There are two screws that attach the PCI board to its standard-sized bracket. Remove both screws. Product Overview Thank you for choosing the Linksys by Cisco Wireless-N PCI Adapter with Dual-Band. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer.
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings.
Page 7
Advanced Configuration Chapter 3 To connect to a wireless network, go to How to Connect to Checking Connection screen appears while the a Wireless Network, page 4. To disconnect from a wireless Wireless Manager establishes the wireless connection. network, select the network, and click Disconnect. To When it is finished, click Next.
Page 8
Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: If your wireless network is NOT hidden, select My network is not hidden, and then click Next. Follow the instructions on the next NOTE: By default, a wireless network’s router screen—verify that your network router is broadcasts the network name (SSID).
Page 9
Advanced Configuration Chapter 3 How to Connect Using Wi-Fi Protected Setup Checking Connection screen appears. On the Connect to a Wireless Network screen, the Wi-Fi Protected Setup icon ( ) indicates a network that supports Wi-Fi Protected Setup. Follow these instructions to connect to a wireless network using Wi-Fi Protected Setup.
Page 10
Advanced Configuration Chapter 3 The Adapter connects to the network. Enter the Adapter’s PIN Number Connecting to the Network via Wi-Fi Protected Setup Enter the PIN Number Access the web-based utility of the router. (Refer to the NOTE: If the connection cannot be set up, the router’s documentation for instructions.) message, “Registration failed”...
Advanced Configuration Chapter 3 Saved Networks How to Connect to a Saved Network To connect to a saved network, follow these instructions. When you connect to a wireless network, you can save its settings so that it will be easier to reconnect to the network In the Connect to a Wireless Network screen, select at a later time.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the PCI slot. The Adapter does not work properly. Power down the computer. Remove the Adapter. Reinsert the Adapter into the computer’s PCI slot. Power on the computer.
Windows Vista Configuration Appendix B Appendix B: Select your network, and then click Connect. Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon If your network has wireless security, go to step 5.
Page 14
Windows Vista Configuration Appendix B Enter the security key, WEP key, or passphrase (also This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
Page 15
Windows Vista Configuration Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
Windows XP Wireless Zero Configuration Appendix C Appendix C: New Wireless Connection Windows XP Wireless Zero After installing the Adapter, the Windows XP Wireless Zero Configuration icon appears in your computer’s Configuration system tray. Double-click the icon. Windows XP Wireless Zero Configuration NOTE: If you have WPA2 wireless security, refer Windows XP Wireless Zero Configuration Icon...
Page 17
Windows XP Wireless Zero Configuration Appendix C If your network uses WEP wireless security, enter the WEP Key in the Network Key and Confirm network key fields. If your network uses WPA Personal wireless security, enter the Passphrase in the Network Key and Confirm network key fields.
Warranty Information Appendix E Appendix E: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
Warranty Information Appendix E rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix F Appendix F: The availability of some specific channels and/or operational frequency bands is country dependent Regulatory Information and is firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This device complies with Part 15 of the FCC Rules.
Regulatory Information Appendix F regulations of Industry Canada. The required antenna Cet appareil est conçu pour fonctionner avec une impedance is 50 ohms. antenne ayant un gain maximum de 2,0 dBi. Industrie Canada interdit d’utiliser une antenne ayant un gain The maximum antenna gain (please see the supérieur.
Regulatory Information Appendix F User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
Page 24
Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 25
Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 26
Regulatory Information Appendix F Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
Page 28
Software License Agreement Appendix G your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
Page 29
Software License Agreement Appendix G GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
Page 30
Software License Agreement Appendix G If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 31
Software License Agreement Appendix G limited to patent issues), conditions are imposed on may choose any version ever published by the Free you (whether by court order, agreement or otherwise) Software Foundation. that contradict the conditions of this License, they do If you wish to incorporate parts of the Program into not excuse you from the conditions of this License.
Page 32
Software License Agreement Appendix G Copyright (C) 1991, 1999 Free Software Foundation, Inc. library is modified by someone else and passed on, the recipients should know that what they have is not the 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, original version, so that the original author’s reputation will not be affected by problems that might be introduced Everyone is permitted to copy and distribute verbatim...
Page 33
Software License Agreement Appendix G The precise terms and conditions for copying, distribution You may charge a fee for the physical act of transferring and modification follow. Pay close attention to the a copy, and you may at your option offer warranty difference between a “work based on the library”...
Page 34
Software License Agreement Appendix G a work based on the Library) on a volume of a If such an object file uses only numerical parameters, storage or distribution medium does not bring the data structure layouts and accessors, and small macros other work under the scope of this License.
Page 35
Software License Agreement Appendix G Accompany the work with a written offer, valid You are not required to accept this License, since you for at least three years, to give the same user the have not signed it. However, nothing else grants you materials specified in Subsection 6a, above, for a permission to modify or distribute the Library or its charge no more than the cost of performing this...
Page 36
Software License Agreement Appendix G If the distribution and/or use of the Library is restricted BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING in certain countries either by patents or by copyrighted RENDERED INACCURATE OR LOSSES SUSTAINED BY interfaces, the original copyright holder who places YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY the Library under this License may add an explicit...
Page 37
Software License Agreement Appendix G The names “OpenSSL Toolkit” and “OpenSSL Project” program startup or in documentation (online or textual) must not be used to endorse or promote products provided with the package. derived from this software without prior written Redistribution and use in source and binary forms, with permission.