Cisco WEC600N User Manual

Cisco WEC600N User Manual

Cisco systems computer networking device user manual
Hide thumbs Also See for WEC600N:

Advertisement

Quick Links

USER GUIDE
Dual-Band Wireless-N
ExpressCard
WEC600N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco WEC600N

  • Page 1 USER GUIDE Dual-Band Wireless-N ExpressCard WEC600N Model:...
  • Page 2: About This Guide

    Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Chapter 1: Product Overview LEDs ............3 Chapter 2: Wireless Security Checklist General Network Security Guidelines .
  • Page 4: Chapter 1: Product Overview

    Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Dual-Band Wireless-N ExpressCard. Using the latest wireless networking technology, Wireless-N (draft 802.11n), the ExpressCard adds or upgrades wireless connectivity on your notebook computer. Because the ExpressCard can work in both the 5 and 2.4 GHz radio bands, it can connect to Wireless-A, Wireless-N, Wireless-G, or Wireless-B networks.
  • Page 5: Chapter 2: Wireless Security Checklist

    Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network.
  • Page 6: Chapter 3: Advanced Configuration

    Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is done through the Wireless Network Monitor (the Monitor). Use it to check the link information, search for available wireless networks, or create profiles that hold different configuration settings. How to Access the Wireless Network Monitor After installing the Adapter, the Monitor icon appears in the system tray of your computer.
  • Page 7 Chapter 3 Push Button (Recommended) Select this option to use the push button method. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router. Click Next to continue, or click Back to return to the previous screen.
  • Page 8 Chapter 3 The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Congratulations Congratulations! The Adapter is connected to the network.
  • Page 9: Connect

    Chapter 3 Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your current network settings. Wireless Network Statistics Transmit Rate This is the data transmission rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transmission rate at any given time.) Receive Rate This is the rate that the Adapter receives...
  • Page 10 Chapter 3 If the router does not support Wi-Fi Protected Setup, proceed to the section, “No Wi-Fi Protected Setup”. If the router supports Wi-Fi Protected Setup section, “Wi-Fi Protected Setup”. No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled”...
  • Page 11 Chapter 3 WEP Security Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 12 Chapter 3 The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Congratulations Congratulations! The Adapter is connected to the network. Enter the Adapter’s PIN Number Access the web-based utility of the router.
  • Page 13 Chapter 3 Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Click Connect Anyway Click Connect Anyway.
  • Page 14: Profiles

    Chapter 3 WEP Security Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 15 Chapter 3 Export Select the profile you want to save in a different location, and click Export. Direct Windows to the appropriate folder, and click Save. Delete Select the profile you want to delete and click Delete. NOTE: If you want to export more than one profile, you must export them one at a time.
  • Page 16 Chapter 3 WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. To connect to the network, click Connect. To cancel the connection, click Cancel. WPA (Wi-Fi Protected Access) If the network uses WPA Personal security, then the WPA-Personal Key Needed for Connection screen appears.
  • Page 17 Chapter 3 Wi-Fi Protected Setup If you connect to a router that supports Wi-Fi Protected Setup, then you will view this screen: Select a Method Before you begin, make sure the router and the computer with the Adapter are in the same room. Then select the method that is most convenient for you.
  • Page 18 Chapter 3 On the Adapter’s PIN number screen, click Enter the PIN Number The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor.
  • Page 19 Chapter 3 WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. To connect to the network, click Connect. To cancel the connection, click Cancel. WPA (Wi-Fi Protected Access) If the network uses WPA Personal security, then the WPA-Personal Key Needed for Connection screen.
  • Page 20 Chapter 3 Advanced Setup If your network is not listed with the available networks, use Advanced Setup. Available Wireless Networks Advanced Setup on the Available Wireless Click Networks screen to set up the Adapter manually. Network Settings screen appears. Wireless Network Settings If your network has a router or other DHCP server, select Obtain network settings automatically (DHCP).
  • Page 21 Chapter 3 If you chose Infrastructure Mode, go to step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen appears. NOTE: The Adapter only supports Ad-Hoc Mode for 2.4 GHz networks: Wireless-B, Wireless-G, and Wireless-N (using 2.4 GHz). Ad-Hoc Mode Settings Standard Channel Select the correct channel...
  • Page 22 Chapter 3 WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA Personal Encryption Select TKIP or AES. Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. Click Next to continue, or click Back to return to the previous screen.
  • Page 23 Chapter 3 PEAP WPA Enterprise - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network. Server Name Enter the name of the authentication server (this is optional).
  • Page 24 Chapter 3 Certificate Select the certificate you installed to authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any. Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue, or click Back to return to the previous screen.
  • Page 25 Chapter 3 Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Status screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. Congratulations Congratulations! The profile is successfully configured.
  • Page 26: Appendix A: Troubleshooting

    Appendix A Appendix A: Troubleshooting Your computer does not recognize the ExpressCard. Make sure that the ExpressCard is properly inserted into the ExpressCard slot. The ExpressCard does not work properly. Remove the ExpressCard, and then reinsert it into the computer’s ExpressCard slot. Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration.
  • Page 27: Appendix B: Windows Xp Wireless Zero Configuration

    Appendix B Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the ExpressCard, instead of using the Wireless Network Monitor, then right-click the Wireless Network Monitor icon, and select Use Windows XP Wireless Configuration.
  • Page 28 Appendix B Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active. Wireless Network Connection For more information about wireless networking on a Windows XP computer, click Start >...
  • Page 29: Appendix C: Specifications

    Appendix C Appendix C: Specifications Model WEC600N Standards Draft IEEE 802.11n, IEEE 802.11g, IEEE 802.11b, IEEE 802.11a LEDs Power, Link/Act # of Antennas 2 Antennas Detachable (Y/N) Modulations 802.11a: OFDM 802.11b: CCK, QPSK, BPSK 802.11g: OFDM 802.11n: BPSK, QPSK, 16-QAM,...
  • Page 30: Appendix D: Warranty Information

    Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: One (1) year for new product •...
  • Page 31 Warranty Information Appendix D rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 32: Appendix E: Regulatory Information

    Appendix E Appendix E: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 33: Restrictions In The 5 Ghz Band

    Appendix E Industry Canada Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
  • Page 34: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
  • Page 35 Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
  • Page 36 Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
  • Page 37 Appendix E Português (Portuguese) - Informação ambiental para clientes da União Europeia A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
  • Page 38: Appendix F: Software License Agreement

    License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- Linksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community.
  • Page 39 Appendix F used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the...
  • Page 40 Appendix F freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
  • Page 41 Appendix F If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
  • Page 42 Appendix F If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 43 Appendix F This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.openssl.org/source/license.html.
  • Page 44 Appendix F The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...

Table of Contents