Linksys WUSB600N (EU) User Manual
Linksys WUSB600N (EU) User Manual

Linksys WUSB600N (EU) User Manual

Dual-band wireless-n usb network adapter
Hide thumbs Also See for WUSB600N (EU):

Advertisement

Quick Links

USER GUIDE
Dual-Band Wireless-N USB
Network Adapter
WUSB600N (EU)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WUSB600N (EU)

  • Page 1 USER GUIDE Dual-Band Wireless-N USB Network Adapter WUSB600N (EU) Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Software in Linksys Products ........
  • Page 4: Chapter 1: Product Overview

    Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Dual-Band Wireless-N USB Network Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
  • Page 5: Chapter 2: Wireless Security Checklist

    3. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
  • Page 6: Chapter 3: Advanced Con Guration

    Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
  • Page 7: Advanced Configuration

    Chapter 3 Push Button (Recommended) Select this option to use the push button method. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router. Click Next to continue, or click Back to return to the previous screen.
  • Page 8 Chapter 3 On the Adapter’s PIN number screen, click Enter the PIN Number The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor.
  • Page 9: Connect

    Chapter 3 Back Click Back to return to the initial Status screen. Save to Profile Click Save to Profile to save the currently active connection settings to a profile. Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your current network settings. Wireless Network Statistics Transmit Rate This is the data transmission rate of...
  • Page 10: Chapter 3 Advanced Configuration

    Chapter 3 Security This is the security method used by the network. Wi-Fi Protected Setup Click the Wi-Fi Protected Setup button to connect to a router that supports Wi-Fi Protected Setup. Refer to the “Wi-Fi Protected Setup” instructions in the “Status” section at the beginning of this chapter.
  • Page 11 The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 12 Chapter 3 Use the Push Button Use the Push Button Press the Wi-Fi Protected Setup button on the router. Within two minutes, click the Wi-Fi Protected Setup button on this screen. The Adapter connects to the network. Connecting to the Network Dual-Band Wireless-N USB Network Adapter Advanced Configuration Print to print out your wireless network settings.
  • Page 13 Chapter 3 On the Adapter’s PIN number screen, click Enter the PIN Number The Adapter connects to the network. Connecting to the Network Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor.
  • Page 14 The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 15: Pro Les

    Chapter 3 Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and wireless network names. Profiles Profile This is the name of the profile. Wireless Network Name This is the SSID or unique name of the wireless network.
  • Page 16 Chapter 3 No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Click Connect Anyway Click...
  • Page 17 The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 18 Chapter 3 Use the Push Button Use the Push Button Press the Wi-Fi Protected Setup button on the router. Within two minutes, click the Wi-Fi Protected Setup button on this screen. The Adapter connects to the network. Connecting to the Network Dual-Band Wireless-N USB Network Adapter Advanced Configuration Print to print out your wireless network settings.
  • Page 19 Chapter 3 Enter the Adapter’s PIN Number Enter the PIN Number Access the web-based utility of the router. (Refer to the router’s documentation for instructions.) On the router’s Wi-Fi Protected Setup screen, enter the Adapter’s PIN number in the PIN field. Then click Register.
  • Page 20 Chapter 3 Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Click Connect Anyway Click Connect Anyway.
  • Page 21 The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 22 Chapter 3 Default Gateway Enter the IP address of your – network’s Gateway. DNS 1 and DNS 2 Enter the DNS address of your – wired Ethernet network. Click Next to continue, or click Back to return to the previous screen. Wireless Mode screen shows a choice of two wireless modes.
  • Page 23 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
  • Page 24 Chapter 3 WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 25 Chapter 3 EAP-TLS WPA2 Enterprise - EAP-TLS If you selected EAP-TLS, configure the following: Login Name Enter the login name of your wireless network. Server Name Enter the name of the authentication server (this is optional). Certificate Select the certificate you installed to authenticate you on your wireless network.
  • Page 26 Chapter 3 PEAP RADIUS - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network. Server Name Enter the name of the authentication server (this is optional).
  • Page 27: Appendix A: Troubleshooting

    Make sure that the Adapter is configured with the same Wireless Network Name (SSID) and wireless security settings as the other wireless computers in the Infrastructure configuration. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Dual-Band Wireless-N USB Network Adapter Troubleshooting...
  • Page 28: Appendix B: Windows Vista Con Guration

    Appendix B Appendix B: Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears.
  • Page 29: Windows Vista Configuration

    Appendix B Enter the security key, WEP key, or passphrase (also known as a pre-shared key), depending on your type of security. Click Connect. Secured Network This screen appears while the Adapter connects to your network. Do not cancel, unless you want to end the installation.
  • Page 30: Appendix B Windows Vista Configuration

    Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Con guration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button > Help and Support. Your computer is now connected to your wireless network.
  • Page 31: Appendix C: Windows Xp Wireless Zero Con Guration

    Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. Use Linksys Wireless Network Monitor NOTE: For more information on Windows XP Wireless Zero Configuration, refer to Windows Help.
  • Page 32: Appendix C Windows Xp Wireless Zero Configuration

    Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active. Wireless Network Connection For more information about wireless networking on a Windows XP computer, click Start >...
  • Page 33: Appendix D: Speci Cations

    Appendix D Appendix D: Specifications Model WUSB600N Standards IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, Draft IEEE 802.11n LEDs Link/Act Number of Antennas 2 Internal Antennas Transmitted Power 2.4 GHz Wireless-N @ <16 dBm (Typical) 5 GHz Wireless-N @ <16 dBm (Typical) Receive Sensitivity 2.4 GHz Wireless-N @ <-91 dBm...
  • Page 34: Appendix E: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
  • Page 35 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Dual-Band Wireless-N USB Network Adapter...
  • Page 36: Appendix F: Regulatory Information

    Appendix F Appendix F: Regulatory Information FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 37: Industry Canada Statement

    Appendix F Industry Canada Statement This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired...
  • Page 38: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
  • Page 39: Regulatory Information

    Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
  • Page 40 Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
  • Page 41 återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit www.linksys.com estää...
  • Page 42: Appendix G: Software License Agreement

    Software, and the recipient agrees to the terms of this Agreement. “Software” includes, and this Agreement will apply to (a) the software of Linksys or its suppliers provided in or with the applicable Linksys product, excluding technology from the open source community, and (b) any upgrades, updates, bug fixes or modified versions (“Upgrades”) or...
  • Page 43: Software License Agreement

    If You would like a copy of the GPL or other open source code in this Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request.
  • Page 44 Appendix G GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
  • Page 45 Appendix G If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
  • Page 46 END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under Version 2.1 of the “GNU Lesser General Public License” then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
  • Page 47 Appendix G GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
  • Page 48 Appendix G freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”.
  • Page 49 Appendix G Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
  • Page 50 Appendix G Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the...
  • Page 51 OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 3 Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
  • Page 52 Appendix G OpenSSL License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 53 Software License Agreement Appendix G DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents