background image

Model No.

Notebook Adapter

Wireless-

N

WPC300N (EU/LA)

User Guide

WIRELESS

GHz

2,4

Summary of Contents for WPC300N

Page 1: ...Model No Notebook Adapter Wireless N WPC300N EU LA User Guide WIRELESS GHz 2 4 ...

Page 2: ...his User Guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage ...

Page 3: ...er 7 Setting up the Adapter 7 Chapter 5 Using the Wireless Network Monitor 15 Accessing the Wireless Network Monitor 15 Using the Wireless Network Monitor 15 Link Information 15 Connect 18 Profiles 19 Create a New Profile 20 Appendix A Troubleshooting 28 Common Problems and Solutions 28 Frequently Asked Questions 28 Appendix B Windows XP Wireless Zero Configuration 32 Windows XP Wireless Zero Conf...

Page 4: ...Wireless N Notebook Adapter Appendix G Warranty Information 46 Appendix H Regulatory Information 47 Appendix I Contact Information 58 ...

Page 5: ...d Hoc Mode Settings 11 Figure 4 13 Wireless Security WEP 11 Figure 4 14 Wireless Security WPA Personal 12 Figure 4 15 Wireless Security WPA2 Personal 12 Figure 4 16 Wireless Security RADIUS EAP TLS 13 Figure 4 17 Wireless Security RADIUS PEAP 13 Figure 4 18 Confirm New Settings 14 Figure 4 19 Congratulations screen 14 Figure 5 1 Wireless Network Monitor Icon 15 Figure 5 2 Link Information 15 Figur...

Page 6: ...igure 5 20 Wireless Security WPA Personal 25 Figure 5 21 Wireless Security WPA2 Personal 25 Figure 5 22 Wireless Security RADIUS EAP TLS 26 Figure 5 23 Wireless Security RADIUS PEAP 26 Figure 5 24 Confirm New Settings 27 Figure 5 25 Congratulations 27 Figure B 1 Wireless Network Monitor Icon 32 Figure B 2 Windows XP Use Windows XP Wireless Configuration 32 Figure B 3 Windows XP Wireless Zero Confi...

Page 7: ...etwork settings step by step Use the instructions in this Guide to help you set up and connect the Adapter using the Setup Wizard These instructions should be all you need to get the most out of the Adapter What s in this User Guide This user guide covers the steps for setting up and using the Wireless N Notebook Adapter Chapter 1 Introduction This chapter describes the Adapter s applications and ...

Page 8: ...es regarding wireless networking and measures you can take to help protect your wireless network Appendix D Windows Help This appendix describes how you can use Windows Help for instructions about networking such as installing the TCP IP protocol Appendix E Glossary This appendix gives a brief glossary of terms frequently used in networking Appendix F Specifications This appendix provides the Adap...

Page 9: ...ter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they both share the same cha...

Page 10: ...ts Access points and wireless routers are compatible with 802 11b and 802 11g adapters such at the PC Cards for your laptop computers PCI Card for your desktop PC and USB Adapters for when you want to enjoy USB connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and ...

Page 11: ...ting to Know the Wireless N Notebook Adapter The LED Indicators The Network Adapter s LEDs display information about network activity Power Green The Power LED lights up when the Adapter is powered on Link Act Green The Link Act LED lights up when the Adapter has an active connection Figure 3 1 Front Panel Power Link Act ...

Page 12: ...elcome screen you have the following choices Click Here to Start Click the Click Here to Start button to begin the software installation process User Guide Click the User Guide button to open the PDF file of this User Guide Diagnostic Click the Diagnostic button to run a diagnostic check on your installed Notebook Adapter s Wireless Network Monitor and driver Exit Click the Exit button to exit the...

Page 13: ...ble Wireless Network list Manual Setup If your network is not listed on this screen select Advanced Setup to set up the adapter manually This method of setting up the Adapter is intended for Advanced Users only The setup for each option is described step by step under the appropriate heading on the following pages Click Exit to close the Setup Wizard if you wish to set up the Adapter later Availab...

Page 14: ...you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Then click Connect and proceed to Step 3 WPA Personal Wi Fi Protected Access If your network has the wireless security WPA Personal enabled this screen will appear En...

Page 15: ...roceed to Step 3 3 After the software has been successfully installed the Congratulations screen will appear Click Finish to exit For more information about the Wireless Network Monitor refer to Chapter 5 Using the Wireless Network Monitor Congratulations The installation of the Wireless N Notebook Adapter is complete To check the link information search for available wireless networks or make add...

