|At a glance|
|Product||Linksys Wireless-N ADSL2+ Modem Router (X2000) [Website]|
|Summary||Entry-level Broadcom-based single band N router with 10/100 ports and both Ethernet and integrated ADSL2+ modem WAN connection.|
|Pros||• 100 Mbps wire-speed routing|
• Supports both Ethernet and ADSL2+ WAN connections
|Cons||• No IPv6 support|
• Only three LAN ports
Many people don't like multiple networking boxes cluttering up their homes. So for those who take their Internet with a DSL twist, Cisco has come up with the Linksys X2000 Wireless-N ADSL2+ Modem Router.
The X2000 has all the ingredients that plug-and-go networkers desire. It sports a built-in ADSL modem that supports T1.413i2, G.992.1 (G.DMT), G.992.2 (G.Lite), G.992.3 (ADSL2), G.992.5 (ADSL2+) for Annex A, B, M, L, U-R2 for Annex B flavors. But it can also connect to a cable or any other modem type via a 10/100 Ethernet port.
Also inside is an 802.11bgn access point for connecting your wireless thingies via the 2.4 GHz band. There is no USB port for drive or printer sharing, however, and the built-in 10/100 switch has only three ports vs. the normal four.
The X2000's housing is no-nonsense matte black plastic that harkens back to the smooth stingray styling of the first group of E-series products.
Figure 1 provides the rundown on front and rear panel indicators and ports. Not shown is the bottom of the router, where a reset-to-defaults switch and mounting screw slots reside.
Figure 1: Cisco X2000 ports and indicators
While the X2000's non-DSL features are similar to Linksys' old entry-level E1000 and current E1200, its innards are very different. Figure 2 shows the FCC docs board shot, where you see a Broadcom BCM63281 Single-Chip ADSL2+ Router/Gateway Solution serving as command central with CPU and integrated 10/100 switch.
Figure 2: Cisco X2000 board
The 2.4 GHz radio comes from a Broadcom BCM43225 2.4 GHz 802.11n 2x2 SoC, which I'm encountering for the first time, tucked under the RF can at photo lower left. 64 MB of RAM and 8 MB of flash make up the rest of the key components.
Table 1 compares the X2000, E1200 and E1000's key components.
|CPU||Broadcom BCM63281||Broadcom BCM5357||Broadcom BCM4716|
|Switch||In BCM63281||In BCM5357||Broadcom BCM5325|
|RAM||64 MB||32 MB||32 MB|
|Flash||8 MB||4 MB||4 MB|
|2.4 GHz Radio||Broadcom BCM43225||In BCM5357||In BCM4716|
Table 1: X2000, E1200 and E1000 component comparison
Figure 3 shows a wider view so that you can see the placement of the two hard-wired bent-metal internal antennas.
Figure 3: Cisco X2000 inside view
Sharp-eyed buyers may note the "V2" designation on the router's serial number label. The FCC docs do show another version that uses the same components with a very similar layout, but different part number board. As far as I know, the V2 is the first model to ship.
The X2000 supports the standard Linksys router feature set:
- DHCP, Static, PPPoE, PPTP, L2TP, Telstra Cable WAN types
- DHCP server with MAC address reservation
- Built-in Dynamic DNS clients for TZO and DynDNS
- Static and dynamic routing
- SPI firewall disable, multicast, WAN ping and IDENT filtering and Proxy, Java, ActiveX and Cooking blocking
- IPsec, PPTP and L2TP VPN passthrough (enabled by default)
- Single port forwarding and Port Range forwarding and triggered ports
- HTTPS admin access, remote management (HTTP / HTTPS) enable with IP range restriction and port setting
- Incoming, outgoing, Security and DHCP onscreen log access with support for Linksys Logviewer recording
- Access Restrictions with 10 deny or allow-based policies, each with its own list of clients and day/time schedule
- Uplink (LAN to WAN) only QoS with High, Medium, Normal or Low Priority that can be applied to specific applications (divided into Application, Online Game and Voice Device groups), physical switch ports or specific MAC addresses.
- WMM (Wireless MultiMedia) (enabled by default)
- Wireless Guest Access - Internet-only access with its own SSID, but no security except a common password for all guests and the ability to limit the number of guests from 1 to 10.
Of course the X2000 also can connect via DSL. That mode offers the selection of RFC 2684 Bridged, RFC2684 Routed, IPoA, RFC 2516 PPPoE and RFC2364 PPPoA connections. There's a shot of the manual page in the Gallery that provides a bit more info on each of these modes. There is also a Bridged Mode Only mode if you will be using a separate router and don't want to deal with double NAT from two routers.
I tried out the X2000 with my CenturyLink DSL service. In my neck of the woods, Century Link doesn't require any visible sort of authentication (username, password). So I just connected it to my phone line and let it do its thing.
After a short time, the Internet light lit, indicating that I was connected. But when I checked the Basic Setup page I found no IP address had been pulled. I went back to my old DSL modem and noted that it had VPI and VCI settings of 8 and 35, while the X2000's remained at 0.
So I changed the Autodetect radio button from Disable to Enable, hit the Reboot button at the bottom of the Basic Setup page, but still no joy. But after unintentionally power-cycling the X2000, I logged back in to futz with the settings some more and found it all connected up.
I can't really judge the X2000's modem performance, both because I have only 5 Mbps down / 0.8 Mbps up service and also because my speeds have been continuously ramping up and down for the past few days. After I get that sorted out, I plan to put the X2000 into service for awhile as my main router, to how it behaves over the long term.
You can download the User Guide to review all the X2000's features. Pay no attention to the X3000 that you'll find in the User Guide if you live in the U.S., however. Cisco says that X3000, which has four Gigabit LAN ports and USB 2.0 port for drive sharing will be offered in Europe only.
I loaded up the latest firmware (v2.0.00 build 027) before testing and found that it doesn't include any IPv6 controls. Another feature that the X2000 shares with E-series routers is won't let you access the Internet unless you run the Cisco Connect software or check a box in a captive portal that says you understand that the router isn't secure.
I've included a few more admin screens in the gallery below.