hit counter script
Cisco Linksys WUSB600N User Manual

Cisco Linksys WUSB600N User Manual

Wireless-n usb network adapter with dual-band
Hide thumbs Also See for Linksys WUSB600N:

Advertisement

USER GUIDE
Wireless-N USB Network Adapter
with Dual-Band
WUSB600N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WUSB600N

  • Page 1 USER GUIDE Wireless-N USB Network Adapter with Dual-Band WUSB600N Model:...
  • Page 2: About This Guide

    Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco, and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered...
  • Page 3: Table Of Contents

    Cisco Products ........
  • Page 4: Chapter 1: Product Overview

    Chapter 1 Chapter 1: USB Extension Base Product Overview Thank you for choosing the Linksys by Cisco Wireless-N USB Network Adapter with Dual-Band. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Configuration

    Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings.
  • Page 7 Advanced Configuration Chapter 3 To connect to a wireless network, go to How to Connect to 5. The Checking Connection screen appears while the a Wireless Network, page 4. To disconnect from a wireless Wireless Manager establishes the wireless connection. network, select the network, and click Disconnect.
  • Page 8 Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: If your wireless network is NOT hidden, select My network is not hidden, and then click Next. Follow the instructions on the next NOTE: By default, a wireless network’s router screen—verify that your network router is broadcasts the network name (SSID).
  • Page 9 Advanced Configuration Chapter 3 How to Connect Using Wi-Fi Protected Setup 5. The Checking Connection screen appears. On the Connect to a Wireless Network screen, the Wi-Fi Protected Setup icon ( ) indicates a network that supports Wi-Fi Protected Setup. Follow these instructions to connect to a wireless network using Wi-Fi Protected Setup.
  • Page 10 Advanced Configuration Chapter 3 5. The Adapter connects to the network. Enter the Adapter’s PIN Number Connecting to the Network via Wi-Fi Protected Setup Enter the PIN Number 1. Access the web-based utility of the router. (Refer to the NOTE: If the connection cannot be set up, the router’s documentation for instructions.) message, “Registration failed”...
  • Page 11: Saved Networks

    Advanced Configuration Chapter 3 Saved Networks How to Connect to a Saved Network To connect to a saved network, follow these instructions. When you connect to a wireless network, you can save its settings so that it will be easier to reconnect to the network 1.
  • Page 12: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot.
  • Page 13: Appendix B: Windows Vista Configuration

    Windows Vista Configuration Appendix B Appendix B: 3. Select your network, and then click Connect. Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon 4.
  • Page 14 Windows Vista Configuration Appendix B 5. Enter the security key, WEP key, or passphrase (also 7. This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
  • Page 15 Windows Vista Configuration Appendix B 9. This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
  • Page 16: Appendix C: Windows Xp Wireless Zero Configuration

    Windows XP Wireless Zero Configuration Appendix C Appendix C: 3. Select Linksys Wireless Manager from the list of programs in the Add or Remove Programs window. Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration Windows XP has a built-in wireless configuration utility. If you prefer to use the Windows XP Wireless Zero Configuration Utility to control your adapter, you must first uninstall the Linksys Wireless Manager.
  • Page 17 Windows XP Wireless Zero Configuration Appendix C 7. A window will open displaying the available wireless 9. If your network uses WEP wireless security, enter the networks. Select the network that you want and click WEP Key in the Network Key and Confirm network key Connect.
  • Page 18: Appendix D: Specifications

    Specifications Appendix D Appendix D: Environmental Dimensions 3.15" x 1.00" x 0.49" Specifications (79.9 x 25.4 x 12.4 mm) Weight 0.39 oz (11 g) Model WUSB600N Certification FCC, CE, IC, UL, RoHS, WEEE, IDA, Standards 802.11a, 802.11b, C-Tick, Wi-Fi A/B/G/Draft-N 802.11g, Draft 802.11n Operating Temp.
  • Page 19: Appendix E: Warranty Information

    Warranty Information Appendix E Appendix E: not warrant that the operation of the product or software will be uninterrupted or error free. Also, due to the Warranty Information continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the product, software or any equipment, system or Limited Warranty network on which the product or software is used will be...
  • Page 20 Warranty Information Appendix E DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk.
  • Page 21: Appendix F: Regulatory Information

    Regulatory Information Appendix F Appendix F: SAR compliance has been established in typical laptop computer(s) with ExpressCard, Cardbus, or USB slots, and Regulatory Information this product can be used in a typical laptop computer with ExpressCard, Cardbus, or USB slots. Other applications such as a handheld PC or similar device has not been FCC Statement verified and may not comply with related RF exposure...
  • Page 22: Avis D'industrie Canada

    Regulatory Information Appendix F gain is strictly prohibited per regulations of Industry interdit d’utiliser une antenne ayant un gain supérieur. Canada. The required antenna impedance is 50 ohms. L’impédance d’antenne requise est de 50 ohms. The maximum antenna gain (Please see the table below) 3.
  • Page 23: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix F User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 24 Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 25 Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 26 Regulatory Information Appendix F Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 27: Appendix G: Software End User License Agreement

    If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
  • Page 28 You permitted by law notwithstanding this provision); (iii) agree that Cisco is not responsible or liable for any loss share, sell, rent, lease, or sublicense the Software or or damage of any sort incurred as the result of any such related Documentation;...
  • Page 29 Cisco product and/or Software indicates your acceptance ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. of the terms of the Cisco Privacy Policy, so please review Without limiting the foregoing, Cisco does not warrant the policy carefully and check the Web site above to that the operation of the product, software or services will review updates to it.
  • Page 30 Disclaimer of Liabilities. TO THE EXTENT NOT PROHIBITED supersedes any conflicting or additional terms contained BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL,...
  • Page 31 If this Cisco product contains open source software any problems introduced by others will not reflect on the licensed under Version 2 of the “GNU General Public...
  • Page 32 Software End User License Agreement Appendix G 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
  • Page 33 Software End User License Agreement Appendix G 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 34 If this Cisco product contains open source software licensed with the library after making changes to the library and under Version 2.1 of the “GNU Lesser General Public recompiling it.
  • Page 35 Software End User License Agreement Appendix G Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 36 Software End User License Agreement Appendix G (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 37 Software End User License Agreement Appendix G a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 38 Software End User License Agreement Appendix G 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
  • Page 39 (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Cisco product contains open source OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND software licensed under the OpenSSL license then the...
  • Page 40 Software End User License Agreement Appendix G 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

Table of Contents