Cisco Linksys WUSB600N User Manual

Cisco Linksys WUSB600N User Manual

Dual-band wireless-n usb network adapter
Hide thumbs Also See for Linksys WUSB600N:

Advertisement

USER GUIDE
Dual-Band Wireless-N USB
Network Adapter
WUSB600N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WUSB600N

  • Page 1 USER GUIDE Dual-Band Wireless-N USB Network Adapter WUSB600N Model:...
  • Page 2: Copyright And Trademarks

    Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview LED ............1 Chapter 2: Wireless Security Checklist General Network Security Guidelines .
  • Page 4: Chapter1 Product Overview

    Product Overview Chapter1 Chapter : Product Overvew Thank you for choosing the Linksys Dual-Band Wireless-N USB Network Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter2 Chapter : 4. Enable encrypton Wreless Securty Checklst Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter3 Chapter 3: Advanced Confguraton Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
  • Page 7 Advanced Configuration Chapter3 Push Button (Recommended) Select this option to use Click Prnt to print out your wireless network settings. Then click Fnsh to return to the Status screen, or click the push button method. Ext to exit the Monitor. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router.
  • Page 8 Advanced Configuration Chapter3 On the Adapter’s PIN number screen, click Next. Congratulatons! The Adapter s connected to the network. Wireless Network Status The Wireless Network Status screen provides information on your current network settings. Enter the PIN Number The Adapter connects to the network. Wireless Network Status Rado Band This is the radio band used on the network.
  • Page 9: Connect

    Advanced Configuration Chapter3 Back Click Back to return to the initial Status screen. Up Tme This indicates the length of the most recent connection to a wireless network. Save to Profle Click Save to Profle to save the currently Total Up Tme active connection settings to a profile.
  • Page 10 Advanced Configuration Chapter3 Securty This is the security method used by the Congratulatons! The Adapter s connected to the network. network. W-F Protected Setup Click the W-F Protected Setup Wireless Security Enabled button to connect to a router that supports Wi-Fi If you connect to a network whose wireless security is Protected Setup.
  • Page 11 Advanced Configuration Chapter3 Passphrase Enter the network’s Passphrase (also Click Fnsh. called a pre-shared key) of 8-63 characters. To connect to the network, click Connect. To cancel the connection, click Cancel. WEP (Wred Equvalent Prvacy) If the network uses WEP encryption, then the WEP Key or Passphrase Needed for Connection screen appears.
  • Page 12 Advanced Configuration Chapter3 Use the Push Button Click Prnt to print out your wireless network settings. Then click Fnsh to return to the Status screen, or click Ext to exit the Monitor. Use the Push Button Press the W-F Protected Setup button on the Congratulations router.
  • Page 13 Advanced Configuration Chapter3 On the Adapter’s PIN number screen, click Next. Congratulatons! The Adapter s connected to the network. Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Enter the PIN Number The Adapter connects to the network.
  • Page 14 Advanced Configuration Chapter3 Proceed to the appropriate instructions. WPA (W-F Protected Access ) If the network uses WPA2 Personal security, then the WPA2-Personal Key Needed for Connection screen appears. WEP Security Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters.
  • Page 15: Profiles

    Advanced Configuration Chapter3 Profiles Export Select the profile you want to save in a different location, and click Export. Direct Windows to the The Profiles screen lets you save different configuration appropriate folder, and click Save. profiles for different network setups. The table on the left Delete Select the profile you want to delete and click displays a list of available profiles with their profile names...
  • Page 16 Advanced Configuration Chapter3 No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: WPA2-Personal Security Passphrase...
  • Page 17 Advanced Configuration Chapter3 Wi-Fi Protected Setup If you connect to a router that supports Wi-Fi Protected Setup, then you will view this screen: WEP Security Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters.
  • Page 18 Advanced Configuration Chapter3 Press the W-F Protected Setup button on the Enter the Adapter’s PIN Number router. Within two minutes, click the W-F Protected Setup button on this screen. The Adapter connects to the network. Enter the PIN Number Access the web-based utility of the router. (Refer to the router’s documentation for instructions.) On the router’s Wi-Fi Protected Setup screen, enter Connecting to the Network...
  • Page 19 Advanced Configuration Chapter3 The Adapter connects to the network. Click Connect Anyway Click Connect Anyway. Click Fnsh. Connecting to the Network Click Prnt to print out your wireless network settings. Then click Fnsh to return to the Status screen, or click Ext to exit the Monitor.
  • Page 20 Advanced Configuration Chapter3 Proceed to the appropriate instructions. WPA (W-F Protected Access ) If the network uses WPA2 Personal security, then the WPA2-Personal Key Needed for Connection screen appears. WEP Security Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters.
  • Page 21 Advanced Configuration Chapter3 Advanced Setup Default Gateway Enter the IP address of your – network’s Gateway. If your network is not listed with the available networks, DNS  and DNS  Enter the DNS address of your – use Advanced Setup. wired Ethernet network.
  • Page 22 Advanced Configuration Chapter3 If you chose Infrastructure Mode, go to step 5 now. for Wi-Fi Protected Access 2. WPA is a stronger security If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings method than WEP. WPA2 is a stronger security method screen appears.
  • Page 23 Advanced Configuration Chapter3 WPA Personal WPA Enterprise WPA Personal offers two encryption methods, TKIP and WPA Enterprise features WPA security used in coordination AES, with dynamic encryption keys. with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 24 Advanced Configuration Chapter3 PEAP EAP-TLS WPA Enterprise - PEAP WPA2 Enterprise - EAP-TLS If you selected PEAP, configure the following: If you selected EAP-TLS, configure the following: Logn Name Enter the login name of your wireless Logn Name Enter the login name of your wireless network.
  • Page 25 Advanced Configuration Chapter3 Certfcate Select the certificate you installed to PEAP authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any. Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue, or click Back to return to the previous screen.
  • Page 26 Advanced Configuration Chapter3 The Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Status screen. Click Return to Profles screen to keep the current settings active and return to the Profiles screen. Congratulations Congratulatons! The profle s successfully confgured.
  • Page 27: AppendixA Troubleshooting

    Troubleshooting AppendixA Appendx A: Troubleshootng Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot. Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration.
  • Page 28: Appendix B: Windows Vista Configuration

    Windows Vista Configuration AppendixB Appendx B: Select your network, and then click Connect. Wndows Vsta Confguraton Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon If your network has wireless security, go to step 5.
  • Page 29 Windows Vista Configuration AppendixB Enter the security key, WEP key, or passphrase (also This screen appears when you are connected to your network. Select Save ths network, if you want to save known as a pre-shared key), depending on your type of security.
  • Page 30 Windows Vista Configuration AppendixB This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
  • Page 31: Appendix C: Windows Xp Wireless Zero Configuration

    Windows XP Wireless Zero Configuration AppendixC Appendx C: Wndows XP Wreless Zero Confguraton Windows XP Wireless Zero Configuration Icon The screen that appears will show any available Windows XP Wireless Zero Configuration wireless network. Select the network you want. Click Connect.
  • Page 32 Windows XP Wireless Zero Configuration AppendixC Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
  • Page 33: Appendix D: Specifications

    Specifications AppendixD Appendx D: Specfcatons Model WUSB600N Standards IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, Draft IEEE 802.11n LEDs Link/Act Number of Antennas 2 Internal Antennas Transmitted Power 2.4 GHz Wireless-N @ <16 dBm (Typical) 5 GHz Wireless-N @ <16 dBm...
  • Page 34: Appendix E: Warranty Information

    Warranty Information AppendixE Appendx E: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Informaton warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 35: Technical Support

    Warranty Information AppendixE rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 36: Appendix F: Regulatory Information

    Regulatory Information AppendixF Appendx F: such as a handheld PC or similar device has not been verified and may not comply with related RF exposure Regulatory Informaton rules and such use shall be prohibited. The availability of some specific channels and/or operational frequency bands is country dependent FCC Statement and programmed at the factory to match the intended...
  • Page 37: Restrictions In The 5 Ghz Band

    Regulatory Information AppendixF Industry Canada Radiation Exposure Statement: Avis d’Industrie Canada concernant l’exposition aux radiofréquences : This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must Ce matériel est conforme aux limites d’exposition aux follow the specific operating instructions for satisfying radiofréquences établies par Industrie Canada pour un RF exposure compliance.
  • Page 38: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information AppendixF User Information for Consumer Products Ceštna (Czech) - Informace o ochraně žvotního prostředí pro zákazníky v zemích Evropské une Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 39 Regulatory Information AppendixF Eest (Estonan) - Keskkonnaalane nformatsoon Franças (French) - Informatons envronnementales Euroopa Ldus asuvatele klentdele pour les clents de l’Unon européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 40 Regulatory Information AppendixF Letuvška (Lthuanan) - Aplnkosaugos nformacja, Nederlands (Dutch) - Mleu-nformate voor klanten skrta Europos Sąjungos vartotojams n de Europese Une Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), is voorzien van dit symbool op het product of de verpakking, negalima šalinti kartu su nerūšiuotomis komunalinėmis...
  • Page 41 Regulatory Information AppendixF Português (Portuguese) - Informação ambental para Slovenčna (Slovene) - Okoljske nformacje za stranke clentes da Unão Europea v Evropsk unj A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...

Table of Contents