Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Dual-Band Wireless-N USB Network Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
3. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
Chapter 3 Push Button (Recommended) Select this option to use the push button method. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router. Click Next to continue, or click Back to return to the previous screen.
Page 8
Chapter 3 On the Adapter’s PIN number screen, click Enter the PIN Number The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor.
Chapter 3 Back Click Back to return to the initial Status screen. Save to Profile Click Save to Profile to save the currently active connection settings to a profile. Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your current network settings. Wireless Network Statistics Transmit Rate This is the data transmission rate of...
Chapter 3 Security This is the security method used by the network. Wi-Fi Protected Setup Click the Wi-Fi Protected Setup button to connect to a router that supports Wi-Fi Protected Setup. Refer to the “Wi-Fi Protected Setup” instructions in the “Status” section at the beginning of this chapter.
Page 11
The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
Page 12
Chapter 3 Use the Push Button Use the Push Button Press the Wi-Fi Protected Setup button on the router. Within two minutes, click the Wi-Fi Protected Setup button on this screen. The Adapter connects to the network. Connecting to the Network Dual-Band Wireless-N USB Network Adapter Advanced Configuration Print to print out your wireless network settings.
Page 13
Chapter 3 On the Adapter’s PIN number screen, click Enter the PIN Number The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor.
Page 14
The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
Chapter 3 Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and wireless network names. Profiles Profile This is the name of the profile. Wireless Network Name This is the SSID or unique name of the wireless network.
Page 16
Chapter 3 No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Click Connect Anyway Click...
Page 17
The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
Page 18
Chapter 3 Use the Push Button Use the Push Button Press the Wi-Fi Protected Setup button on the router. Within two minutes, click the Wi-Fi Protected Setup button on this screen. The Adapter connects to the network. Connecting to the Network Dual-Band Wireless-N USB Network Adapter Advanced Configuration Print to print out your wireless network settings.
Page 19
Chapter 3 Enter the Adapter’s PIN Number Enter the PIN Number Access the web-based utility of the router. (Refer to the router’s documentation for instructions.) On the router’s Wi-Fi Protected Setup screen, enter the Adapter’s PIN number in the PIN field. Then click Register.
Page 20
Chapter 3 Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Click Connect Anyway Click Connect Anyway.
Page 21
The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
Page 22
Chapter 3 Default Gateway Enter the IP address of your – network’s Gateway. DNS 1 and DNS 2 Enter the DNS address of your – wired Ethernet network. Click Next to continue, or click Back to return to the previous screen. Wireless Mode screen shows a choice of two wireless modes.
Page 23
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
Page 24
Chapter 3 WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Page 25
Chapter 3 EAP-TLS WPA2 Enterprise - EAP-TLS If you selected EAP-TLS, configure the following: Login Name Enter the login name of your wireless network. Server Name Enter the name of the authentication server (this is optional). Certificate Select the certificate you installed to authenticate you on your wireless network.
Page 26
Chapter 3 PEAP RADIUS - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network. Server Name Enter the name of the authentication server (this is optional).
Make sure that the Adapter is configured with the same Wireless Network Name (SSID) and wireless security settings as the other wireless computers in the Infrastructure configuration. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Dual-Band Wireless-N USB Network Adapter Troubleshooting...
Appendix B Appendix B: Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears.
Appendix B Enter the security key, WEP key, or passphrase (also known as a pre-shared key), depending on your type of security. Click Connect. Secured Network This screen appears while the Adapter connects to your network. Do not cancel, unless you want to end the installation.
Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Con guration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button > Help and Support. Your computer is now connected to your wireless network.
Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. Use Linksys Wireless Network Monitor NOTE: For more information on Windows XP Wireless Zero Configuration, refer to Windows Help.
Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active. Wireless Network Connection For more information about wireless networking on a Windows XP computer, click Start >...
Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
Page 35
This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Dual-Band Wireless-N USB Network Adapter...
Appendix F Appendix F: Regulatory Information FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix F Industry Canada Statement This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired...
(WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Page 40
Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
Page 41
återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit www.linksys.com estää...
Software, and the recipient agrees to the terms of this Agreement. “Software” includes, and this Agreement will apply to (a) the software of Linksys or its suppliers provided in or with the applicable Linksys product, excluding technology from the open source community, and (b) any upgrades, updates, bug fixes or modified versions (“Upgrades”) or...
If You would like a copy of the GPL or other open source code in this Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request.
Page 44
Appendix G GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
Page 45
Appendix G If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
Page 46
END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under Version 2.1 of the “GNU Lesser General Public License” then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
Page 47
Appendix G GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 48
Appendix G freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”.
Page 49
Appendix G Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
Page 50
Appendix G Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the...
Page 51
OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 3 Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
Page 53
Software License Agreement Appendix G DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.