background image

38

Appendix F

Software License Agreement

Dual-Band Wireless-N ExpressCard

used  in  accordance  with  the  terms  of  this  Agreement; 
(iii) to provide improvements to the way Linksys delivers 
technology to you and to other Linksys customers; (iv) to 
enable Linksys to comply with the terms of any agreements 
it  has  with  any  third  parties  regarding  your  Linksys 
product and/or Software and/or (v) to enable Linksys to 
comply with all applicable laws and/or regulations, or the 
requirements of any regulatory authority or government 
agency.  Linksys  and/  or  its  affiliates  may  collect  and 
process this information provided that it does not identify 
you  personally. Your  use  of  your  Linksys  product  and/or 
the  Software  constitutes  this  consent  by  you  to  Linksys 
and/or its affiliates’ collection and use of such information 
and, for EEA customers, to the transfer of such information 
to a location outside the EEA. 

Software  Upgrades  etc

.  If  the  Software  enables  you  to 

receive  Upgrades,  you  may  elect  at  any  time  to  receive 
these  Upgrades  either  automatically  or  manually.  If  you 
elect  to  receive  Upgrades  manually  or  you  otherwise 
elect not to receive or be notified of any Upgrades, you 
may  expose  your  Linksys  product  and/or  the  Software 
to  serious  security  threats  and/or  some  features  within 
your  Linksys  product  and/or  Software  may  become 
inaccessible.  There  may  be  circumstances  where  we 
apply an Upgrade automatically in order to comply with 
changes  in  legislation,  legal  or  regulatory  requirements 
or as a result of requirements to comply with the terms 
of  any  agreements  Linksys  has  with  any  third  parties 
regarding your Linksys product and/or the Software. You 
will  always  be  notified  of  any  Upgrades  being  delivered 
to  you. The  terms  of  this  license  will  apply  to  any  such 
Upgrade unless the Upgrade in question is accompanied 
by  a  separate  license,  in  which  event  the  terms  of  that 
license will apply.

Open  Source  Software

.  The  GPL  or  other  open  source 

code incorporated into the Software and the open source 
license for such source code are available for free download 
at 

http://www.linksys.com/gpl

. If You would like a copy 

of the GPL or other open source code in this Software on a 
CD, Linksys will mail to You a CD with such code for $9.99 
plus the cost of shipping, upon request.

Term  and  Termination

.  You  may  terminate  this  License 

at  any  time  by  destroying  all  copies  of  the  Software 
and  documentation.  Your  rights  under  this  License  will 
terminate immediately without notice from Linksys if You 
fail to comply with any provision of this Agreement. 

Limited  Warranty

.  The  warranty  terms  and  period 

specified  in  the  applicable  Linksys  Product  User  Guide 
shall also apply to the Software. 

Disclaimer  of  Liabilities.  IN  NO  EVENT  WILL  LINKSYS  OR 
ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA, REVENUE 
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, 
INCIDENTAL  OR  PUNITIVE  DAMAGES,  REGARDLESS  OF 
CAUSE  (INCLUDING  NEGLIGENCE),  ARISING  OUT  OF 
OR  RELATED  TO  THE  USE  OF  OR  INABILITY  TO  USE  THE 

SOFTWARE,  EVEN  IF  LINKSYS  HAS  BEEN  ADVISED  OF 
THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL 
LINKSYS’  LIABILITY  EXCEED  THE  AMOUNT  PAID  BY  YOU 
FOR THE  PRODUCT. The  foregoing  limitations  will  apply 
even if any warranty or remedy under this Agreement fails 
of its essential purpose. Some jurisdictions do not allow 
the exclusion or limitation of incidental or consequential 
damages,  so  the  above  limitation  or  exclusion  may  not 
apply to You.

Export

. Software, including technical data, may be subject 

to U.S. export control laws and regulations and/or export 
or  import  regulations  in  other  countries.  You  agree  to 
comply strictly with all such laws and regulations.

U.S. Government Users

. The Software and documentation 

qualify as “commercial items” as defined at 48 C.F.R. 2.101 
and  48  C.F.R.  12.212.  All  Government  users  acquire  the 
Software  and  documentation  with  only  those  rights 
herein that apply to non-governmental customers.

General Terms

. This Agreement will be governed by and 

construed  in  accordance  with  the  laws  of  the  State  of 
California, without reference to conflict of laws principles. 
The  United  Nations  Convention  on  Contracts  for  the 
International Sale of Goods will not apply. If any portion 
of this Agreement is found to be void or unenforceable, 
the  remaining  provisions  will  remain  in  full  force  and 
effect. This Agreement constitutes the entire agreement 
between  the  parties  with  respect  to  the  Software  and 
supersedes any conflicting or additional terms contained 
in any purchase order or elsewhere. 

END OF SCHEDULE 1

Schedule 2

If  this  Linksys  product  contains  open  source  software 
licensed  under  Version  2  of  the  “GNU  General  Public 
License” then the license terms below in this Schedule 2 
will apply to that open source software. The license terms 
below in this Schedule 2 are from the public web site at 

http://www.gnu.org/copyleft/gpl.html

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991 

Copyright © 1989, 1991 Free Software Foundation, Inc. 

51  Franklin  Street,  Fifth  Floor,  Boston,  MA  02110-1301, 
USA

Everyone  is  permitted  to  copy  and  distribute  verbatim 
copies  of  this  license  document,  but  changing  it  is  not 
allowed.

Preamble

The licenses for most software are designed to take away 
your  freedom  to  share  and  change  it.  By  contrast,  the 
GNU General Public License is intended to guarantee your 

Summary of Contents for WEC600N

Page 1: ...USER GUIDE Dual Band Wireless N ExpressCard Model WEC600N ...

Page 2: ...worthy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web browser you may have to add http in front of the web address Resource Website Linksys www linksys com Linksys International www linksys com international Glossary www linksys com glos...

Page 3: ... Windows XP Wireless Zero Configuration 26 Appendix C Specifications 28 Appendix D Warranty Information 29 Limited Warranty 29 Appendix E Regulatory Information 31 FCC Statement 31 FCC Radiation Exposure Statement 31 Safety Notices 31 Wireless Disclaimer 31 Industry Canada Statement 31 Restrictions in the 5 GHz Band 32 Avis d Industrie Canada 32 Avis de non responsabilité concernant les appareils ...

Page 4: ...bands it can connect to Wireless A Wireless N Wireless G or Wireless B networks To help protect your data and privacy your wireless connection is protected by industrial strength WPA2 encryption The included Setup Wizard will walk you through configuring the ExpressCard to your network s settings step by step LEDs Power Blue The Power LED lights up when the ExpressCard is powered on Link Act Blue ...

Page 5: ...nable MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device With MAC address filtering enabled wireless network access is provided solely for wireless devices with specific MAC addresses For example you can specify the MAC address of e...

Page 6: ...less network Click More Information to view additional status information about the current connection To search for available wireless networks click the Connect tab To perform configuration changes or create connection profiles click the Profiles tab Status The Status screen displays network mode signal strength and link quality information about the current connection It also displays the Wi Fi...

Page 7: ...o minutes click the 2 Wi Fi Protected Setup button on this screen The Adapter connects to the network 3 Connecting to the Network Click 4 Print to print out your wireless network settings Then click Finish to return to the Status screen or click Exit to exit the Monitor Congratulations Congratulations The Adapter is connected to the network Enter the Adapter s PIN Number Access the web based utili...

Page 8: ...with a 40 MHz radio band network Standard Channel This is the channel used by your wireless network Security This is the status of the wireless security feature Authentication This is your wireless network s authentication method Network Type This is the wireless network type IP Address This is the IP Address of the Adapter Subnet Mask This is the Adapter s Subnet Mask Default Gateway This is the ...

Page 9: ...th of the most recent connection to a wireless network Total Up Time This indicates the cumulative total of the Adapter s connection time Signal Strength The Signal Strength bar indicates the signal strength Link Quality The Link Quality bar indicates the quality of the wireless network connection Click Back to return to the initial Statusscreen Click Status to go to the Wireless Network Status sc...

Page 10: ...o a network whose wireless security is enabled then you will view one of three screens Proceed to the appropriate instructions 1 WPA2 Wi Fi Protected Access 2 If the network uses WPA2 Personal security then the WPA2 Personal Key Needed for Connection screen appears WPA2 Personal Security Passphrase Enter the network s Passphrase also called a pre shared key of 8 63 characters To connect to the net...

Page 11: ...k 2 Finish Congratulations Congratulations The Adapter is connected to the network Wi Fi Protected Setup If you connect to a router that supports Wi Fi Protected Setup then you will view this screen Select a Method Before you begin make sure the router and the computer with the Adapter are in the same room Then select the method that is most convenient for you Push Button Recommended Select this o...

Page 12: ...umber Access the web based utility of the router Refer to the 1 router s documentation for instructions On the router s 2 Wi Fi Protected Setup screen enter the Adapter s PIN number in the PIN field Then click Register On the Adapter s PIN number screen click 3 Next Enter the PIN Number The Adapter connects to the network 4 Connecting to the Network Click 5 Print to print out your wireless network...

Page 13: ...ructions 1 WPA2 Wi Fi Protected Access 2 If the network uses WPA2 Personal security then the WPA2 Personal Key Needed for Connection screen appears WPA2 Personal Security Passphrase Enter the network s Passphrase also called a pre shared key of 8 63 characters To connect to the network click Connect To cancel the connection click Cancel WPA Wi Fi Protected Access If the network uses WPA Personal s...

Page 14: ...ofile names and wireless network names Profiles Profile This is the name of the profile Wireless Network Name This is the SSID or unique name of the wireless network Profile Information For each profile selected the following are listed Wireless Mode This is the mode of the wireless network currently in use Standard Channel This is the channel used by your wireless network Security This is the sta...

Page 15: ...ppropriate heading on the following pages AvailableWireless Networks The available networks are listed in the table on the center ofthescreenbyWirelessNetworkName Selectthewireless network you wish to connect to and click Connect If you do not see your network listed click Refresh to bring the list up again If the router does not support Wi Fi Protected Setup proceed to the section No Wi Fi Protec...

Page 16: ...etwork uses WEP encryption then the WEP Key or Passphrase Needed for Connection screen appears WEP Security Passphrase Enter the Passphrase or WEP key The passphrase is case sensitive and must be 16 or fewer alphanumeric characters It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only For non Linksys wireless products enter the WE...

Page 17: ...inue or click Back to return to the previous screen Proceed to the instructions for the method you selected Use the Push Button Press the 1 Wi Fi Protected Setup button on the router Within two minutes click the 2 Wi Fi Protected Setup button on this screen Use the Push Button The Adapter connects to the network 3 Connecting to the Network Click 4 Print to print out your wireless network settings ...

Page 18: ...he appropriate section Wireless Security Disabled or Wireless Security Enabled Wireless Security Disabled If you connect to a network whose wireless security is disabled then you will view this screen Click Connect Anyway Click 1 Connect Anyway Click 2 Finish Congratulations Congratulations The Adapter is connected to the network Wireless Security Enabled If you connect to a network whose wireless...

Page 19: ...rk uses WEP encryption then the WEP Key or Passphrase Needed for Connection screen appears WEP Security Passphrase Enter the Passphrase or WEP key The passphrase is case sensitive and must be 16 or fewer alphanumeric characters It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only For non Linksys wireless products enter the WEP ke...

Page 20: ...ds blank IP Address This IP Address must be unique to your network Subnet Mask The Adapter s Subnet Mask must be the same as your wired network s Subnet Mask Default Gateway Enter the IP address of your network s Gateway DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network Click Next to continue or click Back to return to the previous screen The 3 Wireless Mode screen shows a choic...

Page 21: ... return to the previous screen Proceed to the section for your security method WEP Make sure the settings you configure match the settings of your wireless network WEP WEP Select 64 bit or 128 bit encryption Passphrase Enter the network s Passphrase so a WEP key is automatically generated It is case sensitive and should not be longer than 16 alphanumeric characters This passphrase must match the p...

Page 22: ...creen WPA Enterprise WPA Enterprise featuresWPA security used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the router WPA Enterprise offers two authentication methods EAP TLS and PEAP as well as two encryption methods TKIP and AES with dynamic encryption keys Authentication Select the authentication method your network is using EAP TLS or PEAP ...

Page 23: ...es WPA2 security used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the router WPA2 Enterprise offers two authentication methods EAP TLS and PEAP Authentication Select the authentication method your network is using EAP TLS or PEAP EAP TLS WPA2 Enterprise EAP TLS If you selected EAP TLS configure the following Login Name Enter the login name of ...

Page 24: ...verName Enterthenameoftheauthenticationserver this is optional Certificate Select the certificate you installed to authenticate you on your wireless network Click Next to continue or click Back to return to the previous screen PEAP RADIUS PEAP If you selected PEAP configure the following Login Name Enter the login name of your wireless network Password Enter the password of your wireless network S...

Page 25: ...ns screen appears Click Connect to Network to implement the new settings immediately andreturntotheStatusscreen ClickReturntoProfiles screen to keep the current settings active and return to the Profiles screen Congratulations Congratulations The profile is successfully configured ...

Page 26: ...n reinsert it into the computer s ExpressCard slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make sure that the ExpressCard is configured with 2 the same Wireless Network Name SSID and wireless security settings as the other wireless computers in the Infrastructure configuration WE...

Page 27: ...e Linksys Wireless Network Monitor NOTE For more information on Windows XP Wireless Zero Configuration refer to Windows Help After installing the ExpressCard the Windows XP 1 Wireless Zero Configuration icon appears in your computer s system tray Double click the icon Windows XP Wireless Zero Configuration Icon The screen that appears will show any available 2 wireless network Select the network y...

Page 28: ...the exact WEP key used by your wireless router or access point Your wireless network will appear as Connected when 5 your connection is active Wireless Network Connection For more information about wireless networking on a Windows XP computer click Start Help Support Enter the keyword wireless in the field provided and press the Enter key Your computer is now connected to your wireless network ...

Page 29: ... Receive Sensitivity in dBm 802 11a 65 dBm at 54 Mbps 802 11b 87 dBm at 11 Mbps 802 11g 70 dBm at 54 Mbps 802 11n 61 dBm at 270 Mbps Antenna Gain in dBi 2 4 dBi at 2 4 GHz 1 dBi at 5 0 GHz Power Consumption Active 800mA TX 600mA RX Standby 120mA Security features WEP Wi Fi Protected Access 2 WPA2 Security Key Bits Up to 256 Bit Encryption OS Requirements Windows XP Vista or Vista 64 bit edition wi...

Page 30: ...s limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product s use or operation may require TO THE EXTENT NOT PROHIBITED BY LAW ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO T...

Page 31: ...tom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limited warranty is neither a service nor a support contract Information about Linksys current technical support offerings and policies including any fees for support services can be found at www linksys...

Page 32: ...uction as documented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter SAR compliance has been established in typical laptop computer s with ExpressCard Cardbus or USB slots and this product can be used in a typical laptop computer with ExpressCard Cardbus or USB slots Other applications such as a handheld PC or similar device ...

Page 33: ...dioélectrique reçu 2 mêmesicebrouillageestsusceptibledecompromettre le fonctionnement du dispositif Le dispositif a été conçupourfonctionneravecuneantenneayantungain maximum de 2 dBi Les règlements d Industrie Canada interdisent strictement l utilisation d antennes dont le gain est supérieur à cette limite L impédance requise de l antenne est de 50 ohms Afin de réduire le risque d interférence aux...

Page 34: ...směrnice 2002 96 ES zakazuje aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem Tento symbol udává že daný produkt musí být likvidován odděleně od běžného komunálního odpadu Odpovídáte za likvidaci tohoto produktu a dalších elektrických a elektronických zařízení prostřednictvím určených sběrných míst stanovených vládou nebo místními úřa...

Page 35: ...οποίο αγοράσατε το προϊόν Français French Informations environnementales pour les clients de l Union européenne La directive européenne 2002 96 CE exige que l équipement sur lequel est apposé ce symbole sur le produit et ou son emballage ne soit pas jeté avec les autres ordures ménagères Ce symbole indique que le produit doit être éliminé dans un circuit distinct de celui pour les déchets des ména...

Page 36: ...berendezéseinek felszámolásához további részletes információra van szüksége kérjük lépjen kapcsolatba a helyi hatóságokkal a hulladékfeldolgozási szolgálattal vagy azzal üzlettel ahol a terméket vásárolta Nederlands Dutch Milieu informatie voor klanten in de Europese Unie DeEuropeseRichtlijn2002 96 ECschrijftvoordatapparatuurdie is voorzien van dit symbool op het product of de verpakking nietmagwo...

Page 37: ...môže zabrániť prípadným negatívnym dopadom na životné prostredie a zdravie ľudí Ak máte záujem o podrobnejšie informácie o likvidácii starého zariadenia obráťte sa prosím na miestne orgány organizácie zaoberajúce sa likvidáciou odpadov alebo obchod v ktorom ste si produkt zakúpili Slovenčina Slovene Okoljske informacije za stranke v Evropski uniji Evropska direktiva 2002 96 EC prepoveduje odlaganj...

Page 38: ...SYSTEMS LINKSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IFYOU DO NOT AGREETO ALL OFTHESE TERMS THENYOU MAY NOT DOWNLOAD INSTALL OR USE THE SOFTWARE YOU MAY RETURN UNUSED SOFTWARE OR IF THE SOFTWARE IS SUPPLIED ...

Page 39: ...Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer of Liabilities IN NO EVENT WILL LINKSYS OR ITS SUPPLIERS BE LIABLE FOR ANY LOST DATA REVENUE OR PROFIT OR FOR SPECIAL INDIRECT CONSEQUENTIAL INCIDENTAL OR PUNITIVE DAMAGES REGARDLESS OF CAUSE INCLUDING NEGLIGENCE ARISING OUT OF OR RELATED TO THE USE OF O...

Page 40: ...de it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION This License applies to any program or other work 0 which contains a notice placed by the copyright holder saying it may be distributed under the terms of this Gen...

Page 41: ...ms of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work m...

Page 42: ...se from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later ...

Page 43: ...RRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPT...

Page 44: ... PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLI...

Reviews: