Cisco Linksys WUSB54G User Manual
Cisco Linksys WUSB54G User Manual

Cisco Linksys WUSB54G User Manual

Wireless-g usb network adapter
Hide thumbs Also See for Linksys WUSB54G:
Table of Contents

Advertisement

Quick Links

®
A Division of Cisco Systems, Inc.
2.4
GHz
Wireless-G
802.11g
USB Network Adapter
User Guide
WIRELESS
WUSB54G (EU/LA/UK)
Model No.

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WUSB54G

  • Page 1 ® A Division of Cisco Systems, Inc. Wireless-G 802.11g USB Network Adapter User Guide WIRELESS WUSB54G (EU/LA/UK) Model No.
  • Page 2 Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2005 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Wireless-G USB Network Adapter Table of Contents Chapter 1: Introduction Welcome What’s in this Guide? Chapter 2: Planning your Wireless Network Network Topology Roaming Network Layout Chapter 3: Getting to Know the Wireless-G Notebook Adapter The LED Indicators Chapter 4: Setting up and Connecting the USB Network Adapter Starting the Setup Wizard Connecting the Adapter Setting Up the Adapter...
  • Page 4 Wireless-G USB Network Adapter Appendix H: Regulatory Information Appendix I: Contact Information...
  • Page 5 Wireless-G USB Network Adapter List of Figures Figure 3-1: Front Panel Figure 4-1: Setup Wizard’s Welcome Screen Figure 4-2: Setup Wizard’s License Agreement Figure 4-3: The Connecting the Adapter Screen Figure 4-4: Connecting the Adapter Figure 4-5: The Adapter’s USB Port Figure 4-6: Available Wireless Network Figure 4-7: Available Wireless Network Figure 4-8: Secure Easy Setup...
  • Page 6 Wireless-G USB Network Adapter Figure 4-30: Advanced Wireless Settings Figure 4-31: Confirm New Settings Figure 4-32: Congratulations Figure 5-1: Wireless Network Monitor Icon Figure 5-2: Link Information Figure 5-3: More Information - Wireless Network Status Figure 5-4: More Information - Wireless Network Statistics Figure 5-5: The Secure Easy Setup Button Figure 5-6: The Secure Easy Setup Logo and Location Figure 5-7: Secure Easy Setup...
  • Page 7 Wireless-G USB Network Adapter Figure 5-31: Wireless Security Figure 5-32: Wireless Security - WEP Figure 5-33: Wireless Security - WPA Personal Figure 5-34: Wireless Security - PSK2 Figure 5-35: Wireless Security - WPA Enterprise - EAP-TLS Figure 5-36: Wireless Security - WPA Enterprise - PEAP Figure 5-37: Wireless Security - RADIUS - EAP-TLS Figure 5-38: Wireless Security - RADIUS - PEAP Figure 5-39: LEAP - Windows XP and 2000...
  • Page 8: Chapter 1: Introduction

    Wireless-G USB Network Adapter Chapter 1: Introduction Welcome network: a series of computers or devices Thank you for choosing the Wireless-G USB Network Adapter. With this Adapter, your wireless networking connected for the purpose of data sharing, storage, experience will be faster and easier than ever. and/or transmission between users.
  • Page 9: What's In This Guide

    Wireless-G USB Network Adapter What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-G USB Network Adapter. • Chapter 1: Introduction This chapter describes the Adapter’s applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter discusses a few of the basics about wireless networking.
  • Page 10 Wireless-G USB Network Adapter • Appendix H: Regulatory Information This appendix supplies the Adapter’s regulatory information. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this Guide?
  • Page 11: Chapter 2: Planning Your Wireless Network

    Wireless-G USB Network Adapter Chapter 2: Planning your Wireless Network Network Topology A wireless network is a group of computers, each equipped with one wireless adapter. Computers in a wireless ad-hoc: a group of wireless devices network must be configured to share the same radio channel. Several PCs equipped with wireless cards or communicating directly with each other (peer- adapters can communicate with one another to form an ad-hoc network.
  • Page 12: Network Layout

    Wireless-G USB Network Adapter Network Layout Linksys wireless access points and wireless routers have been designed for use with 802.11a, 802.11b, and 802.11b: an IEEE wireless networking standard 802.11g products. With 802.11g products communicating with the 802.11b standard and some products that specifies a maximum data transfer rate of incorporating both “a”...
  • Page 13: Chapter 3: Getting To Know The Wireless-G Notebook Adapter

    Wireless-G USB Network Adapter Chapter 3: Getting to Know the Wireless-G Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity. Figure 3-1: Front Panel Power Green. The Power LED lights up when the Adapter is powered on. Link Green.
  • Page 14: Chapter 4: Setting Up And Connecting The Usb Network Adapter

    Wireless-G USB Network Adapter Chapter 4: Setting up and Connecting the USB Network Adapter The USB Network Adapter is set up with the Setup Wizard that comes on the CD enclosed with the Adapter. This chapter will guide you through the setup procedure. IMPORTANT: Do not connect the Adapter until you are instructed to do so or the setup will not work.
  • Page 15: Connecting The Adapter

    Wireless-G USB Network Adapter 3. Windows will begin copying the files onto your PC. 4. The Setup Wizard will now prompt you to connect the Adapter to your PC’s USB port. Once you’ve connect, click Next. 5. Windows 98SE and ME users will need to restart their PCs. Figure 4-3: The Connecting the Adapter Screen Connecting the Adapter 1.
  • Page 16: Setting Up The Adapter

    Wireless-G USB Network Adapter Setting Up the Adapter The next screen to appear will be the Available Wireless Network screen. This screen provides three options for setting up the Adapter • Secure Easy Setup. This Adapter features Secure Easy Setup. This means that you can set it up with just the press of a button when connecting to wireless routers or access points that also feature Secure Easy Setup.
  • Page 17: Figure 4-7: Available Wireless Network

    Wireless-G USB Network Adapter Setting Up the Adapter with Secure Easy Setup With Secure Easy Setup, setting up the Adapter is as simple as pushing a couple of buttons. Before you press any buttons, though, you should locate the Secure Easy Setup button on the device you’re connecting the Adapter to, such as a wireless router or access point.
  • Page 18: Figure 4-10: Secure Easy Setup Complete

    Wireless-G USB Network Adapter 3. Press the Cisco logo or Secure Easy Setup button on the wireless router or access point. When it turns white and begins to flash, click the Next button on the Setup Wizard screen. The logo or button will stop flashing on the wireless router or access point when the Adapter has been successfully added to the network.
  • Page 19: Figure 4-11: Available Wireless Network

    Wireless-G USB Network Adapter Setting Up the Adapter with Available Networks If you’re not setting up the Adapter with Secure Easy Setup, another method for setting up the Adapter is with the available networks listed on the Available Wireless Network screen. The available networks are listed in the table on the center of the screen by SSID.
  • Page 20: Figure 4-13: Wpa-Personal Needed For Connection

    Wireless-G USB Network Adapter WPA-Personal Needed for Connection Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu. Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field. The longer and more complex your Passphrase is, the more secure your network will be.
  • Page 21: Figure 4-15: The Congratulations Screen

    Wireless-G USB Network Adapter 2. After the Adapter has been configured for the network, the Congratulations screen will appear. Click Connect to Network to connect to your network. Figure 4-15: The Congratulations Screen Congratulations! Setup is complete. To check the link information, search for available wireless networks, or make additional configuration changes, refer to Chapter 5: Using the Wireless Network Monitor.
  • Page 22: Figure 4-16: Available Wireless Network

    Wireless-G USB Network Adapter Setting Up the Adapter with Manual Setup If you are not taking advantage of Secure Easy Setup and your network is not listed with the available networks, click Manual Setup on the Available Wireless Network screen to set up the adapter manually. 1.
  • Page 23: Figure 4-18: Wireless Mode

    Wireless-G USB Network Adapter 2. The Wireless Mode screen shows a choice of two wireless modes. Click the Infrastructure Mode radio button if you want to connect to a wireless router or access point. Click the Ad-Hoc Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point.
  • Page 24: Figure 4-20: Wireless Security

    Wireless-G USB Network Adapter 4. The Wireless Security screen will appear. This step will configure wireless security. If your wireless network doesn’t use wireless security, select Disabled and then click the Next button to continue. Proceed to Step 5. Select WEP, WPA-Personal, PSK2, WPA Enterprise, Radius, or LEAP for the Encryption Method. WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption, PSK2 stands for Pre-Shared Key 2, which is a security standard stronger than WPA-Personal, RADIUS stands for Remote Authentication Dial-In User Service, and LEAP stands for...
  • Page 25: Figure 4-22: Wireless Security - Wpa Personal

    Wireless-G USB Network Adapter Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen. WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. Select TKIP or AES for encryption.
  • Page 26: Figure 4-24: Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-G USB Network Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 27: Figure 4-26: Wireless Security - Radius - Eap-Tls

    Wireless-G USB Network Adapter RADIUS RADIUS uses the security of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) It offers two authentication methods: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS Enter the Login name of your wireless network in the Login Name field.
  • Page 28: Figure 4-28: Wireless Security - Leap - Windows Xp And 2000 Users

    Password - Enter the password used for authentication. Confirm - Enter the password again. LEAP CCKM - Windows XP and 2000 users can enable this Cisco Central Key Management method if they enabled CCX2.0 on the Advanced Wireless Settings screen.
  • Page 29: Figure 4-30: Advanced Wireless Settings

    Advanced Wireless Settings This screen is for advanced users to enable CCX2.0. CCX2.0 - Cisco Compatible Extensions, a Cisco wireless network protocol. Select Enabled from the drop- down menu to use the function. Select Disabled to disable to function. QoS - Quality of Service. QoS mechanisms ensure better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
  • Page 30: Figure 4-31: Confirm New Settings

    Wireless-G USB Network Adapter 5. The next screen displays all of the Adapter’s settings. If these are correct, you can save these settings to your hard drive by clicking Save. Click Next to continue and finish the setup. If these settings are not correct, click Back to change your settings.
  • Page 31: Chapter 5: Using The Wireless Network Monitor

    Wireless-G USB Network Adapter Chapter 5: Using the Wireless Network Monitor NOTE: The Wireless Network Monitor should only be Use the Wireless Network Monitor to check the link information, search for available wireless networks, or accessed AFTER connecting the Adapter. For more create profiles that hold different configuration settings.
  • Page 32: Figure 5-3: More Information - Wireless Network Status

    MAC Address- The MAC address of the wireless network’s access point or wireless router is shown here. Cisco AP IP - This displays the Cisco AP IP Address when LEAP wireless security is used. Signal Strength - The Signal Strength bar indicates the signal strength.
  • Page 33: Figure 5-4: More Information - Wireless Network Statistics

    Wireless-G USB Network Adapter Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your current network settings. Transmit Rate - This is the data transfer rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transfer rate possible at any given time.) Receive Rate - This is the rate at which data is received.
  • Page 34: Secure Easy Setup

    Wireless-G USB Network Adapter Secure Easy Setup While using the Monitor, you might see the Secure Easy Setup button on the right-hand side of the screen. This button can be used to set up the Adapter, if this has not already been done. With Secure Easy Setup, setting up the Adapter is as simple as pushing a couple of buttons.
  • Page 35: Figure 5-8: Secure Easy Setup Is Complete

    Wireless-G USB Network Adapter 2. Press the Cisco logo or Secure Easy Setup button on the wireless router or access point. When it turns white and begins to flash, click the Next button on the Setup Wizard screen. The logo or button will stop flashing on the wireless router or access point when the Adapter has been successfully added to the network.
  • Page 36: Site Survey

    Wireless-G USB Network Adapter Site Survey The Site Survey screen displays a list of available networks in the table on the left. The table shows each network’s SSID, Channel, and the quality of the wireless signal the Adapter is receiving. You may click SSID, CH (Channel), or Signal, to sort by that field.
  • Page 37: Profiles

    Wireless-G USB Network Adapter If the network has PSK2 wireless security enabled, then you will see the PSK2 Needed for Connection screen. Enter the network’s Passphrase or pre-shared key in the Passphrase field. To connect to the network, click Connect. To cancel the connection, click Cancel. Profiles The Profiles screen lets you save different configuration profiles for different network setups.
  • Page 38: Creating A New Profile

    Wireless-G USB Network Adapter Creating a New Profile On the Profiles screen, click the New button to create a new profile. Enter a name for the new profile, and click the OK button. Click the Cancel button to return to the Profiles screen without entering a name. The Available Wireless Network screen will appear.
  • Page 39: Figure 5-18: Available Wireless Network

    Wireless-G USB Network Adapter Setting Up the Adapter with Secure Easy Setup With Secure Easy Setup, setting up the Adapter is as simple as pushing a couple of buttons. Before you press any buttons, though, you should locate the Secure Easy Setup button on the device you’re connecting the Adapter to, such as a wireless router or access point.
  • Page 40: Figure 5-21: Secure Easy Setup Complete

    Wireless-G USB Network Adapter 6. Press the Cisco logo or Secure Easy Setup button on the wireless router or access point. When it turns white and begins to flash, click the Next button on the Setup Wizard screen. The logo or button will stop flashing on the wireless router or access point when the Adapter has been successfully added to the network.
  • Page 41: Figure 5-22: Available Wireless Network

    Wireless-G USB Network Adapter Setting Up the Adapter with Available Networks If you’re not setting up the Adapter with Secure Easy Setup, another method for setting up the Adapter is with the available networks listed on the Available Wireless Network screen. The available networks are listed in the table on the center of the screen by SSID.
  • Page 42: Figure 5-24: Wpa-Personal Needed For Connection

    Wireless-G USB Network Adapter WPA-Personal Needed for Connection Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu. Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field. The longer and more complex your Passphrase is, the more secure your network will be.
  • Page 43: Figure 5-26: The Congratulations Screen

    Wireless-G USB Network Adapter 2. After the software has been successfully installed, the Congratulations screen will appear. Click Connect to Network to connect to your network. Congratulations! Setup is complete. Figure 5-26: The Congratulations Screen Setting Up the Adapter with Manual Setup If you are not taking advantage of Secure Easy Setup and your network is not listed among the available networks, click Manual Setup on the Available Wireless Network screen to set up the adapter manually.
  • Page 44: Figure 5-28: Network Settings

    Wireless-G USB Network Adapter If your network does not have a DHCP server, click the radio button next to Specify network settings. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for your network. You must specify the IP Address and Subnet Mask on this screen. If you are unsure about the Default Gateway and DNS addresses, leave these fields empty.
  • Page 45: Figure 5-30: Ad-Hoc Mode Settings

    Wireless-G USB Network Adapter 3. If you chose Infrastructure Mode, go to Step 4 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Select the correct Channel for your wireless network. The channel you choose should match the channel set on the other devices in your wireless network.
  • Page 46: Figure 5-32: Wireless Security - Wep

    Wireless-G USB Network Adapter WEP - To use WEP encryption, select 64-bits or 128-bit characters from the drop-down menu, and enter a passphrase or key. WEP Key - The WEP key you enter must match the WEP key of your wireless network. If you are using 64-bit WEP encryption, then the key must consist of exactly 10 hexadecimal characters.
  • Page 47: Figure 5-33: Wireless Security - Wpa Personal

    Wireless-G USB Network Adapter WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm, TKIP or AES, for the Encryption Type. Enter a Passphrase of 8-63 characters in the Passphrase field. Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen.
  • Page 48: Figure 5-35: Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-G USB Network Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 49: Figure 5-37: Wireless Security - Radius - Eap-Tls

    Wireless-G USB Network Adapter RADIUS RADIUS uses the security of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) It offers two authentication methods: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS Enter the Login name of your wireless network in the Login Name field.
  • Page 50: Figure 5-39: Leap - Windows Xp And 2000

    Password - Enter the password used for authentication. Confirm - Enter the password again. LEAP CCKM - Windows XP and 2000 users can enable this Cisco Central Key Management method if they enabled CCX2.0 on the Advanced Wireless Settings screen.
  • Page 51: Figure 5-41: Advanced Wireless Settings

    Advanced Wireless Settings This screen is for advanced users to enable CCX2.0. CCX2.0 - Cisco Compatible Extensions, a Cisco wireless network protocol. Select Enabled from the drop- down menu to use the function. Select Disabled to disable to function. QoS - Quality of Service. QoS mechanisms ensure better service to high-priority types of network traffic, which may involve demanding, real-time applications, such as videoconferencing.
  • Page 52: Figure 5-42: Confirm New Settings

    Wireless-G USB Network Adapter 5. The next screen displays all of the Adapter’s settings. If these are correct, you can save these settings to your hard drive by clicking Save. Click Next to continue. If these settings are not correct, click Back to change your settings.
  • Page 53: Appendix A: Troubleshooting

    Wireless-G USB Network Adapter Appendix A: Troubleshooting This appendix provides solutions to problems usually encountered during the installation and operation of the Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com/international.
  • Page 54: Frequently Asked Questions

    Wireless-G USB Network Adapter Frequently Asked Questions Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network. Can I play computer games with other members of the wireless network? Yes, as long as the game supports multiple players over a LAN (local area network).
  • Page 55 Wireless-G USB Network Adapter What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other. The ad-hoc wireless network will not communicate with any wired network. What is infrastructure mode? When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point.
  • Page 56 Wireless-G USB Network Adapter the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). What is DSSS? What is FHSS? And what are their differences? Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver.
  • Page 57: Appendix B: Using Windows Xp Wireless Configuration

    Wireless-G USB Network Adapter Appendix B: Using Windows XP Wireless Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Configuration to control the Adapter, instead of using the Wireless Network Monitor, then right-click on the Wireless Network Monitor and select Use Windows XP Wireless Configuration.
  • Page 58: Figure B-4: Available Wireless Network

    Wireless-G USB Network Adapter 2. The screen that appears will show any available wireless network. Select the network you want. Click the NOTE: Steps 2 and 3 are the instructions and Connect button. screenshots for Windows XP with Service Pack 2 installed.
  • Page 59: Figure B-6: Network Connection - Wireless Security

    Wireless-G USB Network Adapter 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Click the Connect button. Figure B-6: Network Connection - Wireless Security NOTE: Windows XP Wireless Configuration does not support the use of a passphrase.
  • Page 60: Appendix C: Wireless Security

    Wireless-G USB Network Adapter Appendix C: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
  • Page 61 Wireless-G USB Network Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.
  • Page 62 Wireless-G USB Network Adapter WPA-Personal. If you do not have a RADIUS server, select the type of algorithm you want to use, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters. WPA-Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA-Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 63: Appendix D: Windows Help

    Wireless-G USB Network Adapter Appendix D: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 64: Appendix E: Glossary

    Wireless-G USB Network Adapter Appendix E: Glossary 802.11a - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
  • Page 65 Wireless-G USB Network Adapter Buffer - A shared or assigned memory area that is used to support and coordinate different computing and networking activities so one isn't held up by the other. Byte - A unit of data that is usually eight bits long Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet.
  • Page 66 Wireless-G USB Network Adapter DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless efficiency. Dynamic IP Address - A temporary IP address assigned by a DHCP server. EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.
  • Page 67 Wireless-G USB Network Adapter Infrastructure - A wireless network that is bridged to a wired network via an access point. IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network. IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device.
  • Page 68 Wireless-G USB Network Adapter OFDM (Orthogonal Frequency Division Multiplexing) - Frequency transmission that separates the data stream into a number of lower-speed data streams, which are then transmitted in parallel to prevent information from being lost in transit. Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products.
  • Page 69 Wireless-G USB Network Adapter RTP (Real-time Transport Protocol) - A protocol that enables specialized applications, such as Internet phone calls, video, and audio, to occur in real time. RTS (Request To Send) - A networking method of coordinating large packets through the RTS Threshold setting. Server - Any computer whose function in a network is to provide user access to files, printing, communications, and other services.
  • Page 70 Wireless-G USB Network Adapter TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.
  • Page 71: Appendix F: Specifications

    Wireless-G USB Network Adapter Appendix F: Specifications Model WUSB54G Standards IEEE 802.11b, 802.11g, USB 1.1, USB 2.0 Ports USB Port Channels 802.11b / 802.11g 11 Channels (most of North, Central, and South America) 13 Channels (most of Europe) LEDs Power, Link...
  • Page 72 Wireless-G USB Network Adapter Storage Humidity 5% ~ 90% Non-Condensing Appendix F: Specifications...
  • Page 73: Appendix G: Warranty Information

    Wireless-G USB Network Adapter Appendix G: Warranty Information Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 74 Wireless-G USB Network Adapter Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 75 Wireless-G USB Network Adapter Compliance Information for 2.4-GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999/5/EC (R&TTE Directive) Declaration of Conformity with Regard to the EU Directive 1995/5/EC (R&TTE Directive) Appendix H: Regulatory Information...
  • Page 76 Wireless-G USB Network Adapter NOTE: For all products, the Declaration of Conformity is available through one or more of these options: • A pdf file is included on the product's CD. • A print copy is included with the product. •...
  • Page 77 Wireless-G USB Network Adapter CE Marking For the Linksys Wireless-B and Wireless-G products, the following CE mark, notified body number (where applicable), and class 2 identifier are added to the equipment. Check the CE label on the product to find out which notified body was involved during the assessment. National Restrictions This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below:...
  • Page 78 Wireless-G USB Network Adapter France In case the product is used outdoors, the output power is restricted in some parts of the band. See Table 1 or check http://www.art-telecom.fr/ for more details. Dans la cas d’une utilisation en extérieur, la puissance de sortie est limitée pour certaines parties de la bande. Reportez- vous à...
  • Page 79 Wireless-G USB Network Adapter Power Output of Your Device To comply with your country’s regulations, you may have to change the power output of your wireless device. Proceed to the appropriate section for your device. NOTE: The power output setting may not be available on all wireless products. For more information, refer to the documentation on your product’s CD or http://www.linksys.com/international.
  • Page 80 Wireless-G USB Network Adapter Technical Documents on www.linksys.com/international Follow these steps to access technical documents: 1. Browse to http://www.linksys.com/international. 2. Click the region in which you reside. 3. Click the name of the country in which you reside. 4. Click Products. 5.
  • Page 81 Wireless-G USB Network Adapter Appendix I: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com/international If you experience problems with any Linksys product, you can e-mail us at: In Europe E-mail Address Austria...

Table of Contents