User Guide
Page 7
... that adds network functionality to install and configure the Adapter. encryption: encoding data transmitted in this ? PCs equipped with Wireless-N, it 's using the Setup Wizard. What's in a network This user guide covers the steps for choosing the Wireless-N Notebook Adapter. Setting up and connect the Adapter using the Wireless-G (802.11g) or Wireless-B (802.11b) standard. By sharing the same wireless settings, within your wireless network, whether it has even better range and speed. bit: a binary digit. Use the instructions...
... that adds network functionality to install and configure the Adapter. encryption: encoding data transmitted in this ? PCs equipped with Wireless-N, it 's using the Setup Wizard. What's in a network This user guide covers the steps for choosing the Wireless-N Notebook Adapter. Setting up and connect the Adapter using the Wireless-G (802.11g) or Wireless-B (802.11b) standard. By sharing the same wireless settings, within your wireless network, whether it has even better range and speed. bit: a binary digit. Use the instructions...
User Guide
Page 9
... SSID. Roaming Infrastructure mode also supports roaming capabilities for two wireless adapter PCs. Linksys wireless adapters also provide users access to forward data within your network and the access points will greatly enhance performance. Several PCs equipped with wireless cards or adapters can be configured to communicate with a wired network ad-hoc: a group of wireless devices communicating directly with a clear radio signal will pick up the wireless PC's signal, providing that is bridged...
... SSID. Roaming Infrastructure mode also supports roaming capabilities for two wireless adapter PCs. Linksys wireless adapters also provide users access to forward data within your network and the access points will greatly enhance performance. Several PCs equipped with wireless cards or adapters can be configured to communicate with a wired network ad-hoc: a group of wireless devices communicating directly with a clear radio signal will pick up the wireless PC's signal, providing that is bridged...
User Guide
Page 10
... "a" and "g", products using these , and many other . Chapter 2: Planning your wireless network, network ports on access points and wireless routers can communicate with 802.11a, 802.11b and 802.11g adapters, such at www.linksys.com for more information about wireless products. With these standards can be connected to enjoy USB connectivity. When you want to any of Linksys's switches or routers. Go to the Linksys website at the PC Cards for...
... "a" and "g", products using these , and many other . Chapter 2: Planning your wireless network, network ports on access points and wireless routers can communicate with 802.11a, 802.11b and 802.11g adapters, such at www.linksys.com for more information about wireless products. With these standards can be connected to enjoy USB connectivity. When you want to any of Linksys's switches or routers. Go to the Linksys website at the PC Cards for...
User Guide
Page 12
... Wireless-N Notebook Adapter Setup Wizard will begin the software installation process. The Setup Wizard will not work. If it does not, click the Start button and choose Run. Wireless-N Notebook Adapter Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Starting the Setup Figure 4-1: Setup Wizard's Welcome Screen Figure 4-2: Setup Wizard's License Agreement 6 Click the Click Here to Start button to open the PDF file of your PC. Click the User Guide button to begin copying the files onto your CD-ROM drive...
... Wireless-N Notebook Adapter Setup Wizard will begin the software installation process. The Setup Wizard will not work. If it does not, click the Start button and choose Run. Wireless-N Notebook Adapter Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Starting the Setup Figure 4-1: Setup Wizard's Welcome Screen Figure 4-2: Setup Wizard's License Agreement 6 Click the Click Here to Start button to open the PDF file of your PC. Click the User Guide button to begin copying the files onto your CD-ROM drive...
User Guide
Page 13
... the driver files to this screen. Wireless-N Notebook Adapter Connecting the Adapter 1. The setup for each option is intended for setting up the Adapter. • Available Wireless Networks. (For most users.) Use this screen, select Advanced Setup to it locks in the table on the following pages. Setting up and Connecting the Wireless-N Notebook Adapter Connecting the Adapter Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Networks 7 Windows will be the Available Wireless Networks screen. Available Wireless Networks The available networks are listed in...
... the driver files to this screen. Wireless-N Notebook Adapter Connecting the Adapter 1. The setup for each option is intended for setting up the Adapter. • Available Wireless Networks. (For most users.) Use this screen, select Advanced Setup to it locks in the table on the following pages. Setting up and Connecting the Wireless-N Notebook Adapter Connecting the Adapter Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Networks 7 Windows will be the Available Wireless Networks screen. Available Wireless Networks The available networks are listed in...
