background image

Model No.

PCI Adapter

Wireless-

N

WMP300N (EU)

User Guide

WIRELESS

GHz

2,4

Summary of Contents for LINKSYS WMP300N

Page 1: ...Model No PCI Adapter Wireless N WMP300N EU User Guide WIRELESS GHz 2 4 ...

Page 2: ...en reading this User Guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that c...

Page 3: ...arting the Setup 6 Connecting the Adapter 7 Setting up the Adapter 7 Chapter 5 Using the Wireless Network Monitor 18 Accessing the Wireless Network Monitor 18 Using the Wireless Network Monitor 18 Link Information 18 Connect 21 Profiles 23 Creating a New Profile 24 Appendix A Troubleshooting 34 Common Problems and Solutions 34 Frequently Asked Questions 34 Appendix B Windows XP Wireless Zero Confi...

Page 4: ...Wireless N PCI Adapter Appendix F Specifications 50 Appendix G Warranty Information 52 Appendix H Regulatory Information 53 Appendix I Contact Information 64 ...

Page 5: ...d Hoc Mode Settings 11 Figure 4 13 Wireless Security 12 Figure 4 14 Wireless Security WEP 12 Figure 4 15 Wireless Security PSK Personal 13 Figure 4 16 Wireless Security PSK2 Personal 13 Figure 4 17 Wireless Security PSK Enterprise EAP TLS 14 Figure 4 18 Wireless Security PSK Enterprise PEAP 14 Figure 4 19 Wireless Security PSK2 Enterprise EAP TLS 15 Figure 4 20 Wireless Security PSK2 Enterprise PE...

Page 6: ...s Security WEP 28 Figure 5 21 Wireless Security PSK Personal 29 Figure 5 22 Wireless Security PSK2 Personal 29 Figure 5 23 Wireless Security PSK Enterprise EAP TLS 30 Figure 5 24 Wireless Security PSK Enterprise PEAP 30 Figure 5 25 Wireless Security PSK2 Enterprise EAP TLS 31 Figure 5 26 Wireless Security PSK2 Enterprise PEAP 31 Figure 5 27 Wireless Security RADIUS EAP TLS 32 Figure 5 28 Wireless ...

Page 7: ... Adapter to your wireless network settings step by step Use the instructions in this Guide to help you install and set up the Adapter using the Setup Wizard These instructions should be all you need to get the most out of the Adapter What s in this User Guide This user guide covers the steps for setting up and using the Wireless N PCI Adapter Chapter 1 Introduction This chapter describes the Adapt...

Page 8: ...regarding wireless networking and measures you can take to help protect your wireless network Appendix D Windows Help This appendix describes how you can use Windows Help for instructions about networking such as installing the TCP IP protocol Appendix E Glossary This appendix gives a brief glossary of terms frequently used in networking Appendix F Specifications This appendix provides the Adapter...

Page 9: ...points will pick up the wireless PC s signal providing that they both share the same channel and SSID Before enabling you consider roaming choose a feasible radio channel and optimum access point position Proper access point positioning combined with a clear radio signal will greatly enhance performance Network Layout Linksys wireless access points and wireless routers have been designed for use w...

Page 10: ...rk with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com international for more information about wireless products ...

Page 11: ...s cables to the PCI card of the Adapter ANT CENTER ANT ANT The antenna connectors are connection points for the PCI card s antenna cables LED Green The LED lights up when the Adapter has an active wireless connection It flashes when the Adapter is transmitting or receiving data The Antenna Stand The Adapter s antenna stand has built in cables that are color coded to match the connectors on the PCI...

Page 12: ...come screen you have the following choices Click Here to Start Click the Click Here to Start button to begin the software installation process User Guide Click the User Guide button to open the PDF file of this User Guide Diagnostic Click the Diagnostic button to run a diagnostic check on your installed Adapter s Wireless Network Monitor and driver Exit Click the Exit button to exit the Setup Wiza...

Page 13: ...the blue CENTER ANT port Then attach the remaining cables to the other ANT ports 5 Power on your desktop PC Setting up the Adapter The next screen to appear will be the Available Wireless Networks screen It provides two options for setting up the Adapter Available Wireless Networks for most users Use this option if you already have a network configured The networks available to this Adapter will b...

Page 14: ...the Passphrase field so a WEP key is automatically generated The passphrase is case sensitive and should not be longer than 16 alphanumeric characters It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must m...

Page 15: ...3 3 After the software has been successfully installed the Congratulations screen will appear Click Finish to exit For more information about the Wireless Network Monitor refer to Chapter 5 Using the Wireless Network Monitor Congratulations The installation of the Wireless N PCI Adapter is complete To check the link information search for available wireless networks or make additional configuratio...

Page 16: ...outer click the Specify network settings radio button Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addresses leave these fields empty IP Address This IP Address must be unique to your network Subnet Mask The Adapter s Subnet Mask must ...

Page 17: ...he devices in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click the Next button to continue or click the Back button to return to the previous screen 4 If you chose Infrastructure Mode go to step 5 now If you chose Ad Hoc Mode the Ad Hoc Mode Settings screen will appear Network Mode Select the Network Mode in which your w...

Page 18: ...ld not be longer than 16 alphanumeric characters This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadeci...

Page 19: ...t to use TKIP or AES from the Encryption drop down menu Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click the Next button to continue or the Back button to return to the previous screen PSK2 Personal Enter a Pre shared Key that is 8 63 characters in length Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click the Next bu...

Page 20: ...authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authenticat...

Page 21: ...t the certificate you have installed to authenticate you on your wireless network Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field t...

Page 22: ...have installed to authenticate you on your wireless network Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From t...

Page 23: ...work Monitor click Exit 6 The Congratulations screen will appear next Click Connect to Network to implement the new settings and return to the Link Information screen Click Return to Profiles to return to the Profiles screen Congratulations Your advanced setup through the Wireless Network Monitor is complete To check the link information search for available wireless networks or make additional co...

Page 24: ...ignal is and how good the connection s quality is You can also click the More Information button to view additional status information about the current wireless connection To search for available wireless networks click the Connect tab To perform configuration changes or create connection profiles click the Profiles tab Link Information The Link Information screen displays network mode signal str...

Page 25: ...thentication This is your wireless network s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS1 This is the DNS address of the Adapter MAC Address The MAC address of the wireless network s access point or wireless router is shown h...

Page 26: ...his shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or since the Refresh Statistics button was last pressed Driver Version This shows the version of the Adapter s driver Noise Level This shows the level of background noise affecting the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of t...

Page 27: ...r wireless network Security The status of the wireless security feature is displayed here MAC Address The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has security enabled ...

Page 28: ... shared Key field To connect to the network click the Connect button To cancel the connection click the Cancel button PSK2 Personal Needed for Connection If the network has the wireless security PSK2 Personal enabled then you will see the PSK2 Personal Needed for Connection screen Enter the network s Pre shared Key in the Pre shared Key field To connect to the network click the Connect button To c...

Page 29: ...network Security The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click Connect New Click the New button to create a new profile See the next section Creating a New Profile for detailed instructions Edit Select the profile you...

Page 30: ...Name Select the wireless network you wish to connect to and click the Connect button If you do not see your network listed you can click the Refresh button to bring the list up again If the network uses wireless security you will need to configure security on the Adapter If not you will be taken directly to the Congratulations screen 1 If you have wireless security enabled on your network continue...

Page 31: ... to use TKIP or AES from the Encryption drop down menu Pre shared Key Enter a Pre shared key of 8 63 characters in the Pre shared Key field Then click Connect and proceed to step 3 PSK2 Personal If your network has the wireless security PSK2 Personal enabled this screen will appear Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Then click Connect and proceed t...

Page 32: ...k the Specify network settings radio button Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addresses leave these fields empty IP Address This IP Address must be unique to your network Subnet Mask The Adapter s Subnet Mask must be the sam...

Page 33: ...s in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click the Next button to continue or click the Back button to return to the previous screen 4 If you chose Infrastructure Mode go to step 5 now If you chose Ad Hoc Mode the Ad Hoc Mode Settings screen will appear Network Mode Select the Network Mode in which your wireless n...

Page 34: ... longer than 16 alphanumeric characters This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal chara...

Page 35: ...TKIP or AES from the Encryption drop down menu Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click the Next button to continue or the Back button to return to the previous screen PSK2 Personal Enter a Pre shared Key that is 8 63 characters in length Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click the Next button to c...

Page 36: ...ate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication serve...

Page 37: ...tificate you have installed to authenticate you on your wireless network Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is op...

Page 38: ...alled to authenticate you on your wireless network Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Certif...

Page 39: ...new settings click the Back button To exit the Advanced Setup through the Wireless Network Monitor click Exit 6 The Congratulations screen will appear next Click Connect to Network to implement the new settings and return to the Link Information screen Click Return to Profiles to return to the Profiles screen Congratulations The profile has been successfully configured Figure 5 29 Confirm New Sett...

Page 40: ...cannot communicate with other computers linked via Ethernet in the Infrastructure configuration Make sure that the Adapter is configured with the same wireless network name SSID and security options as the other computers in the Infrastructure configuration Frequently Asked Questions Can I run an application from a remote computer over the wireless network This will depend on whether or not the ap...

Page 41: ...ion Power Management What is ad hoc mode When a wireless network is set to ad hoc mode the wireless equipped computers are configured to communicate directly with each other This type of network will not communicate with any wired network What is infrastructure mode When a wireless network is set to infrastructure mode the wireless network is configured to communicate with a wired network through ...

