hit counter script
Cisco LINKSYS WUSB100 User Manual
Cisco LINKSYS WUSB100 User Manual

Cisco LINKSYS WUSB100 User Manual

Rangeplus wireless network usb adapter
Hide thumbs Also See for LINKSYS WUSB100:

Advertisement

Quick Links

USER GUIDE
RangePlus Wireless
Network USB Adapter
WUSB100
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco LINKSYS WUSB100

  • Page 1 USER GUIDE RangePlus Wireless Network USB Adapter WUSB100 Model:...
  • Page 2: About This Guide

    Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview LED ............1 Chapter 2: Wireless Security Checklist General Network Security Guidelines .
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys RangePlus Wireless Network USB Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Advanced Configuration

    Configuration Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the link information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
  • Page 7: Connect

    Configuration Chapter 3 Wide Channel This is the Wireless-N primary channel Packets Received This shows the packets that the used with a 40 MHz radio band network. Adapter receives, in real time, after connecting to the wireless network or after clicking Refresh. Standard Channel This is the channel used by your wireless network.
  • Page 8 Configuration Chapter 3 Click Continue Make sure you have the security settings of your wireless network, and then click Continue. Connect Proceed to the instructions for the wireless security screen you see: Wireless Network Name This is the SSID or unique name of the wireless network.
  • Page 9: Profiles

    Configuration Chapter 3 Profiles WPA (Wi-Fi Protected Access) If the network has WPA Personal security enabled, then The Profiles screen lets you save different configuration you see the WPA Personal Needed for Connection screen. profiles for different network setups. The table on the left displays a list of available profiles with their profile names and wireless network names.
  • Page 10 Configuration Chapter 3 Export Select the profile you want to save in a different If you have wireless security enabled on your network, location, and click Export. Direct Windows to the continue to step 2. If you do not have wireless security appropriate folder, and click Save.
  • Page 11 Configuration Chapter 3 WEP Key If you do not have the Passphrase, enter Pre-shared Key Enter the network’s Pre-shared Key of 8- the WEP key, which must match the WEP key of your 63 characters. wireless network. For 64-bit encryption, enter exactly 10 Click Connect and proceed to step 3.
  • Page 12 Configuration Chapter 3 Network Settings screen appears. Wireless Mode Infrastructure Mode Select this mode if you want Wireless Network – to connect to a wireless router or access point. If your network has a router or other DHCP server, select Ad-Hoc Mode Select this mode if you want to –...
  • Page 13 Configuration Chapter 3 If your wireless network does not have wireless security, Passphrase Enter the network’s Passphrase, so a WEP select Disabled and then click Next to continue. key is automatically generated. It is case-sensitive and Proceed to step 6. should not be longer than 16 alphanumeric characters.
  • Page 14 Configuration Chapter 3 WPA2 Personal If you selected EAP-TLS, configure the following: Login Name Enter the login name of your wireless WPA2 Personal uses the encryption method, AES, with network. dynamic encryption keys. Server Name Enter the name of the authentication server (this is optional).
  • Page 15 Configuration Chapter 3 Authentication Select the authentication method your Server Name Enter the name of the authentication server network is using, EAP-TLS or PEAP. (this is optional). Certificate Select the certificate you installed to EAP-TLS authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any.
  • Page 16: How To Access The Diagnostics Utility

    Configuration Chapter 3 PEAP Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. RADIUS - PEAP If you selected PEAP, configure the following: Login Name...
  • Page 17: How To Use The Diagnostics Utility

    Configuration Chapter 3 To uninstall the Diagnostics utility, click Uninstall. To open the Monitor, click Wireless Network Monitor. How to Use the Diagnostics Utility After you run the Diagnostics utility, the results are displayed. Diagnostic Results - Passed If the Adapter has passed all tests, then click Exit to close the Diagnostics utility.
  • Page 18: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot.
  • Page 19: Appendix B: Windows Xp Wireless Zero Configuration

    Windows XP Wireless Zero Configuration Appendix B Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration Icon The screen that appears will show any available Windows XP Wireless Zero Configuration wireless network. Select the network you want. Click Connect.
  • Page 20 Windows XP Wireless Zero Configuration Appendix B Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
  • Page 21: Appendix C: Specifications

    Specifications Appendix C Appendix C: Specifications Model WUSB100 Standards IEEE 802.11b, IEEE 802.11g LEDs Number of Antennas 2 Internal Antennas Connector Type Modulations 802.11b: CCK, QPSK, BPSK 802.11g: 64-QAM, 16-QAM 802.11n draft: BPSK, QPSK, 16-QAM, 64-QAM RF Power (EIRP) in dBm 802.11b: 17.6 dBm...
  • Page 22: Appendix D: Warranty Information

    Warranty Information Appendix D Appendix D: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 23: Technical Support

    Warranty Information Appendix D rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 24: Appendix E: Regulatory Information

    Regulatory Information Appendix E Appendix E: This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE Regulatory Information 802.11b or 802.11g operation of this product in the USA is firmware-limited to channels 1 through 11. Safety Notices FCC Statement Caution: To reduce the risk of fire, use only No.26 AWG...
  • Page 25: Avis D'industrie Canada

    Regulatory Information Appendix E Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 26: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix E User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 27 Regulatory Information Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 28 Regulatory Information Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 29 Regulatory Information Appendix E Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 30: Appendix F: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 31 Software License Agreement Appendix F used in accordance with the terms of this Agreement; SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF (iii) to provide improvements to the way Linksys delivers THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL technology to you and to other Linksys customers;...
  • Page 32 Software License Agreement Appendix F freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
  • Page 33 Software License Agreement Appendix F If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 34 Software License Agreement Appendix F If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 35 Software License Agreement Appendix F This product includes software written by Tim Hudson EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Linksys product contains open OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND source software licensed under the OpenSSL license ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,...
  • Page 36 Software License Agreement Appendix F The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...

Table of Contents