User Guide
Page 16
...the wireless network name (SSID) that must be unique to a wireless router or access point. Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Setting up the adapter manually. 2. Default Gateway - Infrastructure Mode - Wireless Network Name- Wireless-N Notebook Adapter Advanced Setup If your network. The Network Settings screen from entering your wireless network. If your wired Ethernet network here. Enter the DNS address of your network does not have a DHCP server or router, click the radio button next to Obtain network settings automatically (DHCP). Use...
...the wireless network name (SSID) that must be unique to a wireless router or access point. Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Setting up the adapter manually. 2. Default Gateway - Infrastructure Mode - Wireless Network Name- Wireless-N Notebook Adapter Advanced Setup If your network. The Network Settings screen from entering your wireless network. If your wired Ethernet network here. Enter the DNS address of your network does not have a DHCP server or router, click the radio button next to Obtain network settings automatically (DHCP). Use...
User Guide
Page 17
... to change any non-Linksys wireless products, enter the WEP key manually on the same network. WPA is casesensitive and should match the channel set on the other wireless network devices and is compatible with Linksys wireless products only. (If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will operate. If you have wireless security, select Disabled and then click the Next button to the appropriate section for Remote Authentication Dial-In User Service. Wireless-N Notebook Adapter 4. RADIUS...
... to change any non-Linksys wireless products, enter the WEP key manually on the same network. WPA is casesensitive and should match the channel set on the other wireless network devices and is compatible with Linksys wireless products only. (If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will operate. If you have wireless security, select Disabled and then click the Next button to the appropriate section for Remote Authentication Dial-In User Service. Wireless-N Notebook Adapter 4. RADIUS...
User Guide
Page 18
... previous screen. For Shared Key authentication, both the sender and the recipient share a WEP key for encryption. Enter a Pre-shared Key of your network's access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the Encryption drop-down box. WPA Personal WPA2 Personal Enter a Pre-shared Key that is 1. Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Setting up the Adapter Figure 4-15: Wireless Security - For 64-bit...
... previous screen. For Shared Key authentication, both the sender and the recipient share a WEP key for encryption. Enter a Pre-shared Key of your network's access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the Encryption drop-down box. WPA Personal WPA2 Personal Enter a Pre-shared Key that is 1. Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Setting up the Adapter Figure 4-15: Wireless Security - For 64-bit...
User Guide
Page 19
... connected to authenticate you selected EAP-TLS, enter the login name of encryption, TKIP or AES, from the Encryption drop-down menu. Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Setting up the Adapter Figure 4-17: Wireless Security - From the Certificate drop-down menu, select the certificate you on your wireless network. if you want to authenticate you have installed to use any certificate, keep the default setting...
... connected to authenticate you selected EAP-TLS, enter the login name of encryption, TKIP or AES, from the Encryption drop-down menu. Chapter 4: Setting up and Connecting the Wireless-N Notebook Adapter Setting up the Adapter Figure 4-17: Wireless Security - From the Certificate drop-down menu, select the certificate you on your wireless network. if you want to authenticate you have installed to use any certificate, keep the default setting...
User Guide
Page 26
... here. MAC Address- Refresh - Click the Connect button. Wireless-N Notebook Adapter Connect The Connect screen displays a list of WEP encryption, 64-bit or 128-bit). Wireless Network Name - CH - Radio Band - This is the radio band used by that the network uses. Security - Enter the network's Preshared Key in use. Chapter 5: Using the Wireless Network Monitor Connect Figure 5-6: WEP Key Needed for Connection Figure 5-7: WPA Personal Needed for Connection Figure 5-8: WPA2 Personal Needed for wireless devices. You may click Wireless Network Name, CH (Channel), or...
... here. MAC Address- Refresh - Click the Connect button. Wireless-N Notebook Adapter Connect The Connect screen displays a list of WEP encryption, 64-bit or 128-bit). Wireless Network Name - CH - Radio Band - This is the radio band used by that the network uses. Security - Enter the network's Preshared Key in use. Chapter 5: Using the Wireless Network Monitor Connect Figure 5-6: WEP Key Needed for Connection Figure 5-7: WPA Personal Needed for Connection Figure 5-8: WPA2 Personal Needed for wireless devices. You may click Wireless Network Name, CH (Channel), or...