Page 16: ...ault Gateway Enter the IP address of your network s Gateway here DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network here Click the Next button to continue or click the Back button to return to the previous screen 3 The Wireless Mode screen shows a choice of two wireless modes Click the Infrastructure Mode radio button if you want to connect to a wireless router or access point Cl...

Page 17: ...PA2 stands for Wi Fi Protected Access 2 WPA is a stronger security method than WEP WPA2 is a stronger security method than WPA RADIUS stands for Remote Authentication Dial In User Service Click the Next button to continue or the Back button to return to the previous screen Proceed to the appropriate section for your security method WEP WPA Personal WPA2 Personal or RADIUS WEP WEP Select 64 bit or ...

Page 18: ...reen WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Pre shared Key that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES from the Encryption drop down menu Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click the Nex...

Page 19: ... you have installed to authenticate you on your wireless network Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional F...

Page 20: ...rk Monitor click Exit 5 The Congratulations screen will appear next Click Connect to Network to implement the new settings and return to the Link Information screen Click Return to Profiles screen to return to the Profiles screen Congratulations Your advanced setup through the Wireless Network Monitor is complete To check the link information search for available wireless networks or make addition...

Page 21: ... signal is and how good the connection s quality is You can also click the More Information button to view additional status information about the current wireless connection To search for available wireless networks click the Connect tab To perform configuration changes or create connection profiles click the Profiles tab Link Information The Link Information screen displays network mode signal s...

Page 22: ... Authentication This is your wireless network s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS1 This is the DNS address of the Adapter MAC Address The MAC address of the wireless network s access point or wireless router is show...

Page 23: ... shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or since the Refresh Statistics button was last pressed Driver Version This shows the version of the Adapter s driver Noise Level This shows the level of background noise affecting the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of the ...

Page 24: ...ere MAC Address The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has encryption enabled then you will see a new screen appear If the network has the wireless security WEP e...

Page 25: ...s the Wireless N primary channel used with a 40 MHz radio band network Standard Channel This displays the channel used by your wireless network Security The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click Connect New Click ...

Page 26: ... Networks The available networks are listed in the table on the center of the screen by Wireless Network Name Select the wireless network you wish to connect to and click the Connect button If you do not see your network listed you can click the Refresh button to bring the list up again If the network utilizes wireless security you will need to configure security on the Adapter If not you will be ...

Page 27: ...curity WPA Personal enabled this screen will appear Encryption Select the type of algorithm you want to use TKIP or AES from the Encryption drop down menu Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Then click Connect and proceed to Step 3 WPA2 Personal Wi Fi Protected Access 2 If your network has the wireless security WPA2 Personal enabled this screen will...

Page 28: ...ick the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addresses leave these fields empty IP Address This IP Address must be unique to your network Subnet Mask The Adapter s Subnet Mask must ...

Page 29: ...all the devices in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click the Next button to continue or click the Back button to return to the previous screen 4 If you chose Infrastructure Mode go to Step 5 now If you chose Ad Hoc Mode the Ad Hoc Mode Settings screen will appear Network Mode Select the Network Mode in which y...

Page 30: ... your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecim...

Page 31: ...Key of 8 63 characters in the Pre shared Key field Click the Next button to continue or the Back button to return to the previous screen WPA2 Personal Enter a Pre shared Key that is 8 63 characters in length Pre shared Key Enter a Pre shared Key of 8 63 characters in the Pre shared Key field Click the Next button to continue or the Back button to return to the previous screen wpa wi fi protected a...

Page 32: ...stalled to authenticate you on your wireless network Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Cert...

Page 33: ... button To exit the Advanced Setup through the Wireless Network Monitor click Exit 7 The Congratulations screen will appear next Click Connect to Network to implement the new settings immediately and return to the Link Information screen Click Return to Profiles Screen to keep the current settings active and return to the Profiles screen Congratulations The profile has been successfully configured...

Page 34: ...ture configuration Make sure that the notebook or desktop is powered on Make sure that the Wireless N Notebook Adapter is configured with the same Wireless Network Name SSID and WEP settings as the other computers in the Infrastructure configuration Frequently Asked Questions Can I run an application from a remote computer over the wireless network This will depend on whether or not the applicatio...

Page 35: ...tation Power Management What is ad hoc mode When a wireless network is set to ad hoc mode the wireless equipped computers are configured to communicate directly with each other This type of network will not communicate with any wired network What is infrastructure mode When a wireless network is set to infrastructure mode the wireless network is configured to communicate with a wired network throu...

Page 36: ...uency technique developed by the military for use in reliable secure mission critical communications systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver kno...

Page 37: ...Notebook Adapter What is WPA WPA is Wi Fi Protected Access a wireless security protocol that can be used in conjunction with a RADIUS server What is RADIUS RADIUS is Remote Authentication Dial In User Service which uses an authentication server to control network access ...

Page 38: ...ss Network Monitor and select Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network Monitor 1 After installing the Adapter the Windows XP Wireless Zero Configuration icon will appear in your computer s system tray Double click the icon Figure B 1 Wireless Network Monitor...

Page 39: ... does not have wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect Anyway button to connect the Adapter to your network NOTE Steps 2 and 3 are the instructions and screenshots for Windows XP with Service Pack 2 installed Figure B 4 Available Wireless Network Figure B 5 No...

Page 40: ... wireless network will appear as Connected when your connection is active For more information about wireless networking on a Windows XP computer click the Start button select Help and choose Support Enter the keyword wireless in the field provided and press the Enter key The installation of the Windows XP Wireless Configuration is complete NOTE Windows XP Wireless Zero Configuration does not supp...

Page 41: ...mance 7 Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps y...

Page 42: ...is makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possib...

Page 43: ...IUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network encryption should be used These security recommendations should help keep your mind at ease while you are enjoying the ...

Page 44: ...tions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared...

Page 45: ... and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy Chain A m...

Page 46: ...et IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files over a TCP IP net...

Page 47: ...age and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard mail server ...

Page 48: ...rk s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for makin...

Page 49: ...ess of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associated devices that...

Page 50: ...Link Act Protocols 802 11b CCK QPSK BPSK 802 11g OFDM Wireless N BPSK QPSK 16 QAM 64 QAM Transmitted Power 802 11g 14 1dBm Typical Wireless N 10 1dBm Typical Receive Sensitivity 54Mbps 70dBm Typical Wireless N 70dBm Typical Power Consumption TX 700mA Maximum RX 540mA Maximum Security Features WEP WPA and WPA2 Encryption Security Dimensions 124 mm x 9 mm x 54 mm Unit Weight 0 05 kg Power 3 3 V Oper...

Page 51: ...45 Appendix F Specifications Wireless N Notebook Adapter Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 52: ...TY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated repaired or ...

Page 53: ...rrect the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for...

Page 54: ...N Notebook Adapter Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Conformity with Regard to the EU Directive 1999 5 EC R TTE Directive ...

Page 55: ...s de l UE et dans tous les pays ayant transposés la directive 1999 5 CE sans aucune limitation excepté pour les pays mentionnés ci dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt werden...

Page 56: ...ore details Dans la cas d une utilisation en extérieur la puissance de sortie est limitée pour certaines parties de la bande Reportez vous à la table 1 ou visitez http www arcep fr pour de plus amples détails Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy Unless operating within the boundaries of the owner s...

Page 57: ...antennas resulting in a radiated power level exceeding 100 mW EIRP are illegal Power Output of Your Device To comply with your country s regulations you may have to change the power output of your wireless device Proceed to the appropriate section for your device Wireless Adapters Wireless adapters have the power output set to 100 by default Maximum power output on each adapter does not exceed 20 ...

Page 58: ... wireless product use its Web based Utility to configure its power output setting refer to the product s documentation for more information Technical Documents on www linksys com international Follow these steps to access technical documents 1 Enter http www linksys com international in your web browser 2 Select the country or region in which you live 3 Click the Products tab 4 Select the appropri...

Page 59: ...red by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electronic products bearing the following symbol ...

Page 60: ...54 Appendix H Regulatory Information Wireless N Notebook Adapter ...

Page 61: ...55 Appendix H Regulatory Information Wireless N Notebook Adapter ...

Page 62: ...56 Appendix H Regulatory Information Wireless N Notebook Adapter ...

Page 63: ...57 Appendix H Regulatory Information Wireless N Notebook Adapter For more information visit www linksys com ...

Page 64: ... linksys com Czech Republic support cz linksys com Denmark support dk linksys com Finland support fi linksys com France support fr linksys com Germany support de linksys com Greece support gr linksys com English only Hungary support hu linksys com Ireland support ie linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Poland support pl linksys c...

Page 65: ...of Europe E mail Address Asia Pacific asiasupport linksys com English only Latin America support portuguese linksys com or support spanish linksys com Middle East Africa support mea linksys com English only South Africa support ze linksys com English only UAE support ae linksys com English only U S and Canada support linksys com ...

Reviews: