Wireless-G standard, you’ll be ready to take advantage of the increased speeds. Get connected to current-standard 802.11b networks today, and be prepared for the future with the Wireless-G Notebook Adapter from Linksys. Wireless-G Notebook Adapter Product Overview Front Panel Power (Green) The Power LED lights up and will stay on while the Adapter is powered on.
32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other...
Chapter 3 Chapter 3: Configuration The Wireless-G Notebok Adapter Setup Wizard will guide you through the installation procedure. The Setup Wizard will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. IMPORTANT: Do not connect the Adapter until you are instructed to do so or the setup will not work.
16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non- Linksys wireless products, enter the WEP key manually on those products.)
Page 8
Chapter 3 Then click Connect and proceed to step 3. WPA-Personal (Wi-Fi Protected Access) If your network has the wireless security WPA-Personal enabled, this screen will appear. WPA-Personal Needed for Connection Encryption Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu.
Page 9
Chapter 3 IP Address This IP Address must be unique to your network. Subnet Mask The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway Enter the IP address of your network’s Gateway here. DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network here.
Page 10
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non- Linksys wireless products, enter the WEP key manually on those products.)
Page 11
Chapter 3 WPA2-Personal Enter a Pre-shared Key that is 8-63 characters in length. Wireless Security - WPA2-Personal Pre-shared Key Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen.
Page 12
Chapter 3 PEAP If you selected PEAP, enter the login name of your wireless network in the Login Name field. Enter the password of your wireless network in the Password field. Enter the name of the authentication server in the Server Name field (this is optional).
Page 13
Chapter 3 Click the Next button to continue or the Back button to return to the previous screen. RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP.
Chapter 4 Chapter 4: Using the Wireless Monitor Use the Wireless Network Monitor to check the link information, search for available wireless networks, or create profiles that hold different configuration settings. Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer.
Page 15
Chapter 4 Wireless Network Status The Wireless Network Status screen provides information on your current network settings. More Information - Wireless Network Status Status This shows the status of the wireless network connection. SSID This is the unique name of the wireless network. Wireless Mode The mode of the wireless network currently in use is displayed here.
Chapter 4 Information screen. Click the Status button to go to the Wireless Network Status screen. Click the Save to Profile button to save the currently active connection settings to a profile. Click the Refresh button to reset the statistics. Site Survey The Site Survey screen displays a list of available networks in the table on the left.
Chapter 4 Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profiles Profile The name of the profile is displayed here. SSID The SSID or unique name of the wireless network is displayed here.
Page 18
Configuration Chapter 4 Available Wireless Networks SecureEasySetup This Adapter features SecureEasySetup. This means that you can set it up with just the press of a button when connecting to wireless routers or access points that also feature SecureEasySetup. Both point on the network must feature SecureEasySetup for this to work.
Appendix A Appendix A: Specifications Model WPC54G Channels 11 Channels (most of North, Central, and South America) 13 Channels (most of Europe) LEDs Power, Link Transmit Power 18 dBm Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps);...
Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
Page 21
This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-G Notebook Adapter...
Appendix C Appendix C: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Appendix C Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : il ne doit pas produire de brouillage et il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
(WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
Page 25
Appendix C Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Page 26
Appendix C Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
Page 27
återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit www.linksys.com estää...
Software, and the recipient agrees to the terms of this Agreement. “Software” includes, and this Agreement will apply to (a) the software of Linksys or its suppliers provided in or with the applicable Linksys product, excluding technology from the open source community, and (b) any upgrades, updates, bug fixes or modified versions (“Upgrades”) or...
Page 29
If You would like a copy of the GPL or other open source code in this Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request.
Page 30
Appendix D GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
Page 31
Appendix D If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
Page 32
END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under Version 2.1 of the “GNU Lesser General Public License” then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
Page 33
Appendix D GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Page 34
Appendix D freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”.
Page 35
Appendix D Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
Page 36
Appendix D Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the...
Page 37
OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 3 Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
Page 39
Software License Agreement Appendix D DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.