Network www.linksysbycisco.com/security Security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the RangePlus Wireless USB Network Adapter. The Adapter connects to your PC via a USB port, leaving your PC’s slots available for other purposes. The Adapter also lets you connect with any of the growing number of wireless hotspots in public places such as coffee shops, airports, hotels and convention centers.
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings.
Page 8
Advanced Configuration Chapter 3 To connect to a wireless network, proceed to How to 5. The Checking Connection screen appears while the Connect to a Wireless Network, page 4. To disconnect Wireless Manager establishes the wireless connection. from a wireless network, select the network from the list, When it is finished, click Next to continue.
Page 9
Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: If your wireless network is NOT hidden, select My Network is not hidden, and then click Next. Follow the instructions on the next NOTE: By default, a wireless network’s router screen—verify that your network router is turned broadcasts the network SSID (name).
Page 10
Advanced Configuration Chapter 3 5. The Checking Connection screen appears. How to Connect Using Wi-Fi Protected Setup On the Connect to a Wireless Network screen, the Wi-Fi Protected Setup icon ( ) indicates a network that supports Wi-Fi Protected Setup. Follow these instructions to connect to a wireless network using Wi-Fi Protected Setup.
Page 11
Advanced Configuration Chapter 3 5. The Adapter connects to the network. Enter the Adapter’s PIN Number Connecting to the Network via Wi-Fi Protected Setup Enter the PIN Number 1. Access the web-based utility of the router. (Refer to the NOTE: If the connection cannot be set up, router’s documentation for instructions.) the message Registration failed appears.
Advanced Configuration Chapter 3 How to Connect to a Saved Network Saved Networks To connect to a saved network, follow these instructions. When you connect to a wireless network, you can save its settings so that it will be easier to reconnect to the 1.
Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot.
Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
Page 16
Warranty Information Appendix C number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Regulatory Information Appendix D Appendix D: computer(s) with USB slot, and this product could be used in typical laptop computer(s) with USB slot. Other Regulatory Information applications like handheld PC or similar device have not been verified and may not be in compliance with related RF exposure rule and such use shall be prohibited.
Regulatory Information Appendix D Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Cet appareil numérique de la classe B est conforme à la data throughput rate, range and coverage.
Regulatory Information Appendix D Čeština (Czech) - Informace o ochraně životního User Information for Consumer Products prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
Page 20
Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 21
Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 22
Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
Page 24
Software and/or your use of either in order you must reproduce all copyright notices and any other (i) to enable Cisco to offer you Upgrades; (ii) to provide proprietary legends found on the original Software and support and assistance with your product and/or the Documentation;...
Page 25
TO THE EXTENT NOT PROHIBITED BY APPLICABLE Cisco product and/or Software indicates your acceptance LAW, ALL IMPLIED WARRANTIES AND CONDITIONS of the terms of the Cisco Privacy Policy, so please review OF MERCHANTABILITY, SATISFACTORY QUALITY OR the policy carefully and check the Web site above to FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO review updates to it.
Page 27
Software End User License Agreement Appendix E freedom to share and change free software--to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s 0.
Page 28
Software End User License Agreement Appendix E c. If the modified program normally reads commands c. Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement...
Page 29
General Public License from time to time. Such new versions will be similar in If this Cisco product contains open source software licensed spirit to the present version, but may differ in detail to under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
Page 30
Software End User License Agreement Appendix E To protect each distributor, we want to make it very clear GNU LESSER GENERAL PUBLIC LICENSE that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 31
Software End User License Agreement Appendix E freedom and the wherewithal to run that program using a 1. You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate...
Page 32
Software End User License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
Page 33
Software End User License Agreement Appendix E b) Use a suitable shared library mechanism for linking 8. You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
Page 34
Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Cisco product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3-C will apply to that open source software.
Page 35
Software End User License Agreement Appendix E The OpenSSL toolkit stays under a dual license, i.e. both This product includes cryptographic software written by the conditions of the OpenSSL License and the original Eric Young (eay@cryptsoft.com). This product includes SSLeay license apply to the toolkit. See below for the software written by Tim Hudson (tjh@cryptsoft.com).
Page 36
Software End User License Agreement Appendix E BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...