Wireless-N Notebook Adapter PSK PSK two encryption methods, TKIP and AES, with dynamic encryption keys. Select TKIP or AES for encryption. Then enter a Pre-shared Key that is 8-63 characters in length. Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu. Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field.
Wireless-N Notebook Adapter PSK+RADIUS PSK+RADIUS features PSK security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) PSK+RADIUS offers two authentication methods, EAPTLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
Wireless-N Notebook Adapter PSK2+RADIUS PSK2+RADIUS Enterprise features PSK2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) PSK2+RADIUS offers two authentication methods, EAPTLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field.
Wireless-N Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional).
Wireless-N Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Advanced Setup through the Wireless Network Monitor, click Exit. Figure 5-28: Confirm New Settings 7. The Congratulations screen will appear next. Click Connect to Network to implement the new settings immediately and return to the Link Information screen.
Wireless-N Notebook Adapter Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-N Notebook Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com. Common Problems and Solutions 1.
Wireless-N Notebook Adapter What is the IEEE 802.11g standard? It is one of the IEEE standards for wireless networks. The 802.11g standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11g standard. The 802.11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2.4GHz. What 802.11b features are supported? The product supports the following 802.
Wireless-N Notebook Adapter simultaneously requires a dynamic RF networking technology that links access points and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system. First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone.
Wireless-N Notebook Adapter What is WPA? WPA is Wi-Fi Protected Access, a wireless security protocol that can be used in conjunction with a RADIUS server. What is RADIUS? RADIUS is Remote Authentication Dial-In User Service, which uses an authentication server to control network access.
Wireless-N Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the Adapter, instead of using the Wireless Network Monitor, then rightclick on the Wireless Network Monitor and select Use Windows XP Wireless Configuration.
Wireless-N Notebook Adapter 2. The screen that appears will show any available wireless network. Select the network you want. Click the Connect button. NOTE: Steps 2 and 3 are the instructions and screenshots for Windows XP with Service Pack 2 installed. If your network does not have wireless security enabled, go to step 3. If your network does have wireless security enabled, go to step 4. Figure B-4: Available Wireless Network 3.
Wireless-N Notebook Adapter 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Click the Connect button. Figure B-6: Network Connection - Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your access point. 5.
Wireless-N Notebook Adapter Appendix C: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
Wireless-N Notebook Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network.
Wireless-N Notebook Adapter WPA Personal. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters. WPA Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. RADIUS. WEP used in coordination with a RADIUS server.
Wireless-N Notebook Adapter Appendix D: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. TCP/IP Before a computer can communicate with an access point or wireless router, TCP/IP must be enabled. TCP/IP is a set of instructions, or protocol, all PCs follow to communicate over a network.
Wireless-N Notebook Adapter Appendix E: Glossary This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network.
Wireless-N Notebook Adapter DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses. Domain - A specific name for a network of computers. Download - To receive a file transmitted over a network. DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines.
Wireless-N Notebook Adapter IP Address - The address used to identify a computer or device on a network. IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer. ISP (Internet Service Provider) - A company that provides access to the Internet. LAN - The computers and networking products that make up your local network.
Wireless-N Notebook Adapter RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires. Roaming - The ability to take a wireless device from one access point's range to another without losing the connection. Router - A networking device that connects multiple networks together. Server - Any computer whose function in a network is to provide user access to files, printing, communications, and other services.
Wireless-N Notebook Adapter TKIP (Temporal Key Integrity Protocol) - a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted. Topology - The physical layout of a network. TX Rate - Transmission Rate. Upgrade - To replace existing software or firmware with a newer version. Upload - To transmit a file over a network. URL (Uniform Resource Locator) - The address of a file located on the Internet.
Wireless-N Notebook Adapter Appendix F: Specifications Standards IEEE 802.11b, IEEE 802.11g, draft IEEE 802.11n Channels 802.11b/802.11g/Wireless-N (20MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Power, Link/Act Protocols 802.11b: CCK, QPSK, BPSK 802.11g: OFDM Wireless-N: BPSK, QPSK, 16-QAM, 64-QAM Transmitted Power 802.11b: 16dBm (Typical) 802.11g: 14dBm (Typical) 802.11g: 12±1dBm (Typical) Wireless-N: 13.
Wireless-N Notebook Adapter Storage Humidity Appendix F: Specifications 5% to 90% Non-Condensing 49
Wireless-N Notebook Adapter Appendix G: Warranty Information LIMITED WARRANTY Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
Wireless-N Notebook Adapter Appendix H: Regulatory Information FCC Statement This equipment has tested been and tested and found to specifications comply with for thealimits a Class B digital device, This product has been complies with the Class for B digital device, pursuant to Partpursuant 15 of the to Part 15 of the FCC Rules. These limits are FCC Rules. to These limitsreasonable are designedprotection to provide reasonable protection against harmful interference installation.
Wireless-N Notebook Adapter User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Wireless-N Notebook Adapter Appendix H: Regulatory Information 53
Wireless-N Notebook Adapter Appendix H: Regulatory Information 54
Wireless-N Notebook Adapter Appendix H: Regulatory Information 55
Wireless-G Notebook Adapter with RangeBooster IC STATEMENT Operation is subject to the following two conditions: 1) this device may not cause interference and 2) this device must accept any interference, including interference that may cause undesired operation of the device IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.
Wireless-N Notebook Adapter Appendix H: Regulatory Information 57
Wireless-N Notebook Adapter Appendix I: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or ftp.linksys.