background image

Appendix C

Warranty Information

18

Wireless-G USB Network Adapter

Appendix C:  

Warranty Information

Limited Warranty

Linksys  warrants  this  Linksys  hardware  product  against 

defects  in  materials  and  workmanship  under  normal 

use for the Warranty Period, which begins on the date of 

purchase by the original end-user purchaser and lasts for 

the period specified below:

One (1) year for new product

 

Ninety (90) days for refurbished product

 

This limited warranty is non-transferable and extends only 

to the original end-user purchaser. Your exclusive remedy 

and  Linksys’  entire  liability  under  this  limited  warranty 

will be for Linksys, at its option, to (a) repair the product 

with  new  or  refurbished  parts,  (b)  replace  the  product 

with a reasonably available equivalent new or refurbished 

Linksys  product,  or  (c)  refund  the  purchase  price  of  the 

product  less  any  rebates.  Any  repaired  or  replacement 

products  will  be  warranted  for  the  remainder  of  the 

original Warranty Period or thirty (30) days, whichever is 

longer. All products and parts that are replaced become 

the property of Linksys.

Exclusions and Limitations

This  limited  warranty  does  not  apply  if:  (a)  the  product 

assembly  seal  has  been  removed  or  damaged,  (b)  the 

product has been altered or modified, except by Linksys, (c) 

the product damage was caused by use with non-Linksys 

products, (d) the product has not been installed, operated, 

repaired,  or  maintained  in  accordance  with  instructions 

supplied by Linksys, (e) the product has been subjected to 

abnormal physical or electrical stress, misuse, negligence, 

or accident, (f) the serial number on the Product has been 

altered, defaced, or removed, or (g) the product is supplied 

or licensed for beta, evaluation, testing or demonstration 

purposes  for  which  Linksys  does  not  charge  a  purchase 

price or license fee.
ALL  SOFTWARE  PROVIDED  BY  LINKSYS  WITH  THE 

PRODUCT,  WHETHER  FACTORY  LOADED  ON  THE 

PRODUCT  OR  CONTAINED  ON  MEDIA  ACCOMPANYING 

THE PRODUCT, IS PROVIDED “AS IS” WITHOUT WARRANTY 

OF ANY KIND. Without limiting the foregoing, Linksys does 

not warrant that the operation of the product or software 

will  be  uninterrupted  or  error  free.  Also,  due  to  the 

continual development of new techniques for intruding 

upon  and  attacking  networks,  Linksys  does  not  warrant 

that the product, software or any equipment, system or 

network on which the product or software is used will be 

free  of  vulnerability  to  intrusion  or  attack.  The  product 

may include or be bundled with third party software or 

service offerings. This limited warranty shall not apply to 

such third party software or service offerings. This limited 

warranty  does  not  guarantee  any  continued  availability 

of  a  third  party’s  service  for  which  this  product’s  use  or 

operation may require. 
TO THE  EXTENT  NOT  PROHIBITED  BY  LAW,  ALL  IMPLIED 

WARRANTIES  AND  CONDITIONS  OF  MERCHANTABILITY, 

SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR 

PURPOSE  ARE  LIMITED  TO  THE  DURATION  OF  THE 

WARRANTY  PERIOD.  ALL  OTHER  EXPRESS  OR  IMPLIED 

CONDITIONS,  REPRESENTATIONS  AND  WARRANTIES, 

INCLUDING,  BUT  NOT  LIMITED  TO,  ANY  IMPLIED 

WARRANTY  OF  NON-INFRINGEMENT,  ARE  DISCLAIMED. 

Some jurisdictions do not allow limitations on how long 

an implied warranty lasts, so the above limitation may not 

apply to you. This limited warranty gives you specific legal 

rights, and you may also have other rights which vary by 

jurisdiction.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT 

WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE 

OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, 

INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE 

THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING 

OUT  OF  OR  RELATED  TO  THE  USE  OF  OR  INABILITY  TO 

USE  THE  PRODUCT  (INCLUDING  ANY  SOFTWARE),  EVEN 

IF  LINKSYS  HAS  BEEN  ADVISED  OF  THE  POSSIBILITY  OF 

SUCH  DAMAGES.  IN  NO  EVENT  WILL  LINKSYS’  LIABILITY 

EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. 

The foregoing limitations will apply even if any warranty 

or  remedy  provided  under  this  limited  warranty  fails  of 

its  essential  purpose.  Some  jurisdictions  do  not  allow 

the exclusion or limitation of incidental or consequential 

damages,  so  the  above  limitation  or  exclusion  may  not 

apply to you.

Obtaining Warranty Service

If you have a question about your product or experience a 

problem with it, please go to 

www.linksys.com/support 

where you will find a variety of online support tools and 

information to assist you with your product. If the product 

proves  defective  during  the  Warranty  Period,  contact 

Linksys  Technical  Support  for  instructions  on  how  to 

obtain warranty service. The telephone number for Linksys 

Technical Support in your area can be found in the product 

User Guide and at 

www.linksys.com

. Have your product 

serial number and proof of purchase on hand when calling. 

