User Guide
Page 5
Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with WEP, because WPA/WPA2 uses dynamic key encryption. You should enable the highest level of your Social Security number) ...not secure. • Password protect all computers on the network and individually password protect sensitive files. • Change passwords on a regular basis. • Install anti-virus software and personal firewall software. • Disable file sharing (peer-to enable Media Access Control (MAC) address filtering. For example, you should ...
Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with WEP, because WPA/WPA2 uses dynamic key encryption. You should enable the highest level of your Social Security number) ...not secure. • Password protect all computers on the network and individually password protect sensitive files. • Change passwords on a regular basis. • Install anti-virus software and personal firewall software. • Disable file sharing (peer-to enable Media Access Control (MAC) address filtering. For example, you should ...
User Guide
Page 6
... connection's quality is most convenient for you can also click the Wi-Fi Protected Setup button to connect to Access the Wireless Network Monitor After installing the Adapter, the Monitor icon appears in the same room. NOTE: The Adapter supports Wi-Fi Protected Setup, which is a feature that makes it to...
... connection's quality is most convenient for you can also click the Wi-Fi Protected Setup button to connect to Access the Wireless Network Monitor After installing the Adapter, the Monitor icon appears in the same room. NOTE: The Adapter supports Wi-Fi Protected Setup, which is a feature that makes it to...
User Guide
Page 23
... two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Certificate Select the certificate you installed to the previous screen. Encryption Select the type of the authentication server (this is using, EAP-TLS or PEAP. WPA2 Personal Passphrase Enter the network...
... two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Certificate Select the certificate you installed to the previous screen. Encryption Select the type of the authentication server (this is using, EAP-TLS or PEAP. WPA2 Personal Passphrase Enter the network...
User Guide
Page 24
...Enter the login name of the authentication server (this is optional). Server Name Enter the name of your wireless network. If you installed to the router.) WPA2 Enterprise offers two authentication methods, EAP‑TLS and PEAP. Authentication Select the authentication method your wireless ...-Band Wireless-N USB Network Adapter WPA2 Enterprise - Click Next to continue, or click Back to return to authenticate you installed to the previous screen. Certificate Select the certificate you on your wireless network. Password Enter the password of your network is optional). ...
...Enter the login name of the authentication server (this is optional). Server Name Enter the name of your wireless network. If you installed to the router.) WPA2 Enterprise offers two authentication methods, EAP‑TLS and PEAP. Authentication Select the authentication method your wireless ...-Band Wireless-N USB Network Adapter WPA2 Enterprise - Click Next to continue, or click Back to return to authenticate you installed to the previous screen. Certificate Select the certificate you on your wireless network. Password Enter the password of your network is optional). ...
User Guide
Page 25
...Authentication Select the authentication method your wireless network. Password Enter the password of your wireless network. Certificate Select the certificate you installed to authenticate you on your wireless network. Select the authentication method used inside the PEAP tunnel. To edit the new settings...Wireless-N USB Network Adapter Confirm New Settings To save the new settings, click Save. Chapter 3 Certificate Select the certificate you installed to authenticate you on your wireless network. Click Next to continue, or click Back to return to the previous screen. Inner ...
...Authentication Select the authentication method your wireless network. Password Enter the password of your wireless network. Certificate Select the certificate you installed to authenticate you on your wireless network. Select the authentication method used inside the PEAP tunnel. To edit the new settings...Wireless-N USB Network Adapter Confirm New Settings To save the new settings, click Save. Chapter 3 Certificate Select the certificate you installed to authenticate you on your wireless network. Click Next to continue, or click Back to return to the previous screen. Inner ...
User Guide
Page 28
... Connect to a different wireless network: 1. Select Network 4. If your network, and then click Connect. Appendix B Appendix B: Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your network has wireless security, go to step 7. Wireless Connection Status New Wireless...
... Connect to a different wireless network: 1. Select Network 4. If your network, and then click Connect. Appendix B Appendix B: Windows Vista Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your network has wireless security, go to step 7. Wireless Connection Status New Wireless...
User Guide
Page 29
... settings for your network. Select Home, Work, or Public location. Click Close. Click Connect. Appendix B 5. This screen appears while the Adapter connects to end the installation.
... settings for your network. Select Home, Work, or Public location. Click Close. Click Connect. Appendix B 5. This screen appears while the Adapter connects to end the installation.
User Guide
Page 31
... back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. After installing the Adapter, the Windows XP Wireless Zero Configuration icon appears in your network does not have wireless security enabled, go to step...2 and 3 are for Windows XP (KB893357) on Windows XP Wireless Zero Configuration, refer to Update for Windows XP with Service Pack 2 installed. Use Linksys Wireless Network Monitor NOTE: For more information on the microsoft.com website to be available. Dual-Band Wireless-N USB Network Adapter No...
... back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. After installing the Adapter, the Windows XP Wireless Zero Configuration icon appears in your network does not have wireless security enabled, go to step...2 and 3 are for Windows XP (KB893357) on Windows XP Wireless Zero Configuration, refer to Update for Windows XP with Service Pack 2 installed. Use Linksys Wireless Network Monitor NOTE: For more information on the microsoft.com website to be available. Dual-Band Wireless-N USB Network Adapter No...
User Guide
Page 34
... warranty fails of the product less any warranty or remedy provided under this product's use with non‑Linksys products, (d) the product has not been installed, operated, repaired, or maintained in the product User Guide and at your product, you . You are requested to such third party software or service offerings...
... warranty fails of the product less any warranty or remedy provided under this product's use with non‑Linksys products, (d) the product has not been installed, operated, repaired, or maintained in the product User Guide and at your product, you . You are requested to such third party software or service offerings...
User Guide
Page 36
...no guarantee that may be prohibited. Other applications Dual-Band Wireless-N USB Network Adapter Regulatory Information such as documented in a particular installation. This setting is restricted to correct the interference by the end user. There may cause undesired operation. Appendix F Appendix F:... wet basement or near a swimming pool. • Avoid using this product can radiate radio frequency energy and, if not installed and used in typical laptop computer(s) with the specifications for an uncontrolled environment. SAR compliance has been established in a typical ...
...no guarantee that may be prohibited. Other applications Dual-Band Wireless-N USB Network Adapter Regulatory Information such as documented in a particular installation. This setting is restricted to correct the interference by the end user. There may cause undesired operation. Appendix F Appendix F:... wet basement or near a swimming pool. • Avoid using this product can radiate radio frequency energy and, if not installed and used in typical laptop computer(s) with the specifications for an uncontrolled environment. SAR compliance has been established in a typical ...