USER GUIDE RangePlus Wireless Notebook Adapter Model No: WPC100
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Chapter 3: Advanced Configuration 3 Accessing the Wireless Network Monitor. . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the RangePlus Wireless Notebook Adapter. The RangePlus Wireless Notebook Adapter uses the very latest wireless networking technology to achieve extended range. Unlike ordinary wireless networking technologies that are confused by signal reflections, MIMO actually uses these reflections to increase the range and reduce “dead spots” in the wireless coverage area.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Configuration Chapter 3 Chapter 3: Advanced Configuration Ad-Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in ad-hoc or infrastructure mode. Advanced configuration is done through the Wireless Network Monitor (the Monitor). You can use the Monitor to check the link information, search for available wireless networks, or create profiles that hold different configuration settings.
Configuration Chapter 3 MAC Address This is the MAC address of the wireless network’s access point or wireless router. Signal Strength The Signal Strength bar indicates the signal strength. Link Quality The Link Quality bar indicates the quality of the wireless network connection. Click Statistics to go to the Wireless Network Statistics screen. Click Back to return to the initial Link Information screen. Click Save to Profile to save the currently active connection settings to a profile.
Configuration Chapter 3 Site Information • For 64-bit encryption Enter exactly 10 hexadecimal characters (“0” to “9” and “A” to “F”). For each network selected, the following settings are listed: • For 128-bit encryption Enter exactly 26 hexadecimal characters(“0” to “9” and “A” to “F”). Wireless Mode This is the mode of the wireless network currently in use. Network Type This is the network type used by your wireless network. Radio Band This is the radio band used by your wireless network.
Configuration Chapter 3 Standard Channel This displays the channel used by your wireless network. Security This is the status of the wireless security. Authentication This is the authentication setting for the network. Connect To connect to a wireless network using a specific profile, select the profile, and click Connect. New Click New to create a new profile. See the next section, “Create a New Profile,” for instructions. Edit Select the profile you want to change and click Edit.
Configuration Chapter 3 Advanced Setup If your network is not listed on this screen, select Advanced Setup to set up the Adapter manually. This method of setting up the Adapter is intended for advanced users only. WEP Key The WEP key must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters (“0” to “9” and “A” to “F”.) For 128-bit encryption, enter exactly 26 hexadecimal characters.
Configuration Chapter 3 Click Connect and proceed to Step 3. 3. After the profile installs, the Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. Network Settings Obtain network settings automatically (DHCP) If your network has a router or other DHCP server, select this option.
Configuration Chapter 3 WEP WPA Personal WEP WEP Select 64-bit or 128-bit encryption. Passphrase Enter the network’s passphrase, so a WEP key is automatically generated. It is case-sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.
Configuration Chapter 3 Authentication Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS Password Enter the password of your wireless network. Server Name Enter the name of the authentication server (this is optional). Certificate From the Certificate drop-down menu, select the certificate you have installed to authenticate you on your wireless network; if you want to use any certificate, keep the default setting, Trust Any. Inner Authen.
Configuration Chapter 3 PEAP EAP-TLS WPA2 Enterprise - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network. Server Name Enter the name of the authentication server (this is optional). Certificate Select the certificate you have installed to authenticate you on your wireless network; if you want to use any certificate, keep the default setting, Trust Any. Inner Authen.
Configuration Chapter 3 Certificate Select the certificate you have installed to authenticate you on your wireless network; if you want to use any certificate, keep the default setting, Trust Any. Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue or Back to return to the previous screen. 6. The Confirm New Settings screen appears next and shows the new settings. Confirm New Settings To save the new settings, click Save.
Appendix A Troubleshooting Appendix A: Troubleshooting My computer does not recognize the RangePlus Wireless Notebook Adapter. Make sure that the RangePlus Wireless Notebook Adapter is properly inserted into the PC Card slot. The RangePlus Wireless Notebook Adapter does not work properly. Reinsert the RangePlus Wireless Notebook Adapter into the notebook’s PC Card slot. I cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. 1.
Specifications Appendix B Appendix B: Specifications Model WPC100 Standards IEEE 802.11b, IEEE 802.11g LEDs Power, Link/Act # of Antennas 2 Antennas Connector type CardBus Modulations 802.11b: CCK, QPSK, BPSK 802.11g: OFDM 802.11n: BPSK, QPSK, 16-QAM, 64-QAM RF Power (EIRP) in dBm 802.11b: 19 dBm, 802.11g: 19 dBm, 802.11n: 19 dBm, Receive Sensitivity in dBm 802.11b: -88dBm ~ -84 dBm 802.11g: -88dBm ~ -66 dBm 802.11n: -85dBm ~ -60 dBm Antenna Gain in dBi -0.
Windows XP Wireless Zero Configuration Appendix C Appendix C: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the Adapter, instead of using the Wireless Network Monitor, then right-click on the Wireless Network Monitor and select . NOTE: If you have WPA2 Wireless Security, refer to Update for Windows XP (KB893357) on the microsoft.
Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passprase. Enter the exact WEP key used by your access point. 5. Your wireless network will appear as Connected when your connection is active. Wireless Network Connection For more information about wireless networking on a Windows XP computer, click Start>Help>Support. Enter the keyword wireless in the field provided, and press the Enter key.
Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants to You that, for a period of one year (the "Warranty Period"), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys’ entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates. This limited warranty extends only to the original purchaser.
Regulatory Information Appendix E Appendix E: Regulatory Informati • • • WARNING: This product contains lead, known to the State of California to cause cancer, and birth defects or other reproductive harm. Wash hands after handling. Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
FCC user manual: Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
SAR compliance has been established in typical laptop computer(s) with CardBus slot, and product could be used in typical laptop computer with CardBus slot. Other application like handheld PC or similar device has not been verified and may not compliance with related RF exposure rule and such use shall be prohibited. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination.
Industry Canada statement: This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.