2.4ghz 802.11g wireless-g usb network adapter with srx400 (62 pages)
Summary of Contents for Linksys WUSB200
Page 1
Wireless-G Business USB Network Adapter with RangeBooster Model No. WUSB200 Wireless Model No. Model No. Model No. Model No. USER GUIDE BUSINESS SERIES...
Roaming Network Layout Chapter 3: Getting to Know the Wireless-G Business USB Network Adapter The LED Indicators Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 7 Starting the Setup Connecting the Adapter Setting up the Adapter...
Page 4
Wireless-G Business USB Network Adapter with RangeBooster Windows XP Wireless Zero Configuration Appendix C: Wireless Security Security Precautions Security Threats Facing Wireless Networks Appendix D: Windows Help Appendix E: Glossary Appendix F: Specifications Appendix G: Warranty Information Appendix H: Regulatory Information...
Page 5
Wireless-G Business USB Network Adapter with RangeBooster List of Figures Figure 3-1: LEDs Figure 4-1: Setup Wizard’s Welcome Screen Figure 4-2: Setup Wizard’s License Agreement Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Network Figure 4-5: WEP Figure 4-6: WPA - Personal...
Page 6
Wireless-G Business USB Network Adapter with RangeBooster Figure 5-9: Creating a Profile - WEP Key Needed Figure 5-10: Creating a Profile - WPA-Personal Figure 5-11: Creating a Profile - Congratulations Figure 5-12: Creating a Profile - Manual Setup - Network Settings...
Page 7
Wireless-G Business USB Network Adapter with RangeBooster Figure 5-43: Editing a Profile - Congratulations Figure 5-44: Site Survey Figure 5-45: Troubleshooting Figure 5-46: Administration Figure 5-47: Administration - Login Access Point Account Figure 5-48: Administration - Modify Access Point Account...
Fi Protected Access™ (WPA2 Enterprise) with up to 256-bit encryption, and the new Wireless Security Monitoring functionality gives your business the visibility and protection it needs. When used with a Linksys WAP200, the Wireless Security Monitoring alerts you of possible wireless intruders and vulnerabilities in the wireless network deployment.
Wireless-G Business USB Network Adapter with RangeBooster What’s in this User Guide? This user guide covers the steps for setting up and using the Wireless-G Business USB Network Adapter. • Chapter 1: Introduction This chapter describes the Adapter’s applications and this User Guide.
Page 10
This appendix supplies the Adapter’s warranty information. • Appendix H: Regulatory Information This appendix supplies the Adapter’s regulatory information. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this User Guide?
Linksys wireless adapters also provide users access to a wired network when using an access point or wireless router. An integrated wireless and wired network is called an infrastructure network. Each wireless PC in an infrastructure network can talk to any computer in a wired network infrastructure via the access point or wireless router.
When you wish to connect your wired network with your wireless network, the network ports on the access points and wireless routers can be connected to Linksys switches or routers. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about wireless products.
Green. The Wireless LED lights up when the Adapter is powered on. Link Green. The Link/Act LED lights up when the Adapter has an active connection. Chapter 3: Getting to Know the Wireless-G Business USB Network Adapter The LED Indicators...
User Guide - Click the User Guide button to open the PDF file of this User Guide. Exit - Click the Exit button to exit the Setup Wizard. 1. To install the Adapter, click the Click Here to Start button on the Welcome screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Starting the Setup Figure 4-1: Setup Wizard’s Welcome Screen...
3. The Power LED should light up when the Adapter is plugged in. 4. Raise the antennas. Make sure the antennas point straight up into the air, at a 90º angle from the Adapter. This will ensure optimum wireless operating range and performance.
Connect button to connect to it. Click the Refresh button to update the Available Wireless Network list. • Manual Setup. If your network is not listed on this screen, select Manual Setup to set up the adapter manually. This method of setting up the Adapter is intended for Advanced Users only.
16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
3. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-7: WPA2 - Personal...
IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter...
If your wireless network has wireless security, select the method of security used: WEP, WPA/WPA2- Personal, WPA/WPA2-Enterprise, RADIUS, or LEAP. WEP stands for Wired Equivalent Privacy, and WPA Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-12: Ad-Hoc Mode Settings encryption: encoding data transmitted in a network.
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter...
Server Name field (this is optional). Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-18: Wireless Security - WPA2 Enterprise-EAP...
Trust Any. Then select the authentication method used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter...
Link Information screen. Click Return to Profile screen to return to the Creating a Profile screen. Congratulations! Your manual setup through the Wireless Network Monitor is complete. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-22: Wireless Security - LEAP...
Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
IP Address - The IP Address of the Adapter is displayed here. Subnet Mask - The Subnet Mask of the Adapter is shown here. Default Gateway - The Default Gateway address of the Adapter is displayed here. DNS - This is the DNS (Domain Name Service) address of the Adapter.
The Statistics screen provides statistics on your current network settings. Transmit Rate - This is the data transfer rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transfer rate possible at any given time.) Receive Rate - This is the rate at which data is received.
Wireless-G Business USB Network Adapter with RangeBooster Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here.
Connect button to connect to it. Click the Refresh button to update the Available Wireless Network list. • Manual Setup. If your network is not listed on this screen, select Manual Setup to set up the adapter manually. This method of setting up the Adapter is intended for advanced users only.
Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters.
IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Wireless-G Business USB Network Adapter with RangeBooster Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication.
Wireless-G Business USB Network Adapter with RangeBooster WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Wireless-G Business USB Network Adapter with RangeBooster WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
Wireless-G Business USB Network Adapter with RangeBooster RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
Wireless-G Business USB Network Adapter with RangeBooster LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password based system. Enter the username and password in their fields. Enter the password again in the Confirm filed.
Wireless-G Business USB Network Adapter with RangeBooster 7. The Congratulations screen will appear next. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profile Screen to keep the current settings active and return to the Profiles screen.
Wireless-G Business USB Network Adapter with RangeBooster 1. The Wireless Mode screen shows a choice of two wireless modes. Click the Infrastructure Mode radio button if you want to connect to a wireless router or access point. Click the Ad-Hoc Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point.
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Wireless-G Business USB Network Adapter with RangeBooster WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in length.
Wireless-G Business USB Network Adapter with RangeBooster WPA Enterprise WPA/WPA2 Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Wireless-G Business USB Network Adapter with RangeBooster WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
Wireless-G Business USB Network Adapter with RangeBooster RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
Wireless-G Business USB Network Adapter with RangeBooster 5. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
The Site Survey screen displays a list of available networks in the table on the left. The table shows each network’s SSID, Channel, and the quality of the wireless signal the Adapter is receiving. You may click SSID, CH (Channel), or Signal, to sort by that field.
You may click Repair to troubleshoot your connection to the wireless network. Repair will disconnect your client from the network and then reconnect, in order to re-establish an IP address. You may also click FAQ to view the FAQ pages from the Linksys website. Figure 5-45: Troubleshooting...
Wireless-G Business USB Network Adapter with RangeBooster Log in as the Access Point's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin). Click Next to continue to the administrative options.
Wireless-G Business USB Network Adapter with RangeBooster Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions of the Wireless Network Monitor.
Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
Wireless-G Business USB Network Adapter with RangeBooster Classification The Classification tab displays a summary of classified devices. The Classification Summary table shows the number of access points and clients classified as trusted and untrusted by MAC addresses in your networks. It also shows the number of allowed vendors, SSIDs, and channels.
The Client Classification Screen lets you classify the existing wireless clients into trusted networks and untrusted networks. New client information is received from Linksys Business Series access points. New clients start off as Unclassified until the System Administrator classifies them. A Trusted Client is one that has been identified by the System Administrator to be known and legitimate.
Wireless-G Business USB Network Adapter with RangeBooster Allowed Vendor List Configuration The Allowed Vendor List Configuration table lists the OUI (Organization Unique Identification) and vendor name of your trusted and allowed AP Vendor OUIs. A OUI is the three-octet (first 6 digits) used to generate LAN MAC Addresses for hardware manufacturers.
Security Monitor IMPORTANT: You must use a WAP200 Access Point with your USB Network Adapter to use the Security Monitor. The Security Monitor helps to make your network more secure. It monitors the airspace through the WAP200 Access Point and USB Network Adapter for security related issues like vulnerabilities in the network configuration, which allows you to act quickly to solve issues and secure your network.
Wireless-G Business USB Network Adapter with RangeBooster AP Inventory The AP Inventory screen provides statistics of the distribution grouped by your AP’s classification of your wireless networks. The pie chart shows the percentage of each classification type, so you can easily view the number of trusted, untrusted, and unknown APs in the airspace.
Wireless-G Business USB Network Adapter with RangeBooster Alert Overview Both the WAP200 Access Point and client USB Network Adapter monitor the state of your wireless network and report on security related issues, ranging from on-going attacks down to vulnerabilities in the network configuration.
Wireless-G Business USB Network Adapter with RangeBooster NOTE: You will be alerted when an Access Point is detected, if you enable pop-up. Alert List The Alert List screen shows the list of the alert activities within your monitored wireless networks.
Wireless-G Business USB Network Adapter with RangeBooster Advice The Advice screen gives advice, when applicable, on what can be done for each alert event. You may need to adjust your wireless network settings according to the advice to better protect your networks.
Page 61
Wireless-G Business USB Network Adapter with RangeBooster The following table is a summary of the various alert descriptions and advice. Item Alert A Rogue Client is detected. Rogue Client Detected For details, press the Advice button. Chapter 6: The Administrative Functions in the Wireless Network Monitor...
Page 62
Wireless-G Business USB Network Adapter with RangeBooster Item Alert SSID on the AP has changed. For AP SSID Changed details, press the Advice button. AP's Channel has Changed. For details, AP Channel Changed press the Advice button. The AP's MAC Address has been Spoofed MAC Address spoofed by a wireless client.
Page 63
Wireless-G Business USB Network Adapter with RangeBooster Item Alert Client not associated with AP is sending Client is Sending Spurious traffic. For details, press the Advice Traffic button. A wireless client using Adhoc structure Adhoc SSID is the same as has the same SSID as the AP's SSID.
Page 64
Wireless-G Business USB Network Adapter with RangeBooster Item Alert Possibly a Denial of Service Attack. For Association Table Full details, press the Advice button. AP does not have any encryption AP Is Not Using Encryption method enabled. For details, press the Advice button.
Page 65
Wireless-G Business USB Network Adapter with RangeBooster Item Alert Unclassified AP has the same SSID as a Duplicate SSID in Use trusted AP. For details, press the Advice button. New AP is detected. For details, press New Access Point Detected the Advice button.
Page 66
Wireless-G Business USB Network Adapter with RangeBooster Item Alert New client is detected. For details, New Client Detected press the Advice button. Connection is at low speed. For details, Low Speed Connection press the Advice button. Rogue AP is detected. For details, press Rogue AP Detected the Advice button.
IMPORTANT: DO NOT select Don’t allow exceptions or the security monitor will not work correctly. Select On (recommended) to use the firewall. Do not select the Don't allow exceptions or the Adapter’s security monitor will not work properly. Then, click OK.
Wireless-G Business USB Network Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
Zero Config to connect to the wireless network? The user will not be able to enjoy the benefits of the Linksys utility, including participation in classification and security monitoring, which helps the administrator to detect intrusions and policy violations and improve the state of the network.
Page 70
Wireless-G Business USB Network Adapter with RangeBooster What is the 802.11b standard? It is one of the standards for wireless networks. The 802.11b standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard. The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
Page 71
Wireless-G Business USB Network Adapter with RangeBooster Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point. Before using the roaming function, the workstation must make sure that it is the same channel number with the access point of dedicated coverage area.
Page 72
Wireless-G Business USB Network Adapter with RangeBooster one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.
If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. 1. After installing the Adapter, the Windows XP Wireless Zero Configuration icon will appear in your computer’s system tray. Double-click the icon.
Wireless-G Business USB Network Adapter with RangeBooster 2. The screen that appears will show any available wireless network. Select the network you want. Click the Connect button. If your network does not have wireless security enabled, go to step 3.
Wireless-G Business USB Network Adapter with RangeBooster 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields.
Wireless-G Business USB Network Adapter with RangeBooster Appendix C: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
Page 77
This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
Page 78
These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix C: Wireless Security Security Threats Facing Wireless Networks...
Wireless-G Business USB Network Adapter with RangeBooster Appendix D: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network.
Page 81
Wireless-G Business USB Network Adapter with RangeBooster DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses.
Page 82
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
Page 83
Wireless-G Business USB Network Adapter with RangeBooster PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.
Page 84
Wireless-G Business USB Network Adapter with RangeBooster TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.
Wireless-G Business USB Network Adapter with RangeBooster Appendix F: Specifications Standards IEEE802.11g, IEEE802.11b, 802.1x (Security Authentication), (802.1i) Channels 802.11b/802.11g 11 Channels (US, Canada) 13 Channels (Europe) 14 Channels (Japan) LEDs Link/Act Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps); 802.11g: OFDM Peak Gain of the Antenna1.89dBi...
Page 86
Wireless-G Business USB Network Adapter with RangeBooster Unit Weight 2.15 oz (0.061 kg) Certifications FCC, IC, CE, Wi-Fi (802.11b/g) Operating Temp. 32ºF to 113ºF (0ºC to 45ºC) Storage Temp. -4ºF to 140ºF (-20ºC to 60ºC) Operating Humidity 10 to 85%, Non-Condensing...
Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
Dual-Band Wireless-N Notebook Adapter Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 89
Wireless-N Notebook Adapter Safety Notices Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Do not use this product near water, for example, in a wet basement or near a swimming pool. Avoid using this product during an electrical storm. There may be a remote risk of electric shock from lightning.
Page 90
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol:...
Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...