Linksys WUSB600N User Manual

Linksys WUSB600N User Manual

Cisco dual-band wireless-n
Hide thumbs Also See for WUSB600N:

Advertisement

Quick Links

USER GUIDE
Dual-Band Wireless-N USB
Network Adapter
WUSB600N (EU)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WUSB600N

  • Page 1 USER GUIDE Dual-Band Wireless-N USB Network Adapter WUSB600N (EU) Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Software in Linksys Products ........
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys Dual-Band Wireless-N USB Network Adapter. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
  • Page 5: Chapter 2: Wireless Security Checklist

    3. Enable MAC address filtering WEB: For more information on wireless Linksys routers give you the ability to enable Media Access security, visit www.linksys.com/security Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
  • Page 6: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
  • Page 7 Advanced Configuration Chapter 3 Push Button (Recommended) Select this option to use Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click the push button method. Exit to exit the Monitor. Use Adapter’s PIN number Select this option to enter the Adapter’s PIN number on the router.
  • Page 8 Advanced Configuration Chapter 3 On the Adapter’s PIN number screen, click Next. Congratulations! The Adapter is connected to the network. Wireless Network Status The Wireless Network Status screen provides information on your current network settings. Enter the PIN Number The Adapter connects to the network. Wireless Network Status Radio Band This is the radio band used on the network.
  • Page 9: Connect

    Advanced Configuration Chapter 3 Back Click Back to return to the initial Status screen. Up Time This indicates the length of the most recent connection to a wireless network. Save to Profile Click Save to Profile to save the currently Total Up Time active connection settings to a profile.
  • Page 10 Advanced Configuration Chapter 3 Security This is the security method used by the Congratulations! The Adapter is connected to the network. network. Wi-Fi Protected Setup Click the Wi-Fi Protected Setup Wireless Security Enabled button to connect to a router that supports Wi-Fi If you connect to a network whose wireless security is Protected Setup.
  • Page 11 The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the...
  • Page 12 Advanced Configuration Chapter 3 Use the Push Button Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Use the Push Button Press the Wi-Fi Protected Setup button on the Congratulations router.
  • Page 13 Advanced Configuration Chapter 3 On the Adapter’s PIN number screen, click Next. Congratulations! The Adapter is connected to the network. Enter Key Manually Proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: Enter the PIN Number The Adapter connects to the network.
  • Page 14 The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. WPA2-Personal Security (For non-Linksys wireless products, enter the WEP key Passphrase Enter the network’s Passphrase (also...
  • Page 15: Profiles

    Advanced Configuration Chapter 3 Profiles Export Select the profile you want to save in a different location, and click Export. Direct Windows to the The Profiles screen lets you save different configuration appropriate folder, and click Save. profiles for different network setups. The table on the left Delete Select the profile you want to delete and click displays a list of available profiles with their profile names...
  • Page 16 Advanced Configuration Chapter 3 No Wi-Fi Protected Setup If the router does not use Wi-Fi Protected Setup, proceed to the appropriate section, “Wireless Security Disabled” or “Wireless Security Enabled”. Wireless Security Disabled If you connect to a network whose wireless security is disabled, then you will view this screen: WPA2-Personal Security Passphrase...
  • Page 17 Push Button (Recommended) Select this option to use and is compatible with Linksys wireless products only. the push button method. (For non-Linksys wireless products, enter the WEP key manually.) Use Adapter’s PIN number...
  • Page 18 Advanced Configuration Chapter 3 Use the Push Button Click Print to print out your wireless network settings. Then click Finish to return to the Status screen, or click Exit to exit the Monitor. Use the Push Button Press the Wi-Fi Protected Setup button on the Congratulations router.
  • Page 19 Advanced Configuration Chapter 3 Enter the Adapter’s PIN Number The Adapter connects to the network. Connecting to the Network Enter the PIN Number Print to print out your wireless network settings. Click Access the web-based utility of the router. (Refer to the Then click Finish to return to the Status screen, or click router’s documentation for instructions.) Exit to exit the Monitor.
  • Page 20 Advanced Configuration Chapter 3 Enter Key Manually Wireless Security Enabled If you connect to a network whose wireless security is Proceed to the appropriate section, “Wireless Security enabled, then you will view one of three screens. Disabled” or “Wireless Security Enabled”. Proceed to the appropriate instructions.
  • Page 21 It must match the Network Settings screen appears. passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, enter the WEP key manually.) If you enter the network’s WEP key, enter the appropriate number of hexadecimal characters (“0”...
  • Page 22 Advanced Configuration Chapter 3 Default Gateway Enter the IP address of your – network’s Gateway. DNS 1 and DNS 2 Enter the DNS address of your – wired Ethernet network. Click Next to continue, or click Back to return to the previous screen.
  • Page 23 Click Next to continue, or click Back to return to the This passphrase must match the passphrase of your other previous screen. wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys WPA2 Personal...
  • Page 24 Advanced Configuration Chapter 3 WPA Enterprise PEAP WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 25 Advanced Configuration Chapter 3 EAP-TLS Certificate Select the certificate you installed to authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any. Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue, or click Back to return to the previous screen.
  • Page 26 Advanced Configuration Chapter 3 PEAP Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Status screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. RADIUS - PEAP If you selected PEAP, configure the following: Login Name...
  • Page 27: Appendix A: Troubleshooting

