ASUS ZenWiFi Pro XT12 AX11000 Tri Band Router User Manual
- May 15, 2024
- Asus
Table of Contents
User Guide
ZenWiFi Pro XT12
AX11000 Tri Band Router E22786
First Edition
Oct. 2023
ZenWiFi Pro XT12 AX11000 Tri Band Router
Copyright © 2023 ASUSTeK Computer Inc. All Rights Reserved.
No part of this manual, including the products and software described in it,
may be reproduced, transmitted, transcribed, stored in a retrieval system, or
translated into any language in any form or by any means, except documentation
kept by the purchaser for backup purposes, without the express written
permission of ASUSTeK Computer Inc. (“ASUS”).
Product warranty or service will not be extended if: (1) the product is
repaired, modified or altered, unless such repair, modification of alteration
is authorized in writing by ASUS; or (2) the serial number of the product is
defaced or missing.
ASUS PROVIDES THIS MANUAL “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL
ASUS, ITS DIRECTORS, OFFICERS, EMPLOYEES OR AGENTS BE LIABLE FOR ANY INDIRECT,
SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF
PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS AND
THE LIKE), EVEN IF ASUS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES
ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT.
SPECIFICATIONS AND INFORMATION CONTAINED IN THIS MANUAL ARE FURNISHED FOR
INFORMATIONAL USE ONLY, AND ARE SUBJECT TO CHANGE AT ANY TIME WITHOUT NOTICE,
AND SHOULD NOT BE CONSTRUED AS A COMMITMENT BY ASUS. ASUS ASSUMES NO
RESPONSIBILITY OR LIABILITY FOR ANY ERRORS OR INACCURACIES THAT MAY APPEAR IN
THIS MANUAL, INCLUDING THE PRODUCTS AND SOFTWARE DESCRIBED IN IT.
Products and corporate names appearing in this manual may or may not be
registered trademarks or copyrights of their respective companies, and are
used only for identification or explanation and to the owners’ benefit,
without intent to infringe.
Getting to know your wireless router
1.1 Welcome!
Thank you for purchasing an ASUS ZenWiFi Pro XT12 Wireless Router!
The strikingly designed black chassis with gaming-inspired red accents,
ZenWiFi Pro XT12 features a 2.4GHz, 5GHz-1 and 5GHz-2 tri bands for an
unmatched concurrent wireless HD streaming;
SMB server, UPnP AV server, and FTP server for 24/7 file sharing; a capability
to handle 300,000 sessions; and the ASUS Green Network Technology, which
provides up to 70% power-saving solution.
1.2 Package contents
ZenWiFi Pro XT12 Wireless Router
Power adapter
Warranty card
RJ45 Ethernet Cable
Quick Start Guide
NOTES:
- If any of the items are damaged or missing, contact ASUS for technical inquiries and support. Refer to the ASUS Support Hotline list at the back of this user manual.
- Keep the original packaging material in case you would need future warranty services such as repair or replacement.
1.3 Your wireless router
-
LAN ports 1-2
Connect your PC to a LAN port with a network cable. -
2.5G / 1G WAN port
Connect your optical modem to this port with a network cable. -
2.5G / 1G LAN port
Connect your PC to a 2.5G / 1G LAN port with a network cable. -
WPS button
This button launches the WPS Wizard. -
Reset button
This button resets or restores the system to its factory default settings. -
Power switch
Use this switch to power on or off the system. -
DCIN port
Insert the bundled AC adapter into this port and connect your router to a power source.
NOTES:
- Use only the adapter that came with your package. Using other adapters may damage the device.
- Specifications:****
DC Power adapter| DC Output: +19V with max 2.37A current
+19.5V with max 2.31A current
---|---
Operating Temperature| 0~40oC| Storage| 0~70oC
Operating Humidity| 50~90%| Storage| 20~90%
1.4 Positioning your wireless router
For optimal wireless transmission between the wireless router and connected
wireless devices, ensure that you:
- Place the wireless router in a centralized area for a maximum wireless coverage for the network devices.
- Keep the wireless router away from metal obstructions and away from direct sunlight.
- Keep the wireless router away from 802.11g or 20MHz only Wi-Fi devices, 2.4GHz computer peripherals, Bluetooth devices, cordless phones, transformers, heavy-duty motors, fluorescent lights, microwave ovens, refrigerators, and other industrial equipment to prevent signal interference or loss.
- Always update to the latest firmware. Visit the ASUS website at http://www.asus.com to get the latest firmware updates.
- Orient the antennas as shown in the drawing below.
1.5 Setup Requirements
To set up your wireless network, you need a computer that meets the following
system requirements:
- Ethernet RJ-45 (LAN) port (10Base-T/100Base- TX/1000BaseTX)
- IEEE 802.11a/b/g/n/ac/ax wireless capability
- An installed TCP/IP service
- Web browser such as Internet Explorer, Firefox, Safari, or Google Chrome
NOTES:
- If your computer does not have built-in wireless capabilities, you may install an IEEE 802.11a/b/g/n/ac/ax WLAN adapter to your computer to connect to the network.
- With its tri band technology, your wireless router supports 2.4GHz, 5GHz-1 and 5GHz-2 wireless signals simultaneously. This allows you to do Internet-related activities such as Internet surfing or reading/ writing e-mail messages using the 2.4GHz band while simultaneously streaming high-definition audio/video files such as movies or music using the 5GHz band.
- Some IEEE 802.11n devices that you want to connect to your network may or may not support 5GHz band. Refer to the device’s manual for specifications.
- The Ethernet RJ-45 cables that will be used to connect the network devices should not exceed 100 meters.
IMPORTANT!
- Some wireless adapters might have connectivity issues to 802.11ax WiFi APs.
- If you’re experiencing such issue, please ensure you update the driver to the latest version. Check your manufacturer’s official support site where software drivers, updates, and other related information can be obtained.
- Realtek: https://www.realtek.com/en/downloads
- Mediatek: https://www.mediatek.com/products/connectivity-and-networking/broadband-wifi
- Intel: https://downloadcenter.intel.com/
Getting started
2.1 Router Setup
IMPORTANT!
- Use a wired connection when setting up your wireless router to avoid possible setup problems.
- Before setting up your ASUS wireless router, do the following:
• If you are replacing an existing router, disconnect it from your network.
• Disconnect the cables/wires from your existing modem setup. If your modem has a backup battery, remove it as well.
• Reboot your cable modem and computer (recommended).
A. Wired connection
NOTE: You can use either a straight-through cable or a crossover cable
for wired connection.
To set up your wireless router via wired connection:
- Insert your wireless router’s AC adapter to the DCIN port and plug it to a power outlet.
- Using the bundled network cable, connect your computer to your wireless router’s LAN port.
- Using another network cable, connect your modem to your wireless router’s WAN port.
- Insert your modem’s AC adapter to the DCIN port and plug it to a power outlet.
To set up your wireless router via wired connection:
- Plug your router into a power outlet and power it on. Connect the network cable from your computer to a LAN port on your router.
- The web GUI launches automatically when you open a web browser. If it does not auto-launch, enter http://www.asusrouter.com
- Set up a password for your router to prevent unauthorized access.
B. Wireless connection
To set up your wireless router via wireless connection:
- Plug your router into a power outlet and power it on.
To set up your wireless router via wireless connection:
- Plug your router into a power outlet and power it on.
- Connect to the network name (SSID) shown on the product
Wi-Fi Name (SSID): ASUS_XX
-
XX refers to the last two digits of 2.4GHz MAC address. You can find it on the label on the back of your router.
label on the back side of the router. For better network security, change to a unique SSID and assign a password.- Once connected, the web GUI launches automatically when you open a web browser. If it does not auto-launch, enter http://www.asusrouter.com.
- Set up a password for your router to prevent unauthorized access.
NOTES:
- For details on connecting to a wireless network, refer to the WLAN adapter’s user manual.
- To set up the security settings for your network, refer to 3.1.1 Setting up the wireless security settings of this user manual.
2.2 Quick Internet Setup (QIS) with Autodetection
The Quick Internet Setup (QIS) function guides you in quickly setting up your
Internet connection.
NOTE: When setting the Internet connection for the first time, press the Reset
button on your wireless router to reset it to its factory default settings.
To use QIS with auto-detection:
-
Launch a web browser. You will be redirected to the ASUS Setup Wizard (Quick Internet Setup). If not, key in http://www.asusrouter.com manually.
-
The wireless router automatically detects if your ISP connection type is Dynamic IP, PPPoE, PPTP and L2TP. Key in the necessary information for your ISP connection type.
IMPORTANT! Obtain the necessary information from your ISP about the Internet connection type.
NOTES:
• The auto-detection of your ISP connection type takes place when you configure the wireless router for the first time or when your wireless router is reset to its default settings.
• If QIS failed to detect your Internet connection type, click Manual Setting and manually configure your connection settings. -
Assign the wireless network name (SSID) and security key for your 2.4GHz and 5GHz wireless connection. Click Apply when done.
-
On the Login Information Setup page, change the router’s login password to prevent unauthorized access to your wireless router.
NOTE: The wireless router’s login username and password is different from
the 2.4GHz, 5GHz-1 and 5GHz-2 network name (SSID) and security key. The
wireless router’s login username and password allows you to log into your
wireless router’s Web GUI to configure your wireless router’s settings. The
2.4GHz, 5GHz-1 and 5GHz-2 network name (SSID) and security key allows Wi-Fi
devices to log in and connect to your 2.4GHz, 5GHz-1 and 5GHz-2 network.
2.3 Connecting to your wireless network
After setting up your wireless router via QIS, you can connect your computer
or other smart devices to your wireless network.
To connect to your network:
- On your computer, click the network icon in the notification area to display the available wireless networks.
- Select the wireless network that you want to connect to, then click Connect.
- You may need to key in the network security key for a secured wireless network, then click OK.
- Wait while your computer establishes connection to the wireless network successfully. The connection status is displayed and the network icon displays the connected status.
NOTES:
- Refer to the next chapters for more details on configuring your wireless network’s settings.
- Refer to your device’s user manual for more details on connecting it to your wireless network.
Configuring the General and Advanced settings
3.1 Logging into the Web GUI
Your ASUS Wireless Router comes with an intuitive web graphical user interface
(GUI) that allows you to easily configure its various features through a web
browser such as Internet Explorer, Firefox, Safari, or Google Chrome.
NOTE:
The features may vary with different firmware versions.
To log into the web GUI:
- On your web browser, manually key in the wireless router’s default IP address: http://www.asusrouter.com.
- On the login page, key in the user name and password that you have set in 2.2 Quick Internet Setup (QIS) with Autodetection.
- You can now use the Web GUI to configure various settings of your ASUS Wireless Router.
* The image is for reference only.
NOTE: If you are logging into the Web GUI for the first time, you will be
directed to the Quick Internet Setup (QIS) page automatically.
3.1.1 Setting up the wireless security settings
To protect your wireless network from unauthorized access, you need to
configure its security settings.
To set up the wireless security settings:
-
From the navigation panel, go to General > Network Map.
-
On the Network Map screen and under System Status, you can configure the wireless security settings such as SSID, security level, and encryption settings.
NOTE: You can set up different wireless security settings for 2.4GHz and 5GHz bands.
2.4GHz/5GHz security settings -
On the Network Name (SSID) field, key in a unique name for your wireless network.
-
From the WEP Encryption dropdown list, select the encryption method for your wireless network.
IMPORTANT! The IEEE 802.11n/ac/ax standard prohibits using High Throughput with WEP or WPA-TKIP as the unicast cipher. If you use these encryption methods, your data rate will drop to IEEE 802.11g 54Mbps connection. -
Key in your security passkey.
-
Click Apply when done.
3.1.2 Managing your network clients
To manage your network clients:
- From the navigation panel, go to General > Network Map.
- On the Network Map screen, select the Client status icon to display your network client’s information.
- To block a client’s access to your network, select the client and click block.
3.2 Adaptive QoS
3.2.1 Managing QoS (Quality of Service) Bandwidth
Quality of Service (QoS) allows you to set the bandwidth priority and manage
network traffic.
To set up bandwidth priority:
-
From the navigation panel, go to General > Adaptive QoS > QoS.
-
Click ON to enable QoS. Fill in the upload and download bandwidth fields.
NOTE: Get the bandwidth information from your ISP. -
Click Apply.
NOTE: The User Specify Rule List is for advanced settings. If you want to prioritize specific network applications and network services, select User- defined QoS rules or User-defined Priority from the drop-down list on the upper-right corner. -
On the user-defined QoS rules page, there are four default online service types – web surf, HTTPS and file transfers. Select your preferred service, fill in the Source IP or MAC, Destination Port, Protocol, Transferred and Priority, then click Apply. The information will be configured in the QoS rules screen.
NOTES:
• To fill in the source IP or MAC, you can:
a) Enter a specific IP address, such as “192.168.122.1”.
b) Enter IP addresses within one subnet or within the same IP pool, such as “192.168.123.”, or “192.168..”
c) Enter all IP addresses as “...*” or leave the field blank.
d) The format for the MAC address is six groups of two hexadecimal digits, separated by colons (:), in transmission order (e.g. 12:34:56:aa:bc:ef)
• For source or destination port range, you can either:
a) Enter a specific port, such as “95”.
b) Enter ports within a range, such as “103:315”, “>100”, or “<65535”.
• The Transferred column contains information about the upstream and downstream traffic (outgoing and incoming network traffic) for one section. In this column, you can set the network traffic limit (in KB) for a specific service to generate specific priorities for the service assigned to a specific port. For example, if two network clients, PC 1 and PC 2, are both accessing the Internet (set at port 80), but PC 1 exceeds the network traffic limit due to some downloading tasks, PC 1 will have a lower priority. If you do not want to set the traffic limit, leave it blank. -
On the User-defined Priority page, you can prioritize the network applications or devices into five levels from the userdefined QoS rules’ dropdown list. Based on priority level, you can use the following methods to send data packets:
• Change the order of upstream network packets that are sent to the Internet.
• Under Upload Bandwidth table, set Minimum Reserved Bandwidth and Maximum Bandwidth Limit for multiple network applications with different priority levels. The percentages indicate the upload bandwidth rates that are available for specified network applications.
NOTES:
• Low-priority packets are disregarded to ensure the transmission of high- priority packets.
• Under Download Bandwidth table, set Maximum Bandwidth Limit for multiple network applications in corresponding order.
The higher priority upstream packet will cause the higher priority downstream packet.
• If there are no packets being sent from high-priority applications, the full transmission rate of the Internet connection is available for lowpriority packets. -
Set the highest priority packet. To ensure a smooth online gaming experience, you can set ACK, SYN, and ICMP as the highest priority packet.
NOTE: Ensure to enable QoS first and set up the upload and download rate
limits.
3.3 Administration
3.3.1 Operation Mode
The Operation Mode page allows you to select the appropriate mode for your
network. To set up the operating mode:
-
From the navigation panel, go to Advanced Settings > Administration > Operation Mode.
-
Select any of these operation modes:
• Wireless router mode (default): In wireless router mode, the wireless router connects to the Internet and provides Internet access to available devices on its own local network.
• Access Point mode: In this mode, the router creates a new wireless network on an existing network.
• Repeater mode: This mode turns the router into a wireless repeater to extend the range of your signal.
• Media Bridge: The Media Bridge mode provides the fastest Wi-Fi connection for multiple media devices simultaneously.
To set up the Media Bridge mode, you need two ZenWiFi Pro XT12: one configured as the Media station and the other as a router.
• AiMesh Node: You can set ZenWiFi Pro XT12 as an AiMesh node to extend an existing AiMesh routers WiFi coverage. -
Click Save.
NOTE: The router will reboot when you change the modes.
3.3.2 System
The System page allows you to configure your wireless router settings.
To set up the System settings:
-
From the navigation panel, go to Advanced Settings > Administration > System.
-
You can configure the following settings:
• Change router login password: You can change the password and login name for the wireless router by entering a new name and password.
• WPS button behavior: The physical WPS button on the wireless router can be used to activate WPS.
• Time Zone: Select the time zone for your network.
• NTP Server: The wireless router can access a NTP (Network time Protocol) server in order to synchronize the time.
• Enable Telnet: Click Yes to enable Telnet services on the network. Click No to disable Telnet.
• Authentication Method: You can select HTTP, HTTPS, or both protocols to secure router access.
• Enable Web Access from WAN: Select Yes to allow devices outside the network to access the wireless router GUI settings. Select No to prevent access.
• Only allow specific IP: Click Yes if you want to specify the IP addresses of devices that are allowed access to the wireless router GUI settings from WAN. -
Click Apply.
3.3.3 Firmware Upgrade
NOTE: Download the latest firmware from the ASUS website at
http://www.asus.com.
To upgrade the firmware:
- From the navigation panel, go to Advanced Settings > Administration > Firmware Upgrade.
- In the Firmware Version field, click Check to locate the downloaded file.
- Click Upload.
NOTES:
- When the upgrade process is complete, wait for some time for the system to reboot.
- If the upgrade process fails, the wireless router automatically enters rescue mode and the power LED indicator on the front panel starts flashing slowly. To recover or restore the system, refer to section 4.2 Firmware Restoration.
3.3.4 Restore/Save/Upload Setting
To restore/save/upload wireless router settings:
- From the navigation panel, go to Advanced Settings > Administration > Restore/Save/Upload Setting.
- Select the tasks that you want to do:
• To restore to the default factory settings, click Restore, and click OK in the confirmation message.
• To save the current system settings, click Save setting, navigate to the folder where you intend to save the file and click Save.
• To restore from a saved system settings file, click Upload to locate your file, then click Open.
IMPORTANT! If issues occur, upload the latest firmware version and
configure new settings. Do not restore the router to its default settings.
3.4 AiCloud 2.0
AiCloud 2.0 is a cloud service application that allows you to save, sync,
share, and access your files.
To use AiCloud 2.0:
- From Google Play Store or Apple Store, download and install the ASUS AiCloud 2.0 app to your smart device.
- Connect your smart device to your network. Follow the instructions to complete the AiCloud 2.0 setup process.
3.4.1 Cloud Disk
To create a cloud disk:
- Insert a USB storage device into the wireless router.
- Turn on Cloud Disk.
- Go to http://www.asusrouter.com and enter the router login account and password. For better user experience, we recommend that you use Google Chrome or Firefox.
- You can now start accessing Cloud Disk files on devices connected to the network.
NOTE: When accessing the devices that are connected to the network, you
need to enter the device’s user name and password manually, which will not be
saved by AiCloud 2.0 for security reason.
3.4.2 Smart Access
The Smart Access function allows you to easily access your home network via
your router’s domain name. NOTES:
- You can create a domain name for your router with ASUS DDNS. For more details, refer to section 3.12.6 DDNS.
- By default, AiCloud 2.0 provides a secure HTTPS connection. Key in https://[yourASUSDDNSname].asuscomm.com for a very secure Cloud Disk and Smart Access usage.
3.4.3 AiCloud Sync To use AiCloud Sync:
- Launch AiCloud 2.0, click AiCloud Sync.
- Select ON to enable AiCloud Sync.
- Click Add new account.
- Enter your ASUS WebStorage account password and select the directory that you want to sync with WebStorage.
- Click Apply.
3.5 AiProtection
AiProtection provides real-time monitoring that detects malware, spyware, and
unwanted access. It also filters unwanted websites and apps and allows you to
schedule a time that a connected device is able to access the Internet.
3.5.1 Network Protection
Network Protection prevents network exploits and secures your network from
unwanted access. Configuring Network Protection
To configure Network Protection:
-
From the navigation panel, go to General > AiProtection.
-
From the AiProtection main page, click on Network Protection.
-
From the Network Protection tab, click Scan.
When done scanning, the utility displays the results on the Router Security Assessment page. IMPORTANT! Items marked as Yes on the Router Security Assessment page is considered to be at a safe status. Items marked as No, Weak, or Very Weak is highly recommended to be configured accordingly. -
(Optional) From the Router Security Assessment page, manually configure the items marked as No, Weak, or Very Weak. To do this:
a. Click an item.
NOTE: When you click an item, the utility forwards you to the item’s setting page.
b. From the item’s security settings page, configure and make the necessary changes and click Apply when done.
c. Go back to the Router Security Assessment page and click Close to exit the page. -
To automatically configure the security settings, click Secure Your Router.
-
When a message prompt appears, click OK.
Malicious Sites Blocking
This feature restricts access to known malicious websites in the cloud
database for an always-up-to-date protection.
NOTE:
This function is automatically enabled if you run the Router Weakness Scan.
To enable Malicious Sites Blocking:
- From the navigation panel, go to General > AiProtection.
- From the AiProtection main page, click on Network Protection.
- From the Malicious Sites Blocking pane, click ON.
Two-Way IPS
Two-Way IPS (Intrusion Prevention System) protects your router from network
attacks by both blocking malicious incoming packets and detecting suspicious
outgoing packets.
NOTE:
This function is automatically enabled if you run the Router Weakness Scan.
To enable Two-Way IPS:
- From the navigation panel, go to General > AiProtection.
- From the AiProtection main page, click on Network Protection.
- From the Two-Way IPS pane, click ON.
Infected Device Prevention and Blocking
This feature prevents infected devices from communicating personal information
or infected status to external parties.
NOTE:
This function is automatically enabled if you run the Router Weakness Scan.
To enable Infected Device Prevention and Blocking:
- From the navigation panel, go to General > AiProtection.
- From the AiProtection main page, click on Network Protection.
- From the Infected Device Prevention and Blocking pane, click ON.
To configure Alert Preference:
- From the Infected Device Prevention and Blocking pane, click Alert Preference.
- Select or key in the e-mail provider, e-mail account, and password then click Apply.
3.5.2 Setting up Parental Controls
Parental Control allows you to control the Internet access time or set the
time limit for a client’s network usage.
To go to the Parental Controls main page:
From the navigation panel, go to General > Parental Controls.
Web & Apps Filters
Web & Apps Filters is a feature of Parental Controls that allows you to block
access to unwanted web sites or applications.
To configure Web & Apps Filters:
- From the navigation panel, go to General > Parental Controls.
- From the Web & Apps Filters pane, click ON.
- When the End Users License Agreement (EULA) message prompt appears, click I agree to continue.
- From the Client List column, select or key in the client’s name from the drop down list box.
- From the Content Category column, select the filters from the four main categories: Adult, Instant Message and Communication, P2P and File Transfer, and Streaming and Entertainment.
- Click to add the client’s profile.
- Click Apply to save the settings.
Time Scheduling
Time Scheduling allows you to set the time limit for a client’s network usage.
NOTE: Ensure that your system time is synchronized with the NTP
server.
To configure Time Scheduling:
-
From the navigation panel, go to General > Parental Controls > Time Scheduling.
-
From the Enable Time Scheduling pane, click ON.
-
From the Clients Name column, select or key in the client’s name from the drop down list box.
NOTE: You may also key in the client’s MAC address in the Client MAC Address column. Ensure that the client name does not contain special characters or spaces as these may cause the router to function abnormally. -
Click to add the client’s profile.
-
Click Apply to save the settings.
3.6 Firewall
The wireless router can serve as a hardware firewall for your network.
NOTE:
The Firewall feature is enabled by default.
3.6.1 General
To set up basic Firewall settings:
- From the navigation panel, go to Advanced Settings > Firewall > General.
- On the Enable Firewall field, select Yes.
- On the Enable DoS protection, select Yes to protect your network from DoS (Denial of Service) attacks though this may affect your router’s performance.
- You can also monitor packets exchanged between the LAN and WAN connection. On the Logged packets type, select Dropped, Accepted, or Both.
- Click Apply.
3.6.2 URL Filter
You can specify keywords or web addresses to prevent access to specific URLs.
NOTE: The URL Filter is based on a DNS query. If a network client has
already accessed a website such as http://www.abcxxx.com, then the website
will not be blocked (a DNS cache in the system stores previously visited
websites). To resolve this issue, clear the DNS cache before setting up the
URL Filter.
To set up a URL filter:
- From the navigation panel, go to Advanced Settings > Firewall > URL Filter.
- On the Enable URL Filter field, select Enabled.
- Enter a URL and click the button.
- Click Apply.
3.6.3 Keyword filter
Keyword filter blocks access to webpages containing specified keywords.
To set up a keyword filter:
- From the navigation panel, go to Advanced Settings > Firewall > Keyword Filter.
- On the Enable Keyword Filter field, select Enabled.
- Enter a word or phrase and click the Add button.
- Click Apply.
NOTES:
- The Keyword Filter is based on a DNS query. If a network client has already accessed a website such as http://www.abcxxx.com, then the website will not be blocked (a DNS cache in the system stores previously visited websites). To resolve this issue, clear the DNS cache before setting up the Keyword Filter.
- Web pages compressed using HTTP compression cannot be filtered. HTTPS pages also cannot be blocked using a keyword filter.
3.6.4 Network Services Filter
The Network Services Filter blocks LAN to WAN packet exchanges and restricts
network clients from accessing specific web services such as Telnet or
FTP.
To set up a Network Service filter:
- From the navigation panel, go to Advanced Settings > Firewall > Network Service Filter.
- On the Enable Network Services Filter field, select Yes.
- Select the Filter table type. Deny blocks the specified network services. Allow limits access to only the specified network services.
- Specify the day and time when the filters will be active.
- To specify a Network Service to filter, enter the Source IP, Destination IP, Port Range, and Protocol. Click the button.
- Click Apply.
3.7 Guest Network
The Guest Network provides temporary visitors with Internet connectivity via
access to separate SSIDs or networks without providing access to your private
network.
NOTE: ZenWiFi Pro XT12 supports up to six SSIDs (three 2.4GHz and three 5GHz
SSIDs).
To create a guest network:
- From the navigation panel, go to General > Guest Network.
- On the Guest Network screen, select 2.4GHz or 5GHz frequency band for the guest network that you want to create.
- Click Enable.
- To configure additional options, click Modify.
- Click Yes on the Enable Guest Network screen.
- Assign a wireless name for your temporary network on the Network Name (SSID) field.
- Select an Authentication Method.
- Select an Encryption method.
- Specify the Access time or choose Limitless.
- Select Disable or Enable on the Access Intranet item.
- When done, click Apply.
3.8 IPv6
This wireless router supports IPv6 addressing, a system that supports more IP
addresses. This standard is not yet widely available. Contact your ISP if your
Internet service supports IPv6.![ASUS ZenWiFi Pro XT12 AX11000 Tri Band Router
- Figure 23](https://manuals.plus/wp-content/uploads/2024/03/ASUS-ZenWiFi-Pro- XT12-AX11000-Tri-Band-Router-Figure-23.png)
To set up IPv6:
- From the navigation panel, go to Advanced Settings > IPv6.
- Select your Connection type. The configuration options vary depending on your selected connection type.
- Enter your IPv6 LAN and DNS settings.
- Click Apply.
NOTE: Please refer to your ISP regarding specific IPv6 information for
your Internet service.
3.9 LAN
3.9 LAN IP
The LAN IP screen allows you to modify the LAN IP settings of your wireless
router.
NOTE: Any changes to the LAN IP address will be reflected on your DHCP
settings.
To modify the LAN IP settings:
- From the navigation panel, go to Advanced Settings > LAN > LAN IP.
- Modify the IP address and Subnet Mask.
- When done, click Apply.
3.9.2 DHCP Server
Your wireless router uses DHCP to assign IP addresses automatically on your
network. You can specify the IP address range and lease time for the clients
on your network.
To configure the DHCP server:
-
From the navigation panel, go to Advanced Settings > LAN > DHCP Server.
-
In the Enable the DHCP Server field, tick Yes.
-
In the Domain Name text box, enter a domain name for the wireless router.
-
In the IP Pool Starting Address field, key in the starting IP address.
-
In the IP Pool Ending Address field, key in the ending IP address.
-
In the Lease Time field, specify in seconds when an assigned IP address will expire. Once it reaches this time limit, the DHCP server will then assign a new IP address.
NOTES:
• We recommend that you use an IP address format of 192.168.50.xxx (where xxx can be any number between 2 and 254) when specifying an IP address range.
• An IP Pool Starting Address should not be greater than the IP Pool Ending Address. -
In the DNS and Server Settings section, key in your DNS Server and WINS Server IP address if needed.
-
Your wireless router can also manually assign IP addresses to devices on the network. On the Enable Manual Assignment field, choose Yes to assign an IP address to specific MAC addresses on the network. Up to 32 MAC Addresses can be added to the DHCP list for manual assignment.
3.9.3 Route
If your network makes use of more than one wireless router, you can configure
a routing table to share the same Internet service.
NOTE: We recommend that you do not change the default route settings
unless you have advanced knowledge of routing tables.
To configure the LAN Routing table:
- From the navigation panel, go to Advanced Settings > LAN > Route.
- On the Enable static routes field, choose Yes.
- On the Static Route List, enter the network information of other access points or nodes. Click the Add or Delete button to add or remove a device on the list.
- Click Apply.
3.9.4 IPTV
The wireless router supports connection to IPTV services through an ISP or a
LAN. The IPTV tab provides the configuration settings needed to set up IPTV,
VoIP, multicasting, and UDP for your service. Contact your ISP for specific
information regarding your service.
3.10 System Log
System Log contains your recorded network activities.
NOTE: System log resets when the router is rebooted or powered off.
To view your system log:
- From the navigation panel, go to Advanced Settings > System Log.
- You can view your network activities in any of these tabs:
• General Log
• Wireless Log
• DHCP Leases
• IPv6
• Routing Table
• Port Forwarding
• Connections
3.11 Traffic Analyzer
The traffic monitor feature allows you to access the bandwidth usage and speed
of your Internet, wired, or wireless networks. It allows you to monitor
network traffic in real-time or on a daily basis. It also offers an option to
display the network traffic within the last 24 hours. NOTE: Packets from the Internet are evenly transmitted to the
wired and wireless devices.
3.12 WAN
3.12.1 Internet Connection
The Internet Connection screen allows you to configure the settings of various
WAN connection types.
To configure the WAN connection settings:
- From the navigation panel, go to Advanced Settings > WAN > Internet Connection.
- Configure the following settings below. When done, click Apply.
• WAN Connection Type: Choose your Internet Service Provider type. The choices are Automatic IP, PPPoE, PPTP, L2TP or fixed IP. Consult your ISP if the router is unable to obtain a valid IP address or if you are unsure the WAN connection type.
• Enable WAN: Select Yes to allow the router Internet access.
Select No to disable Internet access.
• Enable NAT: NAT (Network Address Translation) is a system where one public IP (WAN IP) is used to provide Internet access to network clients with a private IP address in a LAN.
The private IP address of each network client is saved in a NAT table and is used to route incoming data packets.
• Enable UPnP: UPnP (Universal Plug and Play) allows several devices (such as routers, televisions, stereo systems, game consoles, and cellular phone), to be controlled via an IP-based network with or without a central control through a gateway.
UPnP connects PCs of all form factors, providing a seamless network for remote configuration and data transfer. Using UPnP, a new network device is discovered automatically.
Once connected to the network, devices can be remotely configured to support P2P applications, interactive gaming, video conferencing, and web or proxy servers. Unlike Port forwarding, which involves manually configuring port settings, UPnP automatically configures the router to accept incoming connections and direct requests to a specific PC on the local network.
• Enable WAN Aggregation: WAN Aggregation combines two network connections to increase your WAN speed up to 2 Gbps. Connect your router’s WAN port and LAN 4 port to your modem’s LAN ports.
• Connect to DNS Server: Allows this router to get the DNS IP address from the ISP automatically. A DNS is a host on the Internet that translates Internet names to numeric IP addresses.
• Authentication: This item may be specified by some ISPs. Check with your ISP and fill them in if required.
• Host Name: This field allows you to provide a host name for your router. It is usually a special requirement from your ISP. If your ISP assigned a host name to your computer, enter the host name here.
• MAC Address: MAC (Media Access Control) address is a unique identifier for your networking device. Some ISPs monitor the MAC address of networking devices that connect to their service and reject any unrecognized device that attempt to connect. To avoid connection issues due to an unregistered MAC address, you can:
• Contact your ISP and update the MAC address associated with your ISP service.
• Clone or change the MAC address of the ASUS wireless router to match the MAC address of the previous networking device recognized by the ISP.
3.12.2 Dual WAN
The Dual WAN allows you to select two ISP connections to your router, a
primary WAN and a secondary WAN.
To configure Dual WAN:
- From the navigation panel, go to Advanced Settings > WAN.
- Go to Dual WAN field, turn ON.
- Choose your Primary WAN and Secondary WAN. There are WAN, USB, Ethernet LAN and 2.5G WAN for your options.
- Choose Fail Over or Load Balance.
- Click Apply.
NOTE: Detailed explanations are available on the ASUS Support Site FAQ https://www.asus.com/support/FAQ/1011719
3.12.3 Port Trigger
Port range triggering opens a predetermined incoming port for a limited period
of time whenever a client on the local area network makes an outgoing
connection to a specified port. Port triggering is used in the following
scenarios:
- More than one local client needs port forwarding for the same application at a different time.
- An application requires specific incoming ports that are different from the outgoing ports.
To set up Port Trigger:
- From the navigation panel, go to Advanced Settings > WAN > Port Trigger.
- Configure the following settings below. When done, click Apply.
• Enable Port Trigger: Choose Yes to enable Port Trigger.
• Well-Known Applications: Select popular games and web services to add to the Port Trigger List.
• Description: Enter a short name or description for the service.
• Trigger Port: Specify a trigger port to open the incoming port.
• Protocol: Select the protocol, TCP, or UDP.
• Incoming Port: Specify an incoming port to receive inbound data from the Internet.
• Protocol: Select the protocol, TCP, or UDP.
NOTES:
-
When connecting to an IRC server, a client PC makes an outgoing connection using the trigger port range 66660-7000. The IRC server responds by verifying the username and creating a new connection to the client PC using an incoming port.
-
If Port Trigger is disabled, the router drops the connection because it is unable to determine which PC is requesting for IRC access.
When Port Trigger is enabled, the router assigns an incoming port to receive the inbound data. This incoming port closes once a specific time period has elapsed because the router is unsure when the application has been terminated. -
Port triggering only allows one client in the network to use a particular service and a specific incoming port at the same time.
-
You cannot use the same application to trigger a port in more than one PC at the same time. The router will only forward the port back to the last computer to send the router a request/trigger.
3.12.4 Virtual Server/Port Forwarding
Port forwarding is a method to direct network traffic from the Internet to a
specific port or a specific range of ports to a device or number of devices on
your local network. Setting up Port Forwarding on your router allows PCs
outside the network to access specific services provided by a PC in your
network.
NOTE: When port forwarding is enabled, the ASUS router blocks unsolicited
inbound traffic from the Internet and only allows replies from outbound
requests from the LAN. The network client does not have access to the Internet
directly, and vice versa.
To set up Port Forwarding:
- From the navigation panel, go to Advanced Settings > WAN > Virtual Server / Port Forwarding.
- Configure the following settings below. When done, click ON.
• Enable Port Forwarding: Turn ON to enable Port Forwarding.
• Famous Server List: Determine which type of service you want to access.
• Famous Game List: This item lists ports required for popular online games to work correctly.
• FTP Server Port: Avoid assigning the port range 20:21 for your FTP server as this would conflict with the router’s native FTP server assignment.
• Service Name: Enter a service name.
• Port Range: If you want to specify a Port Range for clients on the same network, enter the Service Name, the Port Range (e.g. 10200:10300), the LAN IP address, and leave the Local Port empty. Port range accepts various formats such as Port Range (300:350), individual ports (566,789) or Mix (1015:1024,3021).
NOTES:
- When your network’s firewall is disabled and you set 80 as the HTTP server’s port range for your WAN setup, then your http server/web server would be in conflict with the router’s web user interface.
- A network makes use of ports in order to exchange data, with each port assigned a port number and a specific task. For example, port 80 is used for HTTP. A specific port can only be used by one application or service at a time. Hence, two PCs attempting to access data through the same port at the same time would fail. For example, you cannot set up Port Forwarding for port 100 for two PCs at the same time.
- Local IP: Key in the client’s LAN IP address.
NOTE: Use a static IP address for the local client to make port forwarding work properly. Refer to section 3.9 LAN for information.
-
Local Port: Enter a specific port to receive forwarded packets.
Leave this field blank if you want the incoming packets to be redirected to the specified port range. -
Protocol: Select the protocol. If you are unsure, select BOTH.
To check if Port Forwarding has been configured successfully:
- Ensure that your server or application is set up and running.
- You will need a client outside your LAN but has Internet access (referred to as “Internet client”). This client should not be connected to the ASUS router.
- On the Internet client, use the router’s WAN IP to access the server. If port forwarding has been successful, you should be able to access the files or applications.
Differences between port trigger and port forwarding:
- Port triggering will work even without setting up a specific LAN IP address. Unlike port forwarding, which requires a static LAN IP address, port triggering allows dynamic port forwarding using the router. Predetermined port ranges are configured to accept incoming connections for a limited period of time. Port triggering allows multiple computers to run applications that would normally require manually forwarding the same ports to each PC on the network.
- Port triggering is more secure than port forwarding since the incoming ports are not open all the time. They are opened only when an application is making an outgoing connection through the trigger port.
3.12.5 DMZ
Virtual DMZ exposes one client to the Internet, allowing this client to
receive all inbound packets directed to your Local Area Network.
Inbound traffic from the Internet is usually discarded and routed to a
specific client only if port forwarding or a port trigger has been configured
on the network. In a DMZ configuration, one network client receives all
inbound packets.
Setting up DMZ on a network is useful when you need incoming ports open or you
want to host a domain, web, or e-mail server.
CAUTION: Opening all the ports on a client to the Internet makes the
network vulnerable to outside attacks. Please be aware of the security risks
involved in using DMZ.
To set up DMZ:
- From the navigation panel, go to Advanced Settings > WAN > DMZ.
- Configure the setting below. When done, click Apply.
• IP address of Exposed Station: Key in the client’s LAN IP address that will provide the DMZ service and be exposed on the Internet. Ensure that the server client has a static IP address.
To remove DMZ:
- Delete the client’s LAN IP address from the IP Address of Exposed Station text box.
- When done, click Apply.
3.12.6 DDNS
Setting up DDNS (Dynamic DNS) allows you to access the router from outside
your network through the provided ASUS DDNS Service or another DDNS
service.
To set up DDNS:
- From the navigation panel, go to Advanced Settings > WAN > DDNS.
- Configure the following settings below. When done, click Apply.
• Enable the DDNS Client: Enable DDNS to access the ASUS router via the DNS name rather than WAN IP address.
• Server and Host Name: Choose ASUS DDNS or other DDNS.
If you want to use ASUS DDNS, fill in the Host Name in the format of xxx.asuscomm.com (xxx is your host name).
• If you want to use a different DDNS service, click FREE TRIAL and register online first. Fill in the User Name or E-mail Address and Password or DDNS Key fields.
• Enable wildcard: Enable wildcard if your DDNS service requires one.
NOTES:
DDNS service will not work under these conditions:
- When the wireless router is using a private WAN IP address (192.168. x.x, 10.x.x.x, or 172.16.x.x), as indicated by a yellow text.
- The router may be on a network that uses multiple NAT tables.
3.12.7 NAT Passthrough
NAT Passthrough allows a Virtual Private Network (VPN) connection to pass
through the router to the network clients.
PPTP Passthrough, L2TP Passthrough, IPsec Passthrough and RTSP Passthrough are
enabled by default.
To enable / disable the NAT Passthrough settings, go to the Advanced Settings
WAN > NAT Passthrough. When done, click Apply. 3.13 Wireless
3.13.1 General
The General tab allows you to configure the basic wireless settings.
To configure the basic wireless settings:
-
From the navigation panel, go to Advanced Settings > Wireless > General.
-
Select 2.4GHz or 5GHz as the frequency band for your wireless network.
-
Assign a unique name containing up to 32 characters for your SSID (Service Set Identifier) or network name to identify your wireless network. Wi-Fi devices can identify and connect to the wireless network via your assigned SSID. The SSIDs on the information banner are updated once new SSIDs are saved to the settings.
NOTE: You can assign unique SSIDs for the 2.4 GHz and 5GHz frequency bands. -
In the Hide SSID field, select Yes to prevent wireless devices from detecting your SSID. When this function is enabled, you would need to enter the SSID manually on the wireless device to access the wireless network.
-
Select any of these wireless mode options to determine the types of wireless devices that can connect to your wireless router:
• Auto: Select Auto to allow 802.11AC, 802.11n, 802.11g, and 802.11b devices to connect to the wireless router.
• Legacy: Select Legacy to allow 802.11b/g/n devices to connect to the wireless router. Hardware that supports 802.11n natively, however, will only run at a maximum speed of 54Mbps.
• N only: Select N only to maximize wireless N performance. This setting prevents 802.11g and 802.11b devices from connecting to the wireless router. -
Select any of these channel bandwidth to accommodate higher transmission speeds: 40MHz: Select this bandwidth to maximize the wireless throughput.
20MHz (default): Select this bandwidth if you encounter some issues with your wireless connection. -
Select the operating channel for your wireless router. Select Auto to allow the wireless router to automatically select the channel that has the least amount of interference.
-
Select any of these authentication methods:
• Open System: This option provides no security.
• Shared Key: You must use WEP encryption and enter at least one shared key.
• WPA/WPA2 Personal/WPA Auto-Personal: This option provides strong security. You can use either WPA (with TKIP) or WPA2 (with AES). If you select this option, you must use TKIP + AES encryption and enter the WPA passphrase (network key).
• WPA/WPA2 Enterprise/WPA Auto-Enterprise: This option provides very strong security. It is with integrated EAP server or an external RADIUS back-end authentication server.
• Radius with 802.1x
NOTE: Your wireless router supports the maximum transmission rate of 54Mbps when the Wireless Mode is set to Auto and encryption method is WEP or TKIP. -
Select any of these WEP (Wired Equivalent Privacy) Encryption options for the data transmitted over your wireless network:
• Off: Disables WEP encryption
• 64-bit: Enables weak WEP encryption
• 128-bit: Enables improved WEP encryption -
When done, click Apply.
3.13.2 WPS
WPS (Wi-Fi Protected Setup) is a wireless security standard that allows you to
easily connect devices to a wireless network. You can configure the WPS
function via the PIN code or WPS button.
NOTE: Ensure that the devices support WPS.
To enable WPS on your wireless network:
-
From the navigation panel, go to Advanced Settings > Wireless > WPS.
-
In the Enable WPS field, move the slider to ON.
-
WPS uses 2.4GHz by default. If you want to change the frequency to 5GHz, turn OFF the WPS function, click Switch Frequency in the Current Frequency field, and turn WPS ON again.
NOTE: WPS supports authentication using Open System, WPA- Personal, and WPA2-Personal. WPS does not support a wireless network that uses a Shared Key, WPA-Enterprise, WPA2-Enterprise, and RADIUS encryption method. -
In the WPS Method field, select Push Button or Client PIN code. If you select Push Button, go to step 4. If you select Client PIN code, go to step 5.
-
To set up WPS using the router’s WPS button, follow these steps:
a. Click Start or press the WPS button found at the rear of the wireless router.
b. Press the WPS button on your wireless device. This is normally identified by the WPS logo.
NOTE: Check your wireless device or its user manual for the location of the WPS button.
c. The wireless router will scan for any available WPS devices. If the wireless router does not find any WPS devices, it will switch to standby mode. -
To set up WPS using the Client’s PIN code, follow these steps:
a. Locate the WPS PIN code on your wireless device’s user manual or on the device itself.
b. Key in the Client PIN code on the text box.
c. Click Start to put your wireless router into WPS survey mode.
The router’s LED indicators quickly flash three times until the WPS setup is completed.
3.13.3 Bridge
Bridge or WDS (Wireless Distribution System) allows your ASUS wireless router
to connect to another wireless access point exclusively, preventing other
wireless devices or stations to access your ASUS wireless router. It can also
be considered as a wireless repeater where your ASUS wireless router
communicates with another access point and other wireless devices.To set up the wireless bridge:
-
From the navigation panel, go to Advanced Settings > Wireless > WDS.
-
Select the frequency band for the wireless bridge.
-
In the AP Mode field, select any of these options:
• AP Only: Disables the Wireless Bridge function.
• WDS Only: Enables the Wireless Bridge feature but prevents other wireless devices/stations from connecting to the router.
• HYBRID: Enables the Wireless Bridge feature and allows other wireless devices/stations to connect to the router.
NOTE: In Hybrid mode, wireless devices connected to the ASUS wireless router will only receive half the connection speed of the Access Point. -
In the Connect to APs in list field, click Yes if you want to connect to an Access Point listed in the Remote AP List.
-
In the Control Channel field, select the operating channel for the wireless bridge. Select Auto to allow the router to automatically select the channel with the least amount of interference.
NOTE: Channel availability varies per country or region. -
On the Remote AP List, key in a MAC address and click the Add ** button to enter the MAC address of other available Access Points.
NOTE:** Any Access Point added to the list should be on the same Control Channel as the ASUS wireless router. -
Click Apply.
3.13.4 Wireless MAC Filter
Wireless MAC filter provides control over packets transmitted to a specified
MAC (Media Access Control) address on your wireless network. To set up the Wireless MAC filter:
-
From the navigation panel, go to Advanced Settings > Wireless > Wireless MAC Filter.
-
Tick Yes in the Enable Mac Filter field.
-
In the MAC Filter Mode dropdown list, select either Accept or Reject.
• Select Accept to allow devices in the MAC filter list to access to the wireless network.
• Select Reject to prevent devices in the MAC filter list to access to the wireless network. -
On the MAC filter list, click the Add button and key in the MAC address of the wireless device.
-
Click Apply.
3.13.5 RADIUS Setting
RADIUS (Remote Authentication Dial In User Service) Setting provides an extra
layer of security when you choose WPAEnterprise, WPA2-Enterprise, or Radius
with 802.1x as your Authentication Mode.
To set up wireless RADIUS settings:
-
Ensure that the wireless router’s authentication mode is set to WPA-Enterprise, WPA2-Enterprise, or Radius with 802.1x.
NOTE: Please refer to section 3.13.1 General section for configuring your wireless router’s Authentication Mode. -
From the navigation panel, go to Advanced Settings > Wireless > RADIUS Setting.
-
Select the frequency band.
-
In the Server IP Address field, key in your RADIUS server’s IP Address.
-
In the Connection Secret field, assign the password to access your RADIUS server.
-
Click Apply.
3.13.6 Professional
The Professional screen provides advanced configuration options.
NOTE: We recommend that you use the default values on this page.In the Professional Settings screen, you can configure the
following:
-
Band: Select the frequency band that the professional settings will be applied to.
-
Enable Radio: Select Yes to enable wireless networking. Select No to disable wireless networking.
-
Enable wireless scheduler: You can choose clock format as 24-hour or 12-hour. The color in the table indicates Allow or Deny. Click each frame to change the settings of the hour of the weekdays and click OK when done.
-
Set AP isolated: The Set AP isolated item prevents wireless devices on your network from communicating with each other. This feature is useful if many guests frequently join or leave your network. Select Yes to enable this feature or select No to disable.
-
Multicast rate (Mbps): Select the multicast transmission rate or click Disable to switch off simultaneous single transmission.
-
Preamble Type: Preamble Type defines the length of time that the router spent for CRC (Cyclic Redundancy Check). CRC is a method of detecting errors during data transmission.
Select Short for a busy wireless network with high network traffic. Select Long if your wireless network is composed of older or legacy wireless devices. -
RTS Threshold: Select a lower value for RTS (Request to Send) Threshold to improve wireless communication in a busy or noisy wireless network with high network traffic and numerous wireless devices.
-
DTIM Interval: DTIM (Delivery Traffic Indication Message) Interval or Data Beacon Rate is the time interval before a signal is sent to a wireless device in sleep mode indicating that a data packet is awaiting delivery. The default value is three milliseconds.
-
Beacon Interval: Beacon Interval is the time between one DTIM and the next. The default value is 100 milliseconds. Lower the Beacon Interval value for an unstable wireless connection or for roaming devices.
-
Enable TX Bursting: Enable TX Bursting improves transmission speed between the wireless router and 802.11g devices.
-
Enable WMM APSD: Enable WMM APSD (Wi-Fi Multimedia Automatic Power Save Delivery) to improve power management between wireless devices. Select Disable to switch off WMM APSD.
Utilities
NOTES:
-
Download and install the wireless router’s utilities from the ASUS website:
• Device Discovery v1.4.7.1 at https://dlcdnets.asus.com/pub/ASUS/wireless/ASUSWRT/Discovery_1483.zip?model=ZenWIFI%20Pro%20XT12
• Firmware Restoration v1.9.0.4 at https://dlcdnets.asus.com/pub/ASUS/wireless/GT- AX6000/Rescue_2103.zip?model=ZenWIFI%20Pro%20XT12
• Windows Printer Utility v1.0.5.5 at http://dlcdnet.asus.com/pub/ASUS/LiveUpdate/Release/Wireless/Printer.zip -
The utilities are not supported on MAC OS.
4.1 Device Discovery
Device Discovery is an ASUS WLAN utility that detects an ASUS wireless router
device, and allows you to configure the wireless networking settings.
To launch the Device Discovery utility:
- From your computer’s desktop, click Start > All Programs > ASUS Utility > Wireless Router > Device Discovery.
NOTE: When you set the router to Access Point mode, you need to use
Device Discovery to get the router’s IP address.
4.2 Firmware Restoration
Firmware Restoration is used on an ASUS Wireless Router that failed during its
firmware upgrading process. It uploads the firmware that you specify. The
process takes about three to four minutes. IMPORTANT!
Launch the rescue mode on the router before using the Firmware Restoration
utility.
NOTE: This feature is not supported on MAC OS.
To launch the rescue mode and use the Firmware Restoration utility:
- Unplug the wireless router from the power source.
- Hold the Reset button at the rear panel and simultaneously replug the wireless router into the power source. Release the Reset button when the Power LED at the front panel flashes slowly, which indicates that the wireless router is in the rescue mode.
- Set a static IP on your computer and use the following to set up your TCP/IP settings: IP address: 192.168.1.x Subnet mask: 255.255.255.0
- From your computer’s desktop, click Start > All Programs > ASUS Utility > Wireless Router > Firmware Restoration.
- Specify a firmware file, then click Upload.
NOTE: This is not a firmware upgrade utility and cannot be used on a working ASUS Wireless Router. Normal firmware upgrades must be done through the web interface. Refer to Chapter 3: Configuring the General and Advanced Settings for more details.
4.3 Setting up your printer server
4.3.1 ASUS EZ Printer Sharing
ASUS EZ Printing Sharing utility allows you to connect a USB printer to your
wireless router’s USB port and set up the print server. This allows your
network clients to print and scan files wirelessly. NOTE: The print server function is supported on Windows® 10
and Windows® 11.
To set up the EZ Printer sharing mode:
- From the navigation panel, go to General > USB Application > Network Printer Server.
- Click Download Now! to download the network printer utility. NOTE: Network printer utility is supported on Windows® 10 and Windows® 11 only. To install the utility on Mac OS, select Use LPR protocol for sharing printer.
- Unzip the downloaded file and click the Printer icon to run the network printer setup program.
- Follow the onscreen instructions to set up your hardware, then click Next.
- Wait a few minutes for the initial setup to finish. Click Next.
- Click Finish to complete the installation.
- Follow the Windows® OS instructions to install the printer driver.
- After the printer’s driver installation is complete, network clients can now use the printer.
4.3.2 Using LPR to Share Printer
You can share your printer with computers running on Windows® and MAC
operating system using LPR/LPD (Line Printer Remote/ Line Printer Daemon).
Sharing your LPR printer
To share your LPR printer:
- From the Windows® desktop, click Start > Devices and Printers > Add a printer to run the Add Printer Wizard.
- Select Add a local printer and then click Next.
- Select Create a new port then set Type of Port to Standard TCP/IP Port. Click New Port.
- In the Hostname or IP address field, key in the IP address of the wireless router then click Next.
- Select Custom then click Settings.
- Set Protocol to LPR. In the Queue Name field, key in LPRServer then click OK to continue.
- Click Next to finish setting up the standard TCP/IP port.
- Install the printer driver from the vendor-model list. If your printer is not in the list, click Have Disk to manually install the printer drivers from a CD-ROM or file.
- Click Next to accept the default name for the printer.
- Click Finish to complete the installation.
4.4 Download Master
Download Master is a utility that helps you download files even while your
laptops or other devices are switched off.
NOTE: You need a USB device connected to the wireless router to use
Download Master.
To use Download Master:
-
Click General > USB application > Download Master to download and install the utility automatically.
NOTE: If you have more than one USB drive, select the USB device you want to download the files to. -
After the download process is finished, click the Download Master icon to start using the utility.
-
Click Add to add a download task.
-
Select a download type such as BitTorrent, HTTP, or FTP. Provide a torrent file or a URL to begin downloading.
NOTE: For details on Bit Torrent, refer to section 4.4.1 Configuring Bit Torrent download settings. -
Use the navigation panel to configure the advanced settings.
4.4.1 Configuring Bit Torrent download settings
To configure BitTorrent download settings:
- From Download Master’s navigation panel, click Bit Torrent to launch the Bit Torrent Setting page.
- Select a specific port for your download task.
- To prevent network congestion, you can limit the maximum upload and download speeds under Speed Limits.
- You can limit the maximum number of allowed peers and enable or disable file encryption during downloads.
4.4.2 NZB settings
You can set up a USENET server to download NZB files. After entering USENET
settings, Apply.
Troubleshooting
This chapter provides solutions for issues you may encounter with your router.
If you encounter problems that are not mentioned in this chapter, visit the
ASUS support site at: https://www.asus.com/support/ for more product
information and contact details of ASUS Technical Support.
5.1 Basic Troubleshooting
If you are having problems with your router, try these basic steps in this
section before looking for further solutions.
Upgrade Firmware to the latest version.
- Launch the Web GUI. Go to Advanced Settings > Administration > Firmware Upgrade. Click Check to verify if the latest firmware is available.
- If the latest firmware is available, visit the ASUS global website at https://www.asus.com/networking-iot-servers/whole-home-mesh-wifi-system/zenwifi-wifi-systems/asus-zenwifi-pro-xt12/helpdesk_bios/?model2Name=ASUS-ZenWiFi-Pro-XT12 to download the latest firmware.
- From the Firmware Version page, click Check to locate the firmware file.
- Click Upload to upgrade the firmware.
Restart your network in the following sequence:
- Turn off the modem.
- Unplug the modem.
- Turn off the router and computers.
- Plug in the modem.
- Turn on the modem and then wait for 2 minutes.
- Turn on the router and then wait for 2 minutes.
- Turn on computers.
Check if your Ethernet cables are plugged properly.
- When the Ethernet cable connecting the router with the modem is plugged in properly, the WAN LED will be on.
- When the Ethernet cable connecting your powered on computer with the router is plugged in properly, the corresponding LAN LED will be on.
Check if the wireless setting on your computer matches that of your router.
- When you connect your computer to the router wirelessly, ensure that the SSID (wireless network name), encryption method, and password are correct.
Check if your network settings are correct.
- Each client on the network should have a valid IP address. ASUS recommends that you use the wireless router’s DHCP server to assign IP addresses to computers on your network.
- Some cable modem service providers require you to use the MAC address of the computer initially registered on the account. You can view the MAC address in the web GUI, Network Map > Clients page, and hover the mouse pointer over your device in Client Status.
5.2 Frequently Asked Questions (FAQs)
I cannot access the router GUI using a web browser
- If your computer is wired, check the Ethernet cable connection and LED status as described in the previous section.
- Ensure that you are using the correct login information. The default factory login name and password is “admin/admin”. Ensure that the Caps Lock key is disabled when you enter the login information.
- Delete the cookies and files in your web browser. For Internet Explorer, follow these steps:
1. Launch Internet Explorer, then click Tools > Internet Options.
2. In the General tab, under Browsing history, click Delete…, select Temporary Internet files and website files and Cookies and website data then click Delete.
NOTES:
- The commands for deleting cookies and files vary with web browsers.
- Disable proxy server settings, cancel the dial-up connection, and set the TCP/IP settings to obtain IP addresses automatically. For more details, refer to Chapter 1 of this user manual.
- Ensure that you use CAT5e or CAT6 ethernet cables.
The client cannot establish a wireless connection with the router.
NOTE: If you are having issues connecting to 5GHz network, make sure that
your wireless device supports 5GHz or features dual band capabilities.
-
Out of Range:
• Move the router closer to the wireless client.
• Try to adjust antennas of the router to the best direction as described in section 1.4 Positioning your wireless router. -
DHCP server has been disabled:
1. Launch the web GUI. Go to General > Network Map> Clients and search for the device that you want to connect to the router.
2. If you cannot find the device in the Network Map, go to Advanced SettingsLAN > DHCP Server, Basic Config list, select Yes on the Enable the DHCP Server.
-
SSID has been hidden. If your device can find SSIDs from other routers but cannot find your router’s SSID, go to Advanced Settings > Wireless > General, select No on Hide SSID, and select Auto on Control Channel.
-
If you are using a wireless LAN adapter, check if the wireless channel in use conforms to the channels available in your country/area. If not, adjust the channel, channel bandwidth, and wireless mode.
-
If you still cannot connect to the router wirelessly, you can reset your router to factory default settings. In the router GUI, click Administration > Restore/Save/Upload Setting and click Restore.
Internet is not accessible.
-
Check if your router can connect to your ISP’s WAN IP address.
To do this, launch the web GUI and go to General> Network Map, and check the Internet status. -
If your router cannot connect to your ISP’s WAN IP address, try restarting your network as described in the section Restart your network in following sequence under Basic Troubleshooting.
-
The device has been blocked via the Parental Control function. Go to General > Parental Controls and see if the device is in the list. If the device is listed under Client Name, remove the device using the Delete button or adjust the Time Management Settings.
-
If there is still no Internet access, try to reboot your computer and verify the network’s IP address and gateway address.
-
Check the status indicators on the ADSL modem and the wireless router. If the WAN LED on the wireless router is not ON, check if all cables are plugged properly.
You forgot the SSID (network name) or network password
- Setup a new SSID and encryption key via a wired connection (Ethernet cable). Launch the web GUI, go to Network Map, click the router icon, enter a new SSID and encryption key, and then click Apply.
- Reset your router to the default settings. Launch the web GUI, go to Administration > Restore/Save/Upload Setting, and click Restore. The default login account and password are both “admin”.
How to restore the system to its default settings?
- Go to Administration > Restore/Save/Upload Setting, and click Restore.
Firmware upgrade failed.
Launch the rescue mode and run the Firmware Restoration utility.
Refer to section 4.2 Firmware Restoration on how to use the Firmware
Restoration utility.
Cannot access Web GUI
Before configuring your wireless router, do the steps described in this
section for your host computer and network clients.
A. Disable the proxy server, if enabled.
Windows®
- Click Start > Internet Explorer to launch the browser.
- Click Tools > Internet options > Connections > LAN settings.
- From the Local Area Network (LAN) Settings screen, untick Use a proxy server for your LAN.
- Click OK when done.
MAC OS
- From your Safari browser, click Safari > Preferences > Advanced > Change Settings…
- From the Network screen, deselect FTP Proxy and Web Proxy (HTTP).
- Click Apply Now when done.
NOTE: Refer to your browser’s help feature for details on disabling the
proxy server.
B. Set the TCP/IP settings to automatically obtain an IP address.
Windows®
- Click Start > Control Panel > Network and Sharing Center, then click the network connection to display its status window.
- Click Properties to display the Ethernet Properties window.
- Select Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6), then click Properties.
- To obtain the IPv4 IP settings automatically, tick Obtain an IP address automatically. To obtain the IPv6 IP settings automatically, tick Obtain an IPv6 address automatically.
- Click OK when done.
MAC OS
- Click the Apple icon located on the top left of your screen.
- Click System Preferences > Network > Configure…
- From the TCP/IP tab, select Using DHCP in the Configure IPv4 dropdown list.
- Click Apply Now when done.
NOTE: Refer to your operating system’s help and support feature for
details on configuring your computer’s TCP/IP settings.
C. Disable the dial-up connection, if enabled.
Windows®
- Click Start > Internet Explorer to launch the browser.
- Click Tools > Internet options > Connections.
- Tick Never dial a connection.
- Click OK when done.
NOTE: Refer to your browser’s help feature for details on disabling the dial-up connection.
Appendices
GNU General Public License
Licensing information
This product includes copyrighted third-party software licensed under the
terms of the GNU General Public License. Please see The GNU General Public
License for the exact terms and conditions of this license. All future
firmware updates will also be accompanied with their respective source code.
Please visit our web site for updated information. Note that we do not offer
direct support for the distribution.
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license
document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share
and change it. By contrast, the GNU General Public License is intended to
guarantee your freedom to share and change free software–to make sure the
software is free for all its users. This General Public License applies to
most of the Free Software Foundation’s software and to any other program whose
authors commit to using it. (Some other Free Software Foundation software is
covered by the GNU Library General Public License instead.) You can apply it
to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our
General Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish),
that you receive source code or can get it if you want it, that you can change
the software or use pieces of it in new free programs; and that you know you
can do these things. To protect your rights, we need to make restrictions that
forbid anyone to deny you these rights or to ask you to surrender the rights.
These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for
a fee, you must give the recipients all the rights that you have. You must
make sure that they, too, receive or can get the source code. And you must
show them these terms so they know their rights. We protect your rights with
two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that
everyone understands that there is no warranty for this free software. If the
software is modified by someone else and passed on, we want its recipients to
know that what they have is not the original, so that any problems introduced
by others will not reflect on the original authors’ reputations.
Finally, any free program is threatened constantly by software patents. We
wish to avoid the danger that redistributors of a free program will
individually obtain patent licenses, in effect making the program proprietary.
To prevent this, we have made it clear that any patent must be licensed for
everyone’s free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification
follow.
Terms & conditions for copying, distribution, & modification
-
This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term “modification”.) Each licensee is addressed as “you”. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. -
You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. -
You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. -
You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine- readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. -
You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
-
You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License.
Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. -
Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
-
If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/ donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. -
If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
-
The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. -
If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission.
For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.
NO WARRANTY -
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
Service and Support
Visit our multi-language website at https://www.asus.com/support.
Documents / Resources
| ASUS
ZenWiFi Pro XT12 AX11000 Tri Band
Router
[pdf] User Manual
ZenWiFi Pro XT12 AX11000 Tri Band Router, ZenWiFi Pro XT12, AX11000 Tri Band
Router, Tri Band Router, Band Router, Router
---|---
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>