Summary of the content on the page No. 1
USER GUIDE
Simultaneous Dual-N Band
Wireless Router
Model: WRT610N
Summary of the content on the page No. 2
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: T
Summary of the content on the page No. 3
Table of Contents Chapter 1: Product Overview 3 Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Wireless Security Checklist 5 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 4
Table of Contents Appendix C: Specifications 41 Appendix D: Warranty Information 42 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Exclusions and Limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Obtaining Warranty Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Summary of the content on the page No. 5
Product Overview Chapter 1 Wireless (Blue) The Wireless LED lights up Chapter 1: when the wireless feature is enabled. If the LED is flashing, the Router is actively sending or Product Overview receiving data over the network. Thank you for choosing the Dual-Band Wireless-N Gigabit Internet (Green/Blue) The Internet LED lights Router with Storage Link. The Router lets you access the up when there is a connection made through Internet via a wireless connection or through one of its four
Summary of the content on the page No. 6
Product Overview Chapter 1 Follow these instructions: Horizontal Placement 1. Determine where you want to mount the Router. Make The Router has four rubber feet on its bottom panel. Place sure that the wall you use is smooth, flat, dry, and the Router on a level surface near an electrical outlet. sturdy. Also make sure the location is within reach of an electrical outlet. 2. Drill two holes into the wall. Make sure the holes are 175.56 mm (6.91 inches) apart. 3. Insert a screw into each ho
Summary of the content on the page No. 7
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication. at a rapid pace. Because wireless networking operates by sending information over rad
Summary of the content on the page No. 8
Advanced Configuration Chapter 3 Setup > Basic Setup Chapter 3: The first screen that appears is the Basic Setup screen. This Advanced Configuration allows you to change the Router’s general settings. After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. If you’d like to change its advanced settings, use the Router’s web- based utility. This chapter describes each web page of the utility and each page’s key functions. You can access t
Summary of the content on the page No. 9
Advanced Configuration Chapter 3 Service Name (optional) If provided by your ISP, enter Automatic Configuration - DHCP the Service Name. By default, the Router’s Internet Connection Type is set Connect on Demand: Max Idle Time You can configure to Automatic Configuration - DHCP, which should be the Router to cut the Internet connection after it has been kept only if your ISP supports DHCP or you are connecting inactive for a specified period of time (Max Idle Time). If through a dynamic I
Summary of the content on the page No. 10
Advanced Configuration Chapter 3 User Name and Password Enter the User Name and Keep Alive: Redial Period If you select this option, Password provided by your ISP. the Router will periodically check your Internet connection. If you are disconnected, then the Router Connect on Demand: Max Idle Time You can configure will automatically re-establish your connection. To use the Router to cut the Internet connection after it has been this option, select Keep Alive. In the Redial Period field,
Summary of the content on the page No. 11
Advanced Configuration Chapter 3 Client Lease Time The Client Lease Time is the amount Network Setup of time a network user will be allowed connection to the The Network Setup section changes the settings on the Router with their current dynamic IP address. Enter the network connected to the Router’s Ethernet ports. Wireless amount of time, in minutes, that the user will be “leased” Setup is performed through the Wireless tab. this dynamic IP address. After the time is up, the user will b
Summary of the content on the page No. 12
Advanced Configuration Chapter 3 When you finish your changes, click Save Settings to Password Enter the Password for your DDNS account. save your changes. Click Cancel Changes to cancel your Host Name The is the DDNS URL assigned by the DDNS changes. To view the most up-to-date information, click service. Refresh. To exit this screen, click Close. WildCard Select Enabled to enable this feature or Time Setting Disabled to disable it. Internet IP Address The Router’s Internet IP address is S
Summary of the content on the page No. 13
Advanced Configuration Chapter 3 Setup > MAC Address Clone Setup > Advanced Routing This screen is used to set up the Router’s advanced Every computere hardware device, including the network functions. Operating Mode allows you to select the adapter of your computer has a unique code called a MAC type(s) of advanced functions you use. Dynamic Routing address. Some Internet Service Providers (ISPs) require you automatically adjusts how packets travel on your network. to register this addre
Summary of the content on the page No. 14
Advanced Configuration Chapter 3 Gateway This is the IP address of the gateway device that Network Mode (5 GHz) From this drop-down menu, you allows for contact between the Router and the remote can select the wireless standards running on your network. network or host. If you have both Wireless-A and Wireless-N (5GHz) devices in your network, keep the default setting, Mixed. If you Interface This interface tells you whether the Destination have only Wireless-A devices, select Wireless-A On
Summary of the content on the page No. 15
Advanced Configuration Chapter 3 Standard Channel (2.4 GHz) Select the channel for Method #1 Wireless-B, Wireless-G and Wireless-N (2.4GHz) networking. Use this method if your client device has a Wi-Fi Protected If you selected Wide – 40MHz Channel for the Radio Band Setup button. setting, then the Standard Channel will be a secondary channel for Wireless-N (2.4GHz). If you are not sure which 1. Click or press the Wi-Fi Protected Setup button on channel to select, keep the default, Auto.
Summary of the content on the page No. 16
Advanced Configuration Chapter 3 WPA Enterprise Wireless > Wireless Security This option features WPA used in coordination with a The Wireless Security settings configure the security of RADIUS server. (This should only be used when a RADIUS your wireless network. There are six wireless security server is connected to the Router.) mode options supported by the Router: WPA Personal, WPA Enterprise, WPA2 Personal, WPA2 Enterprise, RADIUS, and WEP. (WPA stands for Wi-Fi Protected Access, whi
Summary of the content on the page No. 17
Advanced Configuration Chapter 3 Encryption WPA2 supports two encryption methods RADIUS with dynamic encryption keys; AES or WPA-TKIP/WPA2- This option features WEP used in coordination with a AES. You must select WPA-TKIP or WPA2-AES to connect RADIUS server. (This should only be used when a RADIUS to the Router. server is connected to the Router.) Passphrase Enter a passphrase of 8-63 characters. Key Renewal Enter a Key Renewal period, which instructs the Router how often it should cha
Summary of the content on the page No. 18
Advanced Configuration Chapter 3 WEP Wireless > Wireless MAC Filter WEP is a basic encryption method that is not as secure as Wireless access can be filtered by using the MAC addresses WPA. of the wireless devices transmitting within your network’s radius. WEP Encryption Select a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. The default is 64 bits Wireless > Wireless MAC Filter 10 hex digits. Passphrase Enter a Passphrase to automatically generate Wireless MAC
Summary of the content on the page No. 19
Advanced Configuration Chapter 3 Frame Burst Enabling this option should provide your network with greater performance, depending on the manufacturer of your wireless products. To use the Frame Burst option, select Enabled. The default is Disabled. Authentication Type The default is set to Auto, which allows either Open System or Shared Key authentication to be used. With Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. With Shared Key auth
Summary of the content on the page No. 20
Advanced Configuration Chapter 3 Fragmentation Threshold This value specifies the Filter Multicast Multicasting allows for multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time. If into multiple packets. If you experience a high packet multicasting is permitted, then the Router will allow IP error rate, you may slightly increase the Fragmentation multicast packets to be forwarded to the appropriate Threshold. Setting the Fragmentat