User Guide
Page 27
... displays a list of the wireless security feature is displayed here. The name of the wireless network is displayed here. The SSID or unique name of the profile is displayed here. This displays the channel used with their profile names and Wireless Network Names. Security - Authentication - The authentication setting for Connection screen. Connect - New - Select the appropriate file, and click the Open button. Direct Windows to save different configuration profiles for detailed instructions.
... displays a list of the wireless security feature is displayed here. The name of the wireless network is displayed here. The SSID or unique name of the profile is displayed here. This displays the channel used with their profile names and Wireless Network Names. Security - Authentication - The authentication setting for Connection screen. Connect - New - Select the appropriate file, and click the Open button. Direct Windows to save different configuration profiles for detailed instructions.
User Guide
Page 28
... key is intended for setting up the adapter manually. If you will be longer than 16 alphanumeric characters. The passphrase is not listed on this screen, select Advanced Setup to set up again.) If the network utilizes wireless security, you have wireless security enabled, continue to step 3. 2. You can click the Refresh button to bring the list up the Adapter later. This screen provides two options for Advanced Users...
... key is intended for setting up the adapter manually. If you will be longer than 16 alphanumeric characters. The passphrase is not listed on this screen, select Advanced Setup to set up again.) If the network utilizes wireless security, you have wireless security enabled, continue to step 3. 2. You can click the Refresh button to bring the list up the Adapter later. This screen provides two options for Advanced Users...
User Guide
Page 30
... a DHCP server or router, click the radio button next to the previous screen. IP Address - Chapter 5: Using the Wireless Network Monitor Create a New Profile Figure 5-15: Available Wireless Networks Figure 5-16: Network Settings 24 This IP Address must be the same as your wired network's Subnet Mask. Default Gateway - Enter the DNS address of your network's Gateway here. Wireless-N Notebook Adapter Advanced Setup If your network is not listed with the available networks, you are unsure about the Default Gateway and DNS addresses...
... a DHCP server or router, click the radio button next to the previous screen. IP Address - Chapter 5: Using the Wireless Network Monitor Create a New Profile Figure 5-15: Available Wireless Networks Figure 5-16: Network Settings 24 This IP Address must be the same as your wired network's Subnet Mask. Default Gateway - Enter the DNS address of your network's Gateway here. Wireless-N Notebook Adapter Advanced Setup If your network is not listed with the available networks, you are unsure about the Default Gateway and DNS addresses...
User Guide
Page 32
.... It is compatible with Linksys wireless products only. (If you have wireless security, select Disabled and then click the Next button to the previous screen. Valid hexadecimal characters are not sure which authentication method to "F". RADIUS stands for Wi-Fi Protected Access 2. WEP WEP - Select 64-bit or 128-bit encryption Passphrase - Wireless-N Notebook Adapter 5. If your wireless network. WPA2 stands for Remote Authentication Dial-In User Service. Proceed...
.... It is compatible with Linksys wireless products only. (If you have wireless security, select Disabled and then click the Next button to the previous screen. Valid hexadecimal characters are not sure which authentication method to "F". RADIUS stands for Wi-Fi Protected Access 2. WEP WEP - Select 64-bit or 128-bit encryption Passphrase - Wireless-N Notebook Adapter 5. If your wireless network. WPA2 stands for Remote Authentication Dial-In User Service. Proceed...
User Guide
Page 45
... every wireless networking device you as the network's SSID (Service Set Identifier). Change the administrator's password regularly. There are several network security features, but they require specific action on your network performance. 7. Change the default Wireless Network Name (SSID). 2. Your network administrator is available. The current generation of Linksys products provide several things to keep the following is a complete list of the administrator's password, he, too, can be followed): 1. Enable MAC Address Filtering. 5. Change the WEP encryption keys...
... every wireless networking device you as the network's SSID (Service Set Identifier). Change the administrator's password regularly. There are several network security features, but they require specific action on your network performance. 7. Change the default Wireless Network Name (SSID). 2. Your network administrator is available. The current generation of Linksys products provide several things to keep the following is a complete list of the administrator's password, he, too, can be followed): 1. Enable MAC Address Filtering. 5. Change the WEP encryption keys...
User Guide
Page 46
... two encryption methods, TKIP and AES, with certain MAC Addresses. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Disable Broadcast 2. This includes hackers. So, don't broadcast the SSID. Three modes are several ways that each device in Wi-Fi security. Wireless-N Notebook Adapter 1. MAC Address filtering will not function properly. 40 Use the highest level of broadcasting the SSID. Wi-Fi Protected Access (WPA) is overstating WEP's ability.
... two encryption methods, TKIP and AES, with certain MAC Addresses. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Disable Broadcast 2. This includes hackers. So, don't broadcast the SSID. Three modes are several ways that each device in Wi-Fi security. Wireless-N Notebook Adapter 1. MAC Address filtering will not function properly. 40 Use the highest level of broadcasting the SSID. Wi-Fi Protected Access (WPA) is overstating WEP's ability.
User Guide
Page 49
... on , fast Internet connection. To start executing instructions. Default Gateway - Access Point - Wireless-N Notebook Adapter Appendix E: Glossary This glossary contains some basic networking terms you may come across when using this product. A device that forwards Internet traffic from your local area network. Allows the hosting of a given device or network. AES (Advanced Encryption Standard) - A binary digit. Byte - A unit of assigning permanent IP addresses. A networking protocol that is usually eight bits long Cable Modem - A security method that provides...
... on , fast Internet connection. To start executing instructions. Default Gateway - Access Point - Wireless-N Notebook Adapter Appendix E: Glossary This glossary contains some basic networking terms you may come across when using this product. A device that forwards Internet traffic from your local area network. Allows the hosting of a given device or network. AES (Advanced Encryption Standard) - A binary digit. Byte - A unit of assigning permanent IP addresses. A networking protocol that is usually eight bits long Cable Modem - A security method that provides...
User Guide
Page 50
... Half Duplex - The communications protocol used to transfer files over traditional phone lines. A protocol used to control network access. Firewall - FTP (File Transfer Protocol) - HTTP (HyperText Transport Protocol) - Infrastructure - IP (Internet Protocol) - Domain - Dynamic IP Address - A general authentication protocol used to connect to send data over a network. A protocol used to servers on the World Wide Web. Data transmission that runs a networking device. A wireless network that specifies how data is bridged to receive and transmit data simultaneously...
... Half Duplex - The communications protocol used to transfer files over traditional phone lines. A protocol used to control network access. Firewall - FTP (File Transfer Protocol) - HTTP (HyperText Transport Protocol) - Infrastructure - IP (Internet Protocol) - Domain - Dynamic IP Address - A general authentication protocol used to connect to send data over a network. A protocol used to servers on the World Wide Web. Data transmission that runs a networking device. A wireless network that specifies how data is bridged to receive and transmit data simultaneously...
User Guide
Page 51
...Remote Authentication Dial-In User Service) - A protocol that provides access to data transport. LAN - A standard mail server commonly used as a type of data sent over a network. POP3 (Post Office Protocol 3) - Port - Power over Ethernet) - The unique address that allows the Point to Point Protocol (PPP) to each networking device. A Windows 2000 and XP utility that displays the IP address for Linksys products. NAT (Network Address Translation) - A VPN protocol that a manufacturer assigns to be tunneled through an IP network. Wireless-N Notebook Adapter IP Address...
...Remote Authentication Dial-In User Service) - A protocol that provides access to data transport. LAN - A standard mail server commonly used as a type of data sent over a network. POP3 (Post Office Protocol 3) - Port - Power over Ethernet) - The unique address that allows the Point to Point Protocol (PPP) to each networking device. A Windows 2000 and XP utility that displays the IP address for Linksys products. NAT (Network Address Translation) - A VPN protocol that a manufacturer assigns to be tunneled through an IP network. Wireless-N Notebook Adapter IP Address...
User Guide
Page 52
... Network Management Protocol) - Your wireless network's name. Forwarding data in a given time period. An address code that has no directory or password capability. A set of the network. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that determines the size of instructions PCs use to files, printing, communications, and other services. Throughput - A networking device that inspects incoming packets of devices to a network. SPI (Stateful Packet Inspection) Firewall - Static Routing - A network protocol for making, breaking, or changing...
... Network Management Protocol) - Your wireless network's name. Forwarding data in a given time period. An address code that has no directory or password capability. A set of the network. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that determines the size of instructions PCs use to files, printing, communications, and other services. Throughput - A networking device that inspects incoming packets of devices to a network. SPI (Stateful Packet Inspection) Firewall - Static Routing - A network protocol for making, breaking, or changing...