User Guide
Page 7
... available networks and click the Connect button to connect to wireless routers or access points that also feature SecureEasySetup. You can set up the Adapter later. The setup for each option is not listed in the Available Wireless Network list. Use this option if you can select one of a button when connecting to it up and Connecting the USB Adapter Creating a Profile Figure 2-6: Available Wireless Network 5 Select this option to set up the adapter manually if...
... available networks and click the Connect button to connect to wireless routers or access points that also feature SecureEasySetup. You can set up the Adapter later. The setup for each option is not listed in the Available Wireless Network list. Use this option if you can select one of a button when connecting to it up and Connecting the USB Adapter Creating a Profile Figure 2-6: Available Wireless Network 5 Select this option to set up the adapter manually if...
User Guide
Page 8
... Complete 6 Figure 2-7: SecureEasySetup Figure 2-8: Searching for available wireless networks, or make additional configuration changes, refer to the network. Click the SecureEasySetup button (circle with the lock) on the wireless router or access point when the Adapter has been successfully added to Chapter 3: Using the Wireless Network Monitor. Click Connect to Network to connect to enable. 1. NOTE: Your wireless router or access point must have Wireless SSID broadcast set to your configuration to flash. Setup is as simple as a wireless router or access point.
... Complete 6 Figure 2-7: SecureEasySetup Figure 2-8: Searching for available wireless networks, or make additional configuration changes, refer to the network. Click the SecureEasySetup button (circle with the lock) on the wireless router or access point when the Adapter has been successfully added to Chapter 3: Using the Wireless Network Monitor. Click Connect to Network to connect to enable. 1. NOTE: Your wireless router or access point must have Wireless SSID broadcast set to your configuration to flash. Setup is as simple as a wireless router or access point.
User Guide
Page 10
... WEP key you have any non-Linksys wireless products, enter the WEP key manually on a wireless network for greater security. Then, click Connect and proceed to "F". Then, click Connect and proceed to use, TKIP or AES, from the Encryption drop-down menu. Enter a passphrase in the Passphrase field. For 128-bit encryption, enter exactly 26 hexadecimal characters. To cancel the connection, click Cancel. WPA-Personal Needed for Connection 8 Figure 2-12: WEP Key Needed for Connection Select...
... WEP key you have any non-Linksys wireless products, enter the WEP key manually on a wireless network for greater security. Then, click Connect and proceed to "F". Then, click Connect and proceed to use, TKIP or AES, from the Encryption drop-down menu. Enter a passphrase in the Passphrase field. For 128-bit encryption, enter exactly 26 hexadecimal characters. To cancel the connection, click Cancel. WPA-Personal Needed for Connection 8 Figure 2-12: WEP Key Needed for Connection Select...
User Guide
Page 11
... Wireless-G USB Network Adapter with Available Networks Figure 2-15: The Congratulations Screen 9 Congratulations! Figure 2-14: WPA2-Personal Needed for available wireless networks, or make additional configuration changes, refer to your network. Chapter 2: Setting up and Connecting the USB Adapter Setting Up the Adapter with SpeedBooster WPA2-Personal Needed for the network, the Congratulations screen will appear. To check the link information, search for Connection 3. Click Connect to Network to connect to Chapter 3: Using the Wireless Network Monitor. Setup is...
... Wireless-G USB Network Adapter with Available Networks Figure 2-15: The Congratulations Screen 9 Congratulations! Figure 2-14: WPA2-Personal Needed for available wireless networks, or make additional configuration changes, refer to your network. Chapter 2: Setting up and Connecting the USB Adapter Setting Up the Adapter with SpeedBooster WPA2-Personal Needed for the network, the Congratulations screen will appear. To check the link information, search for Connection 3. Click Connect to Network to connect to Chapter 3: Using the Wireless Network Monitor. Setup is...
User Guide
Page 12
... Gateway here. Enter the IP address of your network has a router or other DHCP server, click the radio button next to Specify network settings. DNS 1 and DNS 2 - IP Address - The Adapter's Subnet Mask must specify the IP Address and Subnet Mask on the Available Wireless Network screen to the Available Wireless Network screen. Enter the DNS address of your wired network's Subnet Mask. If your wired Ethernet network here. After clicking Manual Setup, the Network Settings screen will appear. Default Gateway - Figure 2-16: Available Wireless Network Chapter 2: Setting...
... Gateway here. Enter the IP address of your network has a router or other DHCP server, click the radio button next to Specify network settings. DNS 1 and DNS 2 - IP Address - The Adapter's Subnet Mask must specify the IP Address and Subnet Mask on the Available Wireless Network screen to the Available Wireless Network screen. Enter the DNS address of your wired network's Subnet Mask. If your wired Ethernet network here. After clicking Manual Setup, the Network Settings screen will appear. Default Gateway - Figure 2-16: Available Wireless Network Chapter 2: Setting...
User Guide
Page 14
... Key or Open system. Authentication -The default is automatically generated. Open key is 1. This step will appear. Compact Wireless-G USB Network Adapter with SpeedBooster 4. The Wireless Security screen will configure wireless security. If your network must consist of your other wireless network devices and is compatible with Manual Setup Figure 2-20: Wireless Security encryption: encoding data transmitted in the Passphrase field, so a WEP key is set to continue. If you enter must consist of your network's access point or wireless router uses transmit key number...
... Key or Open system. Authentication -The default is automatically generated. Open key is 1. This step will appear. Compact Wireless-G USB Network Adapter with SpeedBooster 4. The Wireless Security screen will configure wireless security. If your network must consist of your other wireless network devices and is compatible with Manual Setup Figure 2-20: Wireless Security encryption: encoding data transmitted in the Passphrase field, so a WEP key is set to continue. If you enter must consist of your network's access point or wireless router uses transmit key number...
User Guide
Page 16
... you have installed to use any certificate, keep the default setting, Trust Any. From the Certificate drop-down menu. Then select the authentication method (Inner Authen.) used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 2: Setting up and Connecting the USB Adapter Setting Up the Adapter with Manual Setup Figure 2-25: Wireless Security - Enter the password of your wireless network.
... you have installed to use any certificate, keep the default setting, Trust Any. From the Certificate drop-down menu. Then select the authentication method (Inner Authen.) used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 2: Setting up and Connecting the USB Adapter Setting Up the Adapter with Manual Setup Figure 2-25: Wireless Security - Enter the password of your wireless network.
User Guide
Page 18
... Chapter 2: Setting up and Connecting the USB Adapter 16 Setting Up the Adapter with SpeedBooster 5. Click Connect to Network to connect to Chapter 3: Using the Wireless Network Monitor. To check the link information, search for available wireless networks, or make additional configuration changes, refer to your settings. Click Next to change your network. After the software has been successfully installed, the Congratulations screen will open the Wireless Network Monitor's Profiles screen. Setup is complete. Compact Wireless-G USB Network Adapter with Manual Setup The...
... Chapter 2: Setting up and Connecting the USB Adapter 16 Setting Up the Adapter with SpeedBooster 5. Click Connect to Network to connect to Chapter 3: Using the Wireless Network Monitor. To check the link information, search for available wireless networks, or make additional configuration changes, refer to your settings. Click Next to change your network. After the software has been successfully installed, the Congratulations screen will open the Wireless Network Monitor's Profiles screen. Setup is complete. Compact Wireless-G USB Network Adapter with Manual Setup The...
User Guide
Page 19
... Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be green. To perform configuration changes or create connection profiles, click the Profiles tab. Ad-Hoc Mode or Infrastructure Mode - Signal Strength - Link Information The Link Information screen displays network mode, signal strength, and link quality information about the current connection. For more information on the Wireless Network Status screen. Compact Wireless-G USB Network Adapter with SpeedBooster Chapter 3: Using the Wireless Network Monitor Use the Wireless Network...
... Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be green. To perform configuration changes or create connection profiles, click the Profiles tab. Ad-Hoc Mode or Infrastructure Mode - Signal Strength - Link Information The Link Information screen displays network mode, signal strength, and link quality information about the current connection. For more information on the Wireless Network Status screen. Compact Wireless-G USB Network Adapter with SpeedBooster Chapter 3: Using the Wireless Network Monitor Use the Wireless Network...
User Guide
Page 20
... Mode - This shows the status of the wireless network connection. Channel - Authentication - Click the Back button to return to the Wireless Network Statistics screen. The IP Address of the wireless network. Signal Strength - Status - The status of the wireless network's access point or wireless router is the channel to a profile. Figure 3-3: Link Information - Compact Wireless-G USB Network Adapter with SpeedBooster Wireless Network Status The Wireless Network Status screen provides information on your wireless network's authentication method. SSID - MAC...
... Mode - This shows the status of the wireless network connection. Channel - Authentication - Click the Back button to return to the Wireless Network Statistics screen. The IP Address of the wireless network. Signal Strength - Status - The status of the wireless network's access point or wireless router is the channel to a profile. Figure 3-3: Link Information - Compact Wireless-G USB Network Adapter with SpeedBooster Wireless Network Status The Wireless Network Status screen provides information on your wireless network's authentication method. SSID - MAC...
User Guide
Page 22
... the connection, click Cancel. Signal - Wireless Mode - The MAC address of the wireless signal the Adapter is the channel that field. If the network has the wireless security WEP encryption enabled, then you will see the WPA-Personal Needed for Connection screen. Enter the network's Passphrase or preshared key in the table on the list, select the wireless network, and click the Connect button. CH - If the network has encryption enabled, a screen appear requiring security information. To connect to the network, click Connect. Compact Wireless-G USB Network Adapter...
... the connection, click Cancel. Signal - Wireless Mode - The MAC address of the wireless signal the Adapter is the channel that field. If the network has the wireless security WEP encryption enabled, then you will see the WPA-Personal Needed for Connection screen. Enter the network's Passphrase or preshared key in the table on the list, select the wireless network, and click the Connect button. CH - If the network has encryption enabled, a screen appear requiring security information. To connect to the network, click Connect. Compact Wireless-G USB Network Adapter...
User Guide
Page 23
...-Personal wireless security enabled, then you will see the WPA2-Personal Needed for Connection screen. This is displayed here. The status of the wireless network is the channel to which the wireless network devices are listed: Wireless Mode - Connect - New - Select the appropriate file, and click the Open button. Chapter 3: Using the Wireless Network Monitor Profiles Figure 3-8: WPA2-Personal Needed for detailed instructions. To connect to a wireless network using a specific profile, select the profile, and click the Connect button. Profile - The SSID or...
...-Personal wireless security enabled, then you will see the WPA2-Personal Needed for Connection screen. This is displayed here. The status of the wireless network is the channel to which the wireless network devices are listed: Wireless Mode - Connect - New - Select the appropriate file, and click the Open button. Chapter 3: Using the Wireless Network Monitor Profiles Figure 3-8: WPA2-Personal Needed for detailed instructions. To connect to a wireless network using a specific profile, select the profile, and click the Connect button. Profile - The SSID or...
User Guide
Page 25
... the Adapter, then chose the Device Manager tab, and click on My Computer, and select Properties. Read the description below : • Uninstall the driver software from your PC. • Restart your USB Adapter is powered on. • Make sure that your PC and repeat the hardware and software installation as the other computers linked via Ethernet in the Infrastructure configuration. • Make sure that the USB Adapter is properly...
... the Adapter, then chose the Device Manager tab, and click on My Computer, and select Properties. Read the description below : • Uninstall the driver software from your PC. • Restart your USB Adapter is powered on. • Make sure that your PC and repeat the hardware and software installation as the other computers linked via Ethernet in the Infrastructure configuration. • Make sure that the USB Adapter is properly...
User Guide
Page 31
... when your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. The installation of a passphrase. If your wireless router or access point. For more information about wireless networking on a Windows XP computer, click the Start button, select Help, and choose Support. Enter the exact WEP key used by your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Appendix B: Using Windows XP Wireless Configuration Figure B-7: Wireless Network Connection 29...
... when your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. The installation of a passphrase. If your wireless router or access point. For more information about wireless networking on a Windows XP computer, click the Start button, select Help, and choose Support. Enter the exact WEP key used by your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Appendix B: Using Windows XP Wireless Configuration Figure B-7: Wireless Network Connection 29...
User Guide
Page 32
... require specific action on your part for you can change network settings. Use WPA if it harder for "beacon messages". Refer to keep in its firmware. Change the default password for more information. 30 There are available only through 5 should be easily decrypted and contain much of Linksys products provide several things to the router or access point's documentation for the Administrator account. 4. Change the WEP encryption keys periodically. Change...
... require specific action on your part for you can change network settings. Use WPA if it harder for "beacon messages". Refer to keep in its firmware. Change the default password for more information. 30 There are available only through 5 should be easily decrypted and contain much of Linksys products provide several things to the router or access point's documentation for the Administrator account. 4. Change the WEP encryption keys periodically. Change...
User Guide
Page 33
...Change your wireless network will have to start from the beginning in your wireless network MUST use . RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Appendix C: Wireless Security Security Threats Facing Wireless Networks Important: Always remember that each device in trying to access your network with a random MAC Address. Change your SSID regularly so that WEP can be more difficult. This makes it often Most wireless networking devices will allow you use the same encryption method and encryption key or your WEP key...
...Change your wireless network will have to start from the beginning in your wireless network MUST use . RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Appendix C: Wireless Security Security Threats Facing Wireless Networks Important: Always remember that each device in trying to access your network with a random MAC Address. Change your SSID regularly so that WEP can be more difficult. This makes it often Most wireless networking devices will allow you use the same encryption method and encryption key or your WEP key...
User Guide
Page 36
... E: Glossary 34 Compact Wireless-G USB Network Adapter with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address. An application program that provides a way to communicate with all the information on , fast Internet connection. Byte - DHCP (Dynamic Host Configuration Protocol) - Bandwidth - A binary digit. DDNS (Dynamic Domain Name System) - A unit of an access point. A device that is usually eight bits long Cable Modem - Broadband - To start a device and cause it...
... E: Glossary 34 Compact Wireless-G USB Network Adapter with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address. An application program that provides a way to communicate with all the information on , fast Internet connection. Byte - DHCP (Dynamic Host Configuration Protocol) - Bandwidth - A binary digit. DDNS (Dynamic Domain Name System) - A unit of an access point. A device that is usually eight bits long Cable Modem - Broadband - To start a device and cause it...
User Guide
Page 37
... names of a network from users from one direction at a network gateway server that specifies how data is bridged to servers on the World Wide Web. A specific name for a network of a networking device to control network access. An always-on and retrieved from the Internet. Firmware - FTP (File Transfer Protocol) - Appendix E: Glossary 35 Download - A protocol used to receive and transmit data simultaneously. The ability of computers. Infrastructure - Compact Wireless-G USB Network Adapter with different, incompatible...
... names of a network from users from one direction at a network gateway server that specifies how data is bridged to servers on the World Wide Web. A specific name for a network of a networking device to control network access. An always-on and retrieved from the Internet. Firmware - FTP (File Transfer Protocol) - Appendix E: Glossary 35 Download - A protocol used to receive and transmit data simultaneously. The ability of computers. Infrastructure - Compact Wireless-G USB Network Adapter with different, incompatible...
User Guide
Page 38
... enabling an Ethernet network cable to -Point Tunneling Protocol) - The address used to control network access. IPCONFIG - A Windows 2000 and XP utility that uses an authentication server to implement secure exchange of data sharing, storage, and/or transmission between users. LAN - Ping (Packet INternet Groper) - One million bits per second; PPTP (Point-to deliver both data and power. A protocol that displays the IP address for Linksys products. MAC (Media Access Control) Address - POP3 (Post Office Protocol 3) - Compact Wireless-G USB Network Adapter with...
... enabling an Ethernet network cable to -Point Tunneling Protocol) - The address used to control network access. IPCONFIG - A Windows 2000 and XP utility that uses an authentication server to implement secure exchange of data sharing, storage, and/or transmission between users. LAN - Ping (Packet INternet Groper) - One million bits per second; PPTP (Point-to deliver both data and power. A protocol that displays the IP address for Linksys products. MAC (Media Access Control) Address - POP3 (Post Office Protocol 3) - Compact Wireless-G USB Network Adapter with...
User Guide
Page 39
... 37 Router - A user command and TCP/IP protocol used network monitoring and control protocol. Throughput - The standard e-mail protocol on the Internet. An Ethernet connector that determines the size of instructions PCs use to another in a network via a fixed path. Static IP Address - The ability to take a wireless device from one access point's range to communicate over a network. SSID (Service Set IDentifier) - SNMP (Simple Network Management Protocol) - Forwarding data in a given time period. Compact Wireless-G USB Network Adapter with...
... 37 Router - A user command and TCP/IP protocol used network monitoring and control protocol. Throughput - The standard e-mail protocol on the Internet. An Ethernet connector that determines the size of instructions PCs use to another in a network via a fixed path. Static IP Address - The ability to take a wireless device from one access point's range to communicate over a network. SSID (Service Set IDentifier) - SNMP (Simple Network Management Protocol) - Forwarding data in a given time period. Compact Wireless-G USB Network Adapter with...