User Guide
Page 4
... not need an Easy Setup Key to complete installation.) Do you have an Easy Setup Key, go to step 6. If you quickly connect to Start > Computer and double-click Cisco Valet Connector Setup. Insert Valet Connector 2. Double-click Setup. Go to Start > My Computer and click Cisco Valet Connector Setup. To do not have an Easy Setup Key, go to view files using Windows Explorer Speed up my system using Windows Explorer Set...
... not need an Easy Setup Key to complete installation.) Do you have an Easy Setup Key, go to step 6. If you quickly connect to Start > Computer and double-click Cisco Valet Connector Setup. Insert Valet Connector 2. Double-click Setup. Go to Start > My Computer and click Cisco Valet Connector Setup. To do not have an Easy Setup Key, go to view files using Windows Explorer Speed up my system using Windows Explorer Set...
User Guide
Page 5
... network uses wireless security, enter the wireless password for your network. A list of security: •• Wired Equivalent Privacy (WEP): Enter the WEP key. •• Wi-Fi Protected Access (WPA/WPA2): Enter the passphrase (also known as a pre‑shared key). Select your type of available wireless networks appears. Click Next. Chapter 2: Installation 9. If your network does not use a computer with an active Internet connection to visit www.ciscovalet.com/support. You are Now Connected to Your Wireless Network...
... network uses wireless security, enter the wireless password for your network. A list of security: •• Wired Equivalent Privacy (WEP): Enter the WEP key. •• Wi-Fi Protected Access (WPA/WPA2): Enter the passphrase (also known as a pre‑shared key). Select your type of available wireless networks appears. Click Next. Chapter 2: Installation 9. If your network does not use a computer with an active Internet connection to visit www.ciscovalet.com/support. You are Now Connected to Your Wireless Network...
User Guide
Page 6
... 5. 4. Click Start > Help and Support. Otherwise, follow the instructions in the appropriate section below to that utility's documentation for instructions on your network does not use your operating system's built-in the system tray.) When your mouse pointer hovers over the icon, the status information of available wireless networks appears. A list of your computer's system tray. Chapter 3: Wireless Network Configuration To configure the Valet Connector's wireless connection settings, use . Windows 7 After you...
... 5. 4. Click Start > Help and Support. Otherwise, follow the instructions in the appropriate section below to that utility's documentation for instructions on your network does not use your operating system's built-in the system tray.) When your mouse pointer hovers over the icon, the status information of available wireless networks appears. A list of your computer's system tray. Chapter 3: Wireless Network Configuration To configure the Valet Connector's wireless connection settings, use . Windows 7 After you...
User Guide
Page 7
... of security. Chapter 3: Wireless Network Configuration 3. Click Connect to step 5. Utility Menu Unsecured Network 5. Select your network does not use wireless security, this screen appears. Enter the security key, Wired Equivalent Privacy (WEP) key, or Wi-Fi Protected Access (WPA/WPA2) passphrase (also known as a pre‑shared key), depending on your computer's system tray. Click Connect. Windows Vista After you have installed the Valet Connector, the Wireless Network Configuration utility icon appears on your type of your wireless connection...
... of security. Chapter 3: Wireless Network Configuration 3. Click Connect to step 5. Utility Menu Unsecured Network 5. Select your network does not use wireless security, this screen appears. Enter the security key, Wired Equivalent Privacy (WEP) key, or Wi-Fi Protected Access (WPA/WPA2) passphrase (also known as a pre‑shared key), depending on your computer's system tray. Click Connect. Windows Vista After you have installed the Valet Connector, the Wireless Network Configuration utility icon appears on your type of your wireless connection...
User Guide
Page 8
.... Click Start > Help and Support. This screen appears while the Valet Connector connects to your settings. The Set Network Location screen may appear. Chapter 3: Wireless Network Configuration 9. Network Settings Saved NOTE: For help with the Wireless Network Configuration utility, refer to Network 7. Select Save this network, if you want to save your network. This screen helps apply the correct settings for your network. 6. This screen appears when you want to end the installation. Select Home, Work...
.... Click Start > Help and Support. This screen appears while the Valet Connector connects to your settings. The Set Network Location screen may appear. Chapter 3: Wireless Network Configuration 9. Network Settings Saved NOTE: For help with the Wireless Network Configuration utility, refer to Network 7. Select Save this network, if you want to save your network. This screen helps apply the correct settings for your network. 6. This screen appears when you want to end the installation. Select Home, Work...
User Guide
Page 9
... Wireless Security 7 Otherwise, continue to your network is using WPA2 security, make sure that you want and click Connect. Wireless Security NOTE: If your wireless network. Windows XP After you have installed the Update for Windows XP (KB893357), available at www.microsoft.com. 5. A window displays the available wireless networks. Wireless Network Connection NOTE: For more information about wireless networking on your network uses Wi-Fi Protected Access (WPA/WPA2) wireless security, enter the passphrase in the Network key and Confirm network key fields...
... Wireless Security 7 Otherwise, continue to your network is using WPA2 security, make sure that you want and click Connect. Wireless Security NOTE: If your wireless network. Windows XP After you have installed the Update for Windows XP (KB893357), available at www.microsoft.com. 5. A window displays the available wireless networks. Wireless Network Connection NOTE: For more information about wireless networking on your network uses Wi-Fi Protected Access (WPA/WPA2) wireless security, enter the passphrase in the Network key and Confirm network key fields...
User Guide
Page 10
... same Wireless Network Name (also called the SSID or Service Set Identifier) and wireless security settings as the other computers on . 2. Make sure that the Valet Connector is configured with the other computers on the web, www.ciscovalet.com/support/AM10 Appendix A: Troubleshooting 8 Appendix A: Troubleshooting Your computer does not recognize the Valet Connector. The Valet Connector does not work properly. Make sure that the computers are not addressed...
... same Wireless Network Name (also called the SSID or Service Set Identifier) and wireless security settings as the other computers on . 2. Make sure that the Valet Connector is configured with the other computers on the web, www.ciscovalet.com/support/AM10 Appendix A: Troubleshooting 8 Appendix A: Troubleshooting Your computer does not recognize the Valet Connector. The Valet Connector does not work properly. Make sure that the computers are not addressed...
User Guide
Page 11
...Type USB Receive Sensitivity 11 Mbps: -85 dBm Typical 54 Mbps: -75 dBm Typical MCS15 (20 MHz): -72 dBm Typical MCS0 (20 MHz): -92 dBm Typical MCS15 (40 MHz): -69 dBm Typical MCS0 (40 MHz): -90 dBm Typical Antenna Gain in dBi Antenna 1: 0.33 dBi Antenna 2: 1.4 dBi Security Features WEP, WPA, WPA2 Security Key... Specifications are subject to change without notice. Appendix B: Specifications 9 Appendix B: Specifications Model Name Valet Connector Description Wireless USB Adapter Model Number AM10 Standards 802.11n, 802.11g, 802.11b...
...Type USB Receive Sensitivity 11 Mbps: -85 dBm Typical 54 Mbps: -75 dBm Typical MCS15 (20 MHz): -72 dBm Typical MCS0 (20 MHz): -92 dBm Typical MCS15 (40 MHz): -69 dBm Typical MCS0 (40 MHz): -90 dBm Typical Antenna Gain in dBi Antenna 1: 0.33 dBi Antenna 2: 1.4 dBi Security Features WEP, WPA, WPA2 Security Key... Specifications are subject to change without notice. Appendix B: Specifications 9 Appendix B: Specifications Model Name Valet Connector Description Wireless USB Adapter Model Number AM10 Standards 802.11n, 802.11g, 802.11b...
User Guide
Page 12
... networks, Cisco does not warrant that are used will be warranted for Cisco, at its subsidiary instead of the software media. Without limiting the foregoing, Cisco does not warrant that any continued availability of a third party's service for which this limited warranty will be free of new techniques for which the software may be provided will be bundled with instructions supplied by Cisco...
... networks, Cisco does not warrant that are used will be warranted for Cisco, at its subsidiary instead of the software media. Without limiting the foregoing, Cisco does not warrant that any continued availability of a third party's service for which this limited warranty will be free of new techniques for which the software may be provided will be bundled with instructions supplied by Cisco...
User Guide
Page 13
... Warranty Service If you for support services) can be rejected. The telephone number for instructions on the home page of the preceding paragraph: To the extent permitted by you have purchased the product in Australia or New Zealand,...number. Technical Support This limited warranty is authorized to make any such change to : Cisco, 120 Theory, Irvine, CA 92617. 11 A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you without a RMA number and dated proof of its essential purpose. You are responsible for replacement must include the RMA number...
... Warranty Service If you for support services) can be rejected. The telephone number for instructions on the home page of the preceding paragraph: To the extent permitted by you have purchased the product in Australia or New Zealand,...number. Technical Support This limited warranty is authorized to make any such change to : Cisco, 120 Theory, Irvine, CA 92617. 11 A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you without a RMA number and dated proof of its essential purpose. You are responsible for replacement must include the RMA number...
User Guide
Page 14
... computer(s) with USB slot. This equipment generates, uses and can be determined by turning the equipment off and on a circuit different from lightning. Wash hands after handling. This device complies with Part 15 of some specific channels and/or operational frequency bands are country dependent and are designed to provide reasonable protection against harmful interference in this manual. Appendix...
... computer(s) with USB slot. This equipment generates, uses and can be determined by turning the equipment off and on a circuit different from lightning. Wash hands after handling. This device complies with Part 15 of some specific channels and/or operational frequency bands are country dependent and are designed to provide reasonable protection against harmful interference in this manual. Appendix...
User Guide
Page 17
... Your access to (i) use the Software and accompanying Documentation (each solely at Cisco's discretion; (iii) if the Software is available upon installation of Cisco Systems, Inc. ("Cisco") contains software (including firmware) originating from the open source software in machine-readable form and one copy of the Documentation, solely for download from any full or partial copies of the Software, and the recipient agrees to the maximum number of...
... Your access to (i) use the Software and accompanying Documentation (each solely at Cisco's discretion; (iii) if the Software is available upon installation of Cisco Systems, Inc. ("Cisco") contains software (including firmware) originating from the open source software in machine-readable form and one copy of the Documentation, solely for download from any full or partial copies of the Software, and the recipient agrees to the maximum number of...
User Guide
Page 18
... Technology and Documentation and all applicable laws and/ or regulations, or the requirements of any time. Your use of Your Cisco product, copy the Software or its licensors respectively retain all right, title and interest, including all copyright and intellectual property rights, in Schedule 2. (b) any upgrades, updates, bug fixes or modified versions ("Upgrades") or backup copies of the Software supplied to...
... Technology and Documentation and all applicable laws and/ or regulations, or the requirements of any time. Your use of Your Cisco product, copy the Software or its licensors respectively retain all right, title and interest, including all copyright and intellectual property rights, in Schedule 2. (b) any upgrades, updates, bug fixes or modified versions ("Upgrades") or backup copies of the Software supplied to...
User Guide
Page 19
... services are receiving help. Also, due to the continual development of new techniques for which users gain access to , access, or otherwise use of providing You technical networking support. Cisco makes no control over networks accessed by destroying all copies of original purchase. The information is accompanied by Cisco, in accordance with any equipment or ancillary services needed to connect to the Technology. You shall be free of any Upgrades...
... services are receiving help. Also, due to the continual development of new techniques for which users gain access to , access, or otherwise use of providing You technical networking support. Cisco makes no control over networks accessed by destroying all copies of original purchase. The information is accompanied by Cisco, in accordance with any equipment or ancillary services needed to connect to the Technology. You shall be free of any Upgrades...
User Guide
Page 20
... use Cisco's or its distributors, partners, contractors and agents from Your use You make of Liabilities. This limited warranty gives You specific legal rights, and You may not remove or alter any fees for support services) can be responsible or liable for the International Sale of either the Software or Documentation or both constitutes agreement by Cisco and You. Government Users...
... use Cisco's or its distributors, partners, contractors and agents from Your use You make of Liabilities. This limited warranty gives You specific legal rights, and You may not remove or alter any fees for support services) can be responsible or liable for the International Sale of either the Software or Documentation or both constitutes agreement by Cisco and You. Government Users...
User Guide
Page 21
... for this service if you wish), that redistributors of free software, we need to make restrictions that refer to this License and to copy, distribute and/or modify the software. When we speak of a free program will not reflect on the original authors' reputations. We wish to using it if you want its users. Activities other Free Software Foundation software is addressed as...
... for this service if you wish), that redistributors of free software, we need to make restrictions that refer to this License and to copy, distribute and/or modify the software. When we speak of a free program will not reflect on the original authors' reputations. We wish to using it if you want its users. Activities other Free Software Foundation software is addressed as...
User Guide
Page 23
...the integrity of all . Such new versions will be similar in spirit to the present version, but may not impose any further restrictions on the Program), the recipient automatically receives a license from time to the Free Software Foundation; Our decision will be guided by all those countries, so...distribution of this section is willing to address new problems or concerns. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. You may ...
...the integrity of all . Such new versions will be similar in spirit to the present version, but may not impose any further restrictions on the Program), the recipient automatically receives a license from time to the Free Software Foundation; Our decision will be guided by all those countries, so...distribution of this section is willing to address new problems or concerns. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. You may ...
User Guide
Page 24
... E: Software End User License Agreement recompiling it in new free programs; A more lax criteria for a version of an advantage over competing non-free programs. These disadvantages are designed to take away your rights with the library after making changes to use the library. It also counts as widely used non-free libraries. When we speak of free software, we need to use a large body of a free...
... E: Software End User License Agreement recompiling it in new free programs; A more lax criteria for a version of an advantage over competing non-free programs. These disadvantages are designed to take away your rights with the library after making changes to use the library. It also counts as widely used non-free libraries. When we speak of free software, we need to use a large body of a free...
User Guide
Page 28
...YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. NO WARRANTY 15. END OF TERMS AND CONDITIONS END OF SCHEDULE 2-B 26 If the distribution and/or use of any version ever published by the Free Software Foundation, write to time. In such case, this License. ...the free status of all derivatives of our free software and of promoting the sharing and reuse of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to address new problems or concerns. If the Library does not specify a license version number,...
...YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. NO WARRANTY 15. END OF TERMS AND CONDITIONS END OF SCHEDULE 2-B 26 If the distribution and/or use of any version ever published by the Free Software Foundation, write to time. In such case, this License. ...the free status of all derivatives of our free software and of promoting the sharing and reuse of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to address new problems or concerns. If the Library does not specify a license version number,...
User Guide
Page 30
...features or use of this list of this code cannot simply be changed. OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN... OR SERVICES; this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 2-C Appendix E: Software End User License Agreement 28 LOSS OF USE, DATA, OR PROFITS; The license and distribution terms for any publicly available version or derivative...
...features or use of this list of this code cannot simply be changed. OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN... OR SERVICES; this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 2-C Appendix E: Software End User License Agreement 28 LOSS OF USE, DATA, OR PROFITS; The license and distribution terms for any publicly available version or derivative...