ASUSTeK Computer 7260H Model 7260HMW Wireless Network Adapter User Manual 7260HMW UserMan
ASUSTeK Computer Inc Model 7260HMW Wireless Network Adapter 7260HMW UserMan
Contents
- 1. (7260HMW) UserMan
- 2. (7260HMW) UserMan-2014-04-29
- 3. (7260HMW) UserMan_2014.04.30
- 4. User manual
(7260HMW) UserMan














































![ Intel® Centrino® Advanced-N 6235 Intel® Centrino® Ultimate-N 6300 Intel® Dual Band Wireless-AC 7260 Intel® Dual Band Wireless-N 7260 Intel® Wireless-N 7260 Česky [Czech] Tímto Intel ® Corporation prohlašuje, že toto zařízení je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice EU 1999/5/ES. Dansk [Danish] Herved, Intel ® Corporation, erklærer, at dette udstyr er i overensstemmelse med de væsentlige krav og øvrige relevante bestemmelser i EU-direktiv 1999/5/EF. Deutsch [German] Hiermit erklärt Intel ® Corporation, dass dieses Gerät in Übereinstimmung mit den grundlegenden Anforderungen und anderen relevanten Bestimmungen der EU Richtlinie 1999/5/EG befindet. Esti [Estonian] Käesolevaga Intel ® Corporation teatab, et see seade on vastavuses põhinõuete ja teistele asjakohastele sätetele Euroopa Liidu direktiivis 1999/5/EÜ. English Hereby, Intel® Corporation, declares that this equipment is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Español [Spanish] Por este medio, Intel ® Corporation, declara que este equipo cumple con los requisitos esenciales y otras disposiciones pertinentes de la Directiva Europea 1999/5/CE. Ελληνική [Greek] Δια του παρόντος, η Intel ® Corporation, δηλώνει ότι ο εξοπλισμός αυτός είναι σε συμμόρφωση με τις βασικές απαιτήσεις και άλλες σχετικές διατάξεις της κοινοτικής οδηγίας 1999/5/ΕΚ. Français [French] Par la présente, Intel ® Corporation, déclare que cet équipement est en conformité avec les exigences essentielles et autres dispositions pertinentes de la directive européenne 1999/5/CE. Italiano [Italian] Con la presente, Intel ® Corporation, dichiara che questa apparecchiatura è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti della direttiva UE 1999/5/CE. Latviski [Latvian] Ar šo, Intel ® Corporation paziņo, ka šī tehnika ir atbilstība būtiskajām prasībām un citiem svarīgajiem nosacījumiem ES Direktīvas 1999/5/EK. Lietuvių [Lithuanian] Šiuo dokumentu, Intel ® Corporation ", pareiškia, kad šis įrenginys atitinka esminius reikalavimus ir kitus reikiamus ES Direktyvos 1999/5/EB. Nederlands [Dutch] Hierbij Intel ® Corporation, verklaart dat deze apparatuur in overeenstemming is met de essentiële eisen en andere relevante bepalingen van EU-richtlijn 1999/5/EG. Malti [Maltese] Hawnhekk, Intel ® Korporazzjoni, jiddikjara li dan it-tagħmir huwa konformi mar-rekwiżiti essenzjali u dispożizzjonijiet oħra relevanti tal-UE-Direttiva 1999/5/KE. Magyar [Hungarian] Ezáltal, az Intel ® Corporation kijelenti, hogy ez a berendezés megfelel az alapvető követelményeknek és más vonatkozó uniós 1999/5/EK irányelv. Norsk [Norwegian] Erklærer herved Intel ® Corporation, at dette utstyret er i samsvar med de grunnleggende kravene og andre relevante bestemmelser i EU direktiv 1999/5/EC. Polski [Polish] Niniejszym Intel ® Corporation, deklaruje, że ten sprzęt jest zgodny z zasadniczymi wymaganiami oraz pozostałymi stosownymi postanowieniami dyrektywy UE 1999/5/WE. Português [Portuguese] Nisto, a Intel ® Corporation, declara que este equipamento está em conformidade com os requisitos essenciais e outras disposições relevantes da Directiva da UE 1999/5/CE. Slovensko [Slovenian] S tem, Intel ® Corporation, izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in drugimi relevantnimi določili direktive 1999/5/ES EU. Slovensky [Slovak] Týmto Intel ® Corporation prehlasuje, že toto zariadenie je v zhode so základnými požiadavkami a ďalšími príslušnými ustanoveniami smernice EÚ 1999/5/ES. Suomi [Finnish] Täten Intel ® Corporation vakuuttaa, että tämä laite on direktiivin olennaisten vaatimusten ja muiden määräysten EU-direktiivin 1999/5/EY.](https://usermanual.wiki/ASUSTeK-Computer/7260H.7260HMW-UserMan/User-Guide-2245613-Page-47.png)
![Svenska [Swedish] Härmed förklarar Intel ® Corporation, att denna utrustning är i överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser i EU-direktivet 1999/5/EC. Íslenska [Icelandic] Hér með lýsir, Intel ® Corporation, segir að þessi búnaður er í samræmi við grunnkröfur og önnur viðeigandi ákvæði ESB tilskipun 1999/5/EB. Back to Top Back to Contents Trademarks and Disclaimers](https://usermanual.wiki/ASUSTeK-Computer/7260H.7260HMW-UserMan/User-Guide-2245613-Page-48.png)



![1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related. 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS:' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License.] zlib.h -- interface of the 'zlib' general purpose compression library, version 1.2.3, July 18th, 2005 Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.](https://usermanual.wiki/ASUSTeK-Computer/7260H.7260HMW-UserMan/User-Guide-2245613-Page-52.png)












![mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP. TLS (Transport Layer Security) A type of authentication method using the Extensible Authentication Protocol (EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use passwords. EAP-TLS authentication supports dynamic WEP key management. The TLS protocol is intended to secure and authenticate communications across a public network through data encryption. The TLS Handshake Protocol allows the server and client to provide mutual authentication and to negotiate an encryption algorithm and cryptographic keys before data is transmitted. TTLS (Tunneled Transport Layer Security) These settings define the protocol and the credentials used to authenticate a user. In TTLS, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between the client and server. The client can use another authentication protocol. Typically password-based protocols challenge over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. TTLS implementations today support all methods defined by EAP, as well as several older methods (CHAP, PAP, MS-CHAP and MS-CHAP-V2). TTLS can easily be extended to work with new protocols by defining new attributes to support new protocols. WEP (Wired Equivalent Privacy) Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred to as 40-bit). This is a low-level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN. WEP is a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. WEP aims to provide security by data over radio waves so that it is protected as it is transmitted from one end point to another. WEP Key Either a pass phrase or hexadecimal key. The pass phrase must be 5 ASCII characters for 64-bit WEP or 13 ASCII characters for 128-bit WEP. For pass phrases, 0-9, a-z, A-Z, and ~!@#$%^&*()_+|`-={}|[]\:";'<>?,./ are all valid characters. The hex key must be 10 hexadecimal characters (0-9, A-F) for 64-bit WEP or 26 hexadecimal characters (0-9, A-F) for 128-bit WEP. Wi-Fi* (Wireless Fidelity) Is meant to be used generically when referring of any type to 802.11 network, whether 802.11b, 802.11a, or dual-band. WiMAX WiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access. It is based on the IEEE 802.16 standard. The name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote conformance and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling](https://usermanual.wiki/ASUSTeK-Computer/7260H.7260HMW-UserMan/User-Guide-2245613-Page-65.png)

