USER GUIDE Wireless-N USB Network Adapter with Dual-Band Model: WUSB600N
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 Storing the Cap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 USB Extension Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview USB Extension Base Thank you for choosing the Linksys by Cisco Wireless-N USB Network Adapter with Dual-Band. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection. LED Link (Blue) The LED flashes when there is wireless network activity.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings. How to Access the Wireless Manager After you have installed the Adapter, the Linksys Wireless Manager icon appears in the system tray of your computer.
Advanced Configuration Chapter 3 To connect to a wireless network, go to How to Connect to a Wireless Network, page 4. To disconnect from a wireless network, select the network, and click Disconnect. To refresh the list of available networks, click Search Again. 5. The Checking Connection screen appears while the Wireless Manager establishes the wireless connection. When it is finished, click Next.
Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: By default, a wireless network’s router broadcasts the network name (SSID). A “hidden” wireless network is a network whose router has been configured not to broadcast the network name (SSID). Follow these instructions to connect to a wireless network that is not listed on the Connect to a Wireless Network screen. NOTE: If your wireless network is NOT hidden, select My network is not hidden, and then click Next.
Advanced Configuration Chapter 3 5. The Checking Connection screen appears. How to Connect Using Wi-Fi Protected Setup On the Connect to a Wireless Network screen, the Wi-Fi Protected Setup icon ( ) indicates a network that supports Wi-Fi Protected Setup. Follow these instructions to connect to a wireless network using Wi-Fi Protected Setup. NOTE: Before you begin, make sure the router and the computer with the Adapter are in the same room. 1.
Advanced Configuration Chapter 3 5. The Adapter connects to the network. Connecting to the Network via Wi-Fi Protected Setup NOTE: If the connection cannot be set up, the message, “Registration failed” appears. If this happens, use one of two options: •• Push Button Press the router’s Wi-Fi Protected Setup button until an LED lights up. Then click Connect to try again. •• PIN Click Skip, and then go to Enter the Adapter’s PIN Number, page 7. 6. The Connected to Your Network screen appears.
Advanced Configuration Chapter 3 Saved Networks How to Connect to a Saved Network When you connect to a wireless network, you can save its settings so that it will be easier to reconnect to the network at a later time. This is most helpful with hidden networks; if you do not save a hidden network’s settings, you will have to enter the network name (SSID) and security key. To connect to a saved network, follow these instructions. 1.
Appendix A Troubleshooting Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot. Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. 1. Make sure that the computers are powered on. 2.
Windows Vista Configuration Appendix B Appendix B: Windows Vista Configuration 3. Select your network, and then click Connect. Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears. 4.
Windows Vista Configuration Appendix B 5. Enter the security key, WEP key, or passphrase (also known as a pre‑shared key), depending on your type of security. Click Connect. 7. This screen appears when you are connected to your network. Select Save this network, if you want to save your settings. Click Close. Secured Network Connected to Network 6. This screen appears while the Adapter connects to your network. Do not cancel, unless you want to end the installation. 8.
Windows Vista Configuration Appendix B 9. This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start > Help and Support. button Your computer is now connected to your wireless network.
Windows XP Wireless Zero Configuration Appendix C Appendix C: Windows XP Wireless Zero Configuration 3. Select Linksys Wireless Manager from the list of programs in the Add or Remove Programs window. Windows XP Wireless Zero Configuration Windows XP has a built-in wireless configuration utility. If you prefer to use the Windows XP Wireless Zero Configuration Utility to control your adapter, you must first uninstall the Linksys Wireless Manager.
Windows XP Wireless Zero Configuration Appendix C 7. A window will open displaying the available wireless networks. Select the network that you want and click Connect. If your network does not have wireless security enabled, go to step 8. 9. If your network uses WEP wireless security, enter the WEP Key in the Network Key and Confirm network key fields. If your network uses WPA Personal wireless security, enter the Passphrase in the Network Key and Confirm network key fields. Click Connect.
Specifications Appendix D Appendix D: Specifications Environmental Model WUSB600N Standards 802.11a, 802.11b, 802.11g, Draft 802.11n LEDs Link/Act Number of Antennas 2 Internal Antennas Transmitted Power Receive Sensitivity 2.4 GHz @ 11 Mbps data rate: 18 dBm ± 1.5 dBm 2.4 GHz @ 54 Mbps data rate: 14 dBm ± 1.5 dBm 5 GHz @ 54Mbps data rate: 12 dBm ± 1.5 dBm 2.4 GHz, 11N (MCS0, HT20/40): 18 dBm ± 1.5 dBm 2.4 GHz, 11N (MCS8, HT20/40): 18 dBm ± 1.5 dBm 2.4 GHz, 11N (MCS15, HT20/40): 12 dBm ± 1.
Appendix E Appendix E: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) re
Appendix E Warranty Information DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk. You must include the RMA number and a copy of your dated proof of original purchase when returning your product.
Regulatory Information Appendix F Appendix F: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
Regulatory Information Appendix F gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. interdit d’utiliser une antenne ayant un gain supérieur. L’impédance d’antenne requise est de 50 ohms. The maximum antenna gain (Please see the table below) permitted (for devices in the bands 5250-5350 MHz and 5470-5725 MHz) to comply with the E.I.R.P. limit: 3.
Appendix F User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix F Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix F Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix F Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenščina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix G Appendix G: Software End User License Agreement Cisco Products This product from Cisco Systems, Inc. or its subsidiary licensing the Software instead of Cisco Systems, Inc. (“Cisco”) contains software (including firmware) originating from Cisco and its suppliers and may also contain software from the open source community. Any software originating from Cisco and its suppliers is licensed under the Cisco Software License Agreement contained at Schedule 1 below.
Appendix G License Restrictions.
Appendix G Software can enable any other computer (on the same primary network) to generate reports. When a computer is enabled, that computer shows a notification that it is being monitored. As long as that computer is enabled, each time the Software is started the user of that particular computer will see a notification that it is being monitored by the reports feature. Any computer on the network with the Software installed can enable or disable any other computer from the reports feature.
Appendix G Software End User License Agreement Disclaimer of Liabilities.
Appendix G send you Service related email messages as long as you are a subscriber to the Service. If you wish to opt-out of receiving Service related email messages, you may cancel the Service by providing written notice via www. networkmagic.com/support to Cisco of such cancellation and uninstalling the Software and discontinuing your use of the Service.
Appendix G 1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
Appendix G 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
Appendix G 12.
Appendix G Public License permits more lax criteria for linking other code with the library. We call this license the “Lesser” General Public License because it does Less to protect the user’s freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
Appendix G Software End User License Agreement (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.
Appendix G a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
Appendix G 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix G Schedule 3-C OPENSSL LICENSE If this Cisco product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Appendix G Software End User License Agreement 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written by Eric Young (eay@cryptsoft.