Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Dual-Band Wireless-N USB Network Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
3. Enable MAC address filtering WEB: For more information on wireless Linksys routers give you the ability to enable Media Access security, visit www.linksys.com/security Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
Page 7
Advanced Configuration Chapter 3 Push Button (Recommended) Select this option to use Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click the push button method. Exit to exit the Monitor. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router.
Page 8
Advanced Configuration Chapter 3 On the Adapter’s PIN number screen, click Next. Congratulations! The Adapter is connected to the network. Wireless Network Status The Wireless Network Status screen provides information on your current network settings. Enter the PIN Number The Adapter connects to the network. Wireless Network Status Radio Band This is the radio band used on the network.
Advanced Configuration Chapter 3 Back Click Back to return to the initial Status screen. Up Time This indicates the length of the most recent connection to a wireless network. Save to Profile Click Save to Profile to save the currently Total Up Time active connection settings to a profile.
Page 10
Advanced Configuration Chapter 3 Security This is the security method used by the Congratulations! The Adapter is connected to the network. network. Wi-Fi Protected Setup Click the Wi-Fi Protected Setup Wireless Security Enabled button to connect to a router that supports Wi-Fi If you connect to a network whose wireless security is Protected Setup.
Page 11
The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
Page 12
Advanced Configuration Chapter 3 Use the Push Button Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Use the Push Button Press the Wi-Fi Protected Setup button on the Congratulations router.
Page 13
Advanced Configuration Chapter 3 On the Adapter’s PIN number screen, click Next. Congratulations! The Adapter is connected to the network. Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Enter the PIN Number The Adapter connects to the network.
Page 14
The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. WPA2-Personal Security (For non-Linksys wireless products, enter the WEP key Passphrase Enter the network’s Passphrase (also...
Advanced Configuration Chapter 3 Profiles Export Select the profile you want to save in a different location, and click Export. Direct Windows to the The Profiles screen lets you save different configuration appropriate folder, and click Save. profiles for different network setups. The table on the left Delete Select the profile you want to delete and click displays a list of available profiles with their profile names...
Page 16
Advanced Configuration Chapter 3 No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: WPA2-Personal Security Passphrase...
Page 17
Push Button (Recommended) Select this option to use and is compatible with Linksys wireless products only. the push button method. (For non-Linksys wireless products, enter the WEP key manually.) Use Adapter’s PIN number...
Page 18
Advanced Configuration Chapter 3 Use the Push Button Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Use the Push Button Press the Wi-Fi Protected Setup button on the Congratulations router.
Page 19
Advanced Configuration Chapter 3 Enter the Adapter’s PIN Number The Adapter connects to the network. Connecting to the Network Enter the PIN Number Print to print out your wireless network settings. Click Access the web-based utility of the router. (Refer to the Then click Finish to return to the Status screen, or click router’s documentation for instructions.) Exit to exit the Monitor.
Page 20
Advanced Configuration Chapter 3 Enter Key Manually Wireless Security Enabled If you connect to a network whose wireless security is Proceed to the appropriate section, “Wireless Security enabled, then you will view one of three screens. Disabled” or “Wireless Security Enabled”. Proceed to the appropriate instructions.
Page 21
It must match the Network Settings screen appears. passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the appropriate number of hexadecimal characters (“0”...
Page 22
Advanced Configuration Chapter 3 Default Gateway Enter the IP address of your – network’s Gateway. DNS 1 and DNS 2 Enter the DNS address of your – wired Ethernet network. Click Next to continue, or click Back to return to the previous screen.
Page 23
Click Next to continue, or click Back to return to the This passphrase must match the passphrase of your other previous screen. wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys WPA2 Personal...
Page 24
Advanced Configuration Chapter 3 WPA Enterprise PEAP WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Page 25
Advanced Configuration Chapter 3 EAP-TLS Certificate Select the certificate you installed to authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any. Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue, or click Back to return to the previous screen.
Page 26
Advanced Configuration Chapter 3 PEAP Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Status screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. RADIUS - PEAP If you selected PEAP, configure the following: Login Name...
Make sure that the Adapter is configured with the same Wireless Network Name (SSID) and wireless security settings as the other wireless computers in the Infrastructure configuration. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Dual-Band Wireless-N USB Network Adapter...
Windows Vista Configuration Appendix B Appendix B: Select your network, and then click Connect. Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon If your network has wireless security, go to step 5.
Page 29
Windows Vista Configuration Appendix B Enter the security key, WEP key, or passphrase (also This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
Page 30
Windows Vista Configuration Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select If your network does not have wireless security enabled, Use Linksys Wireless Network Monitor. click Connect Anyway to connect the Adapter to your network.
Page 32
Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
Page 35
This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Dual-Band Wireless-N USB Network Adapter...
Regulatory Information Appendix F Appendix F: The availability of some specific channels and/or operational frequency bands are country dependent Regulatory Information and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This equipment has been tested and found to comply...
Regulatory Information Appendix F Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Cet appareil numérique de la classe B est conforme à la data throughput rate, range and coverage.
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 39
Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 40
Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 41
ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Dual-Band Wireless-N USB Network Adapter...
Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to BY DOWNLOADING OR INSTALLING THE SOFTWARE, (a) the software of Linksys or its suppliers provided in or OR USING THE PRODUCT CONTAINING THE SOFTWARE, with the applicable Linksys product, excluding technology...
Page 43
Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
Page 44
Software License Agreement Appendix G GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
Page 45
Software License Agreement Appendix G If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 46
General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
Page 47
Software License Agreement Appendix G GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 48
Software License Agreement Appendix G freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
Page 49
Software License Agreement Appendix G Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
Page 50
Software License Agreement Appendix G Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
Page 51
If you wish to incorporate parts of the Library into other free programs whose distribution conditions are If this Linksys product contains open source software incompatible with these, write to the author to ask for licensed under the OpenSSL license: permission.
Page 53
Software License Agreement Appendix G DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.