Linksys WPC54G User Manual

Linksys WPC54G User Manual

Wireless-g notebook adapter
Hide thumbs Also See for WPC54G:

Advertisement

USER GUIDE
Wireless-G Notebook Adapter
WPC54G
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WPC54G

  • Page 1 USER GUIDE Wireless-G Notebook Adapter WPC54G Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Software in Linksys Products ........
  • Page 4: Chapter 1: Product Overview

    Wireless-G standard, you’ll be ready to take advantage of the increased speeds. Get connected to current-standard 802.11b networks today, and be prepared for the future with the Wireless-G Notebook Adapter from Linksys. Wireless-G Notebook Adapter Product Overview Front Panel Power (Green) The Power LED lights up and will stay on while the Adapter is powered on.
  • Page 5: Chapter 2: Wireless Security Checklist

    32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other...
  • Page 6: Chapter 3: Configuration

    Chapter 3 Chapter 3: Configuration The Wireless-G Notebok Adapter Setup Wizard will guide you through the installation procedure. The Setup Wizard will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. IMPORTANT: Do not connect the Adapter until you are instructed to do so or the setup will not work.
  • Page 7: Setting Up The Adapter

    16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non- Linksys wireless products, enter the WEP key manually on those products.)
  • Page 8 Chapter 3 Then click Connect and proceed to step 3. WPA-Personal (Wi-Fi Protected Access) If your network has the wireless security WPA-Personal enabled, this screen will appear. WPA-Personal Needed for Connection Encryption Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu.
  • Page 9 Chapter 3 IP Address This IP Address must be unique to your network. Subnet Mask The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway Enter the IP address of your network’s Gateway here. DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network here.
  • Page 10 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non- Linksys wireless products, enter the WEP key manually on those products.)
  • Page 11 Chapter 3 WPA2-Personal Enter a Pre-shared Key that is 8-63 characters in length. Wireless Security - WPA2-Personal Pre-shared Key Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen.
  • Page 12 Chapter 3 PEAP If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Enter the name of the authentication server in the Server Name field (this is optional).
  • Page 13 Chapter 3 Click the Next button to continue or the Back button to return to the previous screen. RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP.
  • Page 14: Chapter 4: Using The Wireless Monitor

    Chapter 4 Chapter 4: Using the Wireless Monitor Use the Wireless Network Monitor to check the link information, search for available wireless networks, or create profiles that hold different configuration settings. Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer.
  • Page 15 Chapter 4 Wireless Network Status The Wireless Network Status screen provides information on your current network settings. More Information - Wireless Network Status Status This shows the status of the wireless network connection. SSID This is the unique name of the wireless network. Wireless Mode The mode of the wireless network currently in use is displayed here.
  • Page 16: Site Survey

    Chapter 4 Information screen. Click the Status button to go to the Wireless Network Status screen. Click the Save to Profile button to save the currently active connection settings to a profile. Click the Refresh button to reset the statistics. Site Survey The Site Survey screen displays a list of available networks in the table on the left.
  • Page 17: Profiles

    Chapter 4 Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profiles Profile The name of the profile is displayed here. SSID The SSID or unique name of the wireless network is displayed here.
  • Page 18 Configuration Chapter 4 Available Wireless Networks SecureEasySetup This Adapter features SecureEasySetup. This means that you can set it up with just the press of a button when connecting to wireless routers or access points that also feature SecureEasySetup. Both point on the network must feature SecureEasySetup for this to work.
  • Page 19: Appendix A: Specifications

    Appendix A Appendix A: Specifications Model WPC54G Channels 11 Channels (most of North, Central, and South America) 13 Channels (most of Europe) LEDs Power, Link Transmit Power 18 dBm Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps);...
  • Page 20: Appendix B: Warranty Information

    Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
  • Page 21 This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-G Notebook Adapter...
  • Page 22: Appendix C: Regulatory Information

    Appendix C Appendix C: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 23: Avis D'industrie Canada

    Appendix C Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : il ne doit pas produire de brouillage et il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
  • Page 24: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
  • Page 25 Appendix C Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
  • Page 26 Appendix C Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
  • Page 27 återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit www.linksys.com estää...
  • Page 28: Appendix D: Software License Agreement

    Software, and the recipient agrees to the terms of this Agreement. “Software” includes, and this Agreement will apply to (a) the software of Linksys or its suppliers provided in or with the applicable Linksys product, excluding technology from the open source community, and (b) any upgrades, updates, bug fixes or modified versions (“Upgrades”) or...
  • Page 29 If You would like a copy of the GPL or other open source code in this Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request.
  • Page 30 Appendix D GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
  • Page 31 Appendix D If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
  • Page 32 END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under Version 2.1 of the “GNU Lesser General Public License” then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
  • Page 33 Appendix D GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
  • Page 34 Appendix D freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”.
  • Page 35 Appendix D Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
  • Page 36 Appendix D Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the...
  • Page 37 OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 3 Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
  • Page 38 Appendix D Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the...
  • Page 39 Software License Agreement Appendix D DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents