Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco, and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered...
Chapter 1 Chapter 1: USB Extension Base Product Overview Thank you for choosing the Linksys by Cisco Wireless-N USB Network Adapter with Dual-Band. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings.
Page 7
Advanced Configuration Chapter 3 To connect to a wireless network, go to How to Connect to 5. The Checking Connection screen appears while the a Wireless Network, page 4. To disconnect from a wireless Wireless Manager establishes the wireless connection. network, select the network, and click Disconnect.
Page 8
Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: If your wireless network is NOT hidden, select My network is not hidden, and then click Next. Follow the instructions on the next NOTE: By default, a wireless network’s router screen—verify that your network router is broadcasts the network name (SSID).
Page 9
Advanced Configuration Chapter 3 How to Connect Using Wi-Fi Protected Setup 5. The Checking Connection screen appears. On the Connect to a Wireless Network screen, the Wi-Fi Protected Setup icon ( ) indicates a network that supports Wi-Fi Protected Setup. Follow these instructions to connect to a wireless network using Wi-Fi Protected Setup.
Page 10
Advanced Configuration Chapter 3 5. The Adapter connects to the network. Enter the Adapter’s PIN Number Connecting to the Network via Wi-Fi Protected Setup Enter the PIN Number 1. Access the web-based utility of the router. (Refer to the NOTE: If the connection cannot be set up, the router’s documentation for instructions.) message, “Registration failed”...
Advanced Configuration Chapter 3 Saved Networks How to Connect to a Saved Network To connect to a saved network, follow these instructions. When you connect to a wireless network, you can save its settings so that it will be easier to reconnect to the network 1.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot.
Windows Vista Configuration Appendix B Appendix B: 3. Select your network, and then click Connect. Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon 4.
Page 14
Windows Vista Configuration Appendix B 5. Enter the security key, WEP key, or passphrase (also 7. This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
Page 15
Windows Vista Configuration Appendix B 9. This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
Windows XP Wireless Zero Configuration Appendix C Appendix C: 3. Select Linksys Wireless Manager from the list of programs in the Add or Remove Programs window. Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration Windows XP has a built-in wireless configuration utility. If you prefer to use the Windows XP Wireless Zero Configuration Utility to control your adapter, you must first uninstall the Linksys Wireless Manager.
Page 17
Windows XP Wireless Zero Configuration Appendix C 7. A window will open displaying the available wireless 9. If your network uses WEP wireless security, enter the networks. Select the network that you want and click WEP Key in the Network Key and Confirm network key Connect.
Warranty Information Appendix E Appendix E: not warrant that the operation of the product or software will be uninterrupted or error free. Also, due to the Warranty Information continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the product, software or any equipment, system or Limited Warranty network on which the product or software is used will be...
Page 20
Warranty Information Appendix E DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk.
Regulatory Information Appendix F Appendix F: SAR compliance has been established in typical laptop computer(s) with ExpressCard, Cardbus, or USB slots, and Regulatory Information this product can be used in a typical laptop computer with ExpressCard, Cardbus, or USB slots. Other applications such as a handheld PC or similar device has not been FCC Statement verified and may not comply with related RF exposure...
Regulatory Information Appendix F gain is strictly prohibited per regulations of Industry interdit d’utiliser une antenne ayant un gain supérieur. Canada. The required antenna impedance is 50 ohms. L’impédance d’antenne requise est de 50 ohms. The maximum antenna gain (Please see the table below) 3.
Regulatory Information Appendix F User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
Page 24
Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 25
Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 26
Regulatory Information Appendix F Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
Page 28
You permitted by law notwithstanding this provision); (iii) agree that Cisco is not responsible or liable for any loss share, sell, rent, lease, or sublicense the Software or or damage of any sort incurred as the result of any such related Documentation;...
Page 29
Cisco product and/or Software indicates your acceptance ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. of the terms of the Cisco Privacy Policy, so please review Without limiting the foregoing, Cisco does not warrant the policy carefully and check the Web site above to that the operation of the product, software or services will review updates to it.
Page 30
Disclaimer of Liabilities. TO THE EXTENT NOT PROHIBITED supersedes any conflicting or additional terms contained BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL,...
Page 31
If this Cisco product contains open source software any problems introduced by others will not reflect on the licensed under Version 2 of the “GNU General Public...
Page 32
Software End User License Agreement Appendix G 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
Page 33
Software End User License Agreement Appendix G 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
Page 34
If this Cisco product contains open source software licensed with the library after making changes to the library and under Version 2.1 of the “GNU Lesser General Public recompiling it.
Page 35
Software End User License Agreement Appendix G Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
Page 36
Software End User License Agreement Appendix G (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
Page 37
Software End User License Agreement Appendix G a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
Page 38
Software End User License Agreement Appendix G 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
Page 39
(tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Cisco product contains open source OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND software licensed under the OpenSSL license then the...
Page 40
Software End User License Agreement Appendix G 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...