Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys RangePlus Wireless Network USB Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Configuration Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the link information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
Configuration Chapter 3 Wide Channel This is the Wireless-N primary channel Packets Received This shows the packets that the used with a 40 MHz radio band network. Adapter receives, in real time, after connecting to the wireless network or after clicking Refresh. Standard Channel This is the channel used by your wireless network.
Page 8
Configuration Chapter 3 Click Continue Make sure you have the security settings of your wireless network, and then click Continue. Connect Proceed to the instructions for the wireless security screen you see: Wireless Network Name This is the SSID or unique name of the wireless network.
Configuration Chapter 3 Profiles WPA (Wi-Fi Protected Access) If the network has WPA Personal security enabled, then The Profiles screen lets you save different configuration you see the WPA Personal Needed for Connection screen. profiles for different network setups. The table on the left displays a list of available profiles with their profile names and wireless network names.
Page 10
Configuration Chapter 3 Export Select the profile you want to save in a different If you have wireless security enabled on your network, location, and click Export. Direct Windows to the continue to step 2. If you do not have wireless security appropriate folder, and click Save.
Page 11
Configuration Chapter 3 WEP Key If you do not have the Passphrase, enter Pre-shared Key Enter the network’s Pre-shared Key of 8- the WEP key, which must match the WEP key of your 63 characters. wireless network. For 64-bit encryption, enter exactly 10 Click Connect and proceed to step 3.
Page 12
Configuration Chapter 3 Network Settings screen appears. Wireless Mode Infrastructure Mode Select this mode if you want Wireless Network – to connect to a wireless router or access point. If your network has a router or other DHCP server, select Ad-Hoc Mode Select this mode if you want to –...
Page 13
Configuration Chapter 3 If your wireless network does not have wireless security, Passphrase Enter the network’s Passphrase, so a WEP select Disabled and then click Next to continue. key is automatically generated. It is case-sensitive and Proceed to step 6. should not be longer than 16 alphanumeric characters.
Page 14
Configuration Chapter 3 WPA2 Personal If you selected EAP-TLS, configure the following: Login Name Enter the login name of your wireless WPA2 Personal uses the encryption method, AES, with network. dynamic encryption keys. Server Name Enter the name of the authentication server (this is optional).
Page 15
Configuration Chapter 3 Authentication Select the authentication method your Server Name Enter the name of the authentication server network is using, EAP-TLS or PEAP. (this is optional). Certificate Select the certificate you installed to EAP-TLS authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any.
Configuration Chapter 3 PEAP Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. RADIUS - PEAP If you selected PEAP, configure the following: Login Name...
Configuration Chapter 3 To uninstall the Diagnostics utility, click Uninstall. To open the Monitor, click Wireless Network Monitor. How to Use the Diagnostics Utility After you run the Diagnostics utility, the results are displayed. Diagnostic Results - Passed If the Adapter has passed all tests, then click Exit to close the Diagnostics utility.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot.
Windows XP Wireless Zero Configuration Appendix B Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration Icon The screen that appears will show any available Windows XP Wireless Zero Configuration wireless network. Select the network you want. Click Connect.
Page 20
Windows XP Wireless Zero Configuration Appendix B Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
Warranty Information Appendix D Appendix D: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
Warranty Information Appendix D rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix E Appendix E: This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE Regulatory Information 802.11b or 802.11g operation of this product in the USA is firmware-limited to channels 1 through 11. Safety Notices FCC Statement Caution: To reduce the risk of fire, use only No.26 AWG...
Regulatory Information Appendix E Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
Regulatory Information Appendix E User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
Page 27
Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 28
Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 29
Regulatory Information Appendix E Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
Page 31
Software License Agreement Appendix F used in accordance with the terms of this Agreement; SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF (iii) to provide improvements to the way Linksys delivers THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL technology to you and to other Linksys customers;...
Page 32
Software License Agreement Appendix F freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
Page 33
Software License Agreement Appendix F If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 34
Software License Agreement Appendix F If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
Page 35
Software License Agreement Appendix F This product includes software written by Tim Hudson EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Linksys product contains open OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND source software licensed under the OpenSSL license ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,...
Page 36
Software License Agreement Appendix F The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...