Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share. For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.
|Published (Last):||13 October 2011|
|PDF File Size:||5.30 Mb|
|ePub File Size:||8.64 Mb|
|Price:||Free* [*Free Regsitration Required]|
Quick Links. Download this manual. Table of Contents. Page 2: About This Guide Network www. Other brands and product names are trademarks or registered trademarks of their respective holders. Page 5: Chapter 1: Product Overview Product Overview is flashing, the Router is actively sending or receiving data over the network. The Router lets you access the Internet via Determine where you want to mount the Router. Make The Router has two wall-mount slots on its bottom sure that the wall you use is smooth, flat, dry, and panel.
The distance between the slots is mm sturdy. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. The default Max Idle Time is 15 minutes. Page 10 Advanced Configuration Chapter 3 inactivity, Connect on Demand enables the Router to Telstra Cable automatically re-establish your connection as soon as you Telstra Cable is a service that applies to connections in attempt to access the Internet again.
To use this option, Australia only. Page 11 Advanced Configuration Chapter 3 host and domain name. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. For added security, you should change Mask, Gateway, and Interface are displayed. Click the default SSID linksys to a unique name. Refresh to update the information. Click Close to exit this screen. After the client device has been configured, click OK.
Then refer back to your client device or its There are three methods available. Use the method that documentation for further instructions. Select Shared Key to This screen shows computers and other devices on only use Shared Key authentication. The default value is 1. Fragmentation Threshold Filter Multicast This value specifies the Multicasting allows multiple maximum size for a packet before data is fragmented transmissions to specific recipients at the same time.
To enable a policy, Check with the Internet To forward a port, enter the information on each line for application documentation for more information. Check with the Internet application documentation for the port number s needed.
Click Add to save your changes. You must have the Remote Management The Router can keep logs of all traffic for your Internet feature enabled as well. Otherwise, keep the default, connection. Then extract the file. To exit this screen and return to the Local Network screen, click Close. You still need your DSL modem in order to use the Router.
Page 33 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P. Box , Irvine, CA Wireless-N Gigabit Router IEEE Standard Actual performance can vary, including lower wireless network capacity, Operation is subject to the following two conditions: data throughput rate, range and coverage.
Other than as set forth in this suitability, functionality, or legality of any sites or products Agreement, you may not i make or distribute copies to which links may be provided or third party services, and of the Software or its related Documentation, or you hereby waive any claim you might have against Cisco electronically transfer the Software or Documentation Page 42 Software End User License Agreement Appendix E Software can enable any other computer on the same part of the installation process or by requesting a change primary network to generate reports.
When a computer to your software settings in the error process. Installing is enabled, that computer shows a notification that it is the software and changing these software settings may being monitored. Page 44 Software End User License Agreement Appendix E send you Service related email messages as long as you For example, if you distribute copies of such a program, are a subscriber to the Service.
If you wish to opt-out whether gratis or for a fee, you must give the recipients of receiving Service related email messages, you may all the rights that you have. Page 49 Software End User License Agreement Appendix E For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work which must be distributed and distribute such a combined library, provided that If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason not ever published by the Free Software Foundation.
This manual is also suitable for: Wrtn. Print page 1 Print document 53 pages. Cancel Delete. Sign In OR. Don't have an account? Sign up! Restore password. Upload from disk. Upload from URL.
Linksys WRT310N User Manual
Wireless-N Gigabit Router
Linksys WRT310N - Wireless-N Gigabit Router Wireless User Manual