Cisco Linksys WAP610N User Manual

Cisco Linksys WAP610N User Manual

Wireless-n access point with dual-band
Hide thumbs Also See for Linksys WAP610N:

Advertisement

USER GUIDE
Wireless-N Access Point
with Dual-Band
WAP610N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WAP610N

  • Page 1 USER GUIDE Wireless-N Access Point with Dual-Band WAP610N Model:...
  • Page 2: About This Guide

    Network www.linksysbycisco.com/security Security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Cisco Products ........
  • Page 4: Chapter 1: Product Overview

    Ethernet port. Power (Blue) The Power LED lights up when Thank you for choosing the Linksys by Cisco the Access Point is powered on. Wireless-N Access Point with Dual-Band. The Wireless-N Access Point with Dual-Band adds wireless capability to...
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: NOTE: If the password request screen does not appear, wait two minutes and try again. Advanced Configuration Setup > Basic Setup After setting up the Access Point with the Setup Wizard (located on the CD-ROM), the Access Point will be ready The first screen that appears is the Basic Setup screen.
  • Page 7: Wireless > Basic Wireless Settings

    Advanced Configuration Chapter 3 If you want to set a permanent static IP address for the Network Mode (5 GHz) From this drop-down menu, you Access Point, then select Static IP. can select the wireless standards running on your network. If you have only Wireless-A devices in your network, select If you select Static IP, then complete the following fields: Wireless-A Only.
  • Page 8: Wireless > Wireless Security

    Advanced Configuration Chapter 3 WPA2 Personal you do not want to broadcast the Access Point’s SSID, then select Disabled. WPA2 is a more advanced, more secure version of WPA. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Wireless >...
  • Page 9 Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs the Access Point how often it should change the encryption keys. The default Key Renewal period is 3600 seconds. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
  • Page 10: Wireless > Wireless Mac Filter

    Advanced Configuration Chapter 3 b. Within two minutes, click the Wi-Fi Protected Setup button on the Access Point’s Wi-Fi Protected Setup screen. c. After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions Congratulations The Wi-Fi Protected Setup Status, Wireless Band,...
  • Page 11: Wireless > Wmm

    Advanced Configuration Chapter 3 WMM® Wireless Client List Access Mode You can assign different settings to the four access modes available. Select the mode you want to configure: Background, Best Effort, Video, or Voice. Follow the instructions for the mode you select. Background Wireless Client List Use Aggregation...
  • Page 12 Advanced Configuration Chapter 3 TXOP for STA This option defines the Transmission CW Min for STA This option defines the minimum Opportunity for an STA in BSS. The range is 0 to 8192. The contention window limit from which the random backoff default is 0.
  • Page 13 Advanced Configuration Chapter 3 ADDBA Timeout This option defines the duration Max. Aggregation Size This option defines the after which the ADDBA setup is terminated, if there are maximum size of the aggregate (in bytes). The range is 0 no frame exchanges within this duration by the Block to 16000.
  • Page 14: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Wireless > Advanced Wireless Settings data transmission. If you want to specify the Access Point’s rate of data transmission, configure the Transmission Rate Configure the Access Point’s advanced wireless functions. setting. These settings should only be adjusted by an expert Transmission Rate The Transmission Rate setting is administrator as incorrect settings can reduce wireless...
  • Page 15: Administration > Management

    Advanced Configuration Chapter 3 Backup and Restore RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is Backup To back up the Access Point’s configuration recommended. If a network packet is smaller than the settings, click Backup Configurations.
  • Page 16: Status > Access Point

    Advanced Configuration Chapter 3 Status > Wireless Network Before upgrading the firmware, download the Access Point’s firmware upgrade file from www.linksysbycisco.com. Information about your wireless network is displayed. Firmware Upgrade Please select a file to upgrade the firmware Click Browse and select the firmware upgrade file. Then click Start to Upgrade and follow the on-screen instructions.
  • Page 17: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: WEB: If your questions are not addressed here, refer Linksys website, Troubleshooting www.linksysbycisco.com The computer cannot connect wirelessly to the network. Make sure the wireless network name or SSID is the same on both the computer and the Access Point. If you have enabled wireless security, then make sure the same security method and key are used by both the computer and the Access Point.
  • Page 18: Appendix B: Specifications

    Certification FCC, UL/cUL, ICES-003, RSS210, Specifications Wi-Fi (IEEE 802.11a/b/g/draft n), WPA2™, Wi-Fi Protected Setup™, WMM®, CE Model WAP610N Operating Temp. 32 to 104ºF (0 to 40ºC) Standards IEEE 802.3u, 802.11g, 802.11b, Storage Temp. -4 to 140ºF (-20 to 60ºC) 802.11a, Draft 802.11n...
  • Page 19: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: not warrant that the operation of the product or software will be uninterrupted or error free. Also, due to the Warranty Information continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the product, software or any equipment, system or Limited Warranty network on which the product or software is used will be...
  • Page 20 Warranty Information Appendix C DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk.
  • Page 21: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: The availability of some specific channels and/or operational frequency bands is country dependent Regulatory Information and programmed at the factory to match the intended destination. This setting is not accessible by the end user. Safety Notices FCC Statement This device complies with Part 15 of the FCC Rules.
  • Page 22: Industry Canada Statement

    Regulatory Information Appendix D Industry Canada Statement Avis d’Industrie Canada This Class B digital apparatus complies with Canadian Cet appareil numérique de la classe B est conforme aux ICES-003 and RSS210. normes NMB-003 et RSS210 du Canada. Operation is subject to the following two conditions: L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1.
  • Page 23: Wireless Disclaimer

    Regulatory Information Appendix D section ne doivent pas être capables de transmettre dans la bande 5 600-5 650 MHz afin de protéger les radars d’Environnement Canada qui l’utilisent. Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
  • Page 24: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
  • Page 25 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 26 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 27 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za clientes da União Europeia stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 28: Appendix E: Software End User License Agreement

    If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
  • Page 29 You permitted by law notwithstanding this provision); (iii) agree that Cisco is not responsible or liable for any loss share, sell, rent, lease, or sublicense the Software or or damage of any sort incurred as the result of any such related Documentation;...
  • Page 30 Cisco product and/or Software indicates your acceptance ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. of the terms of the Cisco Privacy Policy, so please review Without limiting the foregoing, Cisco does not warrant the policy carefully and check the Web site above to that the operation of the product, software or services will review updates to it.
  • Page 31 Disclaimer of Liabilities. TO THE EXTENT NOT PROHIBITED supersedes any conflicting or additional terms contained BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL,...
  • Page 32 If this Cisco product contains open source software any problems introduced by others will not reflect on the licensed under Version 2 of the “GNU General Public...
  • Page 33 Software End User License Agreement Appendix E 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
  • Page 34 Software End User License Agreement Appendix E 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 35 If this Cisco product contains open source software licensed with the library after making changes to the library and under Version 2.1 of the “GNU Lesser General Public recompiling it.
  • Page 36 Software End User License Agreement Appendix E Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 37 Software End User License Agreement Appendix E (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 38 Software End User License Agreement Appendix E a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 39 Software End User License Agreement Appendix E 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
  • Page 40 (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Cisco product contains open source OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND software licensed under the OpenSSL license then the...
  • Page 41 Software End User License Agreement Appendix E 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

Table of Contents