    Make sure that the Adapter is configured with the same Wireless Network Name (SSID) and wireless security settings as the other wireless computers in the Infrastructure configuration. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Dual-Band Wireless-N USB Network Adapter...
  • Page 28: Appendix B: Windows Vista Configuration

    Windows Vista Configuration Appendix B Appendix B: Select your network, and then click Connect. Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon If your network has wireless security, go to step 5.
  • Page 29 Windows Vista Configuration Appendix B Enter the security key, WEP key, or passphrase (also This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
  • Page 30 Windows Vista Configuration Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
  • Page 31: Appendix C: Windows Xp Wireless Zero Configuration

    If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select If your network does not have wireless security enabled, Use Linksys Wireless Network Monitor. click Connect Anyway to connect the Adapter to your network.
  • Page 32 Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
  • Page 33: Appendix D: Specifications

    Specifications Appendix D Appendix D: Specifications Model WUSB600N Standards IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, Draft IEEE 802.11n LEDs Link/Act Number of Antennas 2 Internal Antennas Transmitted Power 2.4 GHz Wireless-N @ <16 dBm (Typical) 5 GHz Wireless-N @ <16 dBm (Typical) Receive Sensitivity 2.4 GHz Wireless-N @ <-91 dBm...
  • Page 34: Appendix E: Warranty Information

    Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
  • Page 35 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Dual-Band Wireless-N USB Network Adapter...
  • Page 36: Appendix F: Regulatory Information

    Regulatory Information Appendix F Appendix F: The availability of some specific channels and/or operational frequency bands are country dependent Regulatory Information and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This equipment has been tested and found to comply...
  • Page 37: Industry Canada Statement

    Regulatory Information Appendix F Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Cet appareil numérique de la classe B est conforme à la data throughput rate, range and coverage.
  • Page 38: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 39 Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 40 Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 41 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Dual-Band Wireless-N USB Network Adapter...
  • Page 42: Appendix G: Software License Agreement

    Schedules 2, 3 or 4 below as applicable. “Software” includes, and this Agreement will apply to BY DOWNLOADING OR INSTALLING THE SOFTWARE, (a) the software of Linksys or its suppliers provided in or OR USING THE PRODUCT CONTAINING THE SOFTWARE, with the applicable Linksys product, excluding technology...
  • Page 43 Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 44 Software License Agreement Appendix G GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 45 Software License Agreement Appendix G If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 46 General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
  • Page 47 Software License Agreement Appendix G GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 48 Software License Agreement Appendix G freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 49 Software License Agreement Appendix G Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 50 Software License Agreement Appendix G Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 51 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are If this Linksys product contains open source software incompatible with these, write to the author to ask for licensed under the OpenSSL license: permission.
  • Page 52 Software License Agreement Appendix G OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 53 Software License Agreement Appendix G DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents