background image

Wireless-G USB Network Adapter

Copyright and Trademarks

Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco 
Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2005 Cisco Systems, Inc. All 
rights reserved. Other brands and product names are trademarks or registered trademarks of their respective 
holders.

How to Use this User Guide

This User Guide has been designed to make understanding networking with the Wireless-G USB Network Adapter 
easier than ever. Look for the following items when reading this User Guide:

In addition to these symbols, there are definitions for technical terms that are presented like this:

Also, each figure (diagram, screenshot, or other image) is provided with a figure number and description, like 
this:

Figure numbers and descriptions can also be found in the "List of Figures" section in the “Table of Contents”.

This exclamation point means there is a Caution or warning and is something that 
could damage your property or the Wireless-G USB Network Adapter.

This checkmark means there is a Note of interest and is something you should 
pay special attention to while using the Wireless-G USB Network Adapter.

This question mark provides you with a reminder about something you might need 
to do while using the Wireless-G USB Network Adapter.

word: 

definition.

Figure 0-1: Sample Figure Description

WUSB54Gv4-EU-UG-50728NC BW

Содержание Linksys WUSB54G

Страница 1: ...A Division of Cisco Systems Inc Model No USB Network Adapter Wireless G WUSB54G EU LA UK User Guide WIRELESS GHz 2 4802 11g ...

Страница 2: ... to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning and is something that could damage y...

Страница 3: ...apter 8 Setting Up the Adapter 9 Chapter 5 Using the Wireless Network Monitor 24 Accessing the Wireless Network Monitor 24 Link Information Screens 24 Secure Easy Setup 27 Site Survey 29 Profiles 30 Creating a New Profile 31 Appendix A Troubleshooting 46 Common Problems and Solutions 46 Frequently Asked Questions 47 Appendix B Using Windows XP Wireless Configuration 50 Appendix C Wireless Security...

Страница 4: ...Wireless G USB Network Adapter Appendix H Regulatory Information 67 Appendix I Contact Information 74 ...

Страница 5: ...nection 12 Figure 4 13 WPA Personal Needed for Connection 13 Figure 4 14 PSK2 Needed for Connection 13 Figure 4 15 The Congratulations Screen 14 Figure 4 16 Available Wireless Network 15 Figure 4 17 Network Settings 15 Figure 4 18 Wireless Mode 16 Figure 4 19 Ad Hoc Mode Settings 16 Figure 4 20 Wireless Security 17 Figure 4 21 Wireless Security WEP 17 Figure 4 22 Wireless Security WPA Personal 18 ...

Страница 6: ...5 11 WPA Personal Needed for Connection 29 Figure 5 12 PSK2 Needed for Connection 30 Figure 5 13 Profiles 30 Figure 5 14 Import a Profile 30 Figure 5 15 Export a Profile 31 Figure 5 16 Create a New Profile 31 Figure 5 17 Available Wireless Network 31 Figure 5 18 Available Wireless Network 32 Figure 5 19 The Secure Easy Setup Logo and Location 32 Figure 5 20 Secure Easy Setup 32 Figure 5 21 Secure ...

Страница 7: ...eless Security RADIUS PEAP 42 Figure 5 39 LEAP Windows XP and 2000 43 Figure 5 40 LEAP Windows 98SE and ME 43 Figure 5 41 Advanced Wireless Settings 44 Figure 5 42 Confirm New Settings 45 Figure 5 43 The Congratulations Screen 45 Figure B 1 Wireless Network Monitor Icon 50 Figure B 2 Windows XP Use Windows XP Wireless Configuration 50 Figure B 3 Windows XP Wireless Configuration Icon 50 Figure B 4...

Страница 8: ... s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs equipped with wireless cards and adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network And now with Secure Easy Setup setting up your network and your W...

Страница 9: ...scribes some problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Using Windows XP Wireless Configuration This appendix describes how Windows XP users can use Window s built in wireless configuration to monitor their Adapter Appendix C Wireless Security This appendix discusses security issues regarding wireless networking and measure...

Страница 10: ...s G USB Network Adapter Appendix H Regulatory Information This appendix supplies the Adapter s regulatory information Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Страница 11: ...o wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they both sha...

Страница 12: ...ireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com international for more in...

Страница 13: ...Chapter 3 Getting to Know the Wireless G Notebook Adapter The LED Indicators The Network Adapter s LEDs display information about network activity Power Green The Power LED lights up when the Adapter is powered on Link Green The Link LED lights up when the Adapter has an active connection Figure 3 1 Front Panel ...

Страница 14: ... and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Click Here to Start Click the Click Here to Start button to begin the software installation process User Guide Click the User Guide button to open this User Guide Exit Click Exit to exit the Setup Wizard 1 To install the Adapter click the Click He...

Страница 15: ...rt their PCs Connecting the Adapter 1 Connect one end of the included USB cable to the Adapter s USB port 2 Connect the other end of the cable to one of the USB ports on your computer 3 The Power LED should light up when the Adapter is plugged in 4 Raise the antenna Make sure the antenna points straight up into the air at a 90º angle from the Adapter This will ensure optimum wireless operating ran...

Страница 16: ...r most users Use this option if you already have a network set up with devices that do not have Secure Easy Setup The networks available to this Adapter will be listed on this screen You can choose one of these networks and click the Connect button to connect to it Click the Refresh button to update the Available Wireless Network list Manual Setup If you are not taking advantage of Secure Easy Set...

Страница 17: ... router or access point 1 Starting from the Available Wireless Network screen click the Secure Easy Setup button on the right hand side 2 You will be asked to locate the Secure Easy Setup button on the device with which the Adapter will be communicating If you are not sure where to find this button click Where can I find the button This will walk you through a couple of screens to help you find th...

Страница 18: ...ully added to the network Repeat this procedure for any additional Secure Easy Setup device 4 When Secure Easy Setup is complete you may save your configuration to a text file by clicking the Save button or print the configuration by clicking the Print button Click Connect to Network to connect to your network Congratulations Setup is complete To check the link information search for available wir...

Страница 19: ... WPA Personal Needed for Connection screen will appear If your network utilizes PSK2 Pre Shared Key 2 encryption the PSK2 Needed for Connection screen will appear WEP Key Needed for Connection Select 64 bit or 128 bit Then enter a passphrase or WEP key Passphrase Enter a passphrase in the Passphrase field so a WEP key is automatically generated The passphrase is case sensitive and should not be lo...

Страница 20: ...red key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Then click Connect and proceed to the Congratulations screen To cancel the connection click Cancel PSK2 Needed for Connection Enter a Passphrase of 8 63 characters in the Passphrase field Then click Connect and proceed to the Congratulations screen To cancel the co...

Страница 21: ...figured for the network the Congratulations screen will appear Click Connect to Network to connect to your network Congratulations Setup is complete To check the link information search for available wireless networks or make additional configuration changes refer to Chapter 5 Using the Wireless Network Monitor Figure 4 15 The Congratulations Screen ...

Страница 22: ...oes not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addresses leave these fields empty IP Address This IP Address must be unique to your network Subnet Mask Th...

Страница 23: ... that must be used for all the devices in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click Next to continue or Back to return to the previous screen 3 If you chose Infrastructure Mode go to Step 4 now If you chose Ad Hoc Mode the Ad Hoc Mode Settings screen will appear Select the correct Channel for your wireless network...

Страница 24: ...using 64 bit WEP encryption then the key must consist of exactly 10 hexadecimal characters If you are using 128 bit WEP encryption then the key must consist of exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Passphrase Instead of manually entering a WEP key you can enter a passphrase in the Passphrase field so a WEP key is automatically generated This case sens...

Страница 25: ...ption Select the type of algorithm you want to use TKIP or AES from the Encryption drop down menu Passphrase Enter a Passphrase also called a pre shared key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Click the Next button to continue or the Back button to return to the previous screen PSK2 Enter a Passphrase of 8 6...

Страница 26: ...m the Encryption drop down menu Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down men...

Страница 27: ...Enter the Login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network Then select the authentication method Inner Authen used inside the PEAP tunnel Select from EAP MSCHAP v2 or Generic Token Card If you select ...

Страница 28: ...ed for authentication Password Enter the password used for authentication Confirm Enter the password again LEAP CCKM Windows XP and 2000 users can enable this Cisco Central Key Management method if they enabled CCX2 0 on the Advanced Wireless Settings screen Encryption Windows XP and 2000 users can select an encryption method if they enabled CCX2 0 on the Advanced Wireless Settings screen Click th...

Страница 29: ...ice to high priority types of network traffic which may involve demanding real time applications such as videoconferencing To use this function select Enabled from the drop down menu Select Disabled to disable to function Fast Roaming To use fast roaming select Enabled from the drop down menu Select Disabled to disable the function Enter the rate in the field The default is 70 dBm Measurement To u...

Страница 30: ... After the software has been successfully installed the Congratulations screen will appear Click Connect to Network to connect to your network Clicking Return to Profiles screen will open the Wireless Network Monitor s Profiles screen For more information about the Wireless Network Monitor refer to Chapter 5 Using the Wireless Network Monitor Congratulations Setup is complete To check the link inf...

Страница 31: ...nal status and statistics about the current wireless connection To search for available wireless networks click the Site Survey tab To perform configuration changes or create connection profiles click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the current connection It also provides a button to click for ad...

Страница 32: ...P Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS This is the DNS address of the Adapter DHCP Client This displays the Adapter s status as a DHCP client MAC Address The MAC address of the wireless network s access point or wireless router is shown here Cisco AP IP This...

Страница 33: ...mitted This shows the bytes transmitted by the Adapter in real time since connecting to the wireless network or since the Refresh Statistics button was last pressed Driver Version This shows the version of the Adapter s driver Noise Level This shows the level of background noise affecting the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intens...

Страница 34: ...tons Before you press any buttons though you should locate the Secure Easy Setup button on the device you re connecting the Adapter to such as a wireless router or access point 1 After clicking the Secure Easy Setup button you will be asked to locate the Secure Easy Setup button on the device with which the Adapter will be communicating If you are not sure where to find this button click Where can...

Страница 35: ...Setup Wizard screen The logo or button will stop flashing on the wireless router or access point when the Adapter has been successfully added to the network Repeat this procedure for any additional Secure Easy Setup device 3 Secure Easy Setup is now complete and a configuration profile will has been created automatically You may save your configuration profile to a text file by clicking the Save b...

Страница 36: ...wireless network devices are set Security The status of the wireless security feature is displayed here MAC Address The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has enc...

Страница 37: ...his is the channel to which the wireless network devices are set Security The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect button New Click New to create a new profile See the next section Creating a New Prof...

Страница 38: ...etwork must feature Secure Easy Setup for this to work Available Networks Use this option if you already have a network set up with devices that do not have Secure Easy Setup The networks available to this Adapter will be listed on this screen You can choose one of these networks and click the Connect button to connect to it Click the Refresh button to update the Available Wireless Network list Ma...

Страница 39: ... click the Secure Easy Setup button on the right hand side 5 You will be asked to locate the Secure Easy Setup button on the device with which the Adapter will be communicating If you are not sure where to find this button click Where can I find the button This will walk you through a couple of screens to help you find the button which is usually located on the front of the wireless router or acce...

Страница 40: ...when the Adapter has been successfully added to the network Repeat this procedure for any additional Secure Easy Setup device 7 Secure Easy Setup is now complete and a configuration profile will has been created automatically You may save your configuration profile to a text file by clicking the Save button or print the configuration by clicking the Print button Click Connect to Network to connect...

Страница 41: ...ar If your network utilizes WPA Personal Wi Fi Protected Access encryption the WPA Personal Needed for Connection screen will appear If your network utilizes PSK2 Pre Shared Key 2 encryption the PSK2 Needed for Connection screen will appear WEP Key Needed for Connection Select 64 bit or 128 bit Then enter a passphrase or WEP key Passphrase Enter a passphrase in the Passphrase field so a WEP key is...

Страница 42: ...e complex your Passphrase is the more secure your network will be Then click Connect and proceed to the Congratulations screen To cancel the connection click Cancel PSK2 Needed for Connection Passphrase Enter a Passphrase also called a pre shared key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Then click Connect and...

Страница 43: ...apter with Manual Setup If you are not taking advantage of Secure Easy Setup and your network is not listed among the available networks click Manual Setup on the Available Wireless Network screen to set up the adapter manually 1 After clicking Manual Setup the Network Settings screen will appear If your network has a router or other DHCP server click the radio button next to Obtain network settin...

Страница 44: ...ue or click Back to return to the Available Wireless Network screen 2 The Wireless Mode screen shows a choice of two wireless modes Click the Infrastructure Mode radio button if you want to connect to a wireless router or access point Click the Ad Hoc Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point Then enter the SSID for...

Страница 45: ... Click Next to continue or click Back to change any settings 4 The Wireless Security screen will appear This step will configure wireless security If your wireless network doesn t use wireless security select Disabled and then click the Next button to continue Proceed to Step 6 Select WEP WPA Personal PSK2 WPA Enterprise Radius or LEAP for the Encryption Method WEP stands for Wired Equivalent Priv...

Страница 46: ... sensitive passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products TX Key The default transmit key number is 1 If your network s access point or wireless router uses transmit key number 2 3 or 4 select the appropriate number from the T...

Страница 47: ...ion Type Enter a Passphrase of 8 63 characters in the Passphrase field Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen PSK2 Enter a Passphrase of 8 63 characters in the Passphrase field Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen Figure 5 34 Wireless...

Страница 48: ...ncryption drop down menu Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down menu selec...

Страница 49: ...he Login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network Then select the authentication method Inner Authen used inside the PEAP tunnel Select from EAP MSCHAP v2 or Generic Token Card If you select Generic...

Страница 50: ...r the username used for authentication Password Enter the password used for authentication Confirm Enter the password again LEAP CCKM Windows XP and 2000 users can enable this Cisco Central Key Management method if they enabled CCX2 0 on the Advanced Wireless Settings screen Encryption Windows XP and 2000 users can select an encryption method if they enabled CCX2 0 on the Advanced Wireless Setting...

Страница 51: ...igh priority types of network traffic which may involve demanding real time applications such as videoconferencing To use this function select Enabled from the drop down menu Select Disabled to disable the function Fast Roaming To use fast roaming select Enabled from the drop down menu Select Disabled to disable the function Enter the rate in the field The default is 70 dBm Measurement To use meas...

Страница 52: ...king Save Click Next to continue If these settings are not correct click Back to change your settings 6 After the software has been successfully installed the Congratulations screen will appear Click Connect to Network to connect to your network Clicking Return to Profile will open the Wireless Network Monitor s Profiles screen Congratulations Setup is complete Figure 5 42 Confirm New Settings Fig...

Страница 53: ... USB Network Adapter does not work properly Reinsert the USB Network Adapter into the notebook or desktop s USB port Right click on My Computer and select Properties Select the Adapter then chose the Device Manager tab and click on the Network Adapter You will find the USB Network Adapter if it is installed successfully If you see a yellow exclamation mark the resources may be conflicting and you ...

Страница 54: ...the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11g standa...

Страница 55: ...ength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transmitter re...

Страница 56: ...ndant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS a...

Страница 57: ...dows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network Monitor 1 After installing the Adapter the Windows XP Wireless Configuration icon will appear in your computer s system tray Double click the icon Figure B 1 Wireless Network Monitor Icon Figure B 2 Windows XP Use Windows XP...

Страница 58: ...eless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect Anyway button to connect the Adapter to your network NOTE Steps 2 and 3 are the instructions and screenshots for Windows XP with Service Pack 2 installed Figure B 4 Available Wireless Network Figure B 5 No Wireless Security...

Страница 59: ...pear as Connected when your connection is active For more information about wireless networking on a Windows XP computer click the Start button select Help and choose Support Enter the keyword wireless in the field provided and press the Enter key The installation of the Windows XP Wireless Configuration is complete NOTE Windows XP Wireless Configuration does not support the use of a passphrase En...

Страница 60: ...ange the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps you can tak...

Страница 61: ...r network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2 Use Shared Key authentication 3 Change y...

Страница 62: ...ith a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device WPA Enterprise offers two encryption methods TKIP and AES with dynamic encryption keys Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network encryption should be used These security recommendations shoul...

Страница 63: ...r protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resour...

Страница 64: ...network Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most d...

Страница 65: ...osting of a website FTP server or e mail server with a fixed domain name e g www xyz com and a dynamic IP address Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount o...

Страница 66: ...etrieved from a common transmission medium Finger A program that tells you the name associated with an e mail address Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a net...

Страница 67: ...nd password system MAC Media Access Control Address The unique address that a manufacturer assigns to each networking device Mbps MegaBits Per Second One million bits per second a unit of measurement for data transmission mIRC An Internet Relay Chat program that runs under Windows Multicasting Sending data to a group of destinations at once NAT Network Address Translation NAT technology translates...

Страница 68: ...lugging in cables or adapters Power over Ethernet PoE A technology enabling an Ethernet network cable to deliver both data and power PPPoE Point to Point Protocol over Ethernet A type of broadband connection that provides authentication username and password in addition to data transport PPTP Point to Point Tunneling Protocol A VPN protocol that allows the Point to Point Protocol PPP to be tunnele...

Страница 69: ...ogy that inspects incoming packets of information before allowing them to enter the network Spread Spectrum Wideband radio frequency technique used for more reliable and secure data transmission SSID Service Set IDentifier Your wireless network s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a ...

Страница 70: ...t does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide ...

Страница 71: ...th America 13 Channels most of Europe LEDs Power Link Transmitted Power 15 17dBm Typical 11Mbps CCK 13 15dBm Typical 54Mbps OFDM Receive Sensitivity 65dBm 54Mbps 80dBm 11Mbps Security features WEP Encryption WPA WPA2 WEP key bits 64 128 bit Dimensions 91 mm x 23 mm x 71 mm Unit Weight 0 08 kg Certifications FCC CE IC 03 Operating Temp 0 C 40 C 32 F 104 F Storage Temp 0 C 70 C 32 F 158 F Operating ...

Страница 72: ...65 Appendix F Specifications Wireless G USB Network Adapter Storage Humidity 5 90 Non Condensing ...

Страница 73: ...NTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated repaired or...

Страница 74: ...uipment does cause harmful interference to radio or television reception which is found by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer...

Страница 75: ... USB Network Adapter Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Conformity with Regard to the EU Directive 1995 5 EC R TTE Directive ...

Страница 76: ...all products the Declaration of Conformity is available through one or more of these options A pdf file is included on the product s CD A print copy is included with the product A pdf file is available on the product s webpage Visit www linksys com international and select your country or region Then select your product If you need any other technical documentation see the Technical Documents on w...

Страница 77: ...ltri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1995 5 CE folgen mit Außnahme der folgenden aufgeführten Staaten Belgium The Belgian Institute for Postal Services and Telecommunications BIPT must be notified ...

Страница 78: ... una Autorizzazione Generale Consultare http www comunicazioni it it per maggiori dettagli Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended This product is designed for use with the standard integral or dedicated external antenna s that is are shipped together with the equipment However some applications may require the antenna s if removab...

Страница 79: ...elect Power Output 7 From the pull down menu on the right select the wireless adapter s power output percentage Windows 2000 1 Open the Control Panel 2 Double click Network and Dial Up Connections 3 Select your current wireless connection and select Properties 4 From the Properties screen click the Configure button 5 Click the Advanced tab and select Power Output 6 From the pull down menu on the r...

Страница 80: ...you reside 3 Click the name of the country in which you reside 4 Click Products 5 Click the appropriate product category 6 Select a product 7 Click the type of documentation you want The document will automatically open in PDF format NOTE If you have questions regarding the compliance of these products or you cannot find the information you need please contact your local sales office or visit http...

Страница 81: ...ort at linksys com Belgium support be linksys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Portugal support pt linksys com Spain support es linksys com Sweden support se linksys com Switzerland support ch linksys com United Kingdom Ireland support uk link...

Отзывы: