Rtax 1800 U
Rtax 1800 U
RT-AX1800U
Wireless AX-1800 Dual Band WiFi 6
Router
E19791
First Edition
January 2022
2
Table of contents
1 Getting to know your wireless router 6
1.1 Welcome!.........................................................................................6
1.2 Package contents..........................................................................6
1.3 Your wireless router......................................................................7
1.4 Positioning your router...............................................................9
1.5 Setup Requirements................................................................. 10
1.6 Router Setup................................................................................ 11
1.6.1 Wired connection...................................................................12
1.6.2 Wireless connection..............................................................13
2 Getting started 14
2.1 Logging into the Web GUI...................................................... 14
2.2 Quick Internet Setup (QIS) with Auto-detection............ 15
2.3 Connecting to your wireless network................................. 19
3
Table of contents
4.1.2 WPS.............................................................................................38
4.1.3 WDS.............................................................................................40
4.1.4 Wireless MAC Filter................................................................42
4.1.5 RADIUS Setting.......................................................................43
4.1.6 Professional..............................................................................44
4.2 LAN.................................................................................................. 47
4.2.1 LAN IP.........................................................................................47
4.2.2 DHCP Server.............................................................................48
4.2.3 Route..........................................................................................50
4.2.4 IPTV.............................................................................................51
4.3 WAN................................................................................................ 52
4.3.1 Internet Connection..............................................................52
4.3.2 Port Trigger...............................................................................55
4.3.3 Virtual Server/Port Forwarding.........................................57
4.3.4 DMZ............................................................................................60
4.3.5 DDNS..........................................................................................61
4.3.6 NAT Passthrough....................................................................62
4.4 IPv6.................................................................................................. 63
4.5 Firewall........................................................................................... 64
4.5.1 General.......................................................................................64
4.5.2 URL Filter...................................................................................64
4.5.3 Keyword filter..........................................................................65
4.5.4 Network Services Filter........................................................66
4.6 Administration............................................................................ 68
4.6.1 Operation Mode.....................................................................68
4.6.2 System........................................................................................69
4.6.3 Firmware Upgrade.................................................................70
4.6.4 Restore/Save/Upload Setting............................................70
4
Table of contents
4.7 System Log................................................................................... 71
5 Utilities 72
5.1 Device Discovery........................................................................ 72
5.2 Firmware Restoration............................................................... 73
6 Troubleshooting 75
6.1 Basic Troubleshooting.............................................................. 75
6.2 Frequently Asked Questions (FAQs) ................................... 78
Appendices 87
Service and Support................................................................................. 95
5
1 Getting to know your wireless
router
1.1 Welcome!
Thank you for purchasing an ASUS RT-AX1800U Wireless Router!
The ultra-thin and stylish RT-AX1800U features a 2.4GHz and 5GHz
dual bands for an unmatched concurrent wireless HD streaming
and the ASUS Green Network Technology, which provides up to
70% power-saving solution.
NOTES:
• If any of the items are damaged or missing, contact ASUS for
technical inquiries and support. Refer to the ASUS Support Hotline
list at the back of this user manual.
• Keep the original packaging material in case you would need future
warranty services such as repair or replacement.
6
1.3 Your wireless router
Power LED
Off: No power.
On: Device is ready.
Flashing slow: Rescue mode
LAN 1~3 LEDs
Off: No power or no physical connection.
On: Has physical connection to a local area network (LAN).
WAN (Internet) LED
Red: No IP or no physical connection.
On: Has physical connection to a wide area network (WAN).
2.4GHz LED
Off: No 2.4GHz signal.
On: Wireless system is ready.
Flashing: Transmitting or receiving data via wireless connection.
5GHz LED
Off: No 5GHz signal.
On: Wireless system is ready.
Flashing: Transmitting or receiving data via wireless connection.
USB 2.0 LED
Off: No power or no physical connection.
On: Has physical connection to USB devices.
Reset button
This button resets or restores the system to its factory default settings.
Power switch
Press this switch to power on or off the system.
7
Power (DCIN) port
Insert the bundled AC adapter into this port and connect your router to a power source.
WPS button
This button launches the WPS Wizard.
USB 2.0 port
Insert USB 2.0 compatible devices such as USB hard disks or USB flash drives
into this port.
WAN (Internet) port
Connect a network cable into this port to establish WAN connection.
LAN 1 ~ 3 ports
Connect network cables into these ports to establish LAN connection.
NOTES:
• Use only the adapter that came with your package. Using other
adapters may damage the device.
• Specifications:
DC Power adapter DC Output: +12V with max 1.5A current
Operating Temperature 0~40oC Storage 0~70oC
Operating Humidity 50~90% Storage 20~90%
8
1.4 Positioning your router
For the best wireless signal transmission between the wireless
router and the network devices connected to it, ensure that you:
45° 45°
9
1.5 Setup Requirements
To set up your wireless network, you need a computer that meets
the following system requirements:
• Ethernet RJ-45 (LAN) port (10Base-T/100Base-TX/1000BaseTX)
• IEEE 802.11a/b/g/n/ac/ax wireless capability
• An installed TCP/IP service
• Web browser such as Internet Explorer, Firefox, Safari, or
Google Chrome
NOTES:
• If your computer does not have built-in wireless capabilities, you may
install an IEEE 802.11a/b/g/n/ac/ax WLAN adapter to your computer
to connect to the network.
• With its dual band technology, your wireless router supports 2.4GHz
and 5GHz wireless signals simultaneously. This allows you to do
Internet-related activities such as Internet surfing or reading/writing
e-mail messages using the 2.4GHz band while simultaneously
streaming high-definition audio/video files such as movies or music
using the 5GHz band.
• Some IEEE 802.11n devices that you want to connect to your network
may or may not support 5GHz band. Refer to the device's manual for
specifications.
• The Ethernet RJ-45 cables that will be used to connect the network
devices should not exceed 100 meters.
10
1.6 Router Setup
IMPORTANT!
• Use a wired connection when setting up your wireless router to
avoid possible setup problems.
• Before setting up your ASUS wireless router, do the followings:
• If you are replacing an existing router, disconnect it from your
network.
• Disconnect the cables/wires from your existing modem setup. If
your modem has a backup battery, remove it as well.
• Reboot your cable modem and computer (recommended).
11
1.6.1 Wired connection
NOTE: You can use either a straight-through cable or a crossover cable
for wired connection.
RT-AX1800U
b LAN
Modem Laptop
Wall Power Outlet
Power a
LINE LAN RESET PWR
c WAN
d
12
1.6.2 Wireless connection
RT-AX1800U
Smart phone
Modem
Wall Power Outlet
Power a Tablet
LINE LAN RESET PWR
b WAN
Laptop
c
NOTES:
• For details on connecting to a wireless network, refer to the WLAN
adapter’s user manual.
• To set up the security settings for your network, refer to the section
3.1.1 Setting up the wireless security settings.
13
2 Getting started
2.1 Logging into the Web GUI
Your ASUS Wireless Router comes with an intuitive web graphical
user interface (GUI) that allows you to easily configure its various
features through a web browser such as Internet Explorer, Firefox,
Safari, or Google Chrome.
NOTE: The features may vary with different firmware versions.
QIS
Navigation
panel
Right column
Middle
column
NOTE: If you are logging into the Web GUI for the first time, you will be
directed to the Quick Internet Setup (QIS) page automatically.
14
2.2 Quick Internet Setup (QIS) with Auto-
detection
The Quick Internet Setup (QIS) function guides you in quickly
setting up your Internet connection.
NOTE: When setting the Internet connection for the first time, press
the Reset button on your wireless router to reset it to its factory default
settings.
NOTES:
• By default, the login username and password for your wireless
router's Web GUI is admin. For details on changing your wireless
router's login username and password, refer to section 4.6.2 System.
• The wireless router's login username and password is different from
the 2.4GHz/5GHz network name (SSID) and security key. The wireless
router's login username and password allows you to log into your
wireless router's Web GUI to configure your wireless router's settings.
The 2.4GHz/5GHz network name (SSID) and security key allows Wi-Fi
devices to log in and connect to your 2.4GHz/5GHz network.
15
2. The wireless router automatically detects if your ISP connection
type is Dynamic IP, PPPoE, PPTP, L2TP, and Static IP. Key in
the necessary information for your ISP connection type.
IMPORTANT! Obtain the necessary information from your ISP about
the Internet connection type.
16
for Static IP
NOTES:
• The auto-detection of your ISP connection type takes place when
you configure the wireless router for the first time or when your
wireless router is reset to its default settings.
• If QIS failed to detect your Internet connection type, click Skip to
manual setting and manually configure your connection settings.
17
3. Assign the wireless network name (SSID) and security key for
your 2.4GHz and 5GHz wireless connection. Click Apply when
done.
18
2.3 Connecting to your wireless network
After setting up your wireless router via QIS, you can connect your
computer or other smart devices to your wireless network.
To connect to your network:
1. On your computer, click the network icon in the notification
area to display the available wireless networks.
2. Select the wireless network that you want to connect to, then
click Connect.
3. You may need to key in the network security key for a secured
wireless network, then click OK.
4. Wait while your computer establishes connection to the
wireless network successfully. The connection status is
displayed and the network icon displays the connected
status.
NOTES:
• Refer to the next chapters for more details on configuring your
wireless network's settings.
• Refer to your device's user manual for more details on connecting it
to your wireless network.
19
3 Configuring the General
settings
3.1 Using the Network Map
Network Map allows you to configure your network’s security
settings and manage your network clients.
20
3.1.1 Setting up the wireless security settings
To protect your wireless network from unauthorized access, you
need to configure its security settings.
To set up the wireless security settings:
1. From the navigation panel, go to General > Network Map.
2. On the Network Map screen and under System status, you can
configure the wireless security settings such as SSID, security
level, and encryption settings.
NOTE: You can set up different wireless security settings for 2.4GHz
and 5GHz bands.
3. On the Wireless name (SSID) field, key in a unique name for
your wireless network.
21
4. From the WEP Encryption dropdown list, select the encryption
method for your wireless network.
IMPORTANT! The IEEE 802.11n/ac/ax standard prohibits using High
Throughput with WEP or WPA-TKIP as the unicast cipher. If you use these
encryption methods, your data rate will drop to IEEE 802.11g 54Mbps
connection.
22
3.2 Creating a Guest Network
The Guest Network provides temporary visitors with Internet
connectivity via access to separate SSIDs or networks without
providing access to your private network.
23
4. To configure additional options, click Modify.
24
3.3 AiProtection
AiProtection provides real-time monitoring that detects malware,
spyware, and unwanted access. It also filters unwanted websites
and apps and allows you to schedule a time that a connected
device is able to access the Internet.
25
3.3.1 Network Protection
Network Protection prevents network exploits and secures your
network from unwanted access.
26
3. From the Network Protection tab, click Scan.
When done scanning, the utility displays the results on the
Router Security Assessment page.
27
Malicious Sites Blocking
This feature restricts access to known malicious websites in the
cloud database for an always-up-to-date protection.
NOTE: This function is automatically enabled if you run the Router
Weakness Scan.
28
3.3.2 Setting up Parental Controls
Parental Controls allows you to control the Internet access time or
set the time limit for a client’s network usage.
To go to the Parental Controls main page:
1. From the navigation panel, go to General > AiProtection.
2. From the AiProtection main page, click on the Parental
Controls tab.
29
Time Scheduling
Time Scheduling allows you to set the time limit for a client’s
network usage.
NOTE: Ensure that your system time is synchronized with the NTP
server.
30
3.4 Using the Traffic Manager
3.4.1 Managing QoS (Quality of Service) Bandwidth
Quality of Service (QoS) allows you to set the bandwidth priority
and manage network traffic.
3. Click Save.
NOTE: The User Specify Rule List is for advanced settings. If you want
to prioritize specific network applications and network services, select
User-defined QoS rules or User-defined Priority from the drop-down
list on the upper-right corner.
31
4. On the user-defined QoS rules page, there are four default
online service types – web surf, HTTPS and file transfers.
Select your preferred service, fill in the Source IP or MAC,
Destination Port, Protocol, Transferred and Priority, then
click Apply. The information will be configured in the QoS rules
screen.
NOTES:
• To fill in the source IP or MAC, you can:
a) Enter a specific IP address, such as "192.168.122.1".
b) Enter IP addresses within one subnet or within the same IP
pool, such as “192.168.123.*”, or “192.168.*.*”
c) Enter all IP addresses as “*.*.*.*” or leave the field blank.
d) The format for the MAC address is six groups of two
hexadecimal digits, separated by colons (:), in transmission
order (e.g. 12:34:56:aa:bc:ef)
• For source or destination port range, you can either:
a) Enter a specific port, such as “95”.
b) Enter ports within a range, such as “103:315”, “>100”, or
“<65535”.
• The Transferred column contains information about the upstream
and downstream traffic (outgoing and incoming network traffic) for
one section. In this column, you can set the network traffic limit (in
KB) for a specific service to generate specific priorities for the service
assigned to a specific port. For example, if two network clients, PC
1 and PC 2, are both accessing the Internet (set at port 80), but PC 1
exceeds the network traffic limit due to some downloading tasks, PC
1 will have a lower priority. If you do not want to set the traffic limit,
leave it blank.
32
5. On the User-defined Priority page, you can prioritize the
network applications or devices into five levels from the user-
defined QoS rules’ dropdown list. Based on priority level, you
can use the following methods to send data packets:
• Change the order of upstream network packets that are sent
to the Internet.
• Under Upload Bandwidth table, set Minimum Reserved
Bandwidth and Maximum Bandwidth Limit for multiple
network applications with different priority levels. The
percentages indicate the upload bandwidth rates that are
available for specified network applications.
NOTES:
• Low-priority packets are disregarded to ensure the transmission of
high-priority packets.
NOTE: Ensure to enable QoS first and set up the upload and download
rate limits.
33
3.5 Traffic Analyzer
The traffic monitor feature allows you to access the bandwidth
usage and speed of your Internet, wired, or wireless networks. It
allows you to monitor network traffic in real-time or on a daily
basis. It also offers an option to display the network traffic within
the last 24 hours.
NOTE: Packets from the Internet are evenly transmitted to the wired
and wireless devices.
34
4 Configuring the Advanced
Settings
4.1 Wireless
4.1.1 General
The General tab allows you to configure the basic wireless
settings.
35
To configure the basic wireless settings:
1. From the navigation panel, go to Advanced Settings >
Wireless > General tab.
2. Select 2.4GHz or 5GHz as the frequency band for your wireless
network.
3. Assign a unique name containing up to 32 characters for your
SSID (Service Set Identifier) or network name to identify your
wireless network. Wi-Fi devices can identify and connect to
the wireless network via your assigned SSID. The SSIDs on the
information banner are updated once new SSIDs are saved to
the settings.
NOTE: You can assign unique SSIDs for the 2.4GHz and 5GHz
frequency bands.
36
6. Select any of these channel bandwidth to accommodate higher
transmission speeds:
40MHz: Select this bandwidth to maximize the wireless
throughput.
20MHz (default): Select this bandwidth if you encounter some
issues with your wireless connection.
7. Select the operating channel for your wireless router. Select
Auto to allow the wireless router to automatically select the
channel that has the least amount of interference.
8. Select any of these authentication methods:
• Open System: This option provides no security.
• WPA/WPA2/WPA3 Personal/WPA Auto-Personal: This
option provides strong security. You can use either WPA (with
TKIP), WPA2 (with AES) or WPA3. If you select this option,
you must use TKIP + AES encryption and enter the WPA
passphrase (network key).
• WPA/WPA2/WPA3 Enterprise/WPA Auto-Enterprise: This
option provides very strong security. It is with integrated EAP
server or an external RADIUS back-end authentication server.
NOTE: Your wireless router supports the maximum transmission rate
of 54Mbps when the Wireless Mode is set to Auto and encryption
method is WEP or TKIP.
37
4.1.2 WPS
WPS (Wi-Fi Protected Setup) is a wireless security standard that
allows you to easily connect devices to a wireless network. You
can configure the WPS function via the PIN code or WPS button.
NOTE: Ensure that the devices support WPS.
38
4. In the WPS Method field, select Push Button or Client PIN
code. If you select Push Button, go to step 5. If you select
Client PIN code, go to step 6.
5. To set up WPS using the router’s WPS button, follow these
steps:
a. Click Start or press the WPS button found at the rear of the
wireless router.
b. Press the WPS button on your wireless device. This is
normally identified by the WPS logo.
NOTE: Check your wireless device or its user manual for the location of
the WPS button.
c. The wireless router will scan for any available WPS devices.
If the wireless router does not find any WPS devices, it will
switch to standby mode.
6. To set up WPS using the Client’s PIN code, follow these steps:
a. Locate the WPS PIN code on your wireless device’s user
manual or on the device itself.
b. Key in the Client PIN code on the text box.
c. Click Start to put your wireless router into WPS survey mode.
The router’s LED indicators quickly flash three times until the
WPS setup is completed.
39
4.1.3 WDS
Bridge or WDS (Wireless Distribution System) allows your ASUS
wireless router to connect to another wireless access point
exclusively, preventing other wireless devices or stations to access
your ASUS wireless router. It can also be considered as a wireless
repeater where your ASUS wireless router communicates with
another access point and other wireless devices.
40
To set up the wireless bridge:
1. From the navigation panel, go to Advanced Settings >
Wireless > WDS tab.
2. Select the frequency band for the wireless bridge.
3. In the AP Mode field, select any of these options:
• AP Only: Disables the Wireless Bridge function.
• WDS Only: Enables the Wireless Bridge feature but prevents
other wireless devices/stations from connecting to the
router.
• HYBRID: Enables the Wireless Bridge feature and allows
other wireless devices/stations to connect to the router.
NOTE: In Hybrid mode, wireless devices connected to the ASUS
wireless router will only receive half the connection speed of the Access
Point.
6. On the Remote AP List, key in a MAC address and click the Add
button to enter the MAC address of other available Access
Points.
NOTE: Any Access Point added to the list should be on the same
Control Channel as the ASUS wireless router.
7. Click Apply.
41
4.1.4 Wireless MAC Filter
Wireless MAC filter provides control over packets transmitted to
a specified MAC (Media Access Control) address on your wireless
network.
42
4.1.5 RADIUS Setting
RADIUS (Remote Authentication Dial In User Service) Setting
provides an extra layer of security when you choose WPA-
Enterprise, WPA2-Enterprise, WPA3-Enterprise or Radius with
802.1x as your Authentication Mode.
43
4.1.6 Professional
The Professional screen provides advanced configuration options.
NOTE: We recommend that you use the default values on this page.
44
• Enable wireless scheduler: You can choose clock format as
24-hour or 12-hour. The color in the table indicates Allow or
Deny. Click each frame to change the settings of the hour of
the weekdays and click OK when done.
• Set AP isolated: The Set AP isolated item prevents wireless
devices on your network from communicating with each
other. This feature is useful if many guests frequently join or
leave your network. Select Yes to enable this feature or select
No to disable.
• Multicast rate (Mbps): Select the multicast transmission
rate or click Disable to switch off simultaneous single
transmission.
45
• Preamble Type: Preamble Type defines the length of time
that the router spent for CRC (Cyclic Redundancy Check). CRC
is a method of detecting errors during data transmission.
Select Short for a busy wireless network with high network
traffic. Select Long if your wireless network is composed of
older or legacy wireless devices.
• RTS Threshold: Select a lower value for RTS (Request to
Send) Threshold to improve wireless communication in a
busy or noisy wireless network with high network traffic and
numerous wireless devices.
• DTIM Interval: DTIM (Delivery Traffic Indication Message)
Interval or Data Beacon Rate is the time interval before a
signal is sent to a wireless device in sleep mode indicating
that a data packet is awaiting delivery. The default value is
three milliseconds.
• Beacon Interval: Beacon Interval is the time between one
DTIM and the next. The default value is 100 milliseconds.
Lower the Beacon Interval value for an unstable wireless
connection or for roaming devices.
• Enable TX Bursting: Enable TX Bursting improves
transmission speed between the wireless router and 802.11g
devices.
• Enable WMM APSD: Enable WMM APSD (Wi-Fi Multimedia
Automatic Power Save Delivery) to improve power
management between wireless devices. Select Disable to
switch off WMM APSD.
46
4.2 LAN
4.2.1 LAN IP
The LAN IP screen allows you to modify the LAN IP settings of your
wireless router.
NOTE: Any changes to the LAN IP address will be reflected on your
DHCP settings.
47
4.2.2 DHCP Server
Your wireless router uses DHCP to assign IP addresses
automatically on your network. You can specify the IP address
range and lease time for the clients on your network.
48
6. In the Lease Time field, specify in seconds when an assigned
IP address will expire. Once it reaches this time limit, the DHCP
server will then assign a new IP address.
NOTES:
• We recommend that you use an IP address format of 192.168.50.xxx
(where xxx can be any number between 2 and 254) when specifying
an IP address range.
• An IP Pool Starting Address should not be greater than the IP Pool
Ending Address.
49
4.2.3 Route
If your network makes use of more than one wireless router, you
can configure a routing table to share the same Internet service.
NOTE: We recommend that you do not change the default route
settings unless you have advanced knowledge of routing tables.
50
4.2.4 IPTV
The wireless router supports connection to IPTV services through
an ISP or a LAN. The IPTV tab provides the configuration settings
needed to set up IPTV, VoIP, multicasting, and UDP for your
service. Contact your ISP for specific information regarding your
service.
51
4.3 WAN
4.3.1 Internet Connection
The Internet Connection screen allows you to configure the
settings of various WAN connection types.
52
• Enable WAN: Select Yes to allow the router Internet access.
Select No to disable Internet access.
• Enable NAT: NAT (Network Address Translation) is a system
where one public IP (WAN IP) is used to provide Internet
access to network clients with a private IP address in a LAN.
The private IP address of each network client is saved in a NAT
table and is used to route incoming data packets.
• Enable UPnP: UPnP (Universal Plug and Play) allows several
devices (such as routers, televisions, stereo systems, game
consoles, and cellular phone), to be controlled via an IP-based
network with or without a central control through a gateway.
UPnP connects PCs of all form factors, providing a seamless
network for remote configuration and data transfer. Using
UPnP, a new network device is discovered automatically.
Once connected to the network, devices can be remotely
configured to support P2P applications, interactive gaming,
video conferencing, and web or proxy servers. Unlike Port
forwarding, which involves manually configuring port
settings, UPnP automatically configures the router to accept
incoming connections and direct requests to a specific PC on
the local network.
• Connect to DNS Server: Allows this router to get the DNS
IP address from the ISP automatically. A DNS is a host on
the Internet that translates Internet names to numeric IP
addresses.
• Authentication: This item may be specified by some ISPs.
Check with your ISP and fill them in if required.
• Host Name: This field allows you to provide a host name for
your router. It is usually a special requirement from your ISP.
If your ISP assigned a host name to your computer, enter the
host name here.
53
• MAC Address: MAC (Media Access Control) address is a
unique identifier for your networking device. Some ISPs
monitor the MAC address of networking devices that connect
to their service and reject any unrecognized device that
attempt to connect. To avoid connection issues due to an
unregistered MAC address, you can:
• Contact your ISP and update the MAC address associated
with your ISP service.
• Clone or change the MAC address of the ASUS wireless router
to match the MAC address of the previous networking device
recognized by the ISP.
54
4.3.2 Port Trigger
Port range triggering opens a predetermined incoming port for a
limited period of time whenever a client on the local area network
makes an outgoing connection to a specified port. Port triggering
is used in the following scenarios:
• More than one local client needs port forwarding for the
same application at a different time.
• An application requires specific incoming ports that are
different from the outgoing ports.
55
• Trigger Port: Specify a trigger port to open the incoming
port.
• Protocol: Select the protocol, TCP, or UDP.
• Incoming Port: Specify an incoming port to receive inbound
data from the Internet.
• Protocol: Select the protocol, TCP, or UDP.
NOTES:
• When connecting to an IRC server, a client PC makes an outgoing
connection using the trigger port range 66660-7000. The IRC server
responds by verifying the username and creating a new connection
to the client PC using an incoming port.
• If Port Trigger is disabled, the router drops the connection because
it is unable to determine which PC is requesting for IRC access.
When Port Trigger is enabled, the router assigns an incoming port to
receive the inbound data. This incoming port closes once a specific
time period has elapsed because the router is unsure when the
application has been terminated.
• Port triggering only allows one client in the network to use a
particular service and a specific incoming port at the same time.
• You cannot use the same application to trigger a port in more than
one PC at the same time. The router will only forward the port back
to the last computer to send the router a request/trigger.
56
4.3.3 Virtual Server/Port Forwarding
Port forwarding is a method to direct network traffic from the
Internet to a specific port or a specific range of ports to a device
or number of devices on your local network. Setting up Port
Forwarding on your router allows PCs outside the network to
access specific services provided by a PC in your network.
57
• Famous Server List: Determine which type of service you
want to access.
• Famous Game List: This item lists ports required for popular
online games to work correctly.
• FTP Server Port: Avoid assigning the port range 20:21 for
your FTP server as this would conflict with the router’s native
FTP server assignment.
• Service Name: Enter a service name.
• Port Range: If you want to specify a Port Range for clients
on the same network, enter the Service Name, the Port
Range (e.g. 10200:10300), the LAN IP address, and leave the
Local Port empty. Port range accepts various formats such
as Port Range (300:350), individual ports (566,789) or Mix
(1015:1024,3021).
NOTES:
• When your network’s firewall is disabled and you set 80 as the HTTP
server’s port range for your WAN setup, then your http server/web
server would be in conflict with the router’s web user interface.
• A network makes use of ports in order to exchange data, with each
port assigned a port number and a specific task. For example, port 80
is used for HTTP. A specific port can only be used by one application
or service at a time. Hence, two PCs attempting to access data
through the same port at the same time would fail. For example, you
cannot set up Port Forwarding for port 100 for two PCs at the same
time.
NOTE: Use a static IP address for the local client to make port
forwarding work properly. Refer to section 4.2 LAN for information.
58
• Local Port: Enter a specific port to receive forwarded packets.
Leave this field blank if you want the incoming packets to be
redirected to the specified port range.
• Protocol: Select the protocol. If you are unsure, select BOTH.
To check if Port Forwarding has been configured successfully:
• Ensure that your server or application is set up and running.
• You will need a client outside your LAN but has Internet
access (referred to as “Internet client”). This client should not
be connected to the ASUS router.
• On the Internet client, use the router’s WAN IP to access the
server. If port forwarding has been successful, you should be
able to access the files or applications.
Differences between port trigger and port forwarding:
• Port triggering will work even without setting up a specific
LAN IP address. Unlike port forwarding, which requires a
static LAN IP address, port triggering allows dynamic port
forwarding using the router. Predetermined port ranges are
configured to accept incoming connections for a limited
period of time. Port triggering allows multiple computers
to run applications that would normally require manually
forwarding the same ports to each PC on the network.
• Port triggering is more secure than port forwarding since the
incoming ports are not open all the time. They are opened
only when an application is making an outgoing connection
through the trigger port.
59
4.3.4 DMZ
Virtual DMZ exposes one client to the Internet, allowing this
client to receive all inbound packets directed to your Local Area
Network.
Inbound traffic from the Internet is usually discarded and routed
to a specific client only if port forwarding or a port trigger has
been configured on the network. In a DMZ configuration, one
network client receives all inbound packets.
Setting up DMZ on a network is useful when you need incoming
ports open or you want to host a domain, web, or e-mail server.
CAUTION! Opening all the ports on a client to the Internet makes the
network vulnerable to outside attacks. Please be aware of the security
risks involved in using DMZ.
To set up DMZ:
1. From the navigation panel, go to Advanced Settings > WAN >
DMZ tab.
2. Configure the setting below. When done, click Apply.
• IP address of Exposed Station: Key in the client’s LAN IP
address that will provide the DMZ service and be exposed
on the Internet. Ensure that the server client has a static IP
address.
To remove DMZ:
1. Delete the client’s LAN IP address from the IP Address of
Exposed Station text box.
2. When done, click Apply.
60
4.3.5 DDNS
Setting up DDNS (Dynamic DNS) allows you to access the router
from outside your network through the provided ASUS DDNS
Service or another DDNS service.
To set up DDNS:
1. From the navigation panel, go to Advanced Settings > WAN >
DDNS tab.
2. Configure the following settings below. When done, click
Apply.
• Enable the DDNS Client: Enable DDNS to access the ASUS
router via the DNS name rather than WAN IP address.
• Server and Host Name: Choose ASUS DDNS or other DDNS.
If you want to use ASUS DDNS, fill in the Host Name in the
format of xxx.asuscomm.com (xxx is your host name).
• If you want to use a different DDNS service, click FREE TRIAL
and register online first. Fill in the User Name or E-mail
Address and Password or DDNS Key fields.
61
• Enable wildcard: Enable wildcard if your DDNS service
requires one.
NOTE:
DDNS service will not work under these conditions:
• W
hen the wireless router is using a private WAN IP address
(192.168.x.x, 10.x.x.x, or 172.16.x.x), as indicated by a yellow text.
• The router may be on a network that uses multiple NAT tables.
62
4.4 IPv6
This wireless router supports IPv6 addressing, a system that
supports more IP addresses. This standard is not yet widely
available. Contact your ISP if your Internet service supports IPv6.
To set up IPv6:
1. From the navigation panel, go to Advanced Settings > IPv6.
2. Select your Connection Type. The configuration options vary
depending on your selected connection type.
3. Enter your IPv6 LAN and DNS settings.
4. Click Apply.
NOTE: Please refer to your ISP regarding specific IPv6 information for
your Internet service.
63
4.5 Firewall
The wireless router can serve as a hardware firewall for your
network.
NOTE: The Firewall feature is enabled by default.
4.5.1 General
To set up basic Firewall settings:
1. From the navigation panel, go to Advanced Settings >
Firewall > General tab.
2. On the Enable Firewall field, select Yes.
3. On the Enable DoS protection, select Yes to protect your
network from DoS (Denial of Service) attacks though this may
affect your router’s performance.
4. You can also monitor packets exchanged between the LAN
and WAN connection. On the Logged packets type, select
Dropped, Accepted, or Both.
5. Click Apply.
64
2. On the Enable URL Filter field, select Enabled.
3. Enter a URL and click the button.
4. Click Apply.
65
4. Click Apply.
NOTES:
• The Keyword Filter is based on a DNS query. If a network client has
already accessed a website such as http://www.abcxxx.com, then
the website will not be blocked (a DNS cache in the system stores
previously visited websites). To resolve this issue, clear the DNS cache
before setting up the Keyword Filter.
• Web pages compressed using HTTP compression cannot be filtered.
HTTPS pages also cannot be blocked using a keyword filter.
66
To set up a Network Service filter:
1. From the navigation panel, go to Advanced Settings >
Firewall > Network Service Filter tab.
2. On the Enable Network Services Filter field, select Yes.
3. Select the Filter table type. Black List blocks the specified
network services. White List limits access to only the specified
network services.
4. Specify the day and time when the filters will be active.
5. To specify a Network Service to filter, enter the Source IP,
Destination IP, Port Range, and Protocol. Click the button.
6. Click Apply.
67
4.6 Administration
4.6.1 Operation Mode
The Operation Mode page allows you to select the appropriate
mode for your network.
68
3. Click Save.
NOTE: The router will reboot when you change the modes.
4.6.2 System
The System page allows you to configure your wireless router
settings.
To set up the System settings:
1. From the navigation panel, go to Advanced Settings >
Administration > System tab.
2. You can configure the following settings:
• Change router login password: You can change the
password and login name for the wireless router by entering
a new name and password.
• WPS button behavior: The physical WPS button on the
wireless router can be used to activate WPS.
• Time Zone: Select the time zone for your network.
• NTP Server: The wireless router can access a NTP (Network
time Protocol) server in order to synchronize the time.
• Enable Telnet: Click Yes to enable Telnet services on the
network. Click No to disable Telnet.
• Authentication Method: You can select HTTP, HTTPS, or
both protocols to secure router access.
• Enable Web Access from WAN: Select Yes to allow devices
outside the network to access the wireless router GUI
settings. Select No to prevent access.
• Only allow specific IP: Click Yes if you want to specify the IP
addresses of devices that are allowed access to the wireless
router GUI settings from WAN.
• Client List: Enter the WAN IP addresses of networking
devices allowed to access the wireless router settings. This
list will be used if you clicked Yes in the Only allow specific
IP item.
3. Click Apply.
69
4.6.3 Firmware Upgrade
70
4.7 System Log
System Log contains your recorded network activities.
NOTE: System log resets when the router is rebooted or powered off.
71
5 Utilities
NOTES:
• Download and install the wireless router's utilities from the ASUS
website:
• Device Discovery v1.4.7.1 at http://dlcdnet.asus.com/pub/ASUS/
LiveUpdate/Release/Wireless/Discovery.zip
• Firmware Restoration v1.9.0.4 at http://dlcdnet.asus.com/pub/
ASUS/LiveUpdate/Release/Wireless/Rescue.zip
• The utilities are not supported on MAC OS.
NOTE: When you set the router to Access Point mode, you need to use
Device Discovery to get the router’s IP address.
72
5.2 Firmware Restoration
Firmware Restoration is used on an ASUS Wireless Router that
failed during its firmware upgrading process. It uploads the
firmware that you specify. The process takes about three to four
minutes.
IMPORTANT! Launch the rescue mode on the router before using the
Firmware Restoration utility.
73
To launch the rescue mode and use the Firmware Restoration
utility:
1. Unplug the wireless router from the power source.
2. Hold the Reset button at the rear panel and simultaneously
replug the wireless router into the power source. Release the
Reset button when the Power LED at the front panel flashes
slowly, which indicates that the wireless router is in the rescue
mode.
3. Set a static IP on your computer and use the following to set up
your TCP/IP settings:
IP address: 192.168.1.x
Subnet mask: 255.255.255.0
4. From your computer’s desktop, click
Start > All Programs > ASUS Utility > Wireless Router >
Firmware Restoration.
5. Specify a firmware file, then click Upload.
74
6 Troubleshooting
This chapter provides solutions for issues you may encounter with
your router. If you encounter problems that are not mentioned in
this chapter, visit the ASUS support site at:
https://www.asus.com/support/ for more product information
and contact details of ASUS Technical Support.
75
3. From the Firmware Upgrade page, click Browse to locate the
firmware file.
4. Click Upload to upgrade the firmware.
Restart your network in the following sequence:
1. Turn off the modem.
2. Unplug the modem.
3. Turn off the router and computers.
4. Plug in the modem.
5. Turn on the modem and then wait for 2 minutes.
6. Turn on the router and then wait for 2 minutes.
7. Turn on computers.
Check if your Ethernet cables are plugged properly.
• When the Ethernet cable connecting the router with the
modem is plugged in properly, the WAN LED will be on.
• When the Ethernet cable connecting your powered-
on computer with the router is plugged in properly, the
corresponding LAN LED will be on.
Check if the wireless setting on your computer matches that
of your router.
• When you connect your computer to the router wirelessly,
ensure that the SSID (wireless network name), encryption
method, and password are correct.
76
Check if your network settings are correct.
• Each client on the network should have a valid IP address. ASUS
recommends that you use the wireless router’s DHCP server to
assign IP addresses to computers on your network.
• Some cable modem service providers require you to use
the MAC address of the computer initially registered on
the account. You can view the MAC address in the web GUI,
Network Map > Clients page, and hover the mouse pointer
over your device in Client Status.
77
6.2 Frequently Asked Questions (FAQs)
I cannot access the router GUI using a web browser
• If your computer is wired, check the Ethernet cable connection
and LED status as described in the previous section.
• Ensure that you are using the correct login information. The
default factory login name and password is “admin/admin”.
Ensure that the Caps Lock key is disabled when you enter the
login information.
• Delete the cookies and files in
your web browser. For Internet
Explorer, follow these steps:
1. Launch Internet Explorer,
then click Tools > Internet
Options.
2. In the General tab, under
Browsing history, click
Delete…, select Temporary
Internet files and website
files and Cookies and
website data then click
Delete.
NOTES:
• The commands for deleting cookies and files vary with web
browsers.
• Disable proxy server settings, cancel the dial-up connection, and set
the TCP/IP settings to obtain IP addresses automatically. For more
details, refer to Chapter 1 of this user manual.
• Ensure that you use CAT5e or CAT6 ethernet cables.
78
The client cannot establish a wireless connection with the
router.
• Out of Range:
• Move the router closer to the wireless client.
• Try to adjust antennas of the router to the best direction as
described in section 1.4 Positioning your router.
• DHCP server has been disabled:
1. Launch the web GUI. Go to General > Network Map>
Clients and search for the device that you want to connect
to the router.
2. If you cannot find the device in the Network Map, go to
Advanced Settings > LAN > DHCP Server, Basic Config
list, select Yes on the Enable the DHCP Server.
79
• SSID has been hidden. If your device can find SSIDs from other
routers but cannot find your router’s SSID, go to Advanced
Settings > Wireless > General, select No on Hide SSID, and
select Auto on Control Channel.
80
Internet is not accessible.
• Check if your router can connect to your ISP’s WAN IP address.
To do this, launch the web GUI and go to General> Network
Map, and check the Internet Status.
• If your router cannot connect to your ISP’s WAN IP address,
try restarting your network as described in the section
Restart your network in following sequence under Basic
Troubleshooting.
• The device has been blocked via the Parental Control function.
Go to General > AiProtection >Parental Control and see
if the device is in the list. If the device is listed under Client
Name, remove the device using the Delete button or adjust
the Time Management Settings.
81
You forgot the SSID (network name) or network password
• Setup a new SSID and encryption key via a wired connection
(Ethernet cable). Launch the web GUI, go to Network Map,
click the router icon, enter a new SSID and encryption key, and
then click Apply.
• Reset your router to the default settings. Launch the web GUI,
go to Administration > Restore/Save/Upload Setting, and
click Restore. The default login account and password are both
“admin”.
82
Cannot access Web GUI
Before configuring your wireless router, do the steps described in
this section for your host computer and network clients.
83
MAC OS
1. From your Safari
browser, click Safari
> Preferences >
Advanced > Change
Settings...
2. From the Network
screen, deselect FTP
Proxy and Web Proxy
(HTTP).
3. Click Apply Now when
done.
NOTE: Refer to your browser’s help feature for details on disabling the
proxy server.
84
2. Click Properties to display the
Ethernet Properties window.
85
MAC OS
1. Click the Apple icon
located on the top left
of your screen.
2. Click System
Preferences > Network
> Configure...
3. From the TCP/IP tab,
select Using DHCP in
the Configure IPv4
dropdown list.
4. Click Apply Now when
done.
NOTE: Refer to your operating system’s help and support feature for
details on configuring your computer’s TCP/IP settings.
NOTE: Refer to your browser’s help feature for details on disabling the
dial-up connection.
86
Appendices
GNU General Public License
Licensing information
This product includes copyrighted third-party software licensed
under the terms of the GNU General Public License. Please see The
GNU General Public License for the exact terms and conditions of
this license. All future firmware updates will also be accompanied
with their respective source code. Please visit our web site for
updated information. Note that we do not offer direct support for
the distribution.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of
this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your
freedom to share and change it. By contrast, the GNU General
Public License is intended to guarantee your freedom to share
and change free software--to make sure the software is free for all
its users. This General Public License applies to most of the Free
Software Foundation’s software and to any other program whose
authors commit to using it. (Some other Free Software Foundation
software is covered by the GNU Library General Public License
instead.) You can apply it to your programs, too.
87
can get it if you want it, that you can change the software or use
pieces of it in new free programs; and that you know you can do
these things.
To protect your rights, we need to make restrictions that forbid
anyone to deny you these rights or to ask you to surrender the
rights. These restrictions translate to certain responsibilities for
you if you distribute copies of the software, or if you modify it.
We protect your rights with two steps: (1) copyright the software,
and (2) offer you this license which gives you legal permission to
copy, distribute and/or modify the software.
88
Terms & conditions for copying, distribution, & modification
0. This License applies to any program or other work which
contains a notice placed by the copyright holder saying it may
be distributed under the terms of this General Public License.
The “Program”, below, refers to any such program or work, and
a “work based on the Program” means either the Program or
any derivative work under copyright law: that is to say, a work
containing the Program or a portion of it, either verbatim or
with modifications and/or translated into another language.
(Hereinafter, translation is included without limitation in the
term “modification”.) Each licensee is addressed as “you”.
Activities other than copying, distribution and modification are
not covered by this License; they are outside its scope. The act
of running the Program is not restricted, and the output from
the Program is covered only if its contents constitute a work
based on the Program (independent of having been made by
running the Program). Whether that is true depends on what
the Program does.
89
b) You must cause any work that you distribute or publish, that
in whole or in part contains or is derived from the Program or
any part thereof, to be licensed as a whole at no charge to all
third parties under the terms of this License.
c) If the modified program normally reads commands
interactively when run, you must cause it, when started
running for such interactive use in the most ordinary way, to
print or display an announcement including an appropriate
copyright notice and a notice that there is no warranty (or
else, saying that you provide a warranty) and that users may
redistribute the program under these conditions, and telling
the user how to view a copy of this License. (Exception: if the
Program itself is interactive but does not normally print such
an announcement, your work based on the Program is not
required to print an announcement.)
These requirements apply to the modified work as a whole.
If identifiable sections of that work are not derived from the
Program, and can be reasonably considered independent and
separate works in themselves, then this License, and its terms,
do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections
as part of a whole which is a work based on the Program, the
distribution of the whole must be on the terms of this License,
whose permissions for other licensees extend to the entire
whole, and thus to each and every part regardless of who
wrote it.
Thus, it is not the intent of this section to claim rights or contest
your rights to work written entirely by you; rather, the intent is
to exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on
the Program with the Program (or with a work based on the
Program) on a volume of a storage or distribution medium
does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on
it, under Section 2) in object code or executable form under the
terms of Sections 1 and 2 above provided that you also do one
90
of the following:
a) Accompany it with the complete corresponding machine-
readable source code, which must be distributed under the
terms of Sections 1 and 2 above on a medium customarily used
for software interchange; or,
b) Accompany it with a written offer, valid for at least three
years, to give any third party, for a charge no more than your
cost of physically performing source distribution, a complete
machine-readable copy of the corresponding source code, to
be distributed under the terms of Sections 1 and 2 above on a
medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the
offer to distribute corresponding source code. (This alternative
is allowed only for noncommercial distribution and only if you
received the program in object code or executable form with
such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of
the work for making modifications to it. For an executable
work, complete source code means all the source code for all
modules it contains, plus any associated interface definition
files, plus the scripts used to control compilation and
installation of the executable. However, as a special exception,
the source code distributed need not include anything that
is normally distributed (in either source or binary form) with
the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that
component itself accompanies the executable.
If distribution of executable or object code is made by
offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place
counts as distribution of the source code, even though third
parties are not compelled to copy the source along with the
object code.
91
rights under this License. However, parties who have received
copies, or rights, from you under this License will not have
their licenses terminated so long as such parties remain in full
compliance.
5. You are not required to accept this License, since you have
not signed it. However, nothing else grants you permission to
modify or distribute the Program or its derivative works. These
actions are prohibited by law if you do not accept this License.
Therefore, by modifying or distributing the Program (or any
work based on the Program), you indicate your acceptance
of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Program or works based
on it.
6. Each time you redistribute the Program (or any work based
on the Program), the recipient automatically receives a license
from the original licensor to copy, distribute or modify the
Program subject to these terms and conditions. You may not
impose any further restrictions on the recipients’ exercise of
the rights granted herein. You are not responsible for enforcing
compliance by third parties to this License.
92
apply in other circumstances.
It is not the purpose of this section to induce you to infringe
any patents or other property right claims or to contest
validity of any such claims; this section has the sole purpose
of protecting the integrity of the free software distribution
system, which is implemented by public license practices.
Many people have made generous contributions to the wide
range of software distributed through that system in reliance
on consistent application of that system; it is up to the author/
donor to decide if he or she is willing to distribute software
through any other system and a licensee cannot impose that
choice.
This section is intended to make thoroughly clear what is
believed to be a consequence of the rest of this License.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE,
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
94
Service and Support
Visit our multi-language website at https://www.asus.com/support.
95