A  DATED  PROOF  OF  ORIGINAL  PURCHASE  IS  REQUIRED 

TO PROCESS WARRANTY CLAIMS. If you are requested to 

return your product, you will be given a Return Materials 

Authorization  (RMA)  number.  You  are  responsible  for 

properly packaging and shipping your product to Linksys 

at your cost and risk. You must include the RMA number 

and a copy of your dated proof of original purchase when 

returning your product. Products received without a RMA 

number  and  dated  proof  of  original  purchase  will  be 

Summary of Contents for WUSB54G

Page 1: ...USER GUIDE Wireless G USB Network Adapter Model WUSB54G...

Page 2: ...thy website address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use...

Page 3: ...ing 16 Appendix B Specifications 17 Appendix C Warranty Information 18 Limited Warranty 18 Appendix D Regulatory Information 20 FCC Statement 20 FCC Radiation Exposure Statement 20 Safety Notices 20 I...

Page 4: ...SB Network Adapter is easier than ever How does the Adapter do this Like all wireless products the Adapter allows for greater range and mobility within your wireless network whether it s using the Wir...

Page 5: ...ble MAC address filtering Linksys routers and gateways give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to e...

Page 6: ...ength and link quality information about the current connection It also provides a More Information button to click for additional status information Link Information Ad Hoc Mode or Infrastructure Mod...

Page 7: ...he wireless network or since the Refresh Statistics button was last pressed Bytes Transmitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or s...

Page 8: ...has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete a...

Page 9: ...ncryption 64 Bit or 128 Bit Then enter the network s Passphrase or WEP Key Click Connect To cancel the connection click Cancel WEP Security WPA Personal If the network has theWPA Personal security ena...

Page 10: ...Networks This screen provides two options for setting up the Adapter SecureEasySetup ThisAdapterfeaturesSecureEasySetup This means that you can set it up with just the press of a button when connectin...

Page 11: ...dure for any additional SecureEasySetup device NOTE You can only add one SecureEasySetup device at a time SecureEasySetup is now complete and a configuration profile will has been created automaticall...

Page 12: ...l characters Click Connect and proceed to Step 3 WPA Personal WPA Personal offers two encryption methods TKIP and AES with dynamic encryption keys Select TKIP or AES for encryption Then enter a Passph...

Page 13: ...dress Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addr...

Page 14: ...ich channel to use keep the default setting Network Mode Select the Network Mode in which your wireless network will operate In Mixed mode Wireless B and Wireless G devices can operate on the same net...

Page 15: ...X Key drop down box Authentication The default is set to Auto so it will auto detectforSharedKeyorOpenSystemauthentication For Shared Key authentication both the sender and the recipient share a WEP k...

Page 16: ...st Any Encryption Select the type of algorithm TKIP or AES for the encryption type PEAP WPA Enterprise PEAP Login Name Enter the login name of your wireless network in the Login Name field Password En...

Page 17: ...thentication method used inside the PEAP tunnel Click Next to continue or Back to return to the previous screen LEAP If you selected LEAP then enter the Username and Password that will authenticate yo...

Page 18: ...able the function Enter the rate in the field The default is 70 dBm Measurement To use measurement select Non Serving or Serving from the drop down menu Select Disabled to disable the function Enter t...

Page 19: ...rt it into the computer s USB slot Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration Make sure that the computers are powered on 1 Make...

Page 20: ...sitivity 11 Mbps 82 dBm Typical 54 Mbps 67 dBm Typical Security Features WEP and WPA Encryption Security Key Bits Up to 128 Bit Encryption Environmental Dimensions 3 58 x 0 91 x 2 80 91 x 23 x 71 mm C...

Page 21: ...limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this product...

Page 22: ...m duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This limit...

Page 23: ...ynotcauseharmfulinterference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Radiation Exposure Statement This equipment complies...

Page 24: ...Ce mat riel est conforme aux limites d exposition aux radiofr quences tablies pour un environnement non contr l Pour assurer le maintien de cette conformit l utilisateur doit suivre les consignes d ut...

Page 25: ...a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho se l...

Page 26: ...jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination e...

Page 27: ...felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederlands...

Page 28: ...zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj c...

Page 29: ...ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSENTING...

Page 30: ...u fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Disclaimer...

Page 31: ...To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow...

Page 32: ...of Sections 1 and 2 above on a medium customarily used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative i...

Page 33: ...uch new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program spec...

Page 34: ...for the free library Also if the library is modified by someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation w...

Page 35: ...You may copy and distribute verbatim copies of the 1 Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropria...

Page 36: ...ibrary because it contains portions of the Library rather than a work that uses the library The executableisthereforecoveredbythisLicense Section 6 states terms for distribution of such executables Wh...

Page 37: ...py modify sublicense link with or 8 distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void a...

Page 38: ...generally NO WARRANTY BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE 15 THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHENOTHERWISESTATEDINWRITINGTHECOPYRIGHT H...

Page 39: ...ryptographic software written by Eric Young eay cryptsoft com This product includes software written by Tim Hudson tjh cryptsoft com Original SSLeay License Copyright 1995 1998 EricYoung eay cryptsoft...

Page 40: ...EVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANYWAY OUT OFTHE USE OFTHIS SOFTWARE EVEN IF ADVISED OF THE POSSIBI...

Reviews: