User Guide
Page 6
... the underlying network is admin. This is the name of security for wireless networks. 2. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are at a rapid pace. Like signals from your cellular or cordless phones, signals from connecting to your wireless network, you , but do not support WPA. WEP is more vulnerable to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Enable MAC address filtering Linksys routers and gateways give...
... the underlying network is admin. This is the name of security for wireless networks. 2. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are at a rapid pace. Like signals from your cellular or cordless phones, signals from connecting to your wireless network, you , but do not support WPA. WEP is more vulnerable to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Enable MAC address filtering Linksys routers and gateways give...
User Guide
Page 7
... connect the Adapter until you to install the Adapter into your PC. To install the Adapter, click the Click Here to open the PDF file of the PC. 2. User Guide Click the User Guide button to Start button on the CD enclosed with the Adapter. The Power LED should appear. If it does not, click the Start button and choose Run. After installing the Adapter, as shown below, and restarting your PC, the Setup Wizard...
... connect the Adapter until you to install the Adapter into your PC. To install the Adapter, click the Click Here to open the PDF file of the PC. 2. User Guide Click the User Guide button to Start button on the CD enclosed with the Adapter. The Power LED should appear. If it does not, click the Start button and choose Run. After installing the Adapter, as shown below, and restarting your PC, the Setup Wizard...
User Guide
Page 8
... on the center of setting up the Adapter. Select the wireless network you wish to connect to and click the Connect button. (If you do not see your wireless network. Wireless-G USB Network Adapter with Linksys wireless products only. (If you have a network configured. It provides two options for advanced users only. WEP If you have any nonLinksys wireless products, enter the WEP key manually on the Adapter. For 64-bit encryption, enter exactly 10 hexadecimal characters...
... on the center of setting up the Adapter. Select the wireless network you wish to connect to and click the Connect button. (If you do not see your wireless network. Wireless-G USB Network Adapter with Linksys wireless products only. (If you have a network configured. It provides two options for advanced users only. WEP If you have any nonLinksys wireless products, enter the WEP key manually on the Adapter. For 64-bit encryption, enter exactly 10 hexadecimal characters...
User Guide
Page 9
...router or other DHCP server, click the Obtain network settings automatically (DHCP) radio button. If your network does not have a DHCP server or router, click the Specify network settings radio button. Then click Connect and proceed to your network. Available Wireless Networks 2. Wireless-G USB Network Adapter with the available networks, you can use , TKIP or AES, from the Wireless Network Monitor will appear. WPA-Personal Needed for your network. 6 Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for Connection Encryption Select the type...
...router or other DHCP server, click the Obtain network settings automatically (DHCP) radio button. If your network does not have a DHCP server or router, click the Specify network settings radio button. Then click Connect and proceed to your network. Available Wireless Networks 2. Wireless-G USB Network Adapter with the available networks, you can use , TKIP or AES, from the Wireless Network Monitor will appear. WPA-Personal Needed for your network. 6 Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for Connection Encryption Select the type...
User Guide
Page 10
... connect to a wireless router or access point. Wireless Network Name This is case- Proceed to the previous screen. 5. Enter the Wireless Network Name for your network's Gateway here. sensitive and should match the channel set on the network, though at a slower speed. Click the Next button to continue, or click the Back button to return to step 6. Chapter 3 Subnet Mask The Adapter's Subnet Mask must be used : WEP, WPA Personal, WPA Enterprise, or RADIUS. DNS 1 and DNS 2 Enter the DNS address...
... connect to a wireless router or access point. Wireless Network Name This is case- Proceed to the previous screen. 5. Enter the Wireless Network Name for your network's Gateway here. sensitive and should match the channel set on the network, though at a slower speed. Click the Next button to continue, or click the Back button to return to step 6. Chapter 3 Subnet Mask The Adapter's Subnet Mask must be used : WEP, WPA Personal, WPA Enterprise, or RADIUS. DNS 1 and DNS 2 Enter the DNS address...
User Guide
Page 11
... WEP key of your other wireless network devices and is set to use, TKIP or AES, from the TX Key drop-down menu. WEP Configuration Authentication The default is compatible with Linksys wireless products only. (If you have any nonLinksys wireless products, enter the WEP key manually on those products.) WEP Key The WEP key you want to Auto, so it will autodetect for Remote Authentication Dial-In User Service. It is a stronger security method than WPA. WPA Personal Encryption Select the type...
... WEP key of your other wireless network devices and is set to use, TKIP or AES, from the TX Key drop-down menu. WEP Configuration Authentication The default is compatible with Linksys wireless products only. (If you have any nonLinksys wireless products, enter the WEP key manually on those products.) WEP Key The WEP key you want to Auto, so it will autodetect for Remote Authentication Dial-In User Service. It is a stronger security method than WPA. WPA Personal Encryption Select the type...
User Guide
Page 12
... Back button to return to the previous screen. 9 RADIUS - Authentication Select the authentication method your wireless network; Wireless-G USB Network Adapter with a RADIUS server. (This should only be used when a RADIUS server is using , EAP-TLS or PEAP. From the Certificate drop-down menu, select the certificate you have installed to authenticate you want to use of the authentication server in the Login Name field. Authentication Select the authentication method your wireless network in the Login Name field. Configuration Wireless Security - Enter...
... Back button to return to the previous screen. 9 RADIUS - Authentication Select the authentication method your wireless network; Wireless-G USB Network Adapter with a RADIUS server. (This should only be used when a RADIUS server is using , EAP-TLS or PEAP. From the Certificate drop-down menu, select the certificate you have installed to authenticate you want to use of the authentication server in the Login Name field. Authentication Select the authentication method your wireless network in the Login Name field. Configuration Wireless Security - Enter...
User Guide
Page 13
... the Link Information screen. Then select the authentication method used inside the PEAP tunnel. Configuration The Congratulations screen will appear next and show the new settings. PEAP Click the Next button to continue or the Back button to return to use any certificate, keep the default setting, Trust Any. Enter the password of your wireless network in the Server Name field (this is complete. Confirm New Settings Wireless-G USB Network Adapter with...
... the Link Information screen. Then select the authentication method used inside the PEAP tunnel. Configuration The Congratulations screen will appear next and show the new settings. PEAP Click the Next button to continue or the Back button to return to use any certificate, keep the default setting, Trust Any. Enter the password of your wireless network in the Server Name field (this is complete. Confirm New Settings Wireless-G USB Network Adapter with...
User Guide
Page 14
... gray. Using the Wireless Monitor Link Information The Link Information screen displays network mode, signal strength, and link quality information about the current wireless connection. You can find out how strong the current wireless signal is and how good the connection's quality is not connected, then the icon will be accessed AFTER connecting the Adapter. It also provides a button to view additional status and statistics about the current connection. Wireless-G USB Network Adapter with...
... gray. Using the Wireless Monitor Link Information The Link Information screen displays network mode, signal strength, and link quality information about the current wireless connection. You can find out how strong the current wireless signal is and how good the connection's quality is not connected, then the icon will be accessed AFTER connecting the Adapter. It also provides a button to view additional status and statistics about the current connection. Wireless-G USB Network Adapter with...
User Guide
Page 15
.... Wireless-G USB Network Adapter with Wi-Fi Finder Using the Wireless Monitor Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your wireless network's authentication method. Driver Version This shows the version of the wireless network connection. Transmit Power This is the channel to the Wireless Network Statistics screen. Chapter 4 Status This shows the status of background noise affecting the wireless signal. SSID This is displayed here. Wireless Mode The mode of the wireless network. Default Gateway The Default Gateway address...
.... Wireless-G USB Network Adapter with Wi-Fi Finder Using the Wireless Monitor Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your wireless network's authentication method. Driver Version This shows the version of the wireless network connection. Transmit Power This is the channel to the Wireless Network Statistics screen. Chapter 4 Status This shows the status of background noise affecting the wireless signal. SSID This is displayed here. Wireless Mode The mode of the wireless network. Default Gateway The Default Gateway address...
User Guide
Page 16
... connection to reset the statistics. Click the Refresh button to a wireless network. Total Up Time This indicates the cumulative total of the wireless network is displayed here. MAC Address The MAC address of WEP encryption, 64-bit or 128-bit Then enter the network's Passphrase or WEP Key. If the network has encryption enabled, a screen appear requiring security information. Select the appropriate level of the wireless network's access point is displayed here. Site Information For each network's SSID, Channel...
... connection to reset the statistics. Click the Refresh button to a wireless network. Total Up Time This indicates the cumulative total of the wireless network is displayed here. MAC Address The MAC address of WEP encryption, 64-bit or 128-bit Then enter the network's Passphrase or WEP Key. If the network has encryption enabled, a screen appear requiring security information. Select the appropriate level of the wireless network's access point is displayed here. Site Information For each network's SSID, Channel...
User Guide
Page 17
... to save different configuration profiles for Connection screen. Import a Profile Export Select the profile you save in use. Authentication The authentication setting for detailed instructions. The table on the left displays a list of the wireless network currently in a different location, and click Export. Profiles Profile The name of the wireless security feature is shown here. Wireless-G USB Network Adapter with their profile names and SSIDs. Profile Information...
... to save different configuration profiles for Connection screen. Import a Profile Export Select the profile you save in use. Authentication The authentication setting for detailed instructions. The table on the left displays a list of the wireless network currently in a different location, and click Export. Profiles Profile The name of the wireless security feature is shown here. Wireless-G USB Network Adapter with their profile names and SSIDs. Profile Information...
User Guide
Page 18
... the Passphrase field, so a WEP key is intended for setting up the Adapter is automatically generated. Click the Refresh button to "F". Chapter 4 Creating a New Profile On the Profiles screen, click the New button to and click the Connect button. (If you do not see a wireless security screen. Manual Setup If your network utilizes WPA-Personal (Wi-Fi Protected Access) encryption, the WPA-Personal Needed for the new profile, and click the OK...
... the Passphrase field, so a WEP key is intended for setting up the Adapter is automatically generated. Click the Refresh button to "F". Chapter 4 Creating a New Profile On the Profiles screen, click the New button to and click the Connect button. (If you do not see a wireless security screen. Manual Setup If your network utilizes WPA-Personal (Wi-Fi Protected Access) encryption, the WPA-Personal Needed for the new profile, and click the OK...
User Guide
Page 19
... 4 WPA-Personal Needed for your network. The passphrase must specify the IP Address and Subnet Mask on this screen. The profile has been configured. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for Connection Using the Wireless Monitor Setting Up the Adapter with Wi-Fi Finder Network Settings If your network does not have a Router or DHCP server, click the radio button next to Specify network settings. To cancel the connection, click Cancel. 2. If your network...
... 4 WPA-Personal Needed for your network. The passphrase must specify the IP Address and Subnet Mask on this screen. The profile has been configured. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for Connection Using the Wireless Monitor Setting Up the Adapter with Wi-Fi Finder Network Settings If your network does not have a Router or DHCP server, click the radio button next to Specify network settings. To cancel the connection, click Cancel. 2. If your network...
User Guide
Page 20
...another wireless device directly without using a wireless router or access point. If you want to connect to a wireless router or access point. The Wireless Security screen will appear. Proceed to change any settings. 4. SSID This is case- If you choose should be used for all the devices in the network. Chapter 4 Default Gateway Enter the IP address of your wireless network will operate. The channel you are unsure about which your network's Gateway here. DNS 1 and DNS 2 Enter the DNS address of two wireless modes. Wireless-G USB Network Adapter...
...another wireless device directly without using a wireless router or access point. If you want to connect to a wireless router or access point. The Wireless Security screen will appear. Proceed to change any settings. 4. SSID This is case- If you choose should be used for all the devices in the network. Chapter 4 Default Gateway Enter the IP address of your wireless network will operate. The channel you are unsure about which your network's Gateway here. DNS 1 and DNS 2 Enter the DNS address of two wireless modes. Wireless-G USB Network Adapter...
User Guide
Page 21
...so a WEP key is set to "F". WPA Enterprise WPA Enterprise features WPA security used in the Server Name 18 Authentication Select the authentication method your wireless network. WEP WEP To use encryption, select Disabled. Wireless-G USB Network Adapter with dynamic encryption keys. The passphrase must match the WEP key of the authentication server in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to use WEP encryption, select 64-bits or 128bit characters from the TX Key drop-down menu, and enter a passphrase or key. Chapter...
...so a WEP key is set to "F". WPA Enterprise WPA Enterprise features WPA security used in the Server Name 18 Authentication Select the authentication method your wireless network. WEP WEP To use encryption, select Disabled. Wireless-G USB Network Adapter with dynamic encryption keys. The passphrase must match the WEP key of the authentication server in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to use WEP encryption, select 64-bits or 128bit characters from the TX Key drop-down menu, and enter a passphrase or key. Chapter...
User Guide
Page 24
... USB Network Adapter if it supports operation over the wireless network? Yes, as long as the other computers linked via Ethernet in the Infrastructure configuration. •• Make sure that the notebook or desktop is powered on. •• Make sure that the USB Controller is properly inserted into the notebook or desktop's USB port. •• Right-click on the same channel, SSID, and WEP as the game supports multiple...
... USB Network Adapter if it supports operation over the wireless network? Yes, as long as the other computers linked via Ethernet in the Infrastructure configuration. •• Make sure that the notebook or desktop is powered on. •• Make sure that the USB Controller is properly inserted into the notebook or desktop's USB port. •• Right-click on the same channel, SSID, and WEP as the game supports multiple...
User Guide
Page 25
... ability of each access point to detect, provided that Wireless-G USB Network Adapter with the wireless network even when not actually transmitting data. Spectrum in effect, louder and thus easier to the wired backbone. Before using the roaming function, the workstation must maintain contact with Wi-Fi Finder Troubleshooting is designed to enhance security and access control. have set to infrastructure mode, the wireless network is being...
... ability of each access point to detect, provided that Wireless-G USB Network Adapter with the wireless network even when not actually transmitting data. Spectrum in effect, louder and thus easier to the wired backbone. Before using the roaming function, the workstation must maintain contact with Wi-Fi Finder Troubleshooting is designed to enhance security and access control. have set to infrastructure mode, the wireless network is being...
User Guide
Page 27
... (a) repair the product with new or refurbished parts, (b) replace the product with Wi-Fi Finder Warranty Information service offerings. This limited warranty gives you specific legal rights, and you will be warranted for the remainder of a third party's service for Linksys, at your area can be uninterrupted or error free. Obtaining Warranty Service If you are responsible for Linksys Technical Support...
... (a) repair the product with new or refurbished parts, (b) replace the product with Wi-Fi Finder Warranty Information service offerings. This limited warranty gives you specific legal rights, and you will be warranted for the remainder of a third party's service for Linksys, at your area can be uninterrupted or error free. Obtaining Warranty Service If you are responsible for Linksys Technical Support...
User Guide
Page 45
... If you include anyWindows specific code (or a derivative thereof ) from this list of any Copyright notices in...SERVICES; This product includes cryptographic software written by Tim Hudson ([email protected]). com). If this distribution is Tim Hudson (tjh@cryptsoft. Redistribution and use in source and binary forms, with this package is used...USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Wireless-G USB Network Adapter with the distribution. 3. This can be used . This package is free for commercial and non-commercial use in documentation...
... If you include anyWindows specific code (or a derivative thereof ) from this list of any Copyright notices in...SERVICES; This product includes cryptographic software written by Tim Hudson ([email protected]). com). If this distribution is Tim Hudson (tjh@cryptsoft. Redistribution and use in source and binary forms, with this package is used...USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Wireless-G USB Network Adapter with the distribution. 3. This can be used . This package is free for commercial and non-commercial use in documentation...