Linksys WPC54G User Manual
Linksys WPC54G User Manual

Linksys WPC54G User Manual

Wireless-g notebook adapter
Hide thumbs Also See for WPC54G:

Advertisement

Quick Links

USER GUIDE
Wireless-G Notebook Adapter
WPC54G (EU)
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WPC54G

  • Page 1 USER GUIDE Wireless-G Notebook Adapter WPC54G (EU) Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Chapter 2: Wireless Security Checklist General Network Security Guidelines .
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Front Panel Product Overview Like all wireless products, the Adapter allows for greater range and mobility within your wireless network. This adapter communicates over the 54Mbps 802.11g wireless standard, which is almost five times faster than 802.11b. But since they share the same 2.4GHz radio band, the Adapter can also communicate with the widely used 11Mbps 802.11b standard.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Configuration

    Configuration Chapter 3 Chapter 3: After reading the License Agreement, click the Next button if you agree and want to continue the Configuration installation, or click the Cancel button to end the installation. The Wireless-G Notebok Adapter Setup Wizard will guide you through the installation procedure.
  • Page 7: Setting Up The Adapter

    Configuration Chapter 3 Slide the Adapter into the PCI slot. Make sure that all Click Back to close the Setup Wizard, if you wish to set up of its pins are touching the slot’s contacts. You may the Adapter later. have to apply a bit of pressure to slide the Adapter all Available Wireless Networks the way in.
  • Page 8 Configuration Chapter 3 Then click Connect and proceed to step 3. refer to “Chapter 5: Using the Wireless Network Monitor. ” Congratulations! The installation of the Wireless-N WPA-Personal (Wi-Fi Protected Access) PCI Adapter is complete. If your network has the wireless security WPA-Personal Advanced Setup enabled, this screen will appear.
  • Page 9 Configuration Chapter 3 IP Address This IP Address must be unique to your If you chose Infrastructure Mode, go to step 5 now. network. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Subnet Mask The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask.
  • Page 10 Configuration Chapter 3 WPA2-Personal, WPA Enterprise, WPA2 Enterprise, or Authentication The default is set to Auto, so it will auto- RADIUS. WEP stands for Wired Equivalent Privacy, and detect for Shared Key or Open System authentication. WPA stands for Wi-Fi Protected Access. WPA2 stands For Shared Key authentication, both the sender and the for Wi-Fi Protected Access 2.
  • Page 11 Configuration Chapter 3 WPA2-Personal EAP-TLS Enter a Pre-shared Key that is 8-63 characters in length. If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field. Enter the name of the authentication server in the Server Name field (this is optional).
  • Page 12 Configuration Chapter 3 PEAP EAP-TLS If you selected PEAP, enter the login name of your wireless If you selected EAP-TLS, enter the login name of your network in the Login Name field. Enter the password of wireless network in the Login Name field. Enter the name your wireless network in the Password field.
  • Page 13 Configuration Chapter 3 Click the Next button to continue or the Back button to PEAP return to the previous screen. If you selected PEAP, enter the login name of your wireless RADIUS network in the Login Name field. Enter the password of your wireless network in the Password field.
  • Page 14: Chapter 4: Using The Wireless Monitor

    Configuration Chapter 4 Chapter 4: Link Information Using the Wireless Monitor The Link Information screen displays network mode, signal strength, and link quality information about the current connection. It also provides a button to click for additional Use the Wireless Network Monitor to check the link status information.
  • Page 15 Configuration Chapter 4 Wireless Network Status Click the Statistics button to go to the Wireless Network Statistics screen. Click the Back button to return to the The Wireless Network Status screen provides information initial Link Information screen. Click the Save to Profile on your current network settings.
  • Page 16: Site Survey

    Configuration Chapter 4 Information screen. Click the Status button to go to the Connect To connect to one of the networks on the list, Wireless Network Status screen. Click the Save to Profile select the wireless network, and click the Connect button. button to save the currently active connection settings to If the network has encryption enabled, then you will see a a profile.
  • Page 17: Profiles

    Configuration Chapter 4 Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Import a Profile Export Select the profile you want to save in a different location, and click the Export button.
  • Page 18 Configuration Chapter 4 Available Wireless Networks SecureEasySetup This Adapter features SecureEasySetup. This means that you can set it up with just the press of a button when connecting to wireless routers or access points that also feature SecureEasySetup. Both point on the network must feature SecureEasySetup for this to work.
  • Page 19: Appendix A: Specifications

    Specifications Appendix A Appendix A: Specifications Model WPC54G Channels 11 Channels (most of North, Central, and South America) 13 Channels (most of Europe) LEDs Power, Link Transmit Power 18 dBm Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps);...
  • Page 20: Appendix B: Warranty Information

    Warranty Information Appendix B Appendix B: network on which the product or software is used will be free of vulnerability to intrusion or attack. The product Warranty Information may include or be bundled with third party software or service offerings. This limited warranty shall not apply to such third party software or service offerings.
  • Page 21 Warranty Information Appendix B and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys.
  • Page 22: Appendix C: Regulatory Information

    Regulatory Information Appendix C Appendix C: Industry Canada Statement Regulatory Information This Class B digital apparatus complies with Canadian ICES-003 and RSS210. Operation is subject to the following two conditions: FCC Statement This device may not cause interference and This product has been tested and complies with the This device must accept any interference, including specifications for a Class B digital device, pursuant to Part interference that may cause undesired operation...
  • Page 23: Wireless Disclaimer

    Regulatory Information Appendix C Wireless Disclaimer The maximum performance for wireless is derived from IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, data throughput rate, range and coverage. Performance depends on many factors, conditions and variables, including distance from the access point, volume of network traffic, building materials and construction, operating system used, mix of wireless products used,...
  • Page 24: Declaration Of Conformity With Regard To Eu Directive 1999/5/Ec (R&Tte Directive)

    Regulatory Information Appendix C Declaration of Conformity with Regard to Dit apparaat voldoet aan de essentiele eisen Nederlands EU Directive 1999/5/EC (R&TTE Directive) en andere van toepassing zijnde bepalingen [Dutch]: van de Richtlijn 1999/5/EC. Compliance Information for 2,4-GHz and 5-GHz Wireless Dan l-apparat huwa konformi mal-ħtiġiet Products Relevant to the EU and Other Countries Following Malti...
  • Page 25: Wireless Equipment (Wireless-N/G/A/B Products)

    Regulatory Information Appendix C Wireless Equipment National Restrictions (Wireless-N/G/A/B Products) This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without The following standards were applied during the any limitation except for the countries mentioned below: assessment of the product against the requirements of Ce produit peut être utilisé...
  • Page 26: Product Usage Restrictions

    Regulatory Information Appendix C Product Usage Restrictions France For 2,4 GHz, the product should not be used outdoors This product is designed for indoor usage only. Outdoor in the band 2454 - 2483,5 MHz. There are no restrictions usage is not recommended, unless otherwise noted. when used in other parts of the 2,4 GHz band when used 2,4 GHz Restrictions indoors.
  • Page 27: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix C User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 28 Regulatory Information Appendix C Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 29 Regulatory Information Appendix C Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 30 Regulatory Information Appendix C Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 31: Appendix D: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 32 Software License Agreement Appendix D your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 33 Software License Agreement Appendix D GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 34 Software License Agreement Appendix D If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 35 Software License Agreement Appendix D If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 36 Software License Agreement Appendix D GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 37 Software License Agreement Appendix D freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 38 Software License Agreement Appendix D Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 39 Software License Agreement Appendix D Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 40 Software License Agreement Appendix D software distributed through that system in reliance NO WARRANTY on consistent application of that system; it is up to BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, the author/donor to decide if he or she is willing to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE distribute software through any other system and a EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 41 Software License Agreement Appendix D Original SSLeay License Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All OpenSSL License rights reserved. This package is an SSL implementation written by Eric Copyright ©...
  • Page 42 Software License Agreement Appendix D DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents