USER GUIDE Wireless-N PCI Adapter with Dual-Band Model: WMP600N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Bracket Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Use of the Low-Profile Bracket (Optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview 1. There are two screws that attach the PCI board to its standard-sized bracket. Remove both screws. Thank you for choosing the Linksys by Cisco Wireless-N PCI Adapter with Dual-Band. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings. How to Access the Wireless Manager After you have installed the Adapter, the Linksys Wireless Manager icon appears in the system tray of your computer.
Advanced Configuration Chapter 3 To connect to a wireless network, go to How to Connect to a Wireless Network, page 4. To disconnect from a wireless network, select the network, and click Disconnect. To refresh the list of available networks, click Search Again. 5. The Checking Connection screen appears while the Wireless Manager establishes the wireless connection. When it is finished, click Next.
Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: By default, a wireless network’s router broadcasts the network name (SSID). A “hidden” wireless network is a network whose router has been configured not to broadcast the network name (SSID). Follow these instructions to connect to a wireless network that is not listed on the Connect to a Wireless Network screen. NOTE: If your wireless network is NOT hidden, select My network is not hidden, and then click Next.
Advanced Configuration Chapter 3 5. The Checking Connection screen appears. How to Connect Using Wi-Fi Protected Setup On the Connect to a Wireless Network screen, the Wi-Fi Protected Setup icon ( ) indicates a network that supports Wi-Fi Protected Setup. Follow these instructions to connect to a wireless network using Wi-Fi Protected Setup. NOTE: Before you begin, make sure the router and the computer with the Adapter are in the same room. 1.
Advanced Configuration Chapter 3 5. The Adapter connects to the network. Connecting to the Network via Wi-Fi Protected Setup NOTE: If the connection cannot be set up, the message, “Registration failed” appears. If this happens, use one of two options: the router’s Wi-Fi Protected Setup button until an LED lights up. Then click Connect to try again. •• Push Button Press •• PIN Click Skip, and then go to Enter the Adapter’s PIN Number, page 7. 6. The Connected to Your Network screen appears.
Advanced Configuration Chapter 3 Saved Networks How to Connect to a Saved Network When you connect to a wireless network, you can save its settings so that it will be easier to reconnect to the network at a later time. This is most helpful with hidden networks; if you do not save a hidden network’s settings, you will have to enter the network name (SSID) and security key. To connect to a saved network, follow these instructions. 1.
Appendix A Troubleshooting Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the PCI slot. The Adapter does not work properly. 1. Power down the computer. 2. Remove the Adapter. 3. Reinsert the Adapter into the computer’s PCI slot. 4. Power on the computer. Your computer cannot communicate with other networked computers in the Infrastructure configuration. 1. Make sure that the computers are powered on. 2.
Windows Vista Configuration Appendix B Appendix B: Windows Vista Configuration 3. Select your network, and then click Connect. Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears. 4.
Windows Vista Configuration Appendix B 5. Enter the security key, WEP key, or passphrase (also known as a pre‑shared key), depending on your type of security. Click Connect. 7. This screen appears when you are connected to your network. Select Save this network, if you want to save your settings. Click Close. Secured Network Connected to Network 6. This screen appears while the Adapter connects to your network. Do not cancel, unless you want to end the installation. 8.
Windows Vista Configuration Appendix B 9. This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start > Help and Support. button Your computer is now connected to your wireless network.
Windows XP Wireless Zero Configuration Appendix C Appendix C: Windows XP Wireless Zero Configuration New Wireless Connection 1. After installing the Adapter, the Windows XP Wireless Zero Configuration icon appears in your computer’s system tray. Double-click the icon. Windows XP Wireless Zero Configuration NOTE: If you have WPA2 wireless security, refer to Update for Windows XP (KB893357) on the microsoft.com website to be able to connect correctly.
Windows XP Wireless Zero Configuration Appendix C 4. If your network uses WEP wireless security, enter the WEP Key in the Network Key and Confirm network key fields. If your network uses WPA Personal wireless security, enter the Passphrase in the Network Key and Confirm network key fields. Click Connect. Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. 5.
Specifications Appendix D Appendix D: Specifications Model WMP600N Standards IEEE 802.11a/b/g, IEEE 802.11n Draft 2.0 LEDs Link/Act # of Antennas 2 External Dipole Antennas Connector Type R-SMA Detachable (Yes/No) Yes RF Pwr (EIRP) in dBm 802.11n @ 2.4 GHz: 13.5 dBm ±1 dBm 802.11n @ 5 GHz: 12 dBm ±1.5 dBm 802.11g: 13.5 dBm ±1 dBm 802.11a: 2 dBm ±1.5 dBm Receive Sensitivity 802.11a/g 16 Mbps: 10-5 BER @ -90 dBm, typical 802.11a/g 54Mbps: 10-5 BER @ -72 dBm, typical 802.
Appendix E Appendix E: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix E Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix F Appendix F: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Regulatory Information Appendix F regulations of Industry Canada. The required antenna impedance is 50 ohms. 3. The maximum antenna gain (please see the table below) permitted (for devices in the bands 5250-5350 MHz and 5470-5725 MHz) to comply with the E.I.R.P. limit: No. Antenna Type For 2.
Appendix F User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix F Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix F Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix F Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix G Appendix G: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix G your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix G GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix G c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix G limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all.
Appendix G Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix G The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix G a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License.
Appendix G c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
Software License Agreement Appendix G 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13.
Appendix G 4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. 5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project. 6.