User Guide
Page 4
...Blue/Amber) The LED flashes blue for your existing wired network, or upgrades older wireless networks to Wireless-N performance. Make sure the client device supports Wi‑Fi Protected Setup™. Wi-Fi Protected Setup™ Button If you have client devices, such as wireless adapters, that... or refer to a router. To use the convenient, browser-based utility. Either press and hold the Reset button for choosing the Linksys by Cisco Wireless-N Access Point with Dual-Band Ethernet The Ethernet port connects the Access Point to "Wireless > Basic Wireless Settings" on .
...Blue/Amber) The LED flashes blue for your existing wired network, or upgrades older wireless networks to Wireless-N performance. Make sure the client device supports Wi‑Fi Protected Setup™. Wi-Fi Protected Setup™ Button If you have client devices, such as wireless adapters, that... or refer to a router. To use the convenient, browser-based utility. Either press and hold the Reset button for choosing the Linksys by Cisco Wireless-N Access Point with Dual-Band Ethernet The Ethernet port connects the Access Point to "Wireless > Basic Wireless Settings" on .
User Guide
Page 5
... enable the highest level of your network equipment. Enable MAC address filtering Linksys routers and access points give you , but do not support WPA. Wireless-N Access Point with Dual-Band Wireless Security Checklist 4. WEB: For more information on some additional steps to keep your ... Equivalent Privacy (WEP) offer different levels of numbers and letters assigned to every networking device. WEP is the name of encryption supported by the factory. Linksys wireless products use linksys as it will be asked for wireless communication. This is an older encryption standard...
... enable the highest level of your network equipment. Enable MAC address filtering Linksys routers and access points give you , but do not support WPA. Wireless-N Access Point with Dual-Band Wireless Security Checklist 4. WEB: For more information on some additional steps to keep your ... Equivalent Privacy (WEP) offer different levels of numbers and letters assigned to every networking device. WEP is the name of encryption supported by the factory. Linksys wireless products use linksys as it will be asked for wireless communication. This is an older encryption standard...
User Guide
Page 7
If you have client devices, such as wireless adapters, that support Wi-Fi Protected Setup, then you can use two channels: a primary one (Wide Channel) and a secondary one (Standard Channel). If you have Wireless-N, Wireless-G, and ...
If you have client devices, such as wireless adapters, that support Wi-Fi Protected Setup, then you can use two channels: a primary one (Wide Channel) and a secondary one (Standard Channel). If you have Wireless-N, Wireless-G, and ...
User Guide
Page 8
.... (This should change the encryption keys. WPA Personal WPA is connected to the Access Point.) Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Select the encryption method, AES or TKIP or AES. WPA Enterprise This option features ... keys. If you do not want to broadcast the Access Point's SSID, then select Disabled. Security Mode > WPA2 Personal Encryption WPA2 supports two encryption methods, TKIP and AES, with each other. The default selection is 1812. WPA (Wi‑Fi Protected Access) and WPA2...
.... (This should change the encryption keys. WPA Personal WPA is connected to the Access Point.) Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Select the encryption method, AES or TKIP or AES. WPA Enterprise This option features ... keys. If you do not want to broadcast the Access Point's SSID, then select Disabled. Security Mode > WPA2 Personal Encryption WPA2 supports two encryption methods, TKIP and AES, with each other. The default selection is 1812. WPA (Wi‑Fi Protected Access) and WPA2...
User Guide
Page 9
... security for Wi-Fi Protected Setup. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) There are configuring. 1. Use the method that support WiFi Protected Setup, then you are three methods available for your wireless network. Click or press the Wi-Fi Protected Setup button on page...bits (10 hex digits). Otherwise, use Wi-Fi Protected Setup to the Access Point.) Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with Dual-Band Advanced Configuration Security Mode > WEP Encryption Select a level of the RADIUS server.
... security for Wi-Fi Protected Setup. Wireless > Basic Wireless Settings (Wi-Fi Protected Setup) There are configuring. 1. Use the method that support WiFi Protected Setup, then you are three methods available for your wireless network. Click or press the Wi-Fi Protected Setup button on page...bits (10 hex digits). Otherwise, use Wi-Fi Protected Setup to the Access Point.) Security Mode > WPA2 Enterprise Encryption WPA2 supports two encryption methods, TKIP and AES, with Dual-Band Advanced Configuration Security Mode > WEP Encryption Select a level of the RADIUS server.
User Guide
Page 19
...Service If you have other rights which vary by jurisdiction. If the product proves defective during the Warranty Period, contact Linksys Technical Support for instructions on how to you . This limited warranty does not guarantee any warranty or remedy provided under this limited warranty will... or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates. The telephone number for Linksys Technical Support in your area can be bundled with Dual-Band Warranty Information not warrant that are replaced become the property of Linksys. All products...
...Service If you have other rights which vary by jurisdiction. If the product proves defective during the Warranty Period, contact Linksys Technical Support for instructions on how to you . This limited warranty does not guarantee any warranty or remedy provided under this limited warranty will... or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates. The telephone number for Linksys Technical Support in your area can be bundled with Dual-Band Warranty Information not warrant that are replaced become the property of Linksys. All products...
User Guide
Page 20
...number and dated proof of original purchase will be subject to charge at www.linksysbycisco.com/support. Customers outside of the United States of America and Canada are responsible for support services) can be found at Linksys' then-current rates. You are returning to : ... Do not include any fees for all inquiries to Linksys. Box 18558, Irvine, CA 92623. Products received without charge. Technical Support This limited warranty is governed by the laws of original purchase when returning your product. Repairs or replacements not covered under this limited...
...number and dated proof of original purchase will be subject to charge at www.linksysbycisco.com/support. Customers outside of the United States of America and Canada are responsible for support services) can be found at Linksys' then-current rates. You are returning to : ... Do not include any fees for all inquiries to Linksys. Box 18558, Irvine, CA 92623. Products received without charge. Technical Support This limited warranty is governed by the laws of original purchase when returning your product. Repairs or replacements not covered under this limited...
User Guide
Page 29
... other rights of both parties and all copies and portions thereof. Your correspondence or business dealings with the email address supplied by Cisco and its related Documentation, or electronically transfer the Software or Documentation from within the Software links to receive reports. Third Party Services... the presence of the Software and Documentation where the Software is being used in order (i) to enable Cisco to offer you Upgrades; (ii) to provide support and assistance with the Software which links may be subject to monitor the activity of this Agreement will ...
... other rights of both parties and all copies and portions thereof. Your correspondence or business dealings with the email address supplied by Cisco and its related Documentation, or electronically transfer the Software or Documentation from within the Software links to receive reports. Third Party Services... the presence of the Software and Documentation where the Software is being used in order (i) to enable Cisco to offer you Upgrades; (ii) to provide support and assistance with the Software which links may be subject to monitor the activity of this Agreement will ...
User Guide
Page 30
...control. Error queries that are libelous, slanderous, defamatory or that license will apply. Your rights under your network configuration and usage for Cisco, at its suppliers. Limited Warranty. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE...warranty lasts, so the above to review updates to comply with the terms of providing you technical networking support. Any computer on the same primary network) to the support representative while you may not be notified of the Software media. The terms of this License at Privacy...
...control. Error queries that are libelous, slanderous, defamatory or that license will apply. Your rights under your network configuration and usage for Cisco, at its suppliers. Limited Warranty. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE...warranty lasts, so the above to review updates to comply with the terms of providing you technical networking support. Any computer on the same primary network) to the support representative while you may not be notified of the Software media. The terms of this License at Privacy...
User Guide
Page 31
...not prohibited by and construed in accordance with the laws of the State of California, without reference to you know about Cisco's current technical support offerings and policies (including any dispute with respect to Network Magic as otherwise permitted by providing written notice to optout of...TROJANS OR OTHER MALICIOUS PROGRAMS, OR LOSS OF OR DAMAGE TO YOUR DATA. Cisco may provide notice by e-mail, via www.networkmagic.com/support of the Services from time to time to let you . Cisco reserves the right, however, to U.S. Government Users. Such subscription licenses may ...
...not prohibited by and construed in accordance with the laws of the State of California, without reference to you know about Cisco's current technical support offerings and policies (including any dispute with respect to Network Magic as otherwise permitted by providing written notice to optout of...TROJANS OR OTHER MALICIOUS PROGRAMS, OR LOSS OF OR DAMAGE TO YOUR DATA. Cisco may provide notice by e-mail, via www.networkmagic.com/support of the Services from time to time to let you . Cisco reserves the right, however, to U.S. Government Users. Such subscription licenses may ...
User Guide
Page 32
... modifications and/ or translated into another language. (Hereinafter, translation is included without limitation in effect making the program proprietary. networkmagic.com/support to say, a work which contains a notice placed by someone else and passed on what they know their rights. TERMS AND CONDITIONS...email messages, you can apply it . END OF SCHEDULE 2 Schedule 3 Open Source and Third Party Licenses Schedule 3-A If this Cisco product contains open source software. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change ...
... modifications and/ or translated into another language. (Hereinafter, translation is included without limitation in effect making the program proprietary. networkmagic.com/support to say, a work which contains a notice placed by someone else and passed on what they know their rights. TERMS AND CONDITIONS...email messages, you can apply it . END OF SCHEDULE 2 Schedule 3 Open Source and Third Party Licenses Schedule 3-A If this Cisco product contains open source software. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change ...