MAC address, select MAC Address and enter the MAC
address in the field provided. To retrieve this information, WMM Support If you have other devices that support
click DHCP Client Table. Wi‑Fi Multimedia (WMM) on your network, select Enabled.
Otherwise, keep the default, Disabled.
No Acknowledgement If you want to disable the Router’s
Acknowledgement feature, so the Router will not re-send
data if an error occurs, then select Enabled. Otherwise,
keep the default, Disabled.

Internet Access Priority


In this section, you can set the bandwidth priority for a
variety of applications and devices. There are four levels
DMZ > DHCP Client Table priority: High, Medium, Normal, or Low. When you set
priority, do not set all applications to High, because this will
DHCP Client Table defeat the purpose of allocating the available bandwidth.
If you want to select below normal bandwidth, select Low.
The DHCP Client Table lists computers and other Depending on the application, a few attempts may be
devices that have been assigned IP addresses by needed to set the appropriate bandwidth priority.
the Router. The list can be sorted by Client Name, IP
Address, and MAC Address. To select a DHCP client, click Enabled/Disabled To use the QoS policies you have set,
Select. To retrieve the most up-to-date information, keep the default, Enabled. Otherwise, select Disabled.
click Refresh. To exit this screen and return to the DMZ Upstream Bandwidth To allow the Router to control the
screen, click Close. maximum bandwidth for upstream data transmissions,
keep the default, Auto. To manually set the maximum,

Wireless-G Broadband Router with 2 Phone Ports 24


Chapter 3 Advanced Configuration

select Manual, and enter the appropriate number in the Game Select the appropriate game. If you select Add a
field provided. New Game, follow the Add a New Game instructions.

Category Priority Select the appropriate priority: High, Medium


(Recommend), Normal, or Low.
There are four categories available. Select one of the
Click Add to save your changes. Your new entry will appear
following: Application, Online Games, MAC Address,
in the Summary list.
or Ethernet Port. Proceed to the instructions for your
selection. Add a New Game

Application
Applications Select the appropriate application. If you
select Add a New Application, follow the Add a New
Application instructions.
Priority Select the appropriate priority: High, Medium,
Normal, or Low.
Click Add to save your changes. Your new entry will appear QoS > Add a New Game
in the Summary list.
Enter a Name Enter any name to indicate the name of
Add a New Application the entry.
Port Range Enter the port range that the application will
be using. For example, if you want to allocate bandwidth
for FTP, you can enter 21-21. If you need services for an
application that uses from 1000 to 1250, you enter 1000-
1250 as your settings. You can have up to three ranges
to define for this bandwidth allocation. Port numbers
can range from 1 to 65535. Check your application’s
documentation for details on the service ports used.
QoS > Add a New Application

Enter a Name Enter any name to indicate the name of Select the protocol TCP, UDP, or Both.
the entry. Priority Select the appropriate priority: High, Medium
Port Range Enter the port range that the application will (Recommend), Normal, or Low.
be using. For example, if you want to allocate bandwidth Click Add to save your changes. Your new entry will appear
for FTP, you can enter 21-21. If you need services for an in the Summary list.
application that uses from 1000 to 1250, you enter 1000-
1250 as your settings. You can have up to three ranges MAC Address
to define for this bandwidth allocation. Port numbers
can range from 1 to 65535. Check your application’s
documentation for details on the service ports used.

Select the protocol TCP, UDP, or Both.


Priority Select the appropriate priority: High, Medium QoS > MAC Address
(Recommend), Normal, or Low.
Click Add to save your changes. Your new entry will appear Enter a Name Enter a name for your device.
in the Summary list. MAC Address Enter the MAC address of your device.
Online Games Priority Select the appropriate priority: High, Medium
(Recommend), Normal, or Low.
Click Add to save your changes. Your new entry will appear
in the Summary list.

QoS > Online Games

Wireless-G Broadband Router with 2 Phone Ports 25


Chapter 3 Advanced Configuration

Ethernet Port

QoS > Ethernet Port

Ethernet Select the appropriate Ethernet port.


Priority Select the appropriate priority: High, Medium
(Recommend), Normal, or Low.
Click Add to save your changes. Your new entry will appear
in the Summary list.

Summary
This lists the QoS entries you have created for your
applications and devices.
Priority This column displays the bandwidth priority of
High, Medium, Normal, or Low.
Name This column displays the application, device, or
port name.
Information This column displays the port range or Administration > Management
MAC address entered for your entry. If a pre-configured
application or game was selected, there will be no valid Management
entry shown in this section.
Remove Click this button to remove an entry. Router Access
Edit Click this button to make changes. To ensure the Router’s security, you will be asked for your
password when you access the Router’s web-based utility.
Click Save Settings to apply your changes, or click Cancel The default is admin.
Changes to cancel your changes.
Router Password Enter a new password for the Router.
Administration > Management Re-enter to confirm Enter the password again to
confirm.
The Administration > Management screen allows the
network’s administrator to manage specific Router Web Access
functions for access and security.
Web Utility Access HTTP (HyperText Transport Protocol)
is the communications protocol used to connect to servers
on the World Wide Web. HTTPS uses SSL (Secured Socket
Layer) to encrypt data transmitted for higher security.
Select HTTP or HTTPS. HTTP is the default.
Web Utility Access via Wireless If you are using the
Router in a public domain where you are giving wireless
access to your guests, you can disable wireless access to
the Router’s web-based utility. You will only be able to
access the utility via a wired connection if you disable
the setting. Keep the default, Enabled, to allow wireless
access to the utility, or select Disabled to block wireless
access to the utility.

Wireless-G Broadband Router with 2 Phone Ports 26


Chapter 3 Advanced Configuration

Remote Access Multimedia Streaming


Remote Management To permit remote access of the RTSP Support If you are experience issues with video-
Router, from outside the local network, select Enabled. on-demand applications, select Enabled to improve
Otherwise, keep the default, Disabled. multimedia transmissions. Using this option, the Router
will establish channels with the Real Time Streaming
Web Utility Access HTTP (HyperText Transport Protocol)
Protocol) RTSP server, which is located at the service
is the communications protocol used to connect to servers
provider. Otherwise, keep the default, Disabled.
on the World Wide Web. HTTPS uses SSL (Secured Socket
Layer) to encrypt data transmitted for higher security.
Select HTTP or HTTPS. HTTP is the default.
IGMP
Remote Upgrade If you want to be able to upgrade the Internet Group Multicast Protocol (IGMP) is used to
Router remotely, from outside the local network, select establish membership in a multicast group and is
Enabled. (You must have the Remote Management commonly used for multicast streaming applications. For
feature enabled as well.) Otherwise, keep the default, example, you may have Internet Protocol Television (IPTV)
Disabled. with multiple setup boxes on the same local network.
These setup boxes have different video streams running
Allowed Remote IP Address If you want to be able to simultaneously, so you should use the IGMP feature of the
access the Router from any external IP address, select Any Router.
IP Address. If you want to specify an external IP address or
range of IP addresses, then select the second option and Support IGMP Version Select the version you want to
complete the fields provided. support, IGMP v1, IGMP v2, or IGMP v3. If you are not
sure which version to select, keep the default, IGMP v2.
Remote Management Port Enter the port number that
will be open to outside access. IGMP Proxy Keep the default, Enabled, if you want
to allow multicast traffic through the Router for your
multimedia application devices. Otherwise, select
NOTE: When you are in a remote location
Disabled.
and wish to manage the Router, enter
http://<Internet_IP_address>:port or Immediate Leave Select Enabled, if you use IPTV
https://<Internet_IP_address>:port, applications and want to allow immediate channel
depending on whether you use HTTP or HTTPS. swapping or flipping without lag or delays. Otherwise,
Enter the Router’s specific Internet IP address in keep the default, Disabled.
place of <Internet_IP_address>, and enter the Click Save Settings to apply your changes, or click Cancel
Remote Management Port number in place of Changes to cancel your changes.
the word port.
Administration > Log
UPnP
The Router can keep logs of all traffic for your Internet
Universal Plug and Play (UPnP) allows Windows XP and Vista connection.
to automatically configure the Router for various Internet
applications, such as gaming and videoconferencing.
UPnP If you want to use UPnP, keep the default, Enabled.
Otherwise, select Disabled.
Allow Users to Configure Keep the default, Enabled,
if you want to be able to make manual changes to the
Router while using the UPnP feature. Otherwise, select
Disabled.
Keep UPnP Configurations After System Reboot If
you enable the Allow Users to Configure option, then this
Administration > Log
option will be available. Select Enabled, if you want to
keep UPnP configuration settings after the Router reboots.
Otherwise, keep the default, Disabled. Log
Allow Users to Disable Internet Access Select Enabled, Log To disable the Log function, keep the default,
if you want to be able to prohibit any and all Internet Disabled. To monitor traffic between the network and the
connections. Otherwise, keep the default, Disabled. Internet, select Enabled. With logging enabled, you can
choose to view temporary logs.

Wireless-G Broadband Router with 2 Phone Ports 27


Chapter 3 Advanced Configuration

View Log To view the logs, click View Log. Diagnostics


Ping Test
The Ping test checks the status of a connection.
IP or URL Address Enter the address of the PC whose
connection you wish to test.
Packet Size Enter the packet size you want to use. The
default is 32 bytes.
Times to Ping Enter many times you wish to test it.
Start to Ping To run the test, click this button. The Ping
Test screen will show if the test was successful. Click Close
to return to the Diagnostics screen.
Log > View Log

Log
•• Type Select Incoming Log, Outgoing Log, Security
Log, or DHCP Client Log.
•• <Type> Log The Incoming Log will display a temporary
log of the source IP addresses and destination
port numbers for the incoming Internet traffic. The
Outgoing Log will display a temporary log of the
local IP addresses, destination URLs/IP addresses, and
service/port numbers for the outgoing Internet traffic.
The Security log will display the login information for
the web-based utility. The DHCP Client Log will display
the LAN DHCP server status information. Diagnostics > Ping

Click Refresh to update the log. Click Clear to clear all Traceroute Test
the information that is displayed.
The Traceroute test tests the performance of a
Click Save Settings to apply your changes, or click Cancel
connection.
Changes to cancel your changes.
IP or URL Address Enter the address of the PC whose
Administration > Diagnostics connection you wish to test.

The diagnostic tests (Ping, Traceroute, and Detect Active Start to Traceroute To run the test, click this button. The
LAN Clients) allow you to check the connections of your Traceroute Test screen will show if the test was successful.
network devices, including connection to the Internet. Click Close to return to the Diagnostics screen.

Administration > Diagnostics

Wireless-G Broadband Router with 2 Phone Ports 28


Chapter 3 Advanced Configuration

Administration > Factory Defaults

NOTE: Restoring factory defaults deletes custom


settings. Note your custom settings before
restoring the factory defaults.

Factory Defaults
Diagnostics > Traceroute
Restore Router Factory Defaults To reset the Router
Detect Active LAN Client(s) settings to the default values, select Yes. Then click Save
Settings. Any custom Router settings you have saved will
Search Time Select how many seconds you wish to be lost when the default settings are restored.
perform this search: 5, 10, or 15.
Restore Voice Factory Defaults To reset the voice
Start to Search To run the search, click this button. The settings to the default values, select Yes. Then click Save
Active LAN Client Table screen will show the search results. Settings. Any custom Voice settings you have saved will
You can sort the results by IP Address, MAC Address, be lost when the default settings are restored.
Interface, Client Name, or IP Status.
To re-run the search, click Retry. Click Close to return to NOTE: Restoring the voice defaults may require
the Diagnostics screen. your login (the default user name and password
are admin). If the defaults do not work, contact
your service provider for more information.

On the Factory Defaults screen, click Save Settings to


apply your changes, or click Cancel Changes to cancel
your changes.

Administration > Firmware Upgrade


The Firmware Upgrade screen allows you to upgrade the
Router’s firmware. Do not upgrade the firmware unless
Diagnostics > Active LAN Client Table
you are experiencing problems with the Router or the new
firmware has a feature you want to use.
Administration > Factory Defaults If you want to upgrade the Router’s firmware, then you may
The Administration > Factory Defaults screen allows need a user name and password available only from your
you to restore the Router’s configuration to its Router service provider. Contact your service provider for more
and/or voice factory default settings. information.

Username & Password


If you see the Username & Password screen, enter the User
Name and Password provided by your service provider.
(The factory default User Name and Password are admin.)
Then click OK.

Wireless-G Broadband Router with 2 Phone Ports 29


Chapter 3 Advanced Configuration

Administration > Username & Password


Administration > Config Management

NOTE: The Router may lose the settings you


have customized. Before you upgrade its
Backup Configuration
firmware, use the Config Management screen Backup To save the Router’s settings in a configuration file,
to back up the Router’s settings. Refer to the click this button and follow the on-screen instructions.
Administration > Config Management section for
more information. Restore Configuration
To use this option, you must have previously backed up its
Firmware Upgrade configuration settings.
Before upgrading the firmware, download the Router’s Please select a file to restore Click the Browse button
firmware upgrade file from the Linksys website, and select the Router’s configuration file.
www.linksys.com. Then extract the file. Restore To restore the Router’s configuration settings,
click this button and follow the on-screen instructions.

Status > Router


The Router screen displays information about the Router.

Administration > Firmware Upgrade

Please select a file to upgrade Click Browse and select


the extracted firmware upgrade file.
Start to Upgrade After you have selected the
appropriate file, click this button, and follow the on-screen
instructions.

Administration > Config Management


The Config Management screen allows you to back up or
restore the Router’s settings using a configuration file.

Status > Router

Router Information
Firmware Version The version number of the Router’s
current firmware is displayed.

Wireless-G Broadband Router with 2 Phone Ports 30


Chapter 3 Advanced Configuration

Current Time The time set on the Router is displayed. End IP Address For the range of IP addresses used by
devices on your local network, the ending IP address is
Internet MAC Address The Router’s MAC address, as
displayed.
seen by your service provider, is displayed.
DHCP Clients Table Click this button to view a list of
Router Name The name of the Router is displayed.
computers that are using the Router as a DHCP server.
Host Name If required by your service provider, this was
entered on the Basic Setup screen.
Domain Name If required by your service provider, this
was entered on the Basic Setup screen.

Internet Connection
This section shows the current network information.
It varies depending on the Internet connection type
selected on the Basic Setup screen.
Click Refresh to update the on-screen information. DHCP Clients Table

Status > Local Network DHCP Client Table


The Local Network screen displays information about the The DHCP Client Table lists computers and other
local, wired network. devices that have been assigned IP addresses by
the Router. The list can be sorted by Client Name, IP
Address, Interface, MAC Address, and Expires Time
(how much time is left for the current IP address). To
remove a DHCP client, click Delete. To retrieve the
most up-to-date information, click Refresh. To exit
this screen and return to the Local Network screen,
click Close.

Status > Wireless Network


The Wireless Network screen displays information about
your wireless network(s).

Status > Local Network

Local Network
Local MAC Address The MAC address of the Router’s
local, wired interface is displayed.
Router IP Address The Router’s IP address, as it appears
on your local network, is displayed.
Subnet Mask The Subnet Mask of the Router is
displayed.

DHCP Server
DHCP Server The status of the Router’s DHCP server Status > Wireless Network
function is displayed.
Start IP Address For the range of IP addresses used by Wireless Network
devices on your local network, the starting IP address is Channel The channel of the wireless network(s) is
displayed. displayed.
Mode The wireless mode is displayed.

Wireless-G Broadband Router with 2 Phone Ports 31


Chapter 3 Advanced Configuration

Wireless Network 1-2


Status information for each wireless network is displayed.
Wireless MAC Address The wireless MAC address of the
Router’s local, wireless interface is displayed.
Network Name (SSID) The network name, which is also
called the SSID, is displayed.
Security The wireless security method is displayed.
SSID Broadcast The status of the SSID Broadcast feature
is displayed.

Access to the Voice Screens


There are two level of access, user and Admin Login. When
you click the Voice tab, the Info screen is automatically
displayed. If you set a User Password on the System screen,
then you will be asked to enter it before the Info screen is
displayed.
The Admin Login allows access to more advanced settings.
To access administrative screens, click Admin Login, and
enter the user name and password provided by your
service provider. Contact your service provider for more
information. (The factory default Admin Login name and
password are admin.)

NOTE: In most cases, you do not need to use


the administrative screens. Contact your service
provider for more information.

Voice > Info Voice > Info

The Info screen displays Voice over Internet Protocol (VoIP) Product Information
information about the Router.
Product Name The model number of the Router is
displayed.
Serial Number The serial number of the Router is
displayed.
Software Version The version number of the Router
software is displayed.
Hardware Version The version number of the Router
hardware is displayed.
MAC Address The MAC address of the Router is
displayed.
Client Certificate The status of the client certificate,
which indicates that the Router has been authorized by
your service provider, is displayed.

System Status
Current Time The current date and time of the Router are
displayed.

Wireless-G Broadband Router with 2 Phone Ports 32


Chapter 3 Advanced Configuration

Elapsed Time The amount of time elapsed since the last Call 1/2 Encoder The codec used for encoding is
reboot of the Router is displayed. displayed.
RTP Packets Sent The number of RTP packets sent by the Call 1/2 Decoder The codec used for decoding is
Router is displayed. displayed.
RTP Bytes Sent The number of RTP bytes sent by the Call 1/2 FAX The status of the fax pass-through mode is
Router is displayed. displayed.
RTP Packets Recv The number of RTP packets received Call 1/2 Type The direction of the call is displayed.
by the Router is displayed.
Call 1/2 Remote Hold This indicates whether the far end
RTP Bytes Recv The number of RTP bytes received by the has placed the call on hold.
Router is displayed.
Call 1/2 Callback This indicates whether the call was
SIP Messages Sent The number of SIP messages sent by triggered by a call back request.
the Router is displayed.
Call 1/2 Peer Name The name of the internal phone is
SIP Bytes Sent The number of SIP bytes sent by the displayed.
Router is displayed.
Call 1/2 Peer Phone The phone number of the internal
SIP Messages Recv The number of SIP messages received phone is displayed.
by the Router is displayed.
Call 1/2 Duration The duration of the call is displayed.
SIP Bytes Recv The number of SIP bytes received by the
Call 1/2 Packets Sent The number of packets sent is
Router is displayed.
displayed.
External IP The external IP address used for NAT mapping
Call 1/2 Packets Recv The number of packets received
is displayed.
is displayed.
Line 1/2 Status Call 1/2 Bytes Sent The number of bytes sent is
displayed.
Lines 1 and 2 have the same status information available.
Call 1/2 Bytes Recv The number of bytes received is
Hook State The status of the Internet phone line’s displayed.
readiness is displayed. “On” indicates that it is ready for
use, while “Off” indicates that it is in use. Call 1/2 Decode Latency The number of milliseconds for
decoder latency is displayed.
Registration State The status of the line’s registration
with the service provider is displayed. Call 1/2 Jitter The number of milliseconds for receiver
jitter is displayed.
Last Registration At The last date and time the line was
registered are displayed. Call 1/2 Round Trip Delay The number of milliseconds
for delay is displayed.
Next Registration In The number of seconds until the
next registration is displayed. Call 1/2 Packets Lost The number of packets lost is
displayed.
Message Waiting This indicates whether you have new
voicemail waiting. Call 1/2 Packet Error The number of invalid packets
received is displayed.
Call Back Active This indicates whether a call back
request is in progress. Call 1/2 Mapped RTP Port The number of the NAT
mapped RTP port is displayed.
Last Called Number The last number called is displayed.
Call 1/2 Media Loopback The Media Loopback feature
Last Caller Number The number of the last caller is allows the service provider to test the quality of the
displayed. connection to the Router. The status of the feature is
Mapped SIP Port The port number of the NAT mapped displayed.
SIP port is displayed.
Calls 1 and 2 have the same status information available.
Call 1/2 State The status of the call is displayed.
Call 1/2 Tone The type of tone used by the call is
displayed.

Wireless-G Broadband Router with 2 Phone Ports 33


Chapter 3 Advanced Configuration

Voice > System Call Forward Settings


The System screen displays the User Password setting. Enter the call forwarding numbers you want to use.
Cfwd All Dest Enter the number for the Call Forward All
Service feature (when you want to forward all calls).
Cfwd Busy Dest Enter the number for the Call Forward
Busy feature (when the line is busy).
Cfwd No Ans Dest Enter the number for the Call Forward
No Answer feature (when the line is not answered).
Cfwd No Ans Delay Enter the number of seconds to wait
before the Call Forward No Answer feature is triggered.
Voice > System The default is 20.

System Configuration Selective Call Forward Settings


User Password Enter the password for user access to the Enter the caller numbers that will be forwarded to specific
Voice screens. (By default, there is no password.) phone numbers.
Cfwd Sel1-8 Caller Enter the caller number pattern to
Miscellaneous Settings trigger the Call Forward Selective (1-8) feature.
No settings are displayed. Cfwd Sel1-8 Dest Enter the forward number for the Call
Click Save Settings to apply your change, or click Cancel Forward Selective (1-8) feature.
Changes to cancel your change. Cfwd Last Caller Enter the caller number that is actively
forwarded to the Cfwd Last Dest number when the Call
Voice > User 1/2 Forward Last activation code is used.
The User 1 and 2 screens display similar settings. The User 1 Cfwd Last Dest Enter the forward number for the Cfwd
screen displays settings for users of phone line 1, and the Last Caller feature.
User 2 screen displays settings for users of phone line 2. Block Last Caller Enter the ID of the caller blocked via
the Block Last Caller service.
Accept Last Caller Enter the ID of the caller accepted via
the Accept Last Caller service.

Speed Dial Settings


Speed Dial 2-9 Enter the phone number for each Speed
Dial setting.

Supplementary Service Settings


CW Setting Select whether you want to use the Call
Waiting feature for all calls, yes or no. The default is yes.
Block CID Setting Select whether you want to block
Caller ID for all calls, yes or no. The default is no.
Block ANC Setting Select whether you want to block
anonymous calls, yes or no. The default is no.
DND Setting Select whether you want to use the Do Not
Disturb (DND) feature, yes or no. The default is no.
CID Setting Select whether you want to enable Caller ID
generation, yes or no. The default is yes.
CWCID Setting Select whether you want to enable Caller
ID for Call Waiting, yes or no. The default is yes.
Voice > User 1

Wireless-G Broadband Router with 2 Phone Ports 34


Chapter 3 Advanced Configuration

Dist Ring Setting Select whether you want to use the


Distinctive Ring feature, yes or no. The default is yes.
Message Waiting Select whether you want to use the
Message Waiting feature, yes or no. The default is no.

Distinctive Ring Settings


Ring1-8 Caller Enter the caller number pattern to play
Distinctive Ring/Call Waiting Tone (1-8).

Ring Settings
Default Ring Select the default ringing pattern for all
callers. The default is 1.
Default CWT Select the default CWT pattern for all callers.
The default is 1.
Hold Reminder Ring Select the ring pattern that will
remind you of a call on hold when the phone is on-hook.
The default is 8.
Call Back Ring Select the ring pattern for call back
notification. The default is 7.
Cfwd Ring Splash Len Enter the duration of the ring
splash when a call is forwarded. The range is 0 to 10.0
seconds. The default is 0.
Cblk Ring Splash Len Enter the duration of the ring
splash when a call is blocked. The range is 0 to 10.0
seconds. The default is 0.
VMWI Ring Splash Len Enter the duration of the ring
splash when new messages arrive before the VoiceMail
Waiting Indication (VMWI) signal is applied. The range is 0
to 10.0 seconds. The default is 0.
Click Save Settings to apply your changes, or click Cancel
Changes to cancel your changes.

Voice > Admin Login


The Admin Login allows access to more advanced settings.
To access administrative screens, click Admin Login, and
enter the user name and password provided by your
service provider. Contact your service provider for more
information. (The factory default Admin Login name and
password are admin.)

NOTE: In most cases, you do not need to use


the administrative screens. Contact your service
provider for more information.

Wireless-G Broadband Router with 2 Phone Ports 35


Chapter 4 Interactive Voice Response Menu

Chapter 4: Action Command Choices Description


Interactive Voice Use this command
to enter the IVR
Response Menu Menu. Ignore
Special Information
Tones (SITs) or other
Overview Enter IVR
****
tones until you
Menu hear, “Configuration
This chapter explains how to use the Interactive Voice
menu. Please enter
Response (IVR) Menu to configure the Router’s network
the option followed
settings. Use your telephone’s keypad to enter your
by the # (pound)
commands and select choices, and the Router will use
key, or hang up to
voice responses.
exit.”
To access the IVR Menu: The IVR announces
1. Use a telephone connected to the Phone 1 or 2 port of Check DHCP 100 whether DHCP is
the Router. (You can only access the IVR Menu through enabled or disabled.
an analog telephone, not any of the Internet phones.) Check IP 110 The IVR announces
2. Press **** (in other words, press the star key four Address the current IP
times). address of the
Router.
3. Wait until you hear the Router’s response,
“Configuration menu. Please enter the option followed Check 120 The IVR announces
by the # (pound) key, or hang up to exit”. Subnet the current subnet
Mask mask of the Router.
Menu Commands Check Static 130 The IVR announces
Gateway IP the current gateway
Refer to the following table that lists actions, commands, Address IP address of the
menu choices, and descriptions. After you select an Router.
option, press the # (pound) key. To exit the menu, hang
Check MAC 140 The IVR announces
up the telephone.
Address the MAC address
If the menu is inactive for more than one minute, the of the Router in
Router will time out. To re-enter the menu, press ****. hexadecimal string
format.
Check 150 The IVR announces
Firmware the version number
Version of the firmware
running on the
Router.
Voice 73738 Confirm - After the
Factory Press 1. Router requests
Reset of the Cancel - confirmation, press
Router Press * 1 to confirm.
(star).
Warning: After you hear,
All custom “Option successful”,
settings will hang up the phone.
be lost. All voice settings
will be reset to their
defaults.

Wireless-G Broadband Router with 2 Phone Ports 36


Appendix A Troubleshooting

Appendix A: When you are on an Internet phone call, words are


dropped intermittently.
Troubleshooting Follow these instructions until your problem is solved:
•• If you are using the Router’s wireless function and
Your computer cannot connect to the Internet. a cordless phone, they may be using the same
frequency and may interfere with each other. Move
Follow these instructions until your computer can connect
the cordless phone farther away from the Router.
to the Internet:
•• There may be heavy network activity, particularly if you
•• Make sure that the Router is powered on. The Power are running a server or using a file sharing program.
LED should be green and not flashing. Try to limit network or Internet activity during
•• If the Power LED is flashing, then power off all of your Internet phone calls. For example, if you are running
network devices, including the modem, Router, and a file sharing program, files may be uploaded in the
computers. Wait 30 seconds. Then power on each background even though you are not downloading
device in the following order: any files, so make sure you exit the program before
making Internet phone calls.
1. Cable or DSL modem
•• There may not be enough bandwidth available
2. Router
for your Internet phone call. You may want to test
3. Computer your bandwidth using one of the bandwidth tests
available online. If necessary, access your Internet
•• Check the cable connections. The computer should
phone service account and reduce the bandwidth
be connected to one of the ports numbered 1-4 on
requirements for your service. For more information,
the Router, and the modem must be connected to the
refer to the website of your ITSP.
Internet port on the Router.
The modem does not have an Ethernet port.
You do not hear a dial tone, and the Phone 1 or 2 LED is
not lit. The modem is a dial-up modem for traditional dial-up
service. To use the Router, you need a cable/DSL modem
Follow these instructions until your problem is solved:
and high-speed Internet connection.
•• Make sure the telephone is plugged into the
appropriate port, Phone 1 or 2. You cannot use the DSL service to connect manually to
the Internet.
•• Disconnect and re-connect the RJ-11 telephone cable
between the Router and telephone. After you have installed the Router, it will automatically
connect to your Internet Service Provider (ISP) or Internet
•• Make sure your telephone is set to its tone setting
Telephony Service Provider (ITSP), so you no longer need
(not pulse).
to connect manually.
•• Make sure your network has an active Internet
connection. Try to access the Internet, and check to The DSL telephone line does not fit into the Router’s
see if the Router’s Internet LED is lit. If you do not Internet port.
have a connection, then power off all of your network
The Router does not replace your modem. You still need
devices, including the modem, Router, and computers.
your DSL modem in order to use the Router. Connect
Wait 30 seconds. Then power on each device in the
the telephone line to the DSL modem, insert the setup
following order:
CD into your computer, and then follow the on‑screen
1. Cable or DSL modem instructions.
2. Router
3. Computers and other devices
•• Verify your account information and confirm that the
phone line is registered with your Internet Telephony
Service Provider (ITSP).

Wireless-G Broadband Router with 2 Phone Ports 37


Appendix A Troubleshooting

When you double-click the web browser, you are You cannot configure the settings for the second wireless
prompted for a username and password. If you want to network because the SSID2 settings are grayed out.
get rid of the prompt, follow these instructions.
Your service provider may control the settings for the
Launch the web browser and perform the following steps second wireless network (SSID2); contact your service
(these steps are specific to Internet Explorer but are similar provider for more information.
for other browsers):
1. Select Tools > Internet Options. WEB: If your questions are not addressed here,
2. Click the Connections tab. refer to the Linksys website, www.linksys.com.

3. Select Never dial a connection.


4. Click OK.

The Router does not have a coaxial port for the cable
connection.
The Router does not replace your modem. You still need
your cable modem in order to use the Router. Connect your
cable connection to the cable modem, insert the setup
CD into your computer, and then follow the on‑screen
instructions.

The computer cannot connect wirelessly to the network.


Make sure the wireless network name or SSID is the same
on both the computer and the Router. If you have enabled
wireless security, then make sure the same security
method and key are used by both the computer and the
Router.

You need to modify the settings on the Router.


To access the web-based utility, follow these instructions:
1. Launch the web browser on your computer, and enter
the Router’s default IP address, 192.168.15.1, in the
Address field. Then press Enter.

NOTE: If you place the Router behind a primary


router with the IP address of 192.168.15.1, then
the Router will automatically assume a new
default IP address, 192.168.16.1.

2. A login screen appears. The first time you open the


web-based utility, use the default user name and
password, admin. (You can set a new password from
the Administration tab’s Management screen.) Then
click OK.
3. Click the appropriate tab to change the settings.

Wireless-G Broadband Router with 2 Phone Ports 38


Appendix B Specifications

Appendix B: IP Multicast / IGMP v1, v2, v3/


IGMP Proxy
Specifications Voice Features Voice Algorithms
G.711 (a-law and µ-law)
Model WRP400 G.726 (16/24/32/40 kbps)
* Note: Many specifications are programmable within a G.729 AB
defined range or list of options. Please see the SPA ATA
G.723.1 (6.3 kbps, 5.3 kbps)
Administration Guide for details. The target configuration
profile is uploaded to the WRP400 at the time of Call Forwarding:
provisioning. No Answer/Busy/Unconditional
Data Networking MAC Address (IEEE 802.3) Support for Two Simultaneous Calls
IPv4 - Internet Protocol v4 (RFC 791) SIP TLS (Transport Layer Security)
Upgradeable to v6 (RFC 1883) Call Transfer
ARP - Address Resolution Protocol Call Waiting/Hold/Retrieve
DNS - A Record (RFC 1706), Three-way Conferencing
SRV Record (RFC 2782) Call ID Number & Name (Primary
DHCP Client - Dynamic Host Line & On Call Waiting)
Configuration Protocol (RFC 2131) Call-ID Block (Prevent Send out the
DHCP Server - Dynamic Host Caller ID)
Configuration Protocol (RFC 2131) Anonymous Call Blocking
PPPoE Client - Point to Point Distinctive Ringing
Protocol over Ethernet (RFC 2516)
Do not Disturb Setting
ICMP - Internet Control Message
Repeat Dialing on Busy
Protocol (RFC792)
Call Return
TCP - Transmission Control Protocol
(RFC793) Emergency Call Support
UDP - User Datagram Protocol Dial Plan
(RFC768) Speed Dial
RTP - Real Time Protocol (RFC 1889) Auto-Attendant
(RFC 1890)
Multi-Room Meet-Me Conference
RTCP - Real Time Control Protocol
In-Band/ SIP-INFO DTMF Translation
(RFC 1889)
Provisioning,
TFTP
Administration,
RTSP & Maintenance Web Browser Administration &
HTTP Configuration via Integral Web Server
NAT (RFC 1631) Telephone Key Pad Configuration
with Interactive Voice Prompts
Reverse NAT
Automated Provisioning & Upgrade
SDP
via HTTP, TFTP, HTTPS
SNTP - Simple Network Time
Asynchronous Notification of
Protocol (RFC 2030)
Upgrade Availability via NOTIFY
Type of Service - TOS
Non-Intrusive, In-Service Upgrades
(RFC 791/1349)
Report Generation & Event Logging
QoS - Packet Prioritization by Type
Stats in BYE Message
Router or Bridge Mode of
Operation Syslog & Debug Server Records
MAC Address Cloning Per Line and Purpose Configurable
Syslog and Debug Options
Port Forwarding

Wireless-G Broadband Router with 2 Phone Ports 39


Appendix B Specifications

Physical Interfaces 4 100Base-T RJ-45 Ethernet Port Indicator Lights/


(IEEE 802.3) LEDs Power, Ethernet, Wireless, Phone 1,
2 RJ-11 FXS Phone Ports - For Phone 2, Internet, WPS
Analog Circuit Telephone Device Documentation Quick Installation and User Guide are
USB 2.0 (reserved for future use via Downloaded from www.linksys.com
firmware upgrade) Linksys SPA ATA Administration
Buttons Reset, WPS Guide - Service Providers Only
Subscriber Line Linksys Provisioning Guide - Service
Interface Circuit Providers Only
(SLIC) Ring Voltage: 40-90 Vpk Security Features Password-Protected Configuration
Ring Frequency: 20 to 25Hz for Web Access
Ring Waveform: Trapezoidal with Denial of Service (DoS) Prevention
1.2 to 1.6 Crest Factor URL Filtering, and Keyword, Java,
Maximum Ringer Load: 3 REN ActiveX, Proxy, Cookie Blocking
On-Hook/Off-Hook Characteristics: VPN Passthrough for IPSec, PPTP,
and L2TP Protocols
On-Hook Voltage (Tip/Ring):
- 46 to -56V 64, 128 bits WEP with Passphrase
WEP Key Generation
Off-Hook Current:
18 to 25mA SSID Broadcast Disable
Terminating Impedance: Access Restriction by MAC and IP
Addresses
600 ohm Resistive
Wi-Fi Protected Setup (WPS),
270 ohm + 750ohm//150nF Wi-Fi Protected Access™ (WPA),
Complex Impedance Wi-Fi Protected Access™ 2 (WPA2)
Frequency Response: 300 – 3400Hz Security Key Bits 64, 128
Regulatory
Compliance FCC (Part 15 Class B), CE, ICES-003, Environmental
RoHS Dimensions 5.51" x 5.51" x 1.06"
Number of (140 x 140 x 27 mm)
Antennas 1 Weight 10.05 oz (285 g)
Connector type Fixed Power External, Switching, 5VDC, 2A
Detachable (y/n) No Certification FCC, CE, CB, IC, UL,
RF Pwr (EIRP) Wi-Fi (802.11b + WPA2,
in dBm (Average, not Including Antenna) 802.11g + WPA2, WMM)

802.11g: Typ. 18 dBm @ Normal Operating Temp. 0 to 40°C (32 to 104°F)


Temp Range (with PA) Storage Temp. -20 to 70°C (-4 to 158°F)
802.11b: Typ: 20 dBm @ Normal Operating
Temp Range (with PA) Humidity 10 to 85%, Relative Humidity,
Antenna Gain Noncondensing
in dBi 2 dBi Storage Humidity 5 to 90% Noncondensing
UPnP able/cert Yes
Power Supply Switching Type (100-240V) Automatic Specifications are subject to change without notice.

DC Input Voltage: +5 VDC at


2.0 A Max.
Power Consumption: 7.9 watts
(Average)
Power Adapter: 100-240V - 50-60Hz
(26-34VA) AC Input, 1.8 m Cord

Wireless-G Broadband Router with 2 Phone Ports 40


Appendix C Warranty Information

Appendix C: service offerings. This limited warranty shall not apply to


such third party software or service offerings. This limited
Warranty Information warranty does not guarantee any continued availability
of a third party’s service for which this product’s use or
operation may require.
Limited Warranty TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED
WARRANTIES AND CONDITIONS OF MERCHANTABILITY,
Linksys warrants this Linksys hardware product against
SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR
defects in materials and workmanship under normal
PURPOSE ARE LIMITED TO THE DURATION OF THE
use for the Warranty Period, which begins on the date of
WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED
purchase by the original end-user purchaser and lasts for
CONDITIONS, REPRESENTATIONS AND WARRANTIES,
the period specified below:
INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED
•• One (1) year for new product WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.
Some jurisdictions do not allow limitations on how long
•• Ninety (90) days for refurbished product an implied warranty lasts, so the above limitation may not
This limited warranty is non-transferable and extends only apply to you. This limited warranty gives you specific legal
to the original end-user purchaser. Your exclusive remedy rights, and you may also have other rights which vary by
and Linksys’ entire liability under this limited warranty jurisdiction.
will be for Linksys, at its option, to (a) repair the product
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT
with new or refurbished parts, (b) replace the product
WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
with a reasonably available equivalent new or refurbished
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
Linksys product, or (c) refund the purchase price of the
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
product less any rebates. Any repaired or replacement
THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING
products will be warranted for the remainder of the
OUT OF OR RELATED TO THE USE OF OR INABILITY TO
original Warranty Period or thirty (30) days, whichever is
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
longer. All products and parts that are replaced become
IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
the property of Linksys.
SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
Exclusions and Limitations The foregoing limitations will apply even if any warranty
This limited warranty does not apply if: (a) the product or remedy provided under this limited warranty fails of
assembly seal has been removed or damaged, (b) the its essential purpose. Some jurisdictions do not allow
product has been altered or modified, except by Linksys, the exclusion or limitation of incidental or consequential
(c) the product damage was caused by use with non- damages, so the above limitation or exclusion may not
Linksys products, (d) the product has not been installed, apply to you.
operated, repaired, or maintained in accordance with
instructions supplied by Linksys, (e) the product has Obtaining Warranty Service
been subjected to abnormal physical or electrical stress,
If you have any questions about the services provided
misuse, negligence, or accident, (f ) the serial number on
by your Service Provider or your Linksys product, please
the Product has been altered, defaced, or removed, or (g)
contact your Service Provider that provided the Linksys
the product is supplied or licensed for beta, evaluation,
product to you. You also will find a variety of online
testing or demonstration purposes for which Linksys does
support tools and information to assist you with your
not charge a purchase price or license fee.
product at www.linksys.com/support. If the product
ALL SOFTWARE PROVIDED BY LINKSYS WITH THE proves defective during the Warranty Period, contact your
PRODUCT, WHETHER FACTORY LOADED ON THE Service Provider for instructions on how to obtain warranty
PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING service. The telephone number for your Service Provider
THE PRODUCT, IS PROVIDED “AS IS” WITHOUT WARRANTY in your area can be found in the written documentation
OF ANY KIND. Without limiting the foregoing, Linksys does included with your Linksys product.
not warrant that the operation of the product or software
Have your product serial number and proof of purchase
will be uninterrupted or error free. Also, due to the
(if applicable) on hand when calling your Service Provider.
continual development of new techniques for intruding
If you are requested to return your product, you will be
upon and attacking networks, Linksys does not warrant
given a Return Materials Authorization (RMA) number
that the product, software or any equipment, system or
and instructions for shipping the product to your Service
network on which the product or software is used will be
Provider. You are responsible for properly packaging and
free of vulnerability to intrusion or attack. The product
shipping your product at your cost and risk. You must
may include or be bundled with third party software or
include the RMA number and a copy of your dated proof
Wireless-G Broadband Router with 2 Phone Ports 41
Appendix C Warranty Information

of original purchase (if applicable) when returning your


product. Products received without a RMA number and
dated proof of original purchase (if applicable) will be
rejected. Do not include any other items with the product
you are returning. Defective product covered by this limited
warranty will be repaired or replaced and returned to you
without charge. Customers outside of the United States
of America and Canada are responsible for all shipping
and handling charges, custom duties, VAT and other
associated taxes and charges. Repairs or replacements for
your product not covered under this limited warranty will
be subject to charge at Linksys’ then-current rates.

Technical Support
This limited warranty is neither a service nor a
support contract. Information about Linksys’ current
technical support offerings and policies (including
any fees for support services) can be found at
www.linksys.com/support.
This limited warranty is governed by the laws of the
jurisdiction in which the Linksys product was purchased
by you.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623

Wireless-G Broadband Router with 2 Phone Ports 42


Appendix D Regulatory Information

Appendix D: •• Do not use this product near water, for example, in a


wet basement or near a swimming pool.
Regulatory Information •• Avoid using this product during an electrical storm.
There may be a remote risk of electric shock from
lightning.
FCC Statement
WARNING: This product contains lead, known
This device complies with Part 15 of the FCC Rules.
to the State of California to cause cancer, and
Operation is subject to the following two conditions: (1)
birth defects or other reproductive harm. Wash
This device may not cause harmful interference, and (2) this
hands after handling.
device must accept any interference received, including
interference that may cause undesired operation.
This product has been tested and complies with the WARNING: This equipment will be inoperable
specifications for a Class B digital device, pursuant to Part when main power fails.
15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in
a residential installation. This equipment generates,
uses, and can radiate radio frequency energy and, if not WARNING: Many Internet phone service
installed and used according to the instructions, may providers do not support calls to emergency
cause harmful interference to radio communications. service numbers (000 in Australia or 111 in New
However, there is no guarantee that interference will not Zealand). An alternative phone should be used
occur in a particular installation. If this equipment does to make emergency calls.
cause harmful interference to radio or television reception,
which is found by turning the equipment off and on, the
user is encouraged to try to correct the interference by WARNING: To ensure compliance with
one or more of the following measures: explosure limits to radiofrequency fields, the
antenna of the WRP400 should be no closer
•• Reorient or relocate the receiving antenna than 20 cm from the body during use.
•• Increase the separation between the equipment or
devices
Industry Canada Statement
•• Connect the equipment to an outlet other than the
receiver’s This Class B digital apparatus complies with Canadian
ICES-003 and RSS210.
•• Consult a dealer or an experienced radio/TV technician
for assistance Operation is subject to the following two conditions:
FCC Caution: Any changes or modifications not expressly 1. This device may not cause interference and
approved by the party responsible for compliance could 2. This device must accept any interference, including
void the user’s authority to operate this equipment. interference that may cause undesired operation
of the device.
FCC Radiation Exposure Statement
To reduce potential radio interference to other users,
This equipment complies with FCC radiation exposure the antenna type and its gain should be so chosen
limits set forth for an uncontrolled environment. This that the EIRP is not more than required for successful
equipment should be installed and operated with communication.
minimum distance 20cm between the radiator and your
body. Industry Canada Radiation Exposure Statement
This transmitter must not be co-located or operating in This equipment complies with IC radiation exposure limits
conjunction with any other antenna or transmitter. IEEE set forth for an uncontrolled environment. This equipment
802.11b or 802.11g operation of this product in the USA is should be installed and operated with minimum distance
firmware-limited to channels 1 through 11. 20cm between the radiator & your body.

Safety Notices and Information This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
•• Caution: To reduce the risk of fire, use only No.26 AWG
or larger telecommunication line cord.

Wireless-G Broadband Router with 2 Phone Ports 43


Appendix D Regulatory Information

Avis d’Industrie Canada Avis de non-responsabilité concernant les


Cet appareil numérique de la classe B est conforme aux appareils sans fil
normes NMB-003 et RSS210 du Canada.
Les performances maximales pour les réseaux sans fil
L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
conditions suivantes : Les performances réelles peuvent varier, notamment
1. il ne doit pas produire de brouillage et en fonction de la capacité du réseau sans fil, du débit
de la transmission de données, de la portée et de la
2. il doit accepter tout brouillage radioélectrique reçu, couverture. Les performances dépendent de facteurs,
même si ce brouillage est susceptible de compromettre le conditions et variables multiples, en particulier de la
fonctionnement du dispositif. distance par rapport au point d’accès, du volume du trafic
Afin de réduire le risque d’interférence aux autres réseau, des matériaux utilisés dans le bâtiment et du
utilisateurs, le type d’antenne et son gain doivent type de construction, du système d’exploitation et de la
être choisis de façon à ce que la puissance isotrope combinaison de produits sans fil utilisés, des interférences
rayonnée équivalente (p.i.r.e.) ne soit pas supérieure et de toute autre condition défavorable.
au niveau requis pour obtenir une communication
satisfaisante.
Telepermit Statement
Avis d’Industrie Canada concernant l’exposition The cabling between the phone port and the phone shall
aux radiofréquences : not exceed 100 metres.
Ce matériel est conforme aux limites établies par IC
en matière d’exposition aux radiofréquences dans un
environnement non contrôlé. Ce matériel doit être installé
et utilisé à une distance d’au moins 20 cm entre l’antenne
et le corps de l’utilisateur.
L’émetteur ne doit pas être placé près d’une autre antenne
ou d’un autre émetteur, ou fonctionner avec une autre
antenne ou un autre émetteur.

Wireless Disclaimer
The maximum performance for wireless is derived from
IEEE Standard 802.11 specifications. Actual performance
can vary, including lower wireless network capacity,
data throughput rate, range and coverage. Performance
depends on many factors, conditions and variables,
including distance from the access point, volume of
network traffic, building materials and construction,
operating system used, mix of wireless products used,
interference and other adverse conditions.

Wireless-G Broadband Router with 2 Phone Ports 44


Appendix D Regulatory Information

Declaration of Conformity with Regard to Nederlands Dit apparaat voldoet aan de essentiele eisen
EU Directive 1999/5/EC (R&TTE Directive) [Dutch]:
en andere van toepassing zijnde bepalingen
van de Richtlijn 1999/5/EC.
Compliance Information for 2,4-GHz and 5-GHz Wireless
Products Relevant to the EU and Other Countries Following Malti Dan l-apparat huwa konformi mal-ħtiġiet
the EU Directive 1999/5/EC (R&TTE Directive) essenzjali u l-provedimenti l-oħra rilevanti
[Maltese]: tad-Direttiva 1999/5/EC.
Това оборудване отговаря на съществените
Български Ez a készülék teljesíti az alapvető
изисквания и приложими клаузи на Magyar
[Bulgarian] követelményeket és más 1999/5/EK
Директива 1999/5/ЕС.
[Hungarian]: irányelvben meghatározott vonatkozó
rendelkezéseket.
Česky Toto zařízení je v souladu se základními
požadavky a ostatními odpovídajícími Dette utstyret er i samsvar med de
[Czech]: ustanoveními Směrnice 1999/5/EC. Norsk
grunnleggende krav og andre relevante
[Norwegian]: bestemmelser i EU-direktiv 1999/5/EF.
Dansk Dette udstyr er i overensstemmelse med
de væsentlige krav og andre relevante Urządzenie jest zgodne z ogólnymi
[Danish]: bestemmelser i Direktiv 1999/5/EF. Polski
wymaganiami oraz szczególnymi warunkami
[Polish]: określonymi Dyrektywą UE: 1999/5/EC.
Dieses Gerät entspricht den grundlegenden
Deutsch Anforderungen und den weiteren
Português Este equipamento está em conformidade com
[German]: entsprechenden Vorgaben der Richtlinie
os requisitos essenciais e outras provisões
1999/5/EU. [Portuguese]: relevantes da Directiva 1999/5/EC.

Eesti See seade vastab direktiivi 1999/5/EÜ olulistele Acest echipament este in conformitate
Română
[Estonian]: nõuetele ja teistele asjakohastele sätetele. cu cerintele esentiale si cu alte prevederi
[Romanian] relevante ale Directivei 1999/5/EC.
This equipment is in compliance with the
Slovensko Ta naprava je skladna z bistvenimi zahtevami
English: essential requirements and other relevant
in ostalimi relevantnimi pogoji Direktive
provisions of Directive 1999/5/EC. [Slovenian]: 1999/5/EC.

Español Este equipo cumple con los requisitos


Slovensky Toto zariadenie je v zhode so základnými
esenciales asi como con otras disposiciones
[Spanish]: požiadavkami a inými príslušnými nariadeniami
de la Directiva 1999/5/CE. [Slovak]: direktív: 1999/5/EC.

Ελληνική Αυτός ο εξοπλισµός είναι σε συµµόρφωση µε


Tämä laite täyttää direktiivin 1999/5/EY
τις ουσιώδεις απαιτήσεις και άλλες σχετικές Suomi
[Greek]: olennaiset vaatimukset ja on siinä asetettujen
διατάξεις της Οδηγίας 1999/5/EC.
[Finnish]: muiden laitetta koskevien määräysten
mukainen.
Français Cet appareil est conforme aux exigences
essentielles et aux autres dispositions Denna utrustning är i överensstämmelse med
[French]: pertinentes de la Directive 1999/5/EC. Svenska
de väsentliga kraven och andra relevanta
[Swedish]: bestämmelser i Direktiv 1999/5/EC.
Íslenska Þetta tæki er samkvæmt grunnkröfum og
öðrum viðeigandi ákvæðum Tilskipunar For all products, the Declaration of Conformity (DofC) is
[Icelandic]: 1999/5/EC. available through one or more of these options:

Italiano Questo apparato é conforme ai requisiti •• A pdf file is included on the product’s CD.
essenziali ed agli altri principi sanciti dalla
[Italian]: Direttiva 1999/5/CE. •• A print copy is included with the product.
•• A pdf file is available on the product’s webpage.
Latviski Šī iekārta atbilst Direktīvas 1999/5/EK Visit www.linksys.com/international and select your
būtiskajām prasībām un citiem ar to country or region. Then select your product.
[Latvian]: saistītajiem noteikumiem.
If you need any other technical documentation, see the
Šis įrenginys tenkina 1999/5/EB Direktyvos “Technical Documents on www.linksys.com/international”
Lietuvių section, as shown later in this appendix.
esminius reikalavimus ir kitas šios direktyvos
[Lithuanian]: nuostatas.

Wireless-G Broadband Router with 2 Phone Ports 45


Appendix D Regulatory Information

The following standards were applied during the


assessment of the product against the requirements of
National Restrictions
the Directive 1999/5/EC: This product may be used in all EU countries (and other
countries following the EU directive 1999/5/EC) without
•• Radio: EN 300 328 and/or EN 301 893 as applicable
any limitation except for the countries mentioned below:
•• EMC: EN 301 489-1, EN 301 489-17
Ce produit peut être utilisé dans tous les pays de l’UE (et dans
•• Safety: EN 60950 and either EN 50385 or EN 50371 tous les pays ayant transposés la directive 1999/5/CE) sans
Dynamic Frequency Selection (DFS) and Transmit Power aucune limitation, excepté pour les pays mentionnés ci-
Control (TPC) are required for operation in the 5 GHz dessous:
band. Questo prodotto è utilizzabile in tutte i paesi EU (ed in tutti
DFS: The equipment meets the DFS requirements as gli altri paesi che seguono le direttive EU 1999/5/EC) senza
defined in ETSI EN 301 893. This feature is required by nessuna limitazione, eccetto per i paesii menzionati di
the regulations to avoid interference with Radio Location seguito:
Services (radars). Das Produkt kann in allen EU Staaten ohne Einschränkungen
TPC: For operation in the 5 GHz band, the maximum power eingesetzt werden (sowie in anderen Staaten die der EU
level is 3 dB or more below the applicable limit. As such, Direktive 1999/5/CE folgen) mit Außnahme der folgenden
TPC is not required. aufgeführten Staaten:
In the majority of the EU and other European countries,
CE Marking the 2,4- and 5-GHz bands have been made available
for the use of wireless local area networks (LANs). The
For the Linksys Wireless-N, -G, -B, and/or -A products, table labeled “Overview of Regulatory Requirements for
the following CE mark, notified body number (where Wireless LANs” provides an overview of the regulatory
applicable), and class 2 identifier are added to the requirements applicable for the 2,4‑ and 5-GHz bands.
equipment.
Later in this document you will find an overview of
countries in which additional restrictions or requirements
or both are applicable.
or The requirements for any country may evolve. Linksys
recommends that you check with the local authorities for
the latest status of their national regulations for both the
2,4- and 5-GHz wireless LANs.
or
Overview of Regulatory Requirements for Wireless LANs
Frequency Max Power Level Indoor Indoor &
or Band (MHz) (EIRP) (mW) ONLY Outdoor

2400-2483.5 100 X

5150-5350† 200 X
Check the CE label on the product to find out which
notified body was involved during the assessment.
5470-5725† 1000 X
††Dynamic Frequency Selection and Transmit Power Control are
required in the frequency ranges of 5250-5350 MHz and 5470-5725
MHz.

The following countries have restrictions and/or


requirements in addition to those given in the table
labeled “Overview of Regulatory Requirements for
Wireless LANs”:

Denmark
In Denmark, the band 5150 - 5350 MHz is also allowed for
outdoor usage.
I Danmark må frekvensbåndet 5150 - 5350 også anvendes
udendørs.
Wireless-G Broadband Router with 2 Phone Ports 46
Appendix D Regulatory Information

France Product Usage Restrictions


For 2,4 GHz, the product should not be used outdoors This product is designed for indoor usage only. Outdoor
in the band 2454 - 2483,5 MHz. There are no restrictions usage is not recommended, unless otherwise noted.
when used in other parts of the 2,4 GHz band when used
indoors. Check http://www.arcep.fr/ for more details. 2,4 GHz Restrictions
Pour la bande 2,4 GHz, l’ équipement ne doit pas être utilisé This product is designed for use with the standard, integral
en extérieur dans la bande 2454 - 2483,5 MHz. Il n’y a pas de or dedicated (external) antenna(s) that is/are shipped
restrictions pour des utilisations en intérieur dans d’autres together with the equipment. However, some applications
parties de la bande 2,4GHz. Consultez http://www.arcep.fr/ may require the antenna(s), if removable, to be separated
pour de plus amples détails. from the product and installed remotely from the device
by using extension cables. For these applications, Linksys
Applicable Power Levels in France offers an R‑SMA extension cable (AC9SMA) and an R-TNC
Frequency extension cable (AC9TNC). Both of these cables are 9
Location Power (EIRP) meters long and have a cable loss (attenuation) of 5 dB. To
Range (MHz)
compensate for the attenuation, Linksys also offers higher
Indoor gain antennas, the HGA7S (with R-SMA connector) and
2400-2483.5 100 mW (20 dBm)
(No restrictions) HGA7T (with R-TNC connector). These antennas have a
gain of 7 dBi and may only be used with either the R-SMA
2400-2454 100 mW (20 dBm) or R-TNC extension cable.
Outdoor
2454-2483.5 10 mW (10 dBm)
Combinations of extension cables and antennas resulting
in a radiated power level exceeding 100 mW EIRP are
Italy illegal.

This product meets the National Radio Interface and Third-Party Software or Firmware
the requirements specified in the National Frequency
Allocation Table for Italy. Unless this 2,4-GHz wireless LAN The use of software or firmware not supported/provided
product is operating within the boundaries of the owner’s by Linksys may result that the equipment is no longer
property, its use requires a “general authorization”. Please compliant with the regulatory requirements.
check http://www.comunicazioni.it/it/ for more details.
Technical Documents on
Questo prodotto è conforme alla specifiche di Interfaccia
Radio Nazionali e rispetta il Piano Nazionale di ripartizione www.linksys.com/international
delle frequenze in Italia. Se non viene installato all’interno Follow these steps to access technical documents:
del proprio fondo, l’utilizzo di prodotti Wireless LAN a
2,4 GHz richiede una “Autorizzazione Generale”. Consultare 1. Enter http://www.linksys.com/international in your
http://www.comunicazioni.it/it/ per maggiori dettagli. web browser.
2. Select the country or region in which you live.
Latvia 3. Click the Products tab.
The outdoor usage of the 2,4 GHz band requires an 4. Select the appropriate product category.
authorization from the Electronic Communications Office.
5. Select the product sub-category, if necessary.
Please check http://www.esd.lv for more details.
6. Select the product.
2,4 GHz frekveču joslas izmantošanai ārpus telpām 7. Select the type of documentation you want from the
nepieciešama atļauja no Elektronisko sakaru direkcijas. More Information section. The document will open
Vairāk informācijas: http://www.esd.lv. in PDF format if you have Adobe Acrobat installed on
Notes: your computer.
1. Although Norway, Switzerland and Liechtenstein are
NOTE: If you have questions regarding
not EU member states, the EU Directive 1999/5/EC has
the compliance of this product or you
also been implemented in those countries.
cannot find the information you need,
2. The regulatory limits for maximum output power are please contact your local sales office or visit
specified in EIRP. The EIRP level of a device can be www.linksys.com/international
calculated by adding the gain of the antenna used
(specified in dBi) to the output power available at the
connector (specified in dBm).
Wireless-G Broadband Router with 2 Phone Ports 47
Appendix D Regulatory Information

User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního
prostředí pro zákazníky v zemích Evropské unie
Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené
tímto symbolem na produktu anebo na obalu bylo likvidováno
Waste Electric and Electronic Equipment s netříděným komunálním odpadem. Tento symbol udává,
(WEEE) že daný produkt musí být likvidován odděleně od běžného
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu
This document contains important information for users a dalších elektrických a elektronických zařízení prostřednictvím
with regards to the proper disposal and recycling of určených sběrných míst stanovených vládou nebo místními
úřady. Správná likvidace a recyklace pomáhá předcházet
Linksys products. Consumers are required to comply with
potenciálním negativním dopadům na životní prostředí a lidské
this notice for all electronic products bearing the following zdraví. Podrobnější informace o likvidaci starého vybavení si
symbol: laskavě vyžádejte od místních úřadů, podniku zabývajícího se
likvidací komunálních odpadů nebo obchodu, kde jste produkt
zakoupili.

Dansk (Danish) - Miljøinformation for kunder i EU


EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol
på produktet og/eller emballagen ikke må bortskaffes som
usorteret kommunalt affald. Symbolet betyder, at dette produkt
skal bortskaffes adskilt fra det almindelige husholdningsaffald.
Det er dit ansvar at bortskaffe dette og andet elektrisk og
English - Environmental Information for Customers in elektronisk udstyr via bestemte indsamlingssteder udpeget
the European Union af staten eller de lokale myndigheder. Korrekt bortskaffelse
European Directive 2002/96/EC requires that the equipment og genvinding vil hjælpe med til at undgå mulige skader for
bearing this symbol on the product and/or its packaging must miljøet og menneskers sundhed. Kontakt venligst de lokale
not be disposed of with unsorted municipal waste. The symbol myndigheder, renovationstjenesten eller den butik, hvor du
indicates that this product should be disposed of separately har købt produktet, angående mere detaljeret information om
from regular household waste streams. It is your responsibility to bortskaffelse af dit gamle udstyr.
dispose of this and other electric and electronic equipment via
designated collection facilities appointed by the government or
local authorities. Correct disposal and recycling will help prevent Deutsch (German) - Umweltinformation für Kunden
potential negative consequences to the environment and innerhalb der Europäischen Union
human health. For more detailed information about the disposal Die Europäische Richtlinie 2002/96/EC verlangt, dass technische
of your old equipment, please contact your local authorities, Ausrüstung, die direkt am Gerät und/oder an der Verpackung mit
waste disposal service, or the shop where you purchased the diesem Symbol versehen ist , nicht zusammen mit unsortiertem
product. Gemeindeabfall entsorgt werden darf. Das Symbol weist darauf
hin, dass das Produkt von regulärem Haushaltmüll getrennt
entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses
Български (Bulgarian) - Информация относно Gerät und andere elektrische und elektronische Geräte über
опазването на околната среда за потребители в die dafür zuständigen und von der Regierung oder örtlichen
Европейския съюз Behörden dazu bestimmten Sammelstellen zu entsorgen.
Европейска директива 2002/96/EC изисква уредите, носещи Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,
този символ върху изделието и/или опаковката му, да не potentielle negative Folgen für Umwelt und die menschliche
се изхвърля т с несортирани битови отпадъци. Символът Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur
обозначава, че изделието трябва да се изхвърля отделно от Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an
сметосъбирането на обикновените битови отпадъци. Ваша die örtlichen Behörden oder städtischen Entsorgungsdienste
е отговорността този и другите електрически и електронни oder an den Händler, bei dem Sie das Produkt erworben haben.
уреди да се изхвърлят в предварително определени от
държавните или общински органи специализирани пунктове
за събиране. Правилното изхвърляне и рециклиране
ще спомогнат да се предотвратят евентуални вредни за
околната среда и здравето на населението последствия. За
по-подробна информация относно изхвърлянето на вашите
стари уреди се обърнете към местните власти, службите за
сметосъбиране или магазина, от който сте закупили уреда.

Wireless-G Broadband Router with 2 Phone Ports 48


Appendix D Regulatory Information

Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales


Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne
Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement
seadmeid, millel on tootel või pakendil käesolev sümbol , sur lequel est apposé ce symbole sur le produit et/ou son
keelatud kõrvaldada koos sorteerimata olmejäätmetega. See emballage ne soit pas jeté avec les autres ordures ménagères. Ce
sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest symbole indique que le produit doit être éliminé dans un circuit
olmejäätmevoogudest. Olete kohustatud kõrvaldama käesoleva distinct de celui pour les déchets des ménages. Il est de votre
ja ka muud elektri- ja elektroonikaseadmed riigi või kohalike responsabilité de jeter ce matériel ainsi que tout autre matériel
ametiasutuste poolt ette nähtud kogumispunktide kaudu. électrique ou électronique par les moyens de collecte indiqués
Seadmete korrektne kõrvaldamine ja ringlussevõtt aitab vältida par le gouvernement et les pouvoirs publics des collectivités
võimalikke negatiivseid tagajärgi keskkonnale ning inimeste territoriales. L’élimination et le recyclage en bonne et due forme
tervisele. Vanade seadmete kõrvaldamise kohta täpsema ont pour but de lutter contre l’impact néfaste potentiel de ce
informatsiooni saamiseks võtke palun ühendust kohalike type de produits sur l’environnement et la santé publique. Pour
ametiasutustega, jäätmekäitlusfirmaga või kauplusega, kust te plus d’informations sur le mode d’élimination de votre ancien
toote ostsite. équipement, veuillez prendre contact avec les pouvoirs publics
locaux, le service de traitement des déchets, ou l’endroit où vous
avez acheté le produit.
Español (Spanish) - Información medioambiental para
clientes de la Unión Europea
La Directiva 2002/96/CE de la UE exige que los equipos que Italiano (Italian) - Informazioni relative all’ambiente
lleven este símbolo en el propio aparato y/o en su embalaje per i clienti residenti nell’Unione Europea
no deben eliminarse junto con otros residuos urbanos no La direttiva europea 2002/96/EC richiede che le apparecchiature
seleccionados. El símbolo indica que el producto en cuestión contrassegnate con questo simbolo sul prodotto e/o
debe separarse de los residuos domésticos convencionales con sull’imballaggio non siano smaltite insieme ai rifiuti urbani
vistas a su eliminación. Es responsabilidad suya desechar este y non differenziati. Il simbolo indica che questo prodotto non
cualesquiera otros aparatos eléctricos y electrónicos a través de deve essere smaltito insieme ai normali rifiuti domestici. È
los puntos de recogida que ponen a su disposición el gobierno y responsabilità del proprietario smaltire sia questi prodotti sia
las autoridades locales. Al desechar y reciclar correctamente estos le altre apparecchiature elettriche ed elettroniche mediante
aparatos estará contribuyendo a evitar posibles consecuencias le specifiche strutture di raccolta indicate dal governo o dagli
negativas para el medio ambiente y la salud de las personas. Si enti pubblici locali. Il corretto smaltimento ed il riciclaggio
desea obtener información más detallada sobre la eliminación aiuteranno a prevenire conseguenze potenzialmente negative
segura de su aparato usado, consulte a las autoridades locales, per l’ambiente e per la salute dell’essere umano. Per ricevere
al servicio de recogida y eliminación de residuos de su zona o informazioni più dettagliate circa lo smaltimento delle vecchie
pregunte en la tienda donde adquirió el producto. apparecchiature in Vostro possesso, Vi invitiamo a contattare gli
enti pubblici di competenza, il servizio di smaltimento rifiuti o il
negozio nel quale avete acquistato il prodotto.
ξλληνικά (Greek) - Στοιχεία περιβαλλοντικής
προστασίας για πελάτες εντός της Ευρωπαϊκής
Ένωσης Latviešu valoda (Latvian) - Ekoloģiska informācija
Η Κοινοτική Οδηγία 2002/96/EC απαιτεί ότι ο εξοπλισμός ο οποίος klientiem Eiropas Savienības jurisdikcijā
φέρει αυτό το σύμβολο στο προϊόν και/ή στη συσκευασία Direktīvā 2002/96/EK ir prasība, ka aprīkojumu, kam pievienota
του δεν πρέπει να απορρίπτεται μαζί με τα μικτά κοινοτικά zīme uz paša izstrādājuma vai uz tā iesaiņojuma, nedrīkst
απορρίμματα. Το σύμβολο υποδεικνύει ότι αυτό το προϊόν θα izmest nešķirotā veidā kopā ar komunālajiem atkritumiem
πρέπει να απορρίπτεται ξεχωριστά από τα συνήθη οικιακά (tiem, ko rada vietēji iedzīvotāji un uzņēmumi). Šī zīme nozīmē
απορρίμματα. Είστε υπεύθυνος για την απόρριψη του παρόντος to, ka šī ierīce ir jāizmet atkritumos tā, lai tā nenonāktu kopā ar
και άλλου ηλεκτρικού και ηλεκτρονικού εξοπλισμού μέσω των parastiem mājsaimniecības atkritumiem. Jūsu pienākums ir šo
καθορισμένων εγκαταστάσεων συγκέντρωσης απορριμμάτων οι un citas elektriskas un elektroniskas ierīces izmest atkritumos,
οποίες παρέχονται από το κράτος ή τις αρμόδιες τοπικές αρχές. izmantojot īpašus atkritumu savākšanas veidus un līdzekļus, ko
Η σωστή απόρριψη και ανακύκλωση συμβάλλει στην πρόληψη nodrošina valsts un pašvaldību iestādes. Ja izmešana atkritumos
πιθανών αρνητικών συνεπειών για το περιβάλλον και την υγεία. un pārstrāde tiek veikta pareizi, tad mazinās iespējamais
Για περισσότερες πληροφορίες σχετικά με την απόρριψη του kaitējums dabai un cilvēku veselībai. Sīkākas ziņas par
παλιού σας εξοπλισμού, παρακαλώ επικοινωνήστε με τις τοπικές novecojuša aprīkojuma izmešanu atkritumos jūs varat saņemt
αρχές, τις υπηρεσίες απόρριψης ή το κατάστημα από το οποίο vietējā pašvaldībā, atkritumu savākšanas dienestā, kā arī veikalā,
αγοράσατε το προϊόν. kur iegādājāties šo izstrādājumu.

Wireless-G Broadband Router with 2 Phone Ports 49


Appendix D Regulatory Information

Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten


skirta Europos Sąjungos vartotojams in de Europese Unie
Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die
kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), is voorzien van dit symbool op het product of de verpakking,
negalima šalinti kartu su nerūšiuotomis komunalinėmis niet mag worden ingezameld met niet-gescheiden huishoudelijk
atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai afval. Dit symbool geeft aan dat het product apart moet worden
nuo bendro buitinių atliekų srauto. Jūs privalote užtikrinti, kad ingezameld. U bent zelf verantwoordelijk voor de vernietiging
ši ir kita elektros ar elektroninė įranga būtų šalinama per tam van deze en andere elektrische en elektronische apparatuur via de
tikras nacionalinės ar vietinės valdžios nustatytas atliekų rinkimo daarvoor door de landelijke of plaatselijke overheid aangewezen
sistemas. Tinkamai šalinant ir perdirbant atliekas, bus išvengta inzamelingskanalen. De juiste vernietiging en recycling van
galimos žalos aplinkai ir žmonių sveikatai. Daugiau informacijos deze apparatuur voorkomt mogelijke negatieve gevolgen voor
apie jūsų senos įrangos šalinimą gali pateikti vietinės valdžios het milieu en de gezondheid. Voor meer informatie over het
institucijos, atliekų šalinimo tarnybos arba parduotuvės, kuriose vernietigen van uw oude apparatuur neemt u contact op met
įsigijote tą gaminį. de plaatselijke autoriteiten of afvalverwerkingsdienst, of met de
winkel waar u het product hebt aangeschaft.

Malti (Maltese) - Informazzjoni Ambjentali għal Klijenti


fl-Unjoni Ewropea Norsk (Norwegian) - Miljøinformasjon for kunder i EU
Id-Direttiva Ewropea 2002/96/KE titlob li t-tagħmir li jkun fih is- EU-direktiv 2002/96/EF krever at utstyr med følgende symbol
simbolu fuq il-prodott u/jew fuq l-ippakkjar ma jistax jintrema avbildet på produktet og/eller pakningen, ikke må kastes
ma’ skart muniċipali li ma ġiex isseparat. Is-simbolu jindika sammen med usortert avfall. Symbolet indikerer at dette
li dan il-prodott għandu jintrema separatament minn ma’ l- produktet skal håndteres atskilt fra ordinær avfallsinnsamling
iskart domestiku regolari. Hija responsabbiltà tiegħek li tarmi for husholdningsavfall. Det er ditt ansvar å kvitte deg med
dan it-tagħmir u kull tagħmir ieħor ta’ l-elettriku u elettroniku dette produktet og annet elektrisk og elektronisk avfall via egne
permezz ta’ faċilitajiet ta’ ġbir appuntati apposta mill-gvern jew innsamlingsordninger slik myndighetene eller kommunene
mill-awtoritajiet lokali. Ir-rimi b’mod korrett u r-riċiklaġġ jgħin bestemmer. Korrekt avfallshåndtering og gjenvinning vil
jipprevjeni konsegwenzi negattivi potenzjali għall-ambjent u være med på å forhindre mulige negative konsekvenser for
għas-saħħa tal-bniedem. Għal aktar informazzjoni dettaljata miljø og helse. For nærmere informasjon om håndtering av
dwar ir-rimi tat-tagħmir antik tiegħek, jekk jogħġbok ikkuntattja det kasserte utstyret ditt, kan du ta kontakt med kommunen,
lill-awtoritajiet lokali tiegħek, is-servizzi għar-rimi ta’ l-iskart, jew en innsamlingsstasjon for avfall eller butikken der du kjøpte
il-ħanut minn fejn xtrajt il-prodott. produktet.

Magyar (Hungarian) - Környezetvédelmi információ az Polski (Polish) - Informacja dla klientów w Unii
európai uniós vásárlók számára Europejskiej o przepisach dotyczących ochrony
A 2002/96/EC számú európai uniós irányelv megkívánja, hogy środowiska
azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán Dyrektywa Europejska 2002/96/EC wymaga, aby sprzęt
az alábbi címke megjelenik, tilos a többi szelektálatlan lakossági oznaczony symbolem znajdującym się na produkcie i/lub jego
hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott opakowaniu nie był wyrzucany razem z innymi niesortowanymi
termék kidobásakor a szokványos háztartási hulladékelszállítási odpadami komunalnymi. Symbol ten wskazuje, że produkt
rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön nie powinien być usuwany razem ze zwykłymi odpadami z
felelõssége, hogy ezt, és más elektromos és elektronikus gospodarstw domowych. Na Państwu spoczywa obowiązek
berendezéseit a kormányzati vagy a helyi hatóságok által wyrzucania tego i innych urządzeń elektrycznych oraz
kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ elektronicznych w punktach odbioru wyznaczonych przez władze
hulladékfeldolgozás segít a környezetre és az emberi egészségre krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób
potenciálisan ártalmas negatív hatások megelõzésében. Ha i jego recykling pomogą zapobiec potencjalnie negatywnym
elavult berendezéseinek felszámolásához további részletes konsekwencjom dla środowiska i zdrowia ludzkiego. W celu
információra van szüksége, kérjük, lépjen kapcsolatba a helyi uzyskania szczegółowych informacji o usuwaniu starego sprzętu,
hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal prosimy zwrócić się do lokalnych władz, służb oczyszczania
üzlettel, ahol a terméket vásárolta. miasta lub sklepu, w którym produkt został nabyty.

Wireless-G Broadband Router with 2 Phone Ports 50


Appendix D Regulatory Information

Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke
clientes da União Europeia v Evropski uniji
A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,
que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom – na izdelku in/ali na embalaži – med
não seja eliminado junto com os resíduos municipais não običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba
separados. O símbolo indica que este produto deve ser izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.
eliminado separadamente dos resíduos domésticos regulares. Vaša odgovornost je, da to in preostalo električno in elektronsko
É da sua responsabilidade eliminar este e qualquer outro opremo odnesete na posebna zbirališča, ki jih določijo
equipamento eléctrico e electrónico através das instalações državne ustanove ali lokalna uprava. S pravilnim odlaganjem
de recolha designadas pelas autoridades governamentais ou in recikliranjem boste preprečili morebitne škodljive vplive na
locais. A eliminação e reciclagem correctas ajudarão a prevenir okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare
as consequências negativas para o ambiente e para a saúde opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer
humana. Para obter informações mais detalhadas sobre a ste izdelek kupili.
forma de eliminar o seu equipamento antigo, contacte as
autoridades locais, os serviços de eliminação de resíduos ou o
estabelecimento comercial onde adquiriu o produto. Suomi (Finnish) - Ympäristöä koskevia tietoja EU-
alueen asiakkaille
EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä
Română (Romanian) - Informaţii de mediu pentru symboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoa
clienţii din Uniunea Europeană ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.
Directiva europeană 2002/96/CE impune ca echipamentele care Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään
prezintă acest simbol pe produs şi/sau pe ambalajul acestuia să tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää
nu fie casate împreună cu gunoiul menajer municipal. Simbolul tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet
indică faptul că acest produs trebuie să fie casat separat de viemällä tuote tai tuotteet viranomaisten määräämään
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi keräyspisteeseen. Laitteiston oikea hävittäminen estää
acest produs şi alte echipamente electrice şi electronice prin mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten
intermediul unităţilor de colectare special desemnate de guvern terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta
sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä
la prevenirea potenţialelor consecinţe negative asupra sănătăţii myymälästä, josta ostit tuotteen.
mediului şi a oamenilor. Pentru mai multe informaţii detaliate
cu privire la casarea acestui echipament vechi, contactaţi
autorităţile locale, serviciul de salubrizare sau magazinul de la Svenska (Swedish) - Miljöinformation för kunder i
care aţi achiziţionat produsul. Europeiska unionen
Det europeiska direktivet 2002/96/EC kräver att utrustning med
denna symbol på produkten och/eller förpackningen inte får
Slovenčina (Slovak) - Informácie o ochrane životného kastas med osorterat kommunalt avfall. Symbolen visar att denna
prostredia pre zákazníkov v Európskej únii produkt bör kastas efter att den avskiljts från vanligt hushållsavfall.
Podľa európskej smernice 2002/96/ES zariadenie s týmto Det faller på ditt ansvar att kasta denna och annan elektrisk och
symbolom na produkte a/alebo jeho balení nesmie byť elektronisk utrustning på fastställda insamlingsplatser utsedda
likvidované spolu s netriedeným komunálnym odpadom. av regeringen eller lokala myndigheter. Korrekt kassering och
Symbol znamená, že produkt by sa mal likvidovať oddelene återvinning skyddar mot eventuella negativa konsekvenser
od bežného odpadu z domácností. Je vašou povinnosťou för miljön och personhälsa. För mer detaljerad information om
likvidovať toto i ostatné elektrické a elektronické zariadenia kassering av din gamla utrustning kontaktar du dina lokala
prostredníctvom špecializovaných zberných zariadení určených myndigheter, avfallshanteringen eller butiken där du köpte
vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia produkten.
pomôže zabrániť prípadným negatívnym dopadom na životné
prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie
informácie o likvidácii starého zariadenia, obráťte sa, prosím, na WEB: For additional information, please visit
miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov www.linksys.com
alebo obchod, v ktorom ste si produkt zakúpili.

Wireless-G Broadband Router with 2 Phone Ports 51


Appendix E Software License Agreement

Appendix E: Software Schedule 1 - Linksys Software License Agreement

License Agreement THIS LICENSE AGREEMENT IS BETWEEN YOU AND


CISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO
SYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYS
K.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OF
Software in Linksys Products CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING
This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, OR USING THE PRODUCT CONTAINING
affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY
Linksys K.K. (“Linksys”) contains software (including THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THESE
firmware) originating from Linksys and its suppliers TERMS, THEN YOU MAY NOT DOWNLOAD, INSTALL OR USE
and may also contain software from the open source THE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE
community. Any software originating from Linksys and its (OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER
suppliers is licensed under the Linksys Software License PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND
Agreement contained at Schedule 1 below. You may also UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO
be prompted to review and accept that Linksys Software THE RETURN PROCESS AND POLICIES OF THE PARTY FROM
License Agreement upon installation of the software. WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.
Any software from the open source community is licensed License. Subject to the terms and conditions of this
under the specific license terms applicable to that software Agreement, Linksys grants the original end user purchaser
made available by Linksys at www.linksys.com/gpl or as of the Linksys product containing the Software (“You”)
provided for in Schedules 2 and 3 below. a nonexclusive license to use the Software solely as
embedded in or (where authorized in the applicable
Where such specific license terms entitle you to the source documentation) for communication with such product.
code of such software, that source code is upon request This license may not be sublicensed, and is not transferable
available at cost from Linksys for at least three years except to a person or entity to which you transfer
from the purchase date of this product and may also be ownership of the complete Linksys product containing
available for download from www.linksys.com/gpl. For the Software, provided you permanently transfer all rights
detailed license terms and additional information on under this Agreement and do not retain any full or partial
open source software in Linksys products please look at copies of the Software, and the recipient agrees to the
the Linksys public web site at: www.linksys.com/gpl/ or terms of this Agreement.
Schedule 2 below as applicable.
“Software” includes, and this Agreement will apply to (a)
BY DOWNLOADING OR INSTALLING THE SOFTWARE, the software of Linksys or its suppliers provided in or with
OR USING THE PRODUCT CONTAINING THE SOFTWARE, the applicable Linksys product, and (b) any upgrades,
YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE updates, bug fixes or modified versions (“Upgrades”) or
LICENSE AGREEMENTS BELOW. IF YOU DO NOT AGREE TO backup copies of the Software supplied to You by Linksys
ALL OF THESE TERMS, THEN YOU MAY NOT DOWNLOAD, or an authorized reseller, provided you already hold a
INSTALL OR USE THE SOFTWARE. YOU MAY RETURN valid license to the original software and have paid any
UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED applicable fee for the Upgrade.
AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT)
FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL Protection of Information. The Software and
PURCHASE, SUBJECT TO THE RETURN PROCESS AND documentation contain trade secrets and/or copyrighted
POLICIES OF THE PARTY FROM WHICH YOU PURCHASED materials of Linksys or its suppliers. You will not copy
SUCH PRODUCT OR SOFTWARE. or modify the Software or decompile, decrypt, reverse
engineer or disassemble the Software (except to the
Software Licenses extent expressly permitted by law notwithstanding this
provision), and You will not disclose or make available
The software Licenses applicable to software from Linksys such trade secrets or copyrighted material in any form
are made available at the Linksys public web site at: to any third party. Title to and ownership of the Software
www.linksys.com and www.linksys.com/gpl/ and documentation and any portion thereof, will remain
respectively. For your convenience of reference, a copy solely with Linksys or its suppliers.
of the Linksys Software License Agreement and the main
Collection and Processing of Information. You agree that
open source code licenses used by Linksys in its products
Linksys and/or its affiliates may, from time to time, collect
are contained in the Schedules below.
and process information about your Linksys product
and/or the Software and/or your use of either in order
(i) to enable Linksys to offer you Upgrades; (ii) to ensure
that your Linksys product and/or the Software is being

Wireless-G Broadband Router with 2 Phone Ports 52


Appendix E Software License Agreement

used in accordance with the terms of this Agreement; SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF
(iii) to provide improvements to the way Linksys delivers THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL
technology to you and to other Linksys customers; (iv) to LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU
enable Linksys to comply with the terms of any agreements FOR THE PRODUCT. The foregoing limitations will apply
it has with any third parties regarding your Linksys even if any warranty or remedy under this Agreement fails
product and/or Software and/or (v) to enable Linksys to of its essential purpose. Some jurisdictions do not allow
comply with all applicable laws and/or regulations, or the the exclusion or limitation of incidental or consequential
requirements of any regulatory authority or government damages, so the above limitation or exclusion may not
agency. Linksys and/ or its affiliates may collect and apply to You.
process this information provided that it does not identify
Export. Software, including technical data, may be subject
you personally. Your use of your Linksys product and/or
to U.S. export control laws and regulations and/or export
the Software constitutes this consent by you to Linksys
or import regulations in other countries. You agree to
and/or its affiliates’ collection and use of such information
comply strictly with all such laws and regulations.
and, for EEA customers, to the transfer of such information
to a location outside the EEA. U.S. Government Users. The Software and documentation
qualify as “commercial items” as defined at 48 C.F.R. 2.101
Software Upgrades etc. If the Software enables you to
and 48 C.F.R. 12.212. All Government users acquire the
receive Upgrades, you may elect at any time to receive
Software and documentation with only those rights
these Upgrades either automatically or manually. If you
herein that apply to non-governmental customers.
elect to receive Upgrades manually or you otherwise
elect not to receive or be notified of any Upgrades, you General Terms. This Agreement will be governed by and
may expose your Linksys product and/or the Software construed in accordance with the laws of the State of
to serious security threats and/or some features within California, without reference to conflict of laws principles.
your Linksys product and/or Software may become The United Nations Convention on Contracts for the
inaccessible. There may be circumstances where we International Sale of Goods will not apply. If any portion
apply an Upgrade automatically in order to comply with of this Agreement is found to be void or unenforceable,
changes in legislation, legal or regulatory requirements the remaining provisions will remain in full force and
or as a result of requirements to comply with the terms effect. This Agreement constitutes the entire agreement
of any agreements Linksys has with any third parties between the parties with respect to the Software and
regarding your Linksys product and/or the Software. You supersedes any conflicting or additional terms contained
will always be notified of any Upgrades being delivered in any purchase order or elsewhere.
to you. The terms of this license will apply to any such END OF SCHEDULE 1
Upgrade unless the Upgrade in question is accompanied
by a separate license, in which event the terms of that Schedule 2
license will apply.
If this Linksys product contains open source software
Open Source Software. The GPL or other open source
licensed under Version 2 of the “GNU General Public
code incorporated into the Software and the open source
License” then the license terms below in this Schedule 2
license for such source code are available for free download
will apply to that open source software. The license terms
at http://www.linksys.com/gpl. If You would like a copy
below in this Schedule 2 are from the public web site at
of the GPL or other open source code in this Software on a
http://www.gnu.org/copyleft/gpl.html
CD, Linksys will mail to You a CD with such code for $9.99
plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE
Term and Termination. You may terminate this License
Version 2, June 1991
at any time by destroying all copies of the Software
and documentation. Your rights under this License will Copyright © 1989, 1991 Free Software Foundation, Inc.
terminate immediately without notice from Linksys if You 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301,
fail to comply with any provision of this Agreement. USA
Limited Warranty. The warranty terms and period Everyone is permitted to copy and distribute verbatim
specified in the applicable Linksys Product User Guide copies of this license document, but changing it is not
shall also apply to the Software. allowed.
Disclaimer of Liabilities. IN NO EVENT WILL LINKSYS OR
ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE Preamble
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, The licenses for most software are designed to take away
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF your freedom to share and change it. By contrast, the
CAUSE (INCLUDING NEGLIGENCE), ARISING OUT OF GNU General Public License is intended to guarantee your
OR RELATED TO THE USE OF OR INABILITY TO USE THE
Wireless-G Broadband Router with 2 Phone Ports 53
Appendix E Software License Agreement

freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
the software is free for all its users. This General Public MODIFICATION
License applies to most of the Free Software Foundation’s
software and to any other program whose authors 0. This License applies to any program or other work
commit to using it. (Some other Free Software Foundation which contains a notice placed by the copyright
software is covered by the GNU Lesser General Public holder saying it may be distributed under the terms
License instead.) You can apply it to your programs, too. of this General Public License. The “Program”, below,
refers to any such program or work, and a “work
When we speak of free software, we are referring to
based on the Program” means either the Program
freedom, not price. Our General Public Licenses are
or any derivative work under copyright law: that is
designed to make sure that you have the freedom to
to say, a work containing the Program or a portion
distribute copies of free software (and charge for this
of it, either verbatim or with modifications and/
service if you wish), that you receive source code or can
or translated into another language. (Hereinafter,
get it if you want it, that you can change the software or
translation is included without limitation in the term
use pieces of it in new free programs; and that you know
“modification”.) Each licensee is addressed as “you”.
you can do these things.
To protect your rights, we need to make restrictions that Activities other than copying, distribution and
forbid anyone to deny you these rights or to ask you to modification are not covered by this License; they
surrender the rights. These restrictions translate to certain are outside its scope. The act of running the Program
responsibilities for you if you distribute copies of the is not restricted, and the output from the Program is
software, or if you modify it. covered only if its contents constitute a work based on
the Program (independent of having been made by
For example, if you distribute copies of such a program,
running the Program). Whether that is true depends
whether gratis or for a fee, you must give the recipients
on what the Program does.
all the rights that you have. You must make sure that they,
too, receive or can get the source code. And you must 1. You may copy and distribute verbatim copies of the
show them these terms so they know their rights. Program’s source code as you receive it, in any medium,
provided that you conspicuously and appropriately
We protect your rights with two steps: (1) copyright the
publish on each copy an appropriate copyright
software, and (2) offer you this license which gives you
notice and disclaimer of warranty; keep intact all the
legal permission to copy, distribute and/or modify the
notices that refer to this License and to the absence
software.
of any warranty; and give any other recipients of the
Also, for each author’s protection and ours, we want to Program a copy of this License along with the Program.
make certain that everyone understands that there is no
warranty for this free software. If the software is modified You may charge a fee for the physical act of transferring
by someone else and passed on, we want its recipients a copy, and you may at your option offer warranty
to know that what they have is not the original, so that protection in exchange for a fee.
any problems introduced by others will not reflect on the 2. You may modify your copy or copies of the Program
original authors’ reputations. or any portion of it, thus forming a work based on the
Finally, any free program is threatened constantly by Program, and copy and distribute such modifications
software patents. We wish to avoid the danger that or work under the terms of Section 1 above, provided
redistributors of a free program will individually obtain that you also meet all of these conditions:
patent licenses, in effect making the program proprietary. a. You must cause the modified files to carry
To prevent this, we have made it clear that any patent must prominent notices stating that you changed the
be licensed for everyone’s free use or not licensed at all. files and the date of any change.
The precise terms and conditions for copying, distribution b. You must cause any work that you distribute or
and modification follow. publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be
licensed as a whole at no charge to all third parties
under the terms of this License.

Wireless-G Broadband Router with 2 Phone Ports 54


Appendix E Software License Agreement

c. If the modified program normally reads commands c. Accompany it with the information you received as
interactively when run, you must cause it, when to the offer to distribute corresponding source code.
started running for such interactive use in the most (This alternative is allowed only for noncommercial
ordinary way, to print or display an announcement distribution and only if you received the program
including an appropriate copyright notice and in object code or executable form with such an
a notice that there is no warranty (or else, saying offer, in accord with Subsection b above.)
that you provide a warranty) and that users may
The source code for a work means the preferred form
redistribute the program under these conditions,
of the work for making modifications to it. For an
and telling the user how to view a copy of
executable work, complete source code means all
this License. (Exception: if the Program itself is
the source code for all modules it contains, plus any
interactive but does not normally print such an
associated interface definition files, plus the scripts
announcement, your work based on the Program
used to control compilation and installation of the
is not required to print an announcement.)
executable. However, as a special exception, the source
These requirements apply to the modified work as code distributed need not include anything that is
a whole. If identifiable sections of that work are not normally distributed (in either source or binary form)
derived from the Program, and can be reasonably with the major components (compiler, kernel, and so
considered independent and separate works in on) of the operating system on which the executable
themselves, then this License, and its terms, do not runs, unless that component itself accompanies the
apply to those sections when you distribute them as executable.
separate works. But when you distribute the same
If distribution of executable or object code is made
sections as part of a whole which is a work based on
by offering access to copy from a designated place,
the Program, the distribution of the whole must be on
then offering equivalent access to copy the source
the terms of this License, whose permissions for other
code from the same place counts as distribution of
licensees extend to the entire whole, and thus to each
the source code, even though third parties are not
and every part regardless of who wrote it.
compelled to copy the source along with the object
Thus, it is not the intent of this section to claim rights code.
or contest your rights to work written entirely by you;
1. You may not copy, modify, sublicense, or distribute
rather, the intent is to exercise the right to control the
the Program except as expressly provided under
distribution of derivative or collective works based on
this License. Any attempt otherwise to copy, modify,
the Program.
sublicense or distribute the Program is void, and will
In addition, mere aggregation of another work not automatically terminate your rights under this License.
based on the Program with the Program (or with a However, parties who have received copies, or rights,
work based on the Program) on a volume of a storage from you under this License will not have their licenses
or distribution medium does not bring the other work terminated so long as such parties remain in full
under the scope of this License. compliance.
1. You may copy and distribute the Program (or a 2. You are not required to accept this License, since you
work based on it, under Section 2) in object code or have not signed it. However, nothing else grants you
executable form under the terms of Sections 1 and 2 permission to modify or distribute the Program or its
above provided that you also do one of the following: derivative works. These actions are prohibited by law if
you do not accept this License. Therefore, by modifying
a. Accompany it with the complete corresponding
or distributing the Program (or any work based on the
machine-readable source code, which must be
Program), you indicate your acceptance of this License
distributed under the terms of Sections 1 and 2
to do so, and all its terms and conditions for copying,
above on a medium customarily used for software
distributing or modifying the Program or works based
interchange; or,
on it.
b. Accompany it with a written offer, valid for at least 3. Each time you redistribute the Program (or any work
three years, to give any third party, for a charge based on the Program), the recipient automatically
no more than your cost of physically performing receives a license from the original licensor to copy,
source distribution, a complete machine-readable distribute or modify the Program subject to these
copy of the corresponding source code, to be terms and conditions. You may not impose any further
distributed under the terms of Sections 1 and 2 restrictions on the recipients’ exercise of the rights
above on a medium customarily used for software granted herein. You are not responsible for enforcing
interchange; or, compliance by third parties to this License.

Wireless-G Broadband Router with 2 Phone Ports 55


Appendix E Software License Agreement

4. If, as a consequence of a court judgment or allegation not specify a version number of this License, you
of patent infringement or for any other reason (not may choose any version ever published by the Free
limited to patent issues), conditions are imposed on Software Foundation.
you (whether by court order, agreement or otherwise)
1. If you wish to incorporate parts of the Program into
that contradict the conditions of this License, they do
other free programs whose distribution conditions are
not excuse you from the conditions of this License. If
different, write to the author to ask for permission. For
you cannot distribute so as to satisfy simultaneously
software which is copyrighted by the Free Software
your obligations under this License and any other
Foundation, write to the Free Software Foundation; we
pertinent obligations, then as a consequence you
sometimes make exceptions for this. Our decision will
may not distribute the Program at all. For example,
be guided by the two goals of preserving the free status
if a patent license would not permit royalty-free
of all derivatives of our free software and of promoting
redistribution of the Program by all those who receive
the sharing and reuse of software generally.
copies directly or indirectly through you, then the only
way you could satisfy both it and this License would be NO WARRANTY
to refrain entirely from distribution of the Program.
1. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
If any portion of this section is held invalid or THERE IS NO WARRANTY FOR THE PROGRAM, TO THE
unenforceable under any particular circumstance, EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT
the balance of the section is intended to apply and WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
the section as a whole is intended to apply in other HOLDERS AND/OR OTHER PARTIES PROVIDE THE
circumstances. PROGRAM “AS IS” WITHOUT WARRANTY OF ANY
It is not the purpose of this section to induce you to KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
infringe any patents or other property right claims or BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
to contest validity of any such claims; this section has MERCHANTABILITY AND FITNESS FOR A PARTICULAR
the sole purpose of protecting the integrity of the free PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
software distribution system, which is implemented PERFORMANCE OF THE PROGRAM IS WITH YOU.
by public license practices. Many people have SHOULD THE PROGRAM PROVE DEFECTIVE, YOU
made generous contributions to the wide range of ASSUME THE COST OF ALL NECESSARY SERVICING,
software distributed through that system in reliance REPAIR OR CORRECTION.
on consistent application of that system; it is up to 2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR
the author/donor to decide if he or she is willing to AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER,
distribute software through any other system and a OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
licensee cannot impose that choice. REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE,
This section is intended to make thoroughly clear BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
what is believed to be a consequence of the rest of this GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
License. DAMAGES ARISING OUT OF THE USE OR INABILITY TO
USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO
1. If the distribution and/or use of the Program is LOSS OF DATA OR DATA BEING RENDERED INACCURATE
restricted in certain countries either by patents or by OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR
copyrighted interfaces, the original copyright holder A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
who places the Program under this License may add an OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER
explicit geographical distribution limitation excluding PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
those countries, so that distribution is permitted only SUCH DAMAGES.
in or among countries not thus excluded. In such case,
this License incorporates the limitation as if written in END OF TERMS AND CONDITIONS
the body of this License. END OF SCHEDULE 2
2. The Free Software Foundation may publish revised
and/or new versions of the General Public License Schedule 3
from time to time. Such new versions will be similar in If this Linksys product contains open source software
spirit to the present version, but may differ in detail to licensed under the OpenSSL license:
address new problems or concerns.
This product includes software developed by the
Each version is given a distinguishing version number.
OpenSSL Project for use in the OpenSSL Toolkit.
If the Program specifies a version number of this
(http://www.openssl.org/).
License which applies to it and “any later version”, you
have the option of following the terms and conditions This product includes cryptographic software written by
either of that version or of any later version published Eric Young ([email protected]).
by the Free Software Foundation. If the Program does
Wireless-G Broadband Router with 2 Phone Ports 56
Appendix E Software License Agreement

This product includes software written by Tim Hudson EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
([email protected]). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
In addition, if this Linksys product contains open
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
source software licensed under the OpenSSL license
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
then the license terms below in this Schedule 3 will
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
apply to that open source software. The license terms
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
below in this Schedule 3 are from the public web site at
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
http://www.openssl.org/source/license.html.
SUCH DAMAGE.
The OpenSSL toolkit stays under a dual license, i.e. both
This product includes cryptographic software written by
the conditions of the OpenSSL License and the original
Eric Young ([email protected]). This product includes
SSLeay license apply to the toolkit. See below for the
software written by Tim Hudson ([email protected]).
actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related
to OpenSSL please contact [email protected].
Original SSLeay License
Copyright © 1995-1998 Eric Young ([email protected])All
OpenSSL License rights reserved.
Copyright © 1998-2007 The OpenSSL Project. All rights This package is an SSL implementation written by Eric
reserved. Young ([email protected]).
Redistribution and use in source and binary forms, with The implementation was written so as to conform with
or without modification, are permitted provided that the Netscapes SSL.
following conditions are met:
This library is free for commercial and non-commercial
1. Redistributions of source code must retain the above use as long as the following conditions are adhered to.
copyright notice, this list of conditions and the The following conditions apply to all code found in this
following disclaimer. distribution, be it the RC4, RSA, lhash, DES, etc., code; not
2. Redistributions in binary form must reproduce the just the SSL code. The SSL documentation included with
above copyright notice, this list of conditions and the this distribution is covered by the same copyright terms
following disclaimer in the documentation and/or except that the holder is Tim Hudson (tjh@cryptsoft.
other materials provided with the distribution. com).
3. All advertising materials mentioning features or Copyright remains Eric Young’s, and as such any Copyright
use of this software must display the following notices in the code are not to be removed.
acknowledgment: “This product includes software If this package is used in a product, Eric Young should be
developed by the OpenSSL Project for use in the given attribution as the author of the parts of the library
OpenSSL Toolkit. (http://www.openssl.org/)” used. This can be in the form of a textual message at
4. The names “OpenSSL Toolkit” and “OpenSSL Project” program startup or in documentation (online or textual)
must not be used to endorse or promote products provided with the package.
derived from this software without prior written
Redistribution and use in source and binary forms, with
permission. For written permission, please contact
or without modification, are permitted provided that the
[email protected].
following conditions are met:
5. Products derived from this software may not be called
“OpenSSL” nor may “OpenSSL” appear in their names 1. Redistributions of source code must retain the
without prior written permission of the OpenSSL copyright notice, this list of conditions and the
Project. following disclaimer.

6. Redistributions of any form whatsoever must retain 2. Redistributions in binary form must reproduce the
the following acknowledgment: “This product includes above copyright notice, this list of conditions and the
software developed by the OpenSSL Project for use in following disclaimer in the documentation and/or
the OpenSSL Toolkit (http://www.openssl.org/)” other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT 3. All advertising materials mentioning features or
``AS IS’’ AND ANY EXPRESSED OR IMPLIED WARRANTIES, use of this software must display the following
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED acknowledgement:
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR “This product includes cryptographic software written
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT by Eric Young ([email protected])”
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
Wireless-G Broadband Router with 2 Phone Ports 57
Appendix E Software License Agreement

The word ‘cryptographic’ can be left out if the routines


from the library being used are not cryptographic
related.
1. If you include any Windows specific code (or a derivative
thereof ) from the apps directory (application code)
you must include an acknowledgement: “This product
includes software written by Tim Hudson (tjh@
cryptsoft.com)”
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS’’
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available
version or derivative of this code cannot be changed. i.e.
this code cannot simply be copied and put under another
distribution license [including the GNU Public License.]
END OF SCHEDULE 3

8051210B-JL
Wireless-G Broadband Router with 2 Phone Ports 58

You might also like