Linksys WUSB200 User Manual

Linksys WUSB200 User Manual

Business series wireless-g business usb network adapter with rangebooster
Hide thumbs Also See for WUSB200:
Table of Contents

Advertisement

Quick Links

Wireless-G
Business USB Network Adapter
with RangeBooster
Model No. WUSB200
Wireless
Model No.
Model No.
Model No.
Model No.
USER GUIDE
BUSINESS SERIES

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WUSB200

  • Page 1 Wireless-G Business USB Network Adapter with RangeBooster Model No. WUSB200 Wireless Model No. Model No. Model No. Model No. USER GUIDE BUSINESS SERIES...
  • Page 2 Wireless-G Business USB Network Adapter with RangeBooster Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2006 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Roaming Network Layout Chapter 3: Getting to Know the Wireless-G Business USB Network Adapter The LED Indicators Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 7 Starting the Setup Connecting the Adapter Setting up the Adapter...
  • Page 4 Wireless-G Business USB Network Adapter with RangeBooster Windows XP Wireless Zero Configuration Appendix C: Wireless Security Security Precautions Security Threats Facing Wireless Networks Appendix D: Windows Help Appendix E: Glossary Appendix F: Specifications Appendix G: Warranty Information Appendix H: Regulatory Information...
  • Page 5 Wireless-G Business USB Network Adapter with RangeBooster List of Figures Figure 3-1: LEDs Figure 4-1: Setup Wizard’s Welcome Screen Figure 4-2: Setup Wizard’s License Agreement Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Network Figure 4-5: WEP Figure 4-6: WPA - Personal...
  • Page 6 Wireless-G Business USB Network Adapter with RangeBooster Figure 5-9: Creating a Profile - WEP Key Needed Figure 5-10: Creating a Profile - WPA-Personal Figure 5-11: Creating a Profile - Congratulations Figure 5-12: Creating a Profile - Manual Setup - Network Settings...
  • Page 7 Wireless-G Business USB Network Adapter with RangeBooster Figure 5-43: Editing a Profile - Congratulations Figure 5-44: Site Survey Figure 5-45: Troubleshooting Figure 5-46: Administration Figure 5-47: Administration - Login Access Point Account Figure 5-48: Administration - Modify Access Point Account...
  • Page 8: Chapter 1: Introduction Welcome

    Fi Protected Access™ (WPA2 Enterprise) with up to 256-bit encryption, and the new Wireless Security Monitoring functionality gives your business the visibility and protection it needs. When used with a Linksys WAP200, the Wireless Security Monitoring alerts you of possible wireless intruders and vulnerabilities in the wireless network deployment.
  • Page 9: What's In This User Guide

    Wireless-G Business USB Network Adapter with RangeBooster What’s in this User Guide? This user guide covers the steps for setting up and using the Wireless-G Business USB Network Adapter. • Chapter 1: Introduction This chapter describes the Adapter’s applications and this User Guide.
  • Page 10 This appendix supplies the Adapter’s warranty information. • Appendix H: Regulatory Information This appendix supplies the Adapter’s regulatory information. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this User Guide?
  • Page 11: Chapter 2: Planning Your Wireless Network

    Linksys wireless adapters also provide users access to a wired network when using an access point or wireless router. An integrated wireless and wired network is called an infrastructure network. Each wireless PC in an infrastructure network can talk to any computer in a wired network infrastructure via the access point or wireless router.
  • Page 12: Network Layout

    When you wish to connect your wired network with your wireless network, the network ports on the access points and wireless routers can be connected to Linksys switches or routers. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about wireless products.
  • Page 13: Chapter 3: Getting To Know The Wireless-G Business Usb Network Adapter

    Green. The Wireless LED lights up when the Adapter is powered on. Link Green. The Link/Act LED lights up when the Adapter has an active connection. Chapter 3: Getting to Know the Wireless-G Business USB Network Adapter The LED Indicators...
  • Page 14: Chapter 4: Setting Up And Connecting The Wireless-G Business Usb Network Adapter

    User Guide - Click the User Guide button to open the PDF file of this User Guide. Exit - Click the Exit button to exit the Setup Wizard. 1. To install the Adapter, click the Click Here to Start button on the Welcome screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Starting the Setup Figure 4-1: Setup Wizard’s Welcome Screen...
  • Page 15: Connecting The Adapter

    3. The Power LED should light up when the Adapter is plugged in. 4. Raise the antennas. Make sure the antennas point straight up into the air, at a 90º angle from the Adapter. This will ensure optimum wireless operating range and performance.
  • Page 16: Setting Up The Adapter

    Connect button to connect to it. Click the Refresh button to update the Available Wireless Network list. • Manual Setup. If your network is not listed on this screen, select Manual Setup to set up the adapter manually. This method of setting up the Adapter is intended for Advanced Users only.
  • Page 17: Figure 4-5: Wep

    16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 18: Figure 4-7: Wpa2 - Personal

    3. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-7: WPA2 - Personal...
  • Page 19: Figure 4-10: Creating A Profile

    IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter...
  • Page 20: Figure 4-12: Ad-Hoc Mode Settings

    If your wireless network has wireless security, select the method of security used: WEP, WPA/WPA2- Personal, WPA/WPA2-Enterprise, RADIUS, or LEAP. WEP stands for Wired Equivalent Privacy, and WPA Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-12: Ad-Hoc Mode Settings encryption: encoding data transmitted in a network.
  • Page 21: Figure 4-14: Wireless Security - Wpa Personal

    16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 22: Figure 4-16: Wireless Security - Wpa Enterprise-Eap-Tls

    Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter...
  • Page 23: Figure 4-18: Wireless Security - Wpa2 Enterprise-Eap

    Server Name field (this is optional). Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-18: Wireless Security - WPA2 Enterprise-EAP...
  • Page 24: Figure 4-20: Wireless Security - Radius - Eap-Tls

    Trust Any. Then select the authentication method used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter...
  • Page 25: Figure 4-22: Wireless Security - Leap

    Link Information screen. Click Return to Profile screen to return to the Creating a Profile screen. Congratulations! Your manual setup through the Wireless Network Monitor is complete. Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-22: Wireless Security - LEAP...
  • Page 26: Chapter 5: Using The Wireless Network Monitor

    Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
  • Page 27: Figure 5-3: Link Information - Wireless Network Status

    IP Address - The IP Address of the Adapter is displayed here. Subnet Mask - The Subnet Mask of the Adapter is shown here. Default Gateway - The Default Gateway address of the Adapter is displayed here. DNS - This is the DNS (Domain Name Service) address of the Adapter.
  • Page 28: Figure 5-4: Link Information - Wireless Network Statistics

    The Statistics screen provides statistics on your current network settings. Transmit Rate - This is the data transfer rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transfer rate possible at any given time.) Receive Rate - This is the rate at which data is received.
  • Page 29: Profiles

    Wireless-G Business USB Network Adapter with RangeBooster Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here.
  • Page 30: Create A New Profile

    Connect button to connect to it. Click the Refresh button to update the Available Wireless Network list. • Manual Setup. If your network is not listed on this screen, select Manual Setup to set up the adapter manually. This method of setting up the Adapter is intended for advanced users only.
  • Page 31: Figure 5-10: Creating A Profile - Wpa-Personal

    Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters.
  • Page 32: Figure 5-12: Creating A Profile - Manual Setup - Network Settings

    IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
  • Page 33: Figure 5-14: Creating A Profile - Manual Setup - Wireless Security - Disabled

    16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 34: Figure 5-16: Creating A Profile - Manual Setup - Wireless Security - Wpa Personal

    Wireless-G Business USB Network Adapter with RangeBooster Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication.
  • Page 35: Figure 5-18: Creating A Profile - Manual Setup - Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-G Business USB Network Adapter with RangeBooster WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 36: Figure 5-20: Creating A Profile - Manual Setup - Wireless Security - Wpa2 Enterprise - Eap-Tls

    Wireless-G Business USB Network Adapter with RangeBooster WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
  • Page 37: Figure 5-22: Creating A Profile - Manual Setup - Wireless Security - Radius - Eap-Tls

    Wireless-G Business USB Network Adapter with RangeBooster RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 38: Figure 5-24: Creating A Profile - Manual Setup - Wireless Security - Leap

    Wireless-G Business USB Network Adapter with RangeBooster LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password based system. Enter the username and password in their fields. Enter the password again in the Confirm filed.
  • Page 39: Editing A Profile

    Wireless-G Business USB Network Adapter with RangeBooster 7. The Congratulations screen will appear next. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profile Screen to keep the current settings active and return to the Profiles screen.
  • Page 40: Figure 5-28: Editing A Profile - Wireless Mode

    Wireless-G Business USB Network Adapter with RangeBooster 1. The Wireless Mode screen shows a choice of two wireless modes. Click the Infrastructure Mode radio button if you want to connect to a wireless router or access point. Click the Ad-Hoc Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point.
  • Page 41: Figure 5-30: Editing A Profile - Wireless Security

    16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 42: Figure 5-32: Editing A Profile - Wireless Security - Wpa Personal

    Wireless-G Business USB Network Adapter with RangeBooster WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in length.
  • Page 43: Figure 5-34: Editing A Profile - Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-G Business USB Network Adapter with RangeBooster WPA Enterprise WPA/WPA2 Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 44: Figure 5-36: Editing A Profile - Wireless Security -Wpa2 Enterprise - Eap-Tls

    Wireless-G Business USB Network Adapter with RangeBooster WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
  • Page 45: Figure 5-38: Editing A Profile - Wireless Security - Radius - Eap-Tls

    Wireless-G Business USB Network Adapter with RangeBooster RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 46: Figure 5-40: Editing A Profile - Wireless Security - Leap

    IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
  • Page 47: Figure 5-42: Editing A Profile - Confirm New Settings

    Wireless-G Business USB Network Adapter with RangeBooster 5. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
  • Page 48: Site Survey

    The Site Survey screen displays a list of available networks in the table on the left. The table shows each network’s SSID, Channel, and the quality of the wireless signal the Adapter is receiving. You may click SSID, CH (Channel), or Signal, to sort by that field.
  • Page 49: Troubleshooting

    You may click Repair to troubleshoot your connection to the wireless network. Repair will disconnect your client from the network and then reconnect, in order to re-establish an IP address. You may also click FAQ to view the FAQ pages from the Linksys website. Figure 5-45: Troubleshooting...
  • Page 50: Figure 5-47: Administration - Login Access Point Account

    Wireless-G Business USB Network Adapter with RangeBooster Log in as the Access Point's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin). Click Next to continue to the administrative options.
  • Page 51: Figure 5-49: Administration - Security Monitor Account

    Wireless-G Business USB Network Adapter with RangeBooster Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions of the Wireless Network Monitor.
  • Page 52: Chapter 6: The Administrative Functions In The Wireless Network Monitor

    Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
  • Page 53: Classification

    Wireless-G Business USB Network Adapter with RangeBooster Classification The Classification tab displays a summary of classified devices. The Classification Summary table shows the number of access points and clients classified as trusted and untrusted by MAC addresses in your networks. It also shows the number of allowed vendors, SSIDs, and channels.
  • Page 54: Figure 6-6: Trusted Mac Address

    The Client Classification Screen lets you classify the existing wireless clients into trusted networks and untrusted networks. New client information is received from Linksys Business Series access points. New clients start off as Unclassified until the System Administrator classifies them. A Trusted Client is one that has been identified by the System Administrator to be known and legitimate.
  • Page 55: Figure 6-8: Allowed Vendor List Configuration

    Wireless-G Business USB Network Adapter with RangeBooster Allowed Vendor List Configuration The Allowed Vendor List Configuration table lists the OUI (Organization Unique Identification) and vendor name of your trusted and allowed AP Vendor OUIs. A OUI is the three-octet (first 6 digits) used to generate LAN MAC Addresses for hardware manufacturers.
  • Page 56: Security Monitor

    Security Monitor IMPORTANT: You must use a WAP200 Access Point with your USB Network Adapter to use the Security Monitor. The Security Monitor helps to make your network more secure. It monitors the airspace through the WAP200 Access Point and USB Network Adapter for security related issues like vulnerabilities in the network configuration, which allows you to act quickly to solve issues and secure your network.
  • Page 57: Figure 6-12: Security Monitor - Ap Inventory

    Wireless-G Business USB Network Adapter with RangeBooster AP Inventory The AP Inventory screen provides statistics of the distribution grouped by your AP’s classification of your wireless networks. The pie chart shows the percentage of each classification type, so you can easily view the number of trusted, untrusted, and unknown APs in the airspace.
  • Page 58: Figure 6-14: Security Monitor - Alerts Summary

    Wireless-G Business USB Network Adapter with RangeBooster Alert Overview Both the WAP200 Access Point and client USB Network Adapter monitor the state of your wireless network and report on security related issues, ranging from on-going attacks down to vulnerabilities in the network configuration.
  • Page 59: Figure 6-16: Security Monitor - Alert List

    Wireless-G Business USB Network Adapter with RangeBooster NOTE: You will be alerted when an Access Point is detected, if you enable pop-up. Alert List The Alert List screen shows the list of the alert activities within your monitored wireless networks.
  • Page 60: Figure 6-18: Security Monitor - Alert Advice

    Wireless-G Business USB Network Adapter with RangeBooster Advice The Advice screen gives advice, when applicable, on what can be done for each alert event. You may need to adjust your wireless network settings according to the advice to better protect your networks.
  • Page 61 Wireless-G Business USB Network Adapter with RangeBooster The following table is a summary of the various alert descriptions and advice. Item Alert A Rogue Client is detected. Rogue Client Detected For details, press the Advice button. Chapter 6: The Administrative Functions in the Wireless Network Monitor...
  • Page 62 Wireless-G Business USB Network Adapter with RangeBooster Item Alert SSID on the AP has changed. For AP SSID Changed details, press the Advice button. AP's Channel has Changed. For details, AP Channel Changed press the Advice button. The AP's MAC Address has been Spoofed MAC Address spoofed by a wireless client.
  • Page 63 Wireless-G Business USB Network Adapter with RangeBooster Item Alert Client not associated with AP is sending Client is Sending Spurious traffic. For details, press the Advice Traffic button. A wireless client using Adhoc structure Adhoc SSID is the same as has the same SSID as the AP's SSID.
  • Page 64 Wireless-G Business USB Network Adapter with RangeBooster Item Alert Possibly a Denial of Service Attack. For Association Table Full details, press the Advice button. AP does not have any encryption AP Is Not Using Encryption method enabled. For details, press the Advice button.
  • Page 65 Wireless-G Business USB Network Adapter with RangeBooster Item Alert Unclassified AP has the same SSID as a Duplicate SSID in Use trusted AP. For details, press the Advice button. New AP is detected. For details, press New Access Point Detected the Advice button.
  • Page 66 Wireless-G Business USB Network Adapter with RangeBooster Item Alert New client is detected. For details, New Client Detected press the Advice button. Connection is at low speed. For details, Low Speed Connection press the Advice button. Rogue AP is detected. For details, press Rogue AP Detected the Advice button.
  • Page 67: Figure 6-19: Security Monitor - Windows Firewall Screen

    IMPORTANT: DO NOT select Don’t allow exceptions or the security monitor will not work correctly. Select On (recommended) to use the firewall. Do not select the Don't allow exceptions or the Adapter’s security monitor will not work properly. Then, click OK.
  • Page 68: Appendix A: Troubleshooting

    Wireless-G Business USB Network Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
  • Page 69: Frequently Asked Questions

    Zero Config to connect to the wireless network? The user will not be able to enjoy the benefits of the Linksys utility, including participation in classification and security monitoring, which helps the administrator to detect intrusions and policy violations and improve the state of the network.
  • Page 70 Wireless-G Business USB Network Adapter with RangeBooster What is the 802.11b standard? It is one of the standards for wireless networks. The 802.11b standard allows wireless networking hardware from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard. The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
  • Page 71 Wireless-G Business USB Network Adapter with RangeBooster Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point. Before using the roaming function, the workstation must make sure that it is the same channel number with the access point of dedicated coverage area.
  • Page 72 Wireless-G Business USB Network Adapter with RangeBooster one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.
  • Page 73: Appendix B: Windows Xp Wireless Zero Configuration

    If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. 1. After installing the Adapter, the Windows XP Wireless Zero Configuration icon will appear in your computer’s system tray. Double-click the icon.
  • Page 74: Figure B-4: Available Wireless Network

    Wireless-G Business USB Network Adapter with RangeBooster 2. The screen that appears will show any available wireless network. Select the network you want. Click the Connect button. If your network does not have wireless security enabled, go to step 3.
  • Page 75: Figure B-6: Network Connection - Wireless Security

    Wireless-G Business USB Network Adapter with RangeBooster 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields.
  • Page 76: Appendix C: Wireless Security

    Wireless-G Business USB Network Adapter with RangeBooster Appendix C: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
  • Page 77 This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
  • Page 78 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix C: Wireless Security Security Threats Facing Wireless Networks...
  • Page 79: Appendix D: Windows Help

    Wireless-G Business USB Network Adapter with RangeBooster Appendix D: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 80: Appendix E: Glossary

    This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network.
  • Page 81 Wireless-G Business USB Network Adapter with RangeBooster DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses.
  • Page 82 Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
  • Page 83 Wireless-G Business USB Network Adapter with RangeBooster PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.
  • Page 84 Wireless-G Business USB Network Adapter with RangeBooster TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.
  • Page 85: Appendix F: Specifications

    Wireless-G Business USB Network Adapter with RangeBooster Appendix F: Specifications Standards IEEE802.11g, IEEE802.11b, 802.1x (Security Authentication), (802.1i) Channels 802.11b/802.11g 11 Channels (US, Canada) 13 Channels (Europe) 14 Channels (Japan) LEDs Link/Act Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps); 802.11g: OFDM Peak Gain of the Antenna1.89dBi...
  • Page 86 Wireless-G Business USB Network Adapter with RangeBooster Unit Weight 2.15 oz (0.061 kg) Certifications FCC, IC, CE, Wi-Fi (802.11b/g) Operating Temp. 32ºF to 113ºF (0ºC to 45ºC) Storage Temp. -4ºF to 140ºF (-20ºC to 60ºC) Operating Humidity 10 to 85%, Non-Condensing...
  • Page 87: Appendix G: Warranty Information

    Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 88: Appendix H: Regulatory Information

    Dual-Band Wireless-N Notebook Adapter Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 89 Wireless-N Notebook Adapter Safety Notices Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Do not use this product near water, for example, in a wet basement or near a swimming pool. Avoid using this product during an electrical storm. There may be a remote risk of electric shock from lightning.
  • Page 90 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol:...
  • Page 91 Dual-Band Wireless-N Notebook Adapter Appendix H: Regulatory Information...
  • Page 92 Dual-Band Wireless-N Notebook Adapter Appendix H: Regulatory Information...
  • Page 93 Dual-Band Wireless-N Notebook Adapter Appendix H: Regulatory Information...
  • Page 94 Wireless-N Notebook Adapter For more information, visit www.linksys.com. Appendix H: Regulatory Information...
  • Page 95: Appendix I: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...

Table of Contents