Linksys WMP300N User Manual

Linksys WMP300N User Manual

Wireless-n pci adapter
Hide thumbs Also See for WMP300N:

Advertisement

USER GUIDE
Wireless-N PCI Adapter
WMP300N (EU)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WMP300N

  • Page 1 USER GUIDE Wireless-N PCI Adapter WMP300N (EU) Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview The PCI Card..........1 The Antenna Stand .
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: The PCI Card Product Overview The Adapter’s connectors attach the antenna stand’s cables to the PCI card of the Adapter. The Linksys Wireless-N PCI Adapter installs in most desktop and tower PCs, and lets you put your computer almost anywhere in the building without the cost and hassle of running network cables.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Configuration

    Configuration Chapter 3 Chapter 3: After reading the License Agreement, click the Next button if you agree and want to continue the Configuration installation, or click the Cancel button to end the installation. The Wireless-N PCI Adapter Setup Wizard will guide you through the installation procedure.
  • Page 7: Setting Up The Adapter

    Configuration Chapter 3 Slide the Adapter into the PCI slot. Make sure that all Click Back to close the Setup Wizard, if you wish to set up of its pins are touching the slot’s contacts. You may the Adapter later. have to apply a bit of pressure to slide the Adapter all Available Wireless Networks the way in.
  • Page 8 Configuration Chapter 3 Then click Connect and proceed to step 3. refer to “Chapter 5: Using the Wireless Network Monitor. ” Congratulations! The installation of the Wireless-N WPA-Personal (Wi-Fi Protected Access) PCI Adapter is complete. If your network has the wireless security WPA-Personal Advanced Setup enabled, this screen will appear.
  • Page 9 Configuration Chapter 3 IP Address This IP Address must be unique to your If you chose Infrastructure Mode, go to step 5 now. network. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Subnet Mask The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask.
  • Page 10 Configuration Chapter 3 WPA2-Personal, WPA Enterprise, WPA2 Enterprise, or Authentication The default is set to Auto, so it will auto- RADIUS. WEP stands for Wired Equivalent Privacy, and detect for Shared Key or Open System authentication. WPA stands for Wi-Fi Protected Access. WPA2 stands For Shared Key authentication, both the sender and the for Wi-Fi Protected Access 2.
  • Page 11 Configuration Chapter 3 WPA2-Personal EAP-TLS Enter a Pre-shared Key that is 8-63 characters in length. If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional).
  • Page 12 Configuration Chapter 3 PEAP EAP-TLS If you selected PEAP, enter the login name of your wireless If you selected EAP-TLS, enter the login name of your network in the Login Name field. Enter the password of wireless network in the Login Name field. Enter the name your wireless network in the Password field.
  • Page 13 Configuration Chapter 3 Click the Next button to continue or the Back button to PEAP return to the previous screen. If you selected PEAP, enter the login name of your wireless RADIUS network in the Login Name field. Enter the password of your wireless network in the Password field.
  • Page 14: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Troubleshooting I can’t connect to the Internet. Verify the proper LEDs are lit on the Adapter. Make sure the Power LED has a steady green light • and is not flashing. Verify the Ethernet LED has a fairly steady green •...
  • Page 15: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WMP300N Standards IEEE 802.11b, IEEE 802.11g, Draft IEEE 802.11n, PCI 2.3 Channels 802.11b / 802.11g / Wireless-N (20MHz) 11 Channels (US, Canada) 13 Channels (Europe) Protocols 802.11b: CCK, QPSK, BPSK 802.11g: OFDM Wireless-N: BPSK, QPSK,...
  • Page 16: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: network on which the product or software is used will be free of vulnerability to intrusion or attack. The product Warranty Information may include or be bundled with third party software or service offerings. This limited warranty shall not apply to such third party software or service offerings.
  • Page 17 Warranty Information Appendix C and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys.
  • Page 18: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Industry Canada Statement Regulatory Information This Class B digital apparatus complies with Canadian ICES-003 and RSS210. Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part interference that may cause undesired operation...
  • Page 19: Wireless Disclaimer

    Regulatory Information Appendix D Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used,...
  • Page 20: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    Regulatory Information Appendix D Declaration of Conformity with Regard to Dit apparaat voldoet aan de essentiele eisen Nederlands EU Directive 1999/5/EC (R&TTE Directive) en andere van toepassing zijnde bepalingen [Dutch]: van de Richtlijn 1999/5/EC. Compliance Information for 2,4-GHz and 5-GHz Wireless Dan l-apparat huwa konformi mal-ħtiġiet Products Relevant to the EU and Other Countries Following Malti...
  • Page 21: Wireless Equipment (Wireless-N/G/A/B Products)

    Regulatory Information Appendix D Wireless Equipment National Restrictions (Wireless-N/G/A/B Products) This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without The following standards were applied during the any limitation except for the countries mentioned below: assessment of the product against the requirements of Ce produit peut être utilisé...
  • Page 22: Product Usage Restrictions

    Regulatory Information Appendix D Product Usage Restrictions France For 2,4 GHz, the product should not be used outdoors This product is designed for indoor usage only. Outdoor in the band 2454 - 2483,5 MHz. There are no restrictions usage is not recommended, unless otherwise noted. when used in other parts of the 2,4 GHz band when used 2,4 GHz Restrictions indoors.
  • Page 23: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 24 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 25 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 26 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 27: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 28 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 29 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 30 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 31 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 32 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 33 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 34 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 35 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 36 Software License Agreement Appendix E software distributed through that system in reliance NO WARRANTY on consistent application of that system; it is up to BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, the author/donor to decide if he or she is willing to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE distribute software through any other system and a EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 37 Software License Agreement Appendix E Original SSLeay License Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All OpenSSL License rights reserved. This package is an SSL implementation written by Eric Copyright ©...
  • Page 38 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents