User Guide
Page 5
... MAC address is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on some additional steps to see when browsing for wireless devices with WEP, because WPA/WPA2 uses dynamic key encryption. WEP is admin. To thwart any unauthorized changes, customize the device's password so it passes over a wireless network. Change the default password For wireless products such as your wireless network from exterior walls and windows. •• Turn wireless routers, access points...
... MAC address is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on some additional steps to see when browsing for wireless devices with WEP, because WPA/WPA2 uses dynamic key encryption. WEP is admin. To thwart any unauthorized changes, customize the device's password so it passes over a wireless network. Change the default password For wireless products such as your wireless network from exterior walls and windows. •• Turn wireless routers, access points...
User Guide
Page 6
... currently working in use the Monitor to check the link information, search for additional status information. Wireless Mode This is the mode of the Adapter. Authentication This is the Default Gateway address. Default Gateway This is your wireless network. Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon appears in the system tray of the wireless security feature. You can also click More Information to view additional information about the wireless network connection...
... currently working in use the Monitor to check the link information, search for additional status information. Wireless Mode This is the mode of the Adapter. Authentication This is the Default Gateway address. Default Gateway This is your wireless network. Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon appears in the system tray of the wireless security feature. You can also click More Information to view additional information about the wireless network connection...
User Guide
Page 7
.... Driver Version This shows the Adapter's driver version. Click Back to return to the initial Link Information screen. Before you press any given time.) Receive Rate This is the intensity of the wireless network's access point or wireless router. Wireless-G USB Network Adapter Configuration Bytes Transmitted This shows the bytes transmitted by the Adapter, in real time, after connecting to , such as a DHCP client. A lower reading translates into a higher quality signal. This button can be used . MAC Address...
.... Driver Version This shows the Adapter's driver version. Click Back to return to the initial Link Information screen. Before you press any given time.) Receive Rate This is the intensity of the wireless network's access point or wireless router. Wireless-G USB Network Adapter Configuration Bytes Transmitted This shows the bytes transmitted by the Adapter, in real time, after connecting to , such as a DHCP client. A lower reading translates into a higher quality signal. This button can be used . MAC Address...
User Guide
Page 8
... the wireless signal the Adapter is the channel that field. If you are listed: SSID This is the SSID or unique name of the Wireless Network. 5 Chapter 3 Locate the Button After clicking the SecureEasySetup button, you will be asked to locate the SecureEasySetup button or Cisco logo button on the device with which is usually located on the front of the wireless router or access point. Press the Cisco logo...
... the wireless signal the Adapter is the channel that field. If you are listed: SSID This is the SSID or unique name of the Wireless Network. 5 Chapter 3 Locate the Button After clicking the SecureEasySetup button, you will be asked to locate the SecureEasySetup button or Cisco logo button on the device with which is usually located on the front of the wireless router or access point. Press the Cisco logo...
User Guide
Page 9
.... Channel This is the MAC address of these wireless security screens appears: WEP If the network has WEP encryption enabled, then you save different configuration profiles for wireless devices. Wireless-G USB Network Adapter 6 To connect to perform a new search for different network setups. PSK2 Security Profiles The Profiles screen lets you see the WPA Personal Needed for Connection screen. Then enter the network's Passphrase or WEP Key. To cancel the connection, click Cancel. MAC Address This is the channel to one of the wireless network's access point...
.... Channel This is the MAC address of these wireless security screens appears: WEP If the network has WEP encryption enabled, then you save different configuration profiles for wireless devices. Wireless-G USB Network Adapter 6 To connect to perform a new search for different network setups. PSK2 Security Profiles The Profiles screen lets you see the WPA Personal Needed for Connection screen. Then enter the network's Passphrase or WEP Key. To cancel the connection, click Cancel. MAC Address This is the channel to one of the wireless network's access point...
User Guide
Page 10
... want to work. Direct Windows to update the Available Wireless Networks list. The networks available to which the wireless network devices are listed: Wireless Mode This is as simple as a wireless router or access point. 7 The setup for each profile selected, the following pages. SecureEasySetup While using a specific profile, select the profile, and click Connect. Security This is the channel to this Adapter are listed on the following are set up the Adapter is not listed on the...
... want to work. Direct Windows to update the Available Wireless Networks list. The networks available to which the wireless network devices are listed: Wireless Mode This is as simple as a wireless router or access point. 7 The setup for each profile selected, the following pages. SecureEasySetup While using a specific profile, select the profile, and click Connect. Security This is the channel to this Adapter are listed on the following are set up the Adapter is not listed on the...
User Guide
Page 11
... step 2. Repeat this button, click Where can I find the Button? Press the Cisco logo or SecureEasySetup button on the center of the wireless router or access point. Chapter 3 Configuration SecureEasySetup is complete. Click Connect to Network to connect to step 3. 2. Select the wireless network you wish to connect to and click Connect. (If you don't have wireless security enabled, continue to your network listed, you have wireless security enabled on the Adapter. Available Wireless Networks The available networks are...
... step 2. Repeat this button, click Where can I find the Button? Press the Cisco logo or SecureEasySetup button on the center of the wireless router or access point. Chapter 3 Configuration SecureEasySetup is complete. Click Connect to Network to connect to step 3. 2. Select the wireless network you wish to connect to and click Connect. (If you don't have wireless security enabled, continue to your network listed, you have wireless security enabled on the Adapter. Available Wireless Networks The available networks are...
User Guide
Page 12
... screen. 9 The longer and more secure your other wireless network devices and is compatible with dynamic encryption keys. After the profile installs, the Congratulations screen appears. It must be . Select 64‑Bit or 128-Bit. Then enter a passphrase or WEP key. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. PSK2 Needed For Connection Passphrase Enter a Passphrase, also called a pre...
... screen. 9 The longer and more secure your other wireless network devices and is compatible with dynamic encryption keys. After the profile installs, the Congratulations screen appears. It must be . Select 64‑Bit or 128-Bit. Then enter a passphrase or WEP key. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. PSK2 Needed For Connection Passphrase Enter a Passphrase, also called a pre...
User Guide
Page 13
...-Hoc Mode if you want to connect to your network does not have a DHCP server or router, select Specify network settings. Wireless-G USB Network Adapter 10 You must be unique to another wireless device directly without using a wireless router or access point. Chapter 3 Configuration Congratulations Congratulations! Enter the SSID for your network. The profile is not listed among the available networks, click Manual Setup on this screen. The Network Settings screen appears. Network Settings If your wired Ethernet network here. DNS 1 and DNS 2 Enter the DNS address of...
...-Hoc Mode if you want to connect to your network does not have a DHCP server or router, select Specify network settings. Wireless-G USB Network Adapter 10 You must be unique to another wireless device directly without using a wireless router or access point. Chapter 3 Configuration Congratulations Congratulations! Enter the SSID for your network. The profile is not listed among the available networks, click Manual Setup on this screen. The Network Settings screen appears. Network Settings If your wired Ethernet network here. DNS 1 and DNS 2 Enter the DNS address of...
User Guide
Page 14
... name to help prevent others from entering your wireless network. It is a security standard stronger than WPA-Personal, RADIUS stands for Remote Authentication Dial-In User Service, and LEAP stands for all the devices in the network. Configuration Network Mode Select the Network Mode in your network. WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption, PSK2 stands for Pre-Shared Key 2, which is...
... name to help prevent others from entering your wireless network. It is a security standard stronger than WPA-Personal, RADIUS stands for Remote Authentication Dial-In User Service, and LEAP stands for all the devices in the network. Configuration Network Mode Select the Network Mode in your network. WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption, PSK2 stands for Pre-Shared Key 2, which is...
User Guide
Page 15
... a WEP key for Wireless-G USB Network Adapter WPA Personal Encryption Select the type of 8-63 characters in the Passphrase field. Chapter 3 WEP Configuration encryption. Select TKIP or AES for authentication. Passphrase Enter a Passphrase of algorithm you are "0" to "9" and "A" to the previous screen. Click Next to continue or Back to return to the previous screen. PSK2 PSK2 Passphrase Enter a Passphrase of your network's access point or wireless router uses transmit key number 2, 3, or...
... a WEP key for Wireless-G USB Network Adapter WPA Personal Encryption Select the type of 8-63 characters in the Passphrase field. Chapter 3 WEP Configuration encryption. Select TKIP or AES for authentication. Passphrase Enter a Passphrase of algorithm you are "0" to "9" and "A" to the previous screen. Click Next to continue or Back to return to the previous screen. PSK2 PSK2 Passphrase Enter a Passphrase of your network's access point or wireless router uses transmit key number 2, 3, or...
User Guide
Page 16
... Password field. Password Enter the password of your wireless network in the Server Name field (this is connected to use any certificate, keep the default setting, Trust Any. EAP-TLS Login Name Enter the login name of your wireless network in the Login Name field. Select the authentication method used when a RADIUS server is optional). if you on your wireless network in the Login Name field. Server Name Enter the name of your wireless network; WPA Enterprise WPA Enterprise features WPA security used...
... Password field. Password Enter the password of your wireless network in the Server Name field (this is connected to use any certificate, keep the default setting, Trust Any. EAP-TLS Login Name Enter the login name of your wireless network in the Login Name field. Select the authentication method used when a RADIUS server is optional). if you on your wireless network in the Login Name field. Server Name Enter the name of your wireless network; WPA Enterprise WPA Enterprise features WPA security used...
User Guide
Page 17
... Cisco Central Key Management method if they enabled CCX2.0 on your wireless network in the Server Name field (this is for authentication. Click the Next button to continue, or click the Back button to return to enable CCX2.0. Chapter 3 EAP-TLS RADIUS - EAP-TLS Login Name Enter the login name of the authentication server in the Login Name field. Server Name Enter the name of your wireless network; Select the authentication method used for authentication. Wireless-G USB Network Adapter Advanced WIreless Settings...
... Cisco Central Key Management method if they enabled CCX2.0 on your wireless network in the Server Name field (this is for authentication. Click the Next button to continue, or click the Back button to return to enable CCX2.0. Chapter 3 EAP-TLS RADIUS - EAP-TLS Login Name Enter the login name of the authentication server in the Login Name field. Server Name Enter the name of your wireless network; Select the authentication method used for authentication. Wireless-G USB Network Adapter Advanced WIreless Settings...
User Guide
Page 18
... new settings, click Back. The default limit is successfully configured. Enter the limit from the drop-down menu. To exit the Manual Setup through the Wireless Network Monitor, click Exit. 7. Chapter 3 QoS Quality of network traffic, which may involve demanding, real-time applications, such as videoconferencing. QoS mechanisms ensure better service to disable the function. Fast Roaming To use this function, select Enabled from the drop-down menu. The default...
... new settings, click Back. The default limit is successfully configured. Enter the limit from the drop-down menu. To exit the Manual Setup through the Wireless Network Monitor, click Exit. 7. Chapter 3 QoS Quality of network traffic, which may involve demanding, real-time applications, such as videoconferencing. QoS mechanisms ensure better service to disable the function. Fast Roaming To use this function, select Enabled from the drop-down menu. The default...
User Guide
Page 21
... to Linksys at your product or experience a problem with it, please go to www.linksys.com/support where you with third party software or Wireless-G USB Network Adapter Warranty Information service offerings. You must include the RMA number and a copy of your dated proof of ... Warranty Linksys warrants this limited warranty fails of its option, to (a) repair the product with new or refurbished parts, (b) replace the product with non‑Linksys products, (d) the product has not been installed, operated, repaired, or maintained in the product User Guide and at www.linksys.com.
... to Linksys at your product or experience a problem with it, please go to www.linksys.com/support where you with third party software or Wireless-G USB Network Adapter Warranty Information service offerings. You must include the RMA number and a copy of your dated proof of ... Warranty Linksys warrants this limited warranty fails of its option, to (a) repair the product with new or refurbished parts, (b) replace the product with non‑Linksys products, (d) the product has not been installed, operated, repaired, or maintained in the product User Guide and at www.linksys.com.
User Guide
Page 23
... this manual. To maintain compliance with FCC RF exposure compliance requirements, please follow the specific operating instructions for satisfying RF exposure compliance. Other applications like handheld PC or similar device have not been verified and may cause harmful interference to operate this product during an electrical storm. Wireless-G USB Network Adapter Regulatory Information The availability of fire, use only...
... this manual. To maintain compliance with FCC RF exposure compliance requirements, please follow the specific operating instructions for satisfying RF exposure compliance. Other applications like handheld PC or similar device have not been verified and may cause harmful interference to operate this product during an electrical storm. Wireless-G USB Network Adapter Regulatory Information The availability of fire, use only...
Quick Installation Guide
Page 1
...; Quick Installation Guide A To begin copying the files onto your PC. D Raise the antenna. Package Contents • Wireless-G USB Network Adapter with SpeedBooster Quick Installation ModMeloNdoe.l NoW. The Setup Wizard should run automatically, and the Welcome screen should light up into your CD- Once the Adapter is installed and set up using the Setup Wizard that the Setup Wizard has prompted you to continue the installation and Windows will not install propertly. Proceed to Connect The Adapter's USB Port...
...; Quick Installation Guide A To begin copying the files onto your PC. D Raise the antenna. Package Contents • Wireless-G USB Network Adapter with SpeedBooster Quick Installation ModMeloNdoe.l NoW. The Setup Wizard should run automatically, and the Welcome screen should light up into your CD- Once the Adapter is installed and set up using the Setup Wizard that the Setup Wizard has prompted you to continue the installation and Windows will not install propertly. Proceed to Connect The Adapter's USB Port...
Quick Installation Guide
Page 2
... wireless security has been enabled on screen prompts. If your network utilizes WEP (Wired Equivalent Privacy) encryption, the WEP Key Needed for Connection screen will appear. Then, enter a passphrase or WEP key. Valid hexadecimal characters are three ways to "F". PSK Needed for Connection Select 64-bit or 128-bit. Enter a Passphrase of Cisco Systems, Inc. All rights reserved. Available Wireless Network IMPORTANT:There are "0" to "9" and "A" to set up the Adapter. Manual Setup: If...
... wireless security has been enabled on screen prompts. If your network utilizes WEP (Wired Equivalent Privacy) encryption, the WEP Key Needed for Connection screen will appear. Then, enter a passphrase or WEP key. Valid hexadecimal characters are three ways to "F". PSK Needed for Connection Select 64-bit or 128-bit. Enter a Passphrase of Cisco Systems, Inc. All rights reserved. Available Wireless Network IMPORTANT:There are "0" to "9" and "A" to set up the Adapter. Manual Setup: If...
Product Guide
Page 1
.... WUSB54GS Connect your e-mail, access the Internet, use instant messaging to chat with friends, and share files and other resources such as specified by WPA encryption Wireless-G Wireless USB Network Adapter Product Data with running a mixed network of running cables. Using your highspeed USB 2.0 port, the Adapter delivers incredible data rates without the cost and hassle of SpeedBooster and regular Wireless-G devices. Unlike other wireless devices and technologies, using a single 2.4GHz channel as printers and hard disk...
.... WUSB54GS Connect your e-mail, access the Internet, use instant messaging to chat with friends, and share files and other resources such as specified by WPA encryption Wireless-G Wireless USB Network Adapter Product Data with running a mixed network of running cables. Using your highspeed USB 2.0 port, the Adapter delivers incredible data rates without the cost and hassle of SpeedBooster and regular Wireless-G devices. Unlike other wireless devices and technologies, using a single 2.4GHz channel as printers and hard disk...
Product Guide
Page 2
... • CD-ROM Drive • Available USB Port • Windows 2000 or XP with Service Pack 1 (or later) Package Contents • Wireless-G USB Network Adapter with SpeedBooster • USB Cable • Setup Wizard CD-ROM • User Guide on CD-ROM • Quick Installation • Registration Card Check the product package and contents for specific features supported. For a complete list of Cisco Systems, Inc. Specifications are subject to 90% Non-Condensing Linksys...
... • CD-ROM Drive • Available USB Port • Windows 2000 or XP with Service Pack 1 (or later) Package Contents • Wireless-G USB Network Adapter with SpeedBooster • USB Cable • Setup Wizard CD-ROM • User Guide on CD-ROM • Quick Installation • Registration Card Check the product package and contents for specific features supported. For a complete list of Cisco Systems, Inc. Specifications are subject to 90% Non-Condensing Linksys...