User Guide
Page 6
... Wireless-G PCI Adapter from Linksys. 802.11b: an IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of Wireless Protected Access (WPA). Like all wireless products, the Adapter allows for choosing the Wireless-G PCI Adapter. network: a series of computers or devices connected for the purpose of measurement for the future with wireless cards and adapters can surf the web or use instant messaging to your e-mail, access the Internet...
... Wireless-G PCI Adapter from Linksys. 802.11b: an IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of Wireless Protected Access (WPA). Like all wireless products, the Adapter allows for choosing the Wireless-G PCI Adapter. network: a series of computers or devices connected for the purpose of measurement for the future with wireless cards and adapters can surf the web or use instant messaging to your e-mail, access the Internet...
User Guide
Page 7
... Adapter's technical specifications. This user guide covers the steps for setting up and using the Wireless-G PCI Adapter. • Chapter 1: Introduction This chapter describes the Adapter's applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter discusses a few of the basics about wireless networking. • Chapter 3: Getting to Know the Wireless-G PCI Adapter This chapter describes the physical features of the Adapter. • Chapter 4: Software Installation and Configuration This chapter instructs...
... Adapter's technical specifications. This user guide covers the steps for setting up and using the Wireless-G PCI Adapter. • Chapter 1: Introduction This chapter describes the Adapter's applications and this User Guide. • Chapter 2: Planning Your Wireless Network This chapter discusses a few of the basics about wireless networking. • Chapter 3: Getting to Know the Wireless-G PCI Adapter This chapter describes the physical features of the Adapter. • Chapter 4: Software Installation and Configuration This chapter instructs...
User Guide
Page 9
... without the use of a wireless network infrastructure: a wireless network that they both share the same channel and SSID. Linksys wireless adapters also provide users access to expand the range of an access point. Proper access point positioning combined with one wireless adapter. ad-hoc: a group of a network. roaming: the ability to take a wireless device from one access point's range to another to share the same radio channel. ssid: your Wireless Network 4 Network Topology Roaming Infrastructure mode also supports roaming capabilities for two wireless adapter PCs...
... without the use of a wireless network infrastructure: a wireless network that they both share the same channel and SSID. Linksys wireless adapters also provide users access to expand the range of an access point. Proper access point positioning combined with one wireless adapter. ad-hoc: a group of a network. roaming: the ability to take a wireless device from one access point's range to another to share the same radio channel. ssid: your Wireless Network 4 Network Topology Roaming Infrastructure mode also supports roaming capabilities for two wireless adapter PCs...
User Guide
Page 12
... button to the previous page. The default setting is your wireless network name and must be identical for some information about your network's SSID (Service Set Identifier). Figure 3-3: The Wireless Mode Screen Chapter 3: Software Installation and Configuration 7 The Wireless Mode screen will end the installation. Click the Ad-Hoc Mode radio button if you want to connect to a wireless router or access point. Click the Infrastructure Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point...
... button to the previous page. The default setting is your wireless network name and must be identical for some information about your network's SSID (Service Set Identifier). Figure 3-3: The Wireless Mode Screen Chapter 3: Software Installation and Configuration 7 The Wireless Mode screen will end the installation. Click the Ad-Hoc Mode radio button if you want to connect to a wireless router or access point. Click the Infrastructure Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point...
User Guide
Page 13
.... Keep the default setting, Mixed, if you have Wireless-G and Wireless-B devices in your wireless network: WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, or RADIUS. If you don't want to use, leave the default channel. Chapter 3: Software Installation and Configuration Figure 3-5: The Wireless Security Screen 8 Click the Back button to the previous screen. WEP stands for Wired Equivalent Privacy, and WPA stands for Remote Authentication Dial-In User Service. RADIUS stands for Wi-Fi Protected Access. Select G-Only...
.... Keep the default setting, Mixed, if you have Wireless-G and Wireless-B devices in your wireless network: WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, or RADIUS. If you don't want to use, leave the default channel. Chapter 3: Software Installation and Configuration Figure 3-5: The Wireless Security Screen 8 Click the Back button to the previous screen. WEP stands for Wired Equivalent Privacy, and WPA stands for Remote Authentication Dial-In User Service. RADIUS stands for Wi-Fi Protected Access. Select G-Only...
User Guide
Page 14
... default is set to the previous screen. For 64-bit encryption, enter exactly 10 hexadecimal characters. The default transmit key number is compatible with SpeedBooster WEP WEP - Wireless-G PCI Adapter with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on a wireless network for authentication. It must match the WEP key of encrypting network data transmitted on those products.) WEP Key - If your other wireless network devices and is 1. bit: a binary digit Chapter 3: Software Installation and Configuration...
... default is set to the previous screen. For 64-bit encryption, enter exactly 10 hexadecimal characters. The default transmit key number is compatible with SpeedBooster WEP WEP - Wireless-G PCI Adapter with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on a wireless network for authentication. It must match the WEP key of encrypting network data transmitted on those products.) WEP Key - If your other wireless network devices and is 1. bit: a binary digit Chapter 3: Software Installation and Configuration...
User Guide
Page 16
... 3: Software Installation and Configuration Figure 3-10: Wireless Security - Select the type of the authentication server in the Login Name field. Figure 3-9: Wireless Security - Enter the name of encryption, TKIP or AES, from the Encryption drop-down menu. EAP-TLS If you want to the Router.) WPA Enterprise offers two authentication methods, EAPTLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Then select the authentication method used inside...
... 3: Software Installation and Configuration Figure 3-10: Wireless Security - Select the type of the authentication server in the Login Name field. Figure 3-9: Wireless Security - Enter the name of encryption, TKIP or AES, from the Encryption drop-down menu. EAP-TLS If you want to the Router.) WPA Enterprise offers two authentication methods, EAPTLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Then select the authentication method used inside...
User Guide
Page 17
... radius (remote authentication dial-in the Login Name field. if you selected EAP-TLS, enter the login name of your wireless network in the Server Name field (this is optional). Chapter 3: Software Installation and Configuration Figure 3-12: Wireless Security - RADIUS - Enter the name of the authentication server in the Password field. PEAP 12 Click the Next button to continue or the Back button to return to control network access. Select the authentication method your network is connected...
... radius (remote authentication dial-in the Login Name field. if you selected EAP-TLS, enter the login name of your wireless network in the Server Name field (this is optional). Chapter 3: Software Installation and Configuration Figure 3-12: Wireless Security - RADIUS - Enter the name of the authentication server in the Password field. PEAP 12 Click the Next button to continue or the Back button to return to control network access. Select the authentication method your network is connected...
User Guide
Page 21
...port: the connection point on your desktop PC. 6. Power on a computer or networking device used for available wireless networks, or make additional configuration changes, proceed to work properly with SpeedBooster 4. Attach the external antenna to continue installation The installation of the Antenna 5. Figure 4-2: Proper Positioning of the Wireless-G PCI Adapter is complete. For Windows 2000 users, a screen stating that a digital signature was not found to "Chapter 5: Using the Wireless Network Monitor." Click the Yes button to the adapter's antenna port. Wireless-G PCI...
...port: the connection point on your desktop PC. 6. Power on a computer or networking device used for available wireless networks, or make additional configuration changes, proceed to work properly with SpeedBooster 4. Attach the external antenna to continue installation The installation of the Antenna 5. Figure 4-2: Proper Positioning of the Wireless-G PCI Adapter is complete. For Windows 2000 users, a screen stating that a digital signature was not found to "Chapter 5: Using the Wireless Network Monitor." Click the Yes button to the adapter's antenna port. Wireless-G PCI...
User Guide
Page 22
... perform configuration changes, click the Profiles tab. Ad-Hoc Mode or Infrastructure Mode - Accessing the Wireless Network Monitor After installing the Adapter's Setup Wizard, the Wireless Network Monitor icon will be green. Signal Strength - Chapter 5: Using the Wireless Network Monitor Overview Figure 5-1: The Link Information Tab Figure 5-2: The Link Information Tab 17 The Link Quality bar indicates the quality of the current wireless signal as well as its quality. Click the X (Close) button in...
... perform configuration changes, click the Profiles tab. Ad-Hoc Mode or Infrastructure Mode - Accessing the Wireless Network Monitor After installing the Adapter's Setup Wizard, the Wireless Network Monitor icon will be green. Signal Strength - Chapter 5: Using the Wireless Network Monitor Overview Figure 5-1: The Link Information Tab Figure 5-2: The Link Information Tab 17 The Link Quality bar indicates the quality of the current wireless signal as well as its quality. Click the X (Close) button in...
User Guide
Page 26
.... Wireless-G PCI Adapter with SpeedBooster WEP Key Needed for Connection 21 It is 8-63 characters in length. Click the Connect button to "F". Figure 5-7: WPA-Personal Needed for Connection Chapter 5: Using the Wireless Network Monitor The Site Survey Tab Figure 5-8: WPA2-Personal Needed for Connection Select 64-bit or 128-bit encryption from the drop-down menu. Enter a passphrase in length. For 64-bit encryption, enter exactly 10 hexadecimal characters. Figure 5-6: WEP Key Needed for Connection WPA2...
.... Wireless-G PCI Adapter with SpeedBooster WEP Key Needed for Connection 21 It is 8-63 characters in length. Click the Connect button to "F". Figure 5-7: WPA-Personal Needed for Connection Chapter 5: Using the Wireless Network Monitor The Site Survey Tab Figure 5-8: WPA2-Personal Needed for Connection Select 64-bit or 128-bit encryption from the drop-down menu. Enter a passphrase in length. For 64-bit encryption, enter exactly 10 hexadecimal characters. Figure 5-6: WEP Key Needed for Connection WPA2...
User Guide
Page 27
... save different configuration profiles for detailed instructions. The mode of the current connection. (In Auto mode, the Adapter dynamically shifts to change an existing profile. Transfer Rate - Connect - Chapter 5: Using the Wireless Network Monitor The Profiles Tab Figure 5-9: The Profiles Tab 22 Authentication - New - Wireless-G PCI Adapter with SpeedBooster The Profiles Tab The Profiles screen lets you ran the Setup Wizard. Profile - The wireless network's unique name, as set . Security - The authentication setting for the network. Select...
... save different configuration profiles for detailed instructions. The mode of the current connection. (In Auto mode, the Adapter dynamically shifts to change an existing profile. Transfer Rate - Connect - Chapter 5: Using the Wireless Network Monitor The Profiles Tab Figure 5-9: The Profiles Tab 22 Authentication - New - Wireless-G PCI Adapter with SpeedBooster The Profiles Tab The Profiles screen lets you ran the Setup Wizard. Profile - The wireless network's unique name, as set . Security - The authentication setting for the network. Select...
User Guide
Page 32
... default is set to use, TKIP or AES, from the Encryption drop-down box. For Shared Key authentication, both the sender and the recipient share a WEP key for Shared Key or Open System authentication. Click the Next button to continue, or click the Back button to return to the previous screen. Encryption - Select the type of your other wireless network devices and is , the more complex your network will auto...
... default is set to use, TKIP or AES, from the Encryption drop-down box. For Shared Key authentication, both the sender and the recipient share a WEP key for Shared Key or Open System authentication. Click the Next button to continue, or click the Back button to return to the previous screen. Encryption - Select the type of your other wireless network devices and is , the more complex your network will auto...
User Guide
Page 37
... installed successfully. Appendix A: Troubleshooting 32 Common Problems and Solutions You will find an answer here, check the Linksys website at www.linksys.com. Select the device manager and click on My Computer and select Properties. I cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. • Make sure that the PC to which the Wireless-G PCI Adapter is associated is powered on. • Make...
... installed successfully. Appendix A: Troubleshooting 32 Common Problems and Solutions You will find an answer here, check the Linksys website at www.linksys.com. Select the device manager and click on My Computer and select Properties. I cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. • Make sure that the PC to which the Wireless-G PCI Adapter is associated is powered on. • Make...
User Guide
Page 43
...is enabled, you will appear if your access point. Enter the keyword wireless in the Confirm network key field. The Zero Configuration icon, showing a connection, will be asked to step 4. 4. Appendix B: Windows XP Wireless Zero Configuration Figure B-6: Wireless Network Connection 38 Figure B-5: Network Connection - WEP NOTE: Windows XP Wireless Zero Configuration does not support the use of the Windows XP Wireless Configuration is active. Enter the exact WEP key used by your connection is complete. The installation of a passphrase. Then, click the Connect button...
...is enabled, you will appear if your access point. Enter the keyword wireless in the Confirm network key field. The Zero Configuration icon, showing a connection, will be asked to step 4. 4. Appendix B: Windows XP Wireless Zero Configuration Figure B-6: Wireless Network Connection 38 Figure B-5: Network Connection - WEP NOTE: Windows XP Wireless Zero Configuration does not support the use of the Windows XP Wireless Configuration is active. Enter the exact WEP key used by your connection is complete. The installation of a passphrase. Then, click the Connect button...
User Guide
Page 44
... stored in mind that information. Wireless-G PCI Adapter with SpeedBooster Appendix C: Wireless Security Linksys wants to make it is the only person who can change network settings. The current generation of the administrator's password, he, too, can change those settings. So, keep in its firmware. Change the default SSID. 2. Disable SSID Broadcast. 3. Change the SSID periodically. 6. Use WPA if it harder for more information. 39 Change the WEP encryption keys periodically. Security Threats Facing Wireless Networks Wireless networks are the steps you can...
... stored in mind that information. Wireless-G PCI Adapter with SpeedBooster Appendix C: Wireless Security Linksys wants to make it is the only person who can change network settings. The current generation of the administrator's password, he, too, can change those settings. So, keep in its firmware. Change the default SSID. 2. Disable SSID Broadcast. 3. Change the SSID periodically. 6. Use WPA if it harder for more information. 39 Change the WEP encryption keys periodically. Security Threats Facing Wireless Networks Wireless networks are the steps you can...
User Guide
Page 45
... provide access to break in trying to only those wireless nodes with a random MAC Address. Wired Equivalent Privacy (WEP) is overstating WEP's ability. Wireless-G PCI Adapter with dynamic encryption keys. Change it unique 3. Enable MAC Address filtering. This is often looked upon as a cure-all for wireless security concerns. So, don't broadcast the SSID. MAC Addresses. This makes it allows anyone to your network. Use "Shared Key" authentication 3. Radius-PSK gives you use the same encryption method and encryption key or your wireless network will...
... provide access to break in trying to only those wireless nodes with a random MAC Address. Wired Equivalent Privacy (WEP) is overstating WEP's ability. Wireless-G PCI Adapter with dynamic encryption keys. Change it unique 3. Enable MAC Address filtering. This is often looked upon as a cure-all for wireless security concerns. So, don't broadcast the SSID. MAC Addresses. This makes it allows anyone to your network. Use "Shared Key" authentication 3. Radius-PSK gives you use the same encryption method and encryption key or your wireless network will...
User Guide
Page 50
... address to expand the range of assigning permanent IP addresses. A device that allows wireless-equipped computers and other (peer-to-peer) without the use of data transfer that adds network functionality to secure data. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - Also used to receive data. Default Gateway - A device that is ready to prevent data collisions. A binary digit. A method of an access point. Ad-hoc - Backbone - AES (Advanced Encryption...
... address to expand the range of assigning permanent IP addresses. A device that allows wireless-equipped computers and other (peer-to-peer) without the use of data transfer that adds network functionality to secure data. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - Also used to receive data. Default Gateway - A device that is ready to prevent data collisions. A binary digit. A method of an access point. Ad-hoc - Backbone - AES (Advanced Encryption...
User Guide
Page 51
... data is bridged to send data over a network medium that is placed on a network. A wireless network that cannot support the original size of information being lost in a network. Frequency transmission with SpeedBooster DNS (Domain Name Server) - Encoding data transmitted in transit. Gateway - Hardware - IP (Internet Protocol) - Radio bandwidth utilized in wireless transmissions. The IP address of data sharing, storage, and/or transmission between users. MAC (Media Access Control) Address - Fragmentation -Breaking...
... data is bridged to send data over a network medium that is placed on a network. A wireless network that cannot support the original size of information being lost in a network. Frequency transmission with SpeedBooster DNS (Domain Name Server) - Encoding data transmitted in transit. Gateway - Hardware - IP (Internet Protocol) - Radio bandwidth utilized in wireless transmissions. The IP address of data sharing, storage, and/or transmission between users. MAC (Media Access Control) Address - Fragmentation -Breaking...
User Guide
Page 52
... Spectrum - An address code that uses an authentication server to files, printing, communications, and other services. A data switch that requires acknowledgement from one access point's range to communicate over a network. A unit of instructions PCs use to another without losing the connection. RJ-45 (Registered Jack-45) - A networking method of ports. 2. SSID (Service Set IDentifier) - Subnet Mask - Switch - 1. A network protocol for more reliable and secure data transmission. Wireless-G PCI Adapter with SpeedBooster Node - A networking device that holds...
... Spectrum - An address code that uses an authentication server to files, printing, communications, and other services. A data switch that requires acknowledgement from one access point's range to communicate over a network. A unit of instructions PCs use to another without losing the connection. RJ-45 (Registered Jack-45) - A networking method of ports. 2. SSID (Service Set IDentifier) - Subnet Mask - Switch - 1. A network protocol for more reliable and secure data transmission. Wireless-G PCI Adapter with SpeedBooster Node - A networking device that holds...