USER GUIDE Wireless-N Access Point with Dual-Band Model: WAP610N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 LEDs Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Ports Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-N Access Point with Dual-Band. The Wireless-N Access Point with Dual-Band adds wireless capability to your existing wired network, or upgrades older wireless networks to Wireless-N performance. For first-time installation, run the Setup Wizard on the enclosed CD. To configure advanced settings, use the convenient, browser-based utility.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Access Point with the Setup Wizard (located on the CD-ROM), the Access Point will be ready for use. However, if you want to change its advanced settings, use the Access Point’s browser-based utility. This chapter describes each page of the utility and each page’s key functions. You can access the utility via a web browser on a computer networked with the Access Point.
Chapter 3 If you want to set a permanent static IP address for the Access Point, then select Static IP. If you select Static IP, then complete the following fields: •• Static IP Address Enter a unique IP address that will be used to access the browser-based utility. •• Subnet Mask Enter the subnet mask of your wired network. •• Default Gateway Enter the IP address of the default gateway for your network (in most cases, this is your router).
Advanced Configuration Chapter 3 you do not want to broadcast the Access Point’s SSID, then select Disabled. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. WPA2 Personal WPA2 is a more advanced, more secure version of WPA. Wireless > Wireless Security The Access Point supports the following wireless security options: WPA Personal, WPA2 Personal, WPA Enterprise, WPA2 Enterprise, and WEP.
Advanced Configuration Chapter 3 Key Renewal Enter a Key Renewal period, which instructs the Access Point how often it should change the encryption keys. The default Key Renewal period is 3600 seconds. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Access Point.
Advanced Configuration Chapter 3 b. Within two minutes, click the Wi‑Fi Protected Setup button on the Access Point’s Wi-Fi Protected Setup screen. c. After the client device has been configured, click OK. Then refer back to your client device or its documentation for further instructions Congratulations The Wi-Fi Protected Setup Status, Wireless Band, Network Name (SSID), and Security method are displayed at the bottom of the screen.
Advanced Configuration Chapter 3 WMM® Wireless Client List Access Mode You can assign different settings to the four access modes available. Select the mode you want to configure: Background, Best Effort, Video, or Voice. Follow the instructions for the mode you select. Wireless Client List This screen shows computers and other devices on the wireless network. The list can be sorted by MAC Address and Status.
Advanced Configuration Chapter 3 TXOP for STA This option defines the Transmission Opportunity for an STA in BSS. The range is 0 to 8192. The default is 0. CW Min for AP This option defines the minimum contention window limits from which the random backoff is computed for AP. The range is 15 to 1023. The default is 15. CW Max for AP This option defines the maximum contention window limits from which the random backoff is computed for AP. The range is 15 to 1023. The default is 1023.
Chapter 3 ADDBA Timeout This option defines the duration after which the ADDBA setup is terminated, if there are no frame exchanges within this duration by the Block Acknowledgement (ACK) agreement. The range is 0 to 65535 ms. The default is 0, which disables the timeout. Aggregation Window Size This option defines the maximum number of packets transmitted without getting ACKs. The range is 0 to 64. The default is 64.
Advanced Configuration Chapter 3 Wireless > Advanced Wireless Settings Configure the Access Point’s advanced wireless functions. These settings should only be adjusted by an expert administrator as incorrect settings can reduce wireless performance. Wireless > Advanced Wireless Settings NOTE: The settings on the Advanced Wireless Settings screen are designed for advanced users only. Advanced Wireless AP Isolation This isolates all wireless clients and wireless devices on your network from each other.
Advanced Configuration Chapter 3 RTS Threshold Should you encounter inconsistent data flow, only minor reduction of the default value, 2347, is recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Access Point sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame.
Advanced Configuration Chapter 3 Before upgrading the firmware, download the Access Point’s firmware upgrade file from www.linksysbycisco.com. Firmware Upgrade Status > Wireless Network Information about your wireless network is displayed. Please select a file to upgrade the firmware Click Browse and select the firmware upgrade file. Then click Start to Upgrade and follow the on-screen instructions.
Troubleshooting Appendix A Appendix A: Troubleshooting WEB: If your questions are not addressed here, refer to the Linksys website, www.linksysbycisco.com The computer cannot connect wirelessly to the network. Make sure the wireless network name or SSID is the same on both the computer and the Access Point. If you have enabled wireless security, then make sure the same security method and key are used by both the computer and the Access Point. The Access Point’s IP address needs to be changed.
Specifications Appendix B Appendix B: Specifications Power 12V, 1A Certification FCC, UL/cUL, ICES-003, RSS210, Wi-Fi (IEEE 802.11a/b/g/draft n), WPA2™, Wi-Fi Protected Setup™, WMM®, CE Model WAP610N Standards IEEE 802.3u, 802.11g, 802.11b, 802.11a, Draft 802.11n Operating Temp. 32 to 104ºF (0 to 40ºC) Storage Temp.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) re
Appendix C Warranty Information DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product.
Regulatory Information Appendix D Appendix D: Regulatory Information The availability of some specific channels and/or operational frequency bands is country dependent and programmed at the factory to match the intended destination. This setting is not accessible by the end user. FCC Statement Safety Notices This device complies with Part 15 of the FCC Rules.
Regulatory Information Appendix D Industry Canada Statement Avis d’Industrie Canada This Class B digital apparatus complies with Canadian ICES-003 and RSS210. Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Operation is subject to the following two conditions: L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. This device may not cause interference and 2.
Appendix D Regulatory Information section ne doivent pas être capables de transmettre dans la bande 5 600-5 650 MHz afin de protéger les radars d’Environnement Canada qui l’utilisent. Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix E License Restrictions.
Appendix E Software can enable any other computer (on the same primary network) to generate reports. When a computer is enabled, that computer shows a notification that it is being monitored. As long as that computer is enabled, each time the Software is started the user of that particular computer will see a notification that it is being monitored by the reports feature. Any computer on the network with the Software installed can enable or disable any other computer from the reports feature.
Appendix E Software End User License Agreement Disclaimer of Liabilities.
Appendix E send you Service related email messages as long as you are a subscriber to the Service. If you wish to opt-out of receiving Service related email messages, you may cancel the Service by providing written notice via www. networkmagic.com/support to Cisco of such cancellation and uninstalling the Software and discontinuing your use of the Service.
Appendix E 1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Appendix E 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
Appendix E 12.
Appendix E Public License permits more lax criteria for linking other code with the library. We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
Appendix E Software End User License Agreement (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.
Appendix E a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Appendix E 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E Schedule 3-C OPENSSL LICENSE If this Cisco product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Appendix E Software End User License Agreement 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.