Page 42: ...cy technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows ...

Page 43: ...N PCI Adapter What is WPA WPA is Wi Fi Protected Access a wireless security protocol that can be used in conjunction with a RADIUS server What is RADIUS RADIUS is Remote Authentication Dial In User Service which uses an authentication server to control network access ...

Page 44: ...select Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network Monitor 1 After installing the Adapter the Windows XP Wireless Zero Configuration icon will appear in your computer s system tray Double click the icon Figure B 1 Wireless Network Monitor Icon Figure B 2 Window...

Page 45: ...es not have wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect Anyway button to connect the Adapter to your network NOTE Steps 2 and 3 are the instructions and screenshots for Windows XP with Service Pack 2 installed Figure B 4 Available Wireless Network Figure B 5 No Wi...

Page 46: ...r wireless network will appear as Connected when your connection is active For more information about wireless networking on a Windows XP computer click the Start button select Help and choose Support Enter the keyword wireless in the field provided and press the Enter key The setup of Windows XP Wireless Configuration is complete NOTE Windows XP Wireless Zero Configuration does not support the us...

Page 47: ...network performance 7 Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here a...

Page 48: ...ccess to only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that W...

Page 49: ...d is PSK or PSK2 used in coordination with a RADIUS server Select the authentication method EAP TLS or PEAP Then configure the appropriate settings for your authentication method RADIUS This method features use of a RADIUS server Select the authentication method EAP TLS or PEAP Then configure the appropriate settings for your authentication method Implementing encryption may have a negative impact...

Page 50: ...ctions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing share...

Page 51: ...d cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy Chain A meth...

Page 52: ...IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files over a TCP IP networ...

Page 53: ...e and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard mail server co...

Page 54: ...s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for making b...

Page 55: ... of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associated devices that co...

Page 56: ...a 13 Channels Europe LEDs ACT Protocols 802 11b CCK QPSK BPSK 802 11g OFDM Wireless N BPSK QPSK 16 QAM 64 QAM Transmitted Power 802 11g 14 1dBm Typical Wireless N 10 1dBm Typical Receive Sensitivity 54Mbps 70dBm Typical Wireless N 70dBm Typical Security Features WEP PSK and PSK2 Encryption Security Dimensions 133 mm x 22 x 121 mm Unit Weight 62 g Power 3 3V Operating Temp 0ºC to 55ºC Storage Temp ...

Page 57: ...51 Appendix F Specifications Wireless N PCI Adapter Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 58: ...OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated repaired or mai...

Page 59: ...orrect the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth fo...

Page 60: ...ss N PCI Adapter Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Conformity with Regard to the EU Directive 1999 5 EC R TTE Directive ...

Page 61: ...de l UE et dans tous les pays ayant transposés la directive 1999 5 CE sans aucune limitation excepté pour les pays mentionnés ci dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt werden s...

Page 62: ...e details Dans la cas d une utilisation en extérieur la puissance de sortie est limitée pour certaines parties de la bande Reportez vous à la table 1 ou visitez http www arcep fr pour de plus amples détails Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy Unless operating within the boundaries of the owner s p...

Page 63: ...tennas resulting in a radiated power level exceeding 100 mW EIRP are illegal Power Output of Your Device To comply with your country s regulations you may have to change the power output of your wireless device Proceed to the appropriate section for your device Wireless Adapters Wireless adapters have the power output set to 100 by default Maximum power output on each adapter does not exceed 20 dB...

Page 64: ...reless product use its Web based Utility to configure its power output setting refer to the product s documentation for more information Technical Documents on www linksys com international Follow these steps to access technical documents 1 Enter http www linksys com international in your web browser 2 Select the country or region in which you live 3 Click the Products tab 4 Select the appropriate...

Page 65: ... by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electronic products bearing the following symbol ...

Page 66: ...60 Appendix H Regulatory Information Wireless N PCI Adapter ...

Page 67: ...61 Appendix H Regulatory Information Wireless N PCI Adapter ...

Page 68: ...62 Appendix H Regulatory Information Wireless N PCI Adapter ...

Page 69: ...63 Appendix H Regulatory Information Wireless N PCI Adapter For more information visit www linksys com ...

Page 70: ... at linksys com Belgium support be linksys com Czech Republic support cz linksys com Denmark support dk linksys com Finland support fi linksys com France support fr linksys com Germany support de linksys com Greece support gr linksys com English only Hungary support hu linksys com Ireland support ie linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no links...

Page 71: ...t uk linksys com Outside of Europe E mail Address Asia Pacific asiasupport linksys com English only Latin America support portuguese linksys com or support spanish linksys com Middle East Africa support mea linksys com English only South Africa support ze linksys com English only UAE support ae linksys com English only U S and Canada support linksys com In Europe E mail Address ...

Reviews: