User Guide
Page 2
...www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of the address because most current web browsers do not require it is something... that could damage your property or product. About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific...
...www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of the address because most current web browsers do not require it is something... that could damage your property or product. About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific...
User Guide
Page 3
... Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration 3 How to Access the Wireless Manager 3 How to Use the Wireless Manager 3 Saved Networks 8 Appendix A: Troubleshooting 9 Appendix B: Specifications 10 Appendix C: Warranty Information 11 Limited Warranty 11 Appendix D: Regulatory Information 13 FCC Statement 13 FCC Radiation Exposure Statement 13 Safety Notices 13 Industry Canada...
... Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration 3 How to Access the Wireless Manager 3 How to Use the Wireless Manager 3 Saved Networks 8 Appendix A: Troubleshooting 9 Appendix B: Specifications 10 Appendix C: Warranty Information 11 Limited Warranty 11 Appendix D: Regulatory Information 13 FCC Statement 13 FCC Radiation Exposure Statement 13 Safety Notices 13 Industry Canada...
User Guide
Page 6
...) because this information may be asked for wireless communication. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with specific MAC addresses. Like signals from your cellular or cordless phones, signals from other wireless networks that may try to use them at least eight characters...
...) because this information may be asked for wireless communication. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with specific MAC addresses. Like signals from your cellular or cordless phones, signals from other wireless networks that may try to use them at least eight characters...
User Guide
Page 14
...ºF (0 to 40ºC) Storage Temp. 10 to 158ºF (-10 to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Specifications RangePlus Wireless USB Network Adapter 10 Appendix B Appendix B: Specifications Model WUSB100 Standards IEEE 802.11b, IEEE 802.11g LEDs Power/Link/Act No.
...ºF (0 to 40ºC) Storage Temp. 10 to 158ºF (-10 to 70ºC) Operating Humidity 10 to 85%, Noncondensing Storage Humidity 5 to 90%, Noncondensing Specifications RangePlus Wireless USB Network Adapter 10 Appendix B Appendix B: Specifications Model WUSB100 Standards IEEE 802.11b, IEEE 802.11g LEDs Power/Link/Act No.
User Guide
Page 15
... product User Guide and at its essential purpose. You are responsible for Linksys Technical Support in your cost and risk. This limited warranty gives you specific legal rights, and you will be uninterrupted or error free. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR...
... product User Guide and at its essential purpose. You are responsible for Linksys Technical Support in your cost and risk. This limited warranty gives you specific legal rights, and you will be uninterrupted or error free. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR...
User Guide
Page 17
... from that interference will not occur in this manual. To maintain compliance with FCC RF exposure compliance requirements, please follow the specific operating instructions for an uncontrolled environment. The firmware setting is no guarantee that to correct the interference by the end user. ... is not accessible by one of the following two conditions: (1) This device may cause harmful interference to Part 15 of some specific channels and/or operational frequency bands are country dependent and are designed to operate this device must not be prohibited. End users ...
... from that interference will not occur in this manual. To maintain compliance with FCC RF exposure compliance requirements, please follow the specific operating instructions for an uncontrolled environment. The firmware setting is no guarantee that to correct the interference by the end user. ... is not accessible by one of the following two conditions: (1) This device may cause harmful interference to Part 15 of some specific channels and/or operational frequency bands are country dependent and are designed to operate this device must not be prohibited. End users ...
User Guide
Page 23
...to offer you permanently transfer all rights under the specific license terms applicable to that Linksys and/or its affiliates may not be available for the Upgrade. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. The Software and documentation contain trade ...secrets and/or copyrighted materials of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. Where such specific license terms entitle you already hold a valid license to the source code of such software, that source...
...to offer you permanently transfer all rights under the specific license terms applicable to that Linksys and/or its affiliates may not be available for the Upgrade. OR CISCO-LINKSYS K.K. ("LINKSYS") LICENSING THE SOFTWARE INSTEAD OF CISCO-LINKSYS LLC. The Software and documentation contain trade ...secrets and/or copyrighted materials of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. Where such specific license terms entitle you already hold a valid license to the source code of such software, that source...
User Guide
Page 33
... or without prior written permission of conditions and the following conditions are not to . Products derived from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from this software must include an acknowledgement: "This product includes software written by Eric Young ([email protected])" The word 'cryptographic...
... or without prior written permission of conditions and the following conditions are not to . Products derived from the apps directory (application code) you include anyWindows specific code (or a derivative thereof ) from this software must include an acknowledgement: "This product includes software written by Eric Young ([email protected])" The word 'cryptographic...