LINKSYS WUSB54GCV3 Compact Wireless-G USB Network Adapter User Manual WUSB54GC User Guide
LINKSYS LLC Compact Wireless-G USB Network Adapter WUSB54GC User Guide
LINKSYS >
Contents
- 1. Manual Part 1
- 2. Manual Part 2
Manual Part 1
USER GUIDE Compact Wireless-G USB Adapter Model: WUSB54GC About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product. WEB: This globe icon indicates a noteworthy website address or e-mail address. Online Resources Website addresses in this document are listed without http:// in front of the address because most current web browsers do not require it. If you use an older web browser, you may have to add http:// in front of the web address. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders. Compact Wireless-G USB Adapter Table of Contents Chapter 1: Product Overview LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Wireless Security Checklist General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Chapter 3: Configuration How to Access the Wireless Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 How to Use the Wireless Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Saved Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Appendix A: Troubleshooting 11 Appendix B: Specifications 12 Appendix C: Warranty Information 13 Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Appendix D: Regulatory Information 15 FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Safety Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Avis d’Industrie Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Avis de non-responsabilité concernant les appareils sans fil . . . . . . . . . . . . . . . . . .16 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Appendix E: Software License Agreement 21 Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 Compact Wireless-G USB Adapter ii Chapter 1 Product Overview Chapter 1: Product Overview Thank you for choosing the Compact Wireless-G USB Adapter. The Adapter connects to your PC via a USB port, leaving your PC’s slots available for other purposes. The Adapter also lets you connect with any of the growing number of wireless hotspots in public places such as coffee shops, airports, hotels and convention centers. With this Adapter, your wireless networking experience can be faster and easier than ever. LEDs Link (Green) The LED flashes when there is wireless network activity. Compact Wireless-G USB Adapter Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure. 1. Change the default wireless network name or SSID Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks. 2. Change the default password For wireless products such as access points, routers, and gateways, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess. 3. Enable MAC address filtering 4. Enable encryption Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of security for wireless communication. A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment. WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA. General Network Security Guidelines Wireless network security is useless if the underlying network is not secure. Password protect all computers on the network and individually password protect sensitive files. Change passwords on a regular basis. Install anti-virus software and personal firewall software. Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge. Additional Security Tips Keep wireless routers, access points, or gateways away from exterior walls and windows. Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary. WEB: For more information on wireless security, visit www.linksys.com/security Linksys routers and gateways give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network. Compact Wireless-G USB Adapter Advanced Configuration Chapter 3 Chapter 3: Configuration The Linksys Wireless Manager is used to configure the Adapter. The Wireless Manager lets you search for available wireless networks, establish or terminate a connection with a wireless network, and save a wireless network’s settings. How to Access the Wireless Manager After you have installed the Adapter, the Linksys Wireless Manager icon appears in the system tray of your computer. If the Adapter is connected to a wireless network, the icon will have green bars (the exact number of green bars varies depending on the network’s signal strength). If the Adapter is not connected to a wireless network, the icon will have gray bars with a red X. Connect to a Wireless Network—Searching for Wireless Networks Linksys Wireless Manager Icon— Connected to a Wireless Network Linksys Wireless Manager Icon— Not Connected to a Wireless Network To open the Wireless Manager, click the icon, and then select View Wireless Networks... from the pop-up menu. (To skip the pop-up menu, double-click the icon instead.) To close the Wireless Manager, click the icon, then select Close from the pop-up menu. Wireless Manager Icon Pop-up Menu Connect to a Wireless Network—Available Wireless Networks The list of available wireless networks provides the following information about each network: Network name. The network’s unique name or SSID. Connection status. The word Connected appears if the Adapter is connected to the network. Wi-Fi Protected Setup support. The icon appears if the network supports Wi-Fi Protected Setup. How to Use the Wireless Manager NOTE: The Adapter supports Wi-Fi Protected Setup, a feature that makes it easy to set up a wireless network. For information on this feature, go to How to Connect Using Wi-Fi Protected Setup, page 8. The Wireless Manager opens with the Connect to a Wireless Network screen. This screen allows you to connect to a wireless network, or to disconnect from a wireless network. When the Connect to a Wireless Network screen first appears, it displays a message indicating that the Wireless Manager is searching for wireless networks within range. When the search is complete, the screen then displays the available wireless networks within range. Compact Wireless-G USB Adapter Security. The icon appears if the network uses wireless security. The security type (WEP, WPA, etc.) is listed below the network name. Network signal strength. The green bars in the icon indicate the network’s signal strength; is the strongest level and is the weakest level. Advanced Configuration Chapter 3 To connect to a wireless network, proceed to How to Connect to a Wireless Network, page 6. To disconnect from a wireless network, select the network from the list, and then click Disconnect. To refresh the list of available wireless networks, click Search Again. 5. The Checking Connection screen appears while the Wireless Manager establishes the wireless connection. When it is finished, click Next to continue. How to Connect to a Wireless Network Follow these instructions to connect to a wireless network that has not been saved. (To connect to a saved network, go to How to Connect to a Saved Network, page 10.) 1. In the Connect to a Wireless Network screen, locate the name of your wireless network in the list. If your wireless network is not in the list, proceed to How to Connect to a Hidden Wireless Network, page 7. 2. If your wireless network supports Wi-Fi Protected Setup (the icon appears next to the network’s name), go to How to Connect Using Wi-Fi Protected Setup, page 8. 3. Select your network, and then click Connect. Checking Connection 6. The Connected to Your Network screen appears. If you want the Wireless Manager to remember your network’s settings (so that it will be easier to reconnect to should it become disconnected), click Remember this network. Click Finish to exit the Wireless Manager. Select a Wireless Network 4. If the wireless network uses wireless security, enter the security key, and then click Next to continue. Connected to Your Network Congratulations! The Adapter is connected to the network. Enter Wireless Network’s Security Key Compact Wireless-G USB Adapter Advanced Configuration Chapter 3 How to Connect to a Hidden Wireless Network NOTE: By default, a wireless network’s router broadcasts the network SSID (name). A “hidden” wireless network is a network whose router has been configured not to broadcast the SSID. Follow these steps to connect to a wireless network that is not listed on the Connect to a Wireless Network screen. 1. Select My network is not in this list in the Connect to a Wireless Network screen. Then click Next. My network is not in this list 2. The next screen asks if you want to connect to a hidden network. If your network is hidden, select Connect to hidden network, and then click Next. NOTE: If your wireless network is NOT hidden, select My Network is not hidden, and then click Next. Follow the instructions on the next screen—verify that your network router is turned on and is within range of the Adapter, and then click Retry to search for wireless networks again Then proceed to How to Connect to a Wireless Network, page 6 to continue. 3. Enter your wireless network’s name (SSID). Click Next to continue. Enter the Wireless Network’s Name (SSID) 4. If your wireless network uses wireless security, enter the security key, and then click Next to continue. Enter the Wireless Network’s Security Key Confirm Connection to Hidden Network Compact Wireless-G USB Adapter
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print XMP Toolkit : 3.1-701 Modify Date : 2008:10:28 13:46:57+08:00 Create Date : 2008:10:28 13:46:50+08:00 Metadata Date : 2008:10:28 13:46:57+08:00 Creator Tool : Adobe InDesign CS3 (5.0.3) Format : application/pdf Title : WUSB54GC User Guide Document ID : uuid:ee2052d7-3066-4087-9308-8a0ca837671d Instance ID : uuid:8725498e-8379-467b-8e34-54b4d2f6d175 Producer : Mac OS X 10.5.5 Quartz PDFContext Page Count : 8 Creator : Adobe InDesign CS3 (5.0.3)EXIF Metadata provided by EXIF.tools