USER GUIDE RangePlus Wireless PCI Adapter Model No: WMP110
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys RangePlus Wireless PCI Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your desktop computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection. The included Setup Wizard will walk you through configuring the Adapter to your network’s settings, step by step.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
Advanced Configuration Chapter 3 Push Button (Recommended) Select this option to use the push button method. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router. 4. Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Click Next to continue, or click Back to return to the previous screen. Proceed to the instructions for the method you selected.
Advanced Configuration Chapter 3 3. On the Adapter’s PIN number screen, click Next. Congratulations! The Adapter is connected to the network. Wireless Network Status The Wireless Network Status screen provides information on your current network settings. Enter the PIN Number 4. The Adapter connects to the network. Wireless Network Status Radio Band This is the radio band used on the network. Wireless Network Name This is the unique name (SSID) of the wireless network.
Advanced Configuration Chapter 3 Back Click Back to return to the initial Status screen. Save to Profile Click Save to Profile to save the currently active connection settings to a profile. Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your current network settings. Up Time This indicates the length of the most recent connection to a wireless network. Total Up Time This indicates the cumulative total of the Adapter’s connection time.
Advanced Configuration Chapter 3 Security This is the security method used by the network. Wi-Fi Protected Setup Click the Wi-Fi Protected Setup button to connect to a router that supports Wi-Fi Protected Setup. Refer to the “Wi-Fi Protected Setup” instructions in the “Status” section at the beginning of this chapter. Refresh Click Refresh to perform a new search for wireless devices. Connect To connect to one of the networks on the list, select the wireless network, and click Connect.
Advanced Configuration Chapter 3 Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. 2. Click Finish. To connect to the network, click Connect. To cancel the connection, click Cancel. WEP (Wired Equivalent Privacy) If the network uses WEP encryption, then the WEP Key or Passphrase Needed for Connection screen appears. Congratulations Congratulations! The Adapter is connected to the network.
Advanced Configuration Chapter 3 Use the Push Button 4. Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Use the Push Button 1. Press the Wi-Fi Protected Setup button on the router. 2. Within two minutes, click the Wi‑Fi Protected Setup button on this screen. 3. The Adapter connects to the network. Connecting to the Network Congratulations Congratulations! The Adapter is connected to the network.
Advanced Configuration Chapter 3 3. On the Adapter’s PIN number screen, click Next. Congratulations! The Adapter is connected to the network. Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Enter the PIN Number 4. The Adapter connects to the network. Click Connect Anyway 1. Click Connect Anyway. 2.
Advanced Configuration Chapter 3 1. Proceed to the appropriate instructions. WPA2 (Wi-Fi Protected Access 2) If the network uses WPA2 Personal security, then the WPA2-Personal Key Needed for Connection screen appears. WEP Security Passphrase Enter the Passphrase or WEP key. WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. To connect to the network, click Connect. To cancel the connection, click Cancel.
Advanced Configuration Chapter 3 Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and wireless network names. Export Select the profile you want to save in a different location, and click Export. Direct Windows to the appropriate folder, and click Save. Delete Select the profile you want to delete and click Delete.
Advanced Configuration Chapter 3 No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. Click Connect Anyway 1. Click Connect Anyway. 2.
Advanced Configuration Chapter 3 Wi-Fi Protected Setup If you connect to a router that supports Wi-Fi Protected Setup, then you will view this screen: WEP Security Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.
Advanced Configuration Chapter 3 1. Press the Wi-Fi Protected Setup button on the router. Enter the Adapter’s PIN Number 2. Within two minutes, click the Wi‑Fi Protected Setup button on this screen. 3. The Adapter connects to the network. Enter the PIN Number 1. Access the web-based utility of the router. (Refer to the router’s documentation for instructions.) Connecting to the Network 4. Click Print to print out your wireless network settings.
Advanced Configuration Chapter 3 4. The Adapter connects to the network. Click Connect Anyway 1. Click Connect Anyway. 2. Click Finish. Connecting to the Network 5. Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Congratulations Congratulations! The Adapter is connected to the network.
Advanced Configuration Chapter 3 1. Proceed to the appropriate instructions. WPA2 (Wi-Fi Protected Access 2) If the network uses WPA2 Personal security, then the WPA2-Personal Key Needed for Connection screen appears. WEP Security Passphrase Enter the Passphrase or WEP key. WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. To connect to the network, click Connect. To cancel the connection, click Cancel.
Advanced Configuration Chapter 3 Advanced Setup – If your network is not listed with the available networks, use Advanced Setup. Default Gateway Enter the IP address of your network’s Gateway. – DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network. Click Next to continue, or click Back to return to the previous screen. 3. The Wireless Mode screen shows a choice of two wireless modes. Available Wireless Networks 1.
Advanced Configuration Chapter 3 4. If you chose Infrastructure Mode, go to step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen appears. NOTE: The Adapter only supports Ad-Hoc Mode for 2.4 GHz networks: Wireless-B, Wireless-G, and Wireless-N (using 2.4 GHz). for Wi-Fi Protected Access 2. WPA is a stronger security method than WEP. WPA2 is a stronger security method than WPA. RADIUS stands for Remote Authentication Dial-In User Service.
Advanced Configuration Chapter 3 WPA Personal WPA Enterprise WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Advanced Configuration Chapter 3 PEAP EAP-TLS WPA Enterprise - PEAP WPA2 Enterprise - EAP-TLS If you selected PEAP, configure the following: If you selected EAP-TLS, configure the following: Login Name Enter the login name of your wireless network. Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network. Server Name Enter the name of the authentication server (this is optional).
Advanced Configuration Chapter 3 Certificate Select the certificate you installed to authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any. PEAP Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue, or click Back to return to the previous screen. RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the router.
Advanced Configuration Chapter 3 7. The Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Status screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. Congratulations Congratulations! The profile is successfully configured.
Appendix A Troubleshooting Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the PCI slot. The Adapter does not work properly. Remove the Adapter, and then re-insert it into the computer’s PCI slot. Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. 1. Make sure that the computers are powered on. 2.
Windows Vista Configuration Appendix B Appendix B: Windows Vista Configuration 3. Select your network, and then click Connect. Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears. 4.
Windows Vista Configuration Appendix B 5. Enter the security key, WEP key, or passphrase (also known as a pre‑shared key), depending on your type of security. Click Connect. 7. This screen appears when you are connected to your network. Select Save this network, if you want to save your settings. Click Close. Secured Network Connected to Network 6. This screen appears while the Adapter connects to your network. Do not cancel, unless you want to end the installation. 8.
Windows Vista Configuration Appendix B 9. This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button > Help and Support. Your computer is now connected to your wireless network.
Windows XP Wireless Zero Configuration Appendix C Appendix C: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the Adapter, instead of using the Wireless Network Monitor, then right-click the Wireless Network Monitor icon, and select Use Windows XP Wireless Configuration.
Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. 5. Your wireless network will appear as Connected when your connection is active. Wireless Network Connection For more information about wireless networking on a Windows XP computer, click Start > Help > Support.
Specifications Appendix D Appendix D: Specifications Model WMP110 ver. 2 Standards IEEE 802.11b, IEEE 802.11g LEDs Link/Act Number of Antennas 2 External Dipole Antennas Connector Type PCI Detachable Antennas Yes Modulations 802.11b: CCK, QPSK, BPSK 802.11g: BPSK, QPSK, 16-QAM, 64-QAM 802.11n: BPSK, QPSK, 16-QAM, 64-QAM RF Power (EIRP) in dBm 802.11b: 17dBm 802.11g: 16dBm 802.
Appendix E Appendix E: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: • One (1) year for new product • Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix E Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix E Appendix E: Regulatory Information Safety Notices • Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. FCC Statement • Do not use this product near water, for example, in a wet basement or near a swimming pool. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Appendix E Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Les conditions de fonctionnement sont sujettes à deux conditions: 1. Ce périphérique ne doit pas causer d’interférence et. 2. Ce périphérique doit accepter toute interférence, y compris les interférences pouvant perturber le bon fonctionnement de ce périphérique.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.