Linksys WUSB54GS User Manual

Linksys WUSB54GS User Manual

Wireless-g usb network adapter
Hide thumbs Also See for WUSB54GS:

Advertisement

USER GUIDE
Wireless-G USB
Network Adapter
WUSB54G
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WUSB54GS

  • Page 1 USER GUIDE Wireless-G USB Network Adapter WUSB54G Model:...
  • Page 2: About This Guide

    Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview LEDs ............1 Chapter 2: Wireless Security Checklist General Network Security Guidelines .
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Wireless-G USB Network Adapter. Setting up your network and your Wireless-G USB Network Adapter is easier than ever. How does the Adapter do this? Like all wireless products, the Adapter allows for greater range and mobility within your wireless network, whether it’s using the Wireless-G (802.11g) or Wireless-B (802.11b) standard.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Configuration

    Configuration Chapter 3 Chapter 3: Ad-Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in Configuration ad-hoc or infrastructure mode. Signal Strength The Signal Strength bar indicates signal strength. Configuration is done through the Wireless Network Monitor (the Monitor).
  • Page 7 Driver Version This shows the Adapter’s driver version. Cisco AP IP This displays the Cisco AP IP Address when Noise Level LEAP wireless security is used. This shows the level of background noise that affects the wireless signal. A lower reading translates...
  • Page 8: Site Survey

    Locate the Button After clicking the SecureEasySetup button, you will be asked to locate the SecureEasySetup button or Cisco logo button on the device with which the Adapter will be communicating. If you are not sure where to find this...
  • Page 9: Profiles

    Configuration Chapter 3 Wireless Mode This is the mode of the wireless network currently in use. Channel This is the channel to which the wireless network devices are set. Security This is the status of the wireless security feature. MAC Address This is the MAC address of the wireless network’s access point.
  • Page 10 Configuration Chapter 3 Create a New Profile The next screen is the Available Wireless Networks screen. Profiles Profile This is the name of the profile. SSID This is the SSID or unique name of the wireless Available Wireless Networks network. This screen provides two options for setting up the Profile Information Adapter.
  • Page 11 Locate the Button After clicking the SecureEasySetup button, you will be asked to locate the SecureEasySetup button or Cisco logo button on the device with which the Adapter will be communicating. If you are not sure where to find this...
  • Page 12 Configuration Chapter 3 WPA Personal Available Wireless Network Encryption Select the type of algorithm you want to use, WEP (Wired Equivalent Privacy) TKIP or AES, from the Encryption drop-down menu. If you have WEP enabled, this screen appears. Select 64-Bit Passphrase Enter a Passphrase of 8-63 characters in the or 128-Bit.
  • Page 13 Configuration Chapter 3 Congratulations Network Settings Congratulations! The profile is successfully configured. If your network has a router or other DHCP server, select Obtain network settings automatically (DHCP). Manual Setup If your network does not have a DHCP server or router, select Specify network settings.
  • Page 14 Configuration Chapter 3 Network Mode Select the Network Mode in which your wireless network will operate. In Mixed mode, Wireless-B and Wireless-G devices can operate on the same network. In Wireless-G Only mode, no Wireless-B devices can operate in the network. Click Next to continue.
  • Page 15 Configuration Chapter 3 encryption. Then enter a Passphrase that is 8-63 characters in length. WPA Personal Select 64-Bit or 128-Bit encryption. Encryption Select the type of algorithm you want to use, Passphrase Enter a passphrase in the Passphrase TKIP or AES, from the Encryption drop-down menu. field, so a WEP key is automatically generated.
  • Page 16 Configuration Chapter 3 Click Next to continue or Back to return to the previous PEAP screen. WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication types: EAP-TLS and PEAP.
  • Page 17 Windows XP and 2000 users can enable this Server Name Enter the name of the authentication server Cisco Central Key Management method if they enabled in the Server Name field (this is optional). CCX2.0 on the Advanced Wireless Settings screen.
  • Page 18 Configuration Chapter 3 Quality of Service. QoS mechanisms ensure better Congratulations! The profile is successfully configured. service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing. To use this function, select Enabled from the drop-down menu. Select Disabled to disable the function.
  • Page 19: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot.
  • Page 20: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WUSB54G Standards 802.11g, 802.11b, USB 1.1, USB 2.0 Ports LEDs Power, Link Transmit Power 15-17 dBm Receive Sensitivity 11 Mbps @ -82 dBm (Typical) 54 Mbps @ -67 dBm (Typical) Security Features WEP and WPA Encryption Security Key Bits Up to 128-Bit Encryption Environmental...
  • Page 21: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 22 Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 23: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: The availability of some specific channels and/or operational frequency bands are country dependent Regulatory Information and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This equipment has been tested and found to comply...
  • Page 24: Industry Canada Statement

    Regulatory Information Appendix D Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Cet appareil numérique de la classe B est conforme à la data throughput rate, range and coverage.
  • Page 25: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 26 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 27 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 28 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 29: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 30 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 31 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 32 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 33 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 34 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 35 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 36 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 37 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 38 Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 39 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 40 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This manual is also suitable for:

Wusb54g

Table of Contents