User Guide
Page 3
... 1 What's in this User Guide? 2 Chapter 2: Planning your Wireless Network 4 Network Topology 4 Roaming 4 Network Layout 5 Chapter 3: Getting to Know the Wireless-G Business USB Network Adapter 6 The LED Indicators 6 Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 7 Starting the Setup 7 Connecting the Adapter 8 Setting up the Adapter 9 Chapter 5: Using the Wireless Network Monitor 19 Accessing the Wireless Network Monitor 19 Using the Wireless Network Monitors 19 Link Information 19 Profiles 22 Create a New Profile 23 Editing...
... 1 What's in this User Guide? 2 Chapter 2: Planning your Wireless Network 4 Network Topology 4 Roaming 4 Network Layout 5 Chapter 3: Getting to Know the Wireless-G Business USB Network Adapter 6 The LED Indicators 6 Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 7 Starting the Setup 7 Connecting the Adapter 8 Setting up the Adapter 9 Chapter 5: Using the Wireless Network Monitor 19 Accessing the Wireless Network Monitor 19 Using the Wireless Network Monitors 19 Link Information 19 Profiles 22 Create a New Profile 23 Editing...
User Guide
Page 8
... Internet, and share files and other resources such as printers and network storage with up to run cable wires. Once you're connected, you can communicate without cables. Advanced wireless security using the Setup Wizard. Setting up and connect the Adapter using WiFi Protected Access™ (WPA2 Enterprise) with other computers on the network, wherever your wireless network's range up to your business. adapter: a device that "dead spots" in your computer's USB port and enjoy incredible high-speed wireless network access...
... Internet, and share files and other resources such as printers and network storage with up to run cable wires. Once you're connected, you can communicate without cables. Advanced wireless security using the Setup Wizard. Setting up and connect the Adapter using WiFi Protected Access™ (WPA2 Enterprise) with other computers on the network, wherever your wireless network's range up to your business. adapter: a device that "dead spots" in your computer's USB port and enjoy incredible high-speed wireless network access...
User Guide
Page 9
... some problems and solutions, as well as frequently asked questions, regarding installation and use of the Adapter. • Appendix B: Windows XP Zero Configuration This appendix describes how to use the Windows XP Zero Configuration. • Appendix C: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix D: Windows Help This appendix describes how you can use Windows Help for instructions about networking...
... some problems and solutions, as well as frequently asked questions, regarding installation and use of the Adapter. • Appendix B: Windows XP Zero Configuration This appendix describes how to use the Windows XP Zero Configuration. • Appendix C: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix D: Windows Help This appendix describes how you can use Windows Help for instructions about networking...
User Guide
Page 14
... this User Guide. User Guide - Click the User Guide button to open the PDF file of your CD-ROM drive. Exit - The Setup Wizard should run automatically, and the Welcome screen should appear. Click the Exit button to Start button on the Welcome screen. Wireless-G Business USB Network Adapter with RangeBooster Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 7 Starting the Setup Insert the Setup Wizard CD-ROM into your CD-ROM drive). The Setup Wizard will not work...
... this User Guide. User Guide - Click the User Guide button to open the PDF file of your CD-ROM drive. Exit - The Setup Wizard should run automatically, and the Welcome screen should appear. Click the Exit button to Start button on the Welcome screen. Wireless-G Business USB Network Adapter with RangeBooster Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 7 Starting the Setup Insert the Setup Wizard CD-ROM into your CD-ROM drive). The Setup Wizard will not work...
User Guide
Page 16
... setting up the Adapter is not listed on this option if you wish to set up the Adapter The next screen to close the Setup Wizard, if you already have a network set up the adapter manually. Wireless-G Business USB Network Adapter with RangeBooster Setting up the Adapter later. This method of these networks and click the Connect button to connect to update the Available Wireless Network list. • Manual Setup. Figure 4-4: Available Wireless Network Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 9 Setting...
... setting up the Adapter is not listed on this option if you wish to set up the Adapter The next screen to close the Setup Wizard, if you already have a network set up the adapter manually. Wireless-G Business USB Network Adapter with RangeBooster Setting up the Adapter later. This method of these networks and click the Connect button to connect to update the Available Wireless Network list. • Manual Setup. Figure 4-4: Available Wireless Network Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter 9 Setting...
User Guide
Page 17
... the Adapter Figure 4-5: WEP Figure 4-6: WPA - For connecting with RADIUS or LEAP, click Connect, then continue to the next section "Manual Setup" on your network listed, you don't have wireless security enabled on page 12. Enter a passphrase in a network. Security - WEP - If not, you do not see your network, continue to step 3. If you have wireless security enabled, continue to step 2. Wireless-G Business USB Network Adapter with RangeBooster Available Wireless Network The available networks are listed in conjunction with a RADIUS server. 2.
... the Adapter Figure 4-5: WEP Figure 4-6: WPA - For connecting with RADIUS or LEAP, click Connect, then continue to the next section "Manual Setup" on your network listed, you don't have wireless security enabled on page 12. Enter a passphrase in a network. Security - WEP - If not, you do not see your network, continue to step 3. If you have wireless security enabled, continue to step 2. Wireless-G Business USB Network Adapter with RangeBooster Available Wireless Network The available networks are listed in conjunction with a RADIUS server. 2.
User Guide
Page 19
... a DHCP server, click the radio button next to Specify network settings. Figure 4-10: Creating a Profile Manual Setup If your network is complete. Click Manual Setup on this screen. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for available wireless networks, or make additional configuration changes, proceed to Chapter 5: Using the Wireless Network Monitor. Wireless Mode 12 After the software has been successfully installed, the Congratulations screen will appear. The installation of the Wireless-G Business USB Network Adapter is not listed with...
... a DHCP server, click the radio button next to Specify network settings. Figure 4-10: Creating a Profile Manual Setup If your network is complete. Click Manual Setup on this screen. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for available wireless networks, or make additional configuration changes, proceed to Chapter 5: Using the Wireless Network Monitor. Wireless Mode 12 After the software has been successfully installed, the Congratulations screen will appear. The installation of the Wireless-G Business USB Network Adapter is not listed with...
User Guide
Page 20
... wireless modes. Click the Infrastructure Mode radio button if you are unsure about which channel to the previous screen. Click the Next button to continue, or click the Back button to return to a wireless router or access point. Enter the SSID for Wired Equivalent Privacy, and WPA Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-13: Wireless Security - WEP stands for your network. Click the Back button to continue. Use this mode...
... wireless modes. Click the Infrastructure Mode radio button if you are unsure about which channel to the previous screen. Click the Next button to continue, or click the Back button to return to a wireless router or access point. Enter the SSID for Wired Equivalent Privacy, and WPA Chapter 4: Setting up and Connecting the Wireless-G Business USB Network Adapter Setting up the Adapter Figure 4-13: Wireless Security - WEP stands for your network. Click the Back button to continue. Use this mode...
User Guide
Page 21
... Remote Authentication Dial-In User Service. It uses username and password-based authentication between a wireless client and a RADIUS server. This passphrase must match the passphrase of your wireless network. Advanced Users TX Key - wpa2 offers a stronger encryption than WPA. WPA uses a stronger security method than WEP and WPA2 defines an even stronger encryption, authentication, and key management than wpa by using TKIP (Temporal Key Integrity Protocol) encryption, which can be longer than 16 alphanumeric characters. WEP - For 128-bit encryption, enter exactly...
... Remote Authentication Dial-In User Service. It uses username and password-based authentication between a wireless client and a RADIUS server. This passphrase must match the passphrase of your wireless network. Advanced Users TX Key - wpa2 offers a stronger encryption than WPA. WPA uses a stronger security method than WEP and WPA2 defines an even stronger encryption, authentication, and key management than wpa by using TKIP (Temporal Key Integrity Protocol) encryption, which can be longer than 16 alphanumeric characters. WEP - For 128-bit encryption, enter exactly...
User Guide
Page 23
... Encryption drop-down menu, select the certificate you have installed to the Router.) WPA Enterprise offers two authentication methods, EAPTLS and PEAP, as well as two encryption methods, TKIP and AES, with a RADIUS server. (This should only be used when a RADIUS server is optional). Wireless-G Business USB Network Adapter with RangeBooster WPA Enterprise WPA Enterprise features WPA security used in coordination with dynamic encryption keys. Enter the name of your wireless network. Enter the password of the authentication server in the Server...
... Encryption drop-down menu, select the certificate you have installed to the Router.) WPA Enterprise offers two authentication methods, EAPTLS and PEAP, as well as two encryption methods, TKIP and AES, with a RADIUS server. (This should only be used when a RADIUS server is optional). Wireless-G Business USB Network Adapter with RangeBooster WPA Enterprise WPA Enterprise features WPA security used in coordination with dynamic encryption keys. Enter the name of your wireless network. Enter the password of the authentication server in the Server...
User Guide
Page 27
...Business USB Network Adapter with RangeBooster Status Click the Status tab to the initial Link Information screen. SSID - Security - The MAC address of the Adapter is shown here. Figure 5-3: Link Information - Wireless Network Status Chapter 5: Using the Wireless Network Monitor 20 Link Information Authentication - The IP Address of the wireless network's access point or wireless router is displayed here. The Default Gateway address of the wireless security feature is displayed here. Click the Connection button to return to view the Wireless Network Status screen...
...Business USB Network Adapter with RangeBooster Status Click the Status tab to the initial Link Information screen. SSID - Security - The MAC address of the Adapter is shown here. Figure 5-3: Link Information - Wireless Network Status Chapter 5: Using the Wireless Network Monitor 20 Link Information Authentication - The IP Address of the wireless network's access point or wireless router is displayed here. The Default Gateway address of the wireless security feature is displayed here. Click the Connection button to return to view the Wireless Network Status screen...
User Guide
Page 29
... the wireless security feature is shown here. The authentication setting for different network setups. Encryption - The status of the current connection is displayed here. See the next section, "Create a New Profile," for detailed instructions. Select the profile you want to which the wireless network devices are listed: Wireless Mode - The name of the wireless network currently in use. This is the mode of the profile is displayed here. New - NOTE: The default profile...
... the wireless security feature is shown here. The authentication setting for different network setups. Encryption - The status of the current connection is displayed here. See the next section, "Create a New Profile," for detailed instructions. Select the profile you want to which the wireless network devices are listed: Wireless Mode - The name of the wireless network currently in use. This is the mode of the profile is displayed here. New - NOTE: The default profile...
User Guide
Page 30
... of these networks and click the Connect button to connect to update the Available Wireless Network list. • Manual Setup. Available Wireless Network Figure 5-9: Creating a Profile - This screen provides two options for your network has WEP, WPA Personal, or WPA2 Personal wireless security enabled, then that security screen will be shown. You can click the Refresh button to bring the list up the Adapter. • Available Wireless Network. (For most users.) Use this screen, select Manual Setup to...
... of these networks and click the Connect button to connect to update the Available Wireless Network list. • Manual Setup. Available Wireless Network Figure 5-9: Creating a Profile - This screen provides two options for your network has WEP, WPA Personal, or WPA2 Personal wireless security enabled, then that security screen will be shown. You can click the Refresh button to bring the list up the Adapter. • Available Wireless Network. (For most users.) Use this screen, select Manual Setup to...
User Guide
Page 32
... wireless device directly without using a wireless router or access point. Ad-Hoc Mode - SSID - sensitive and should be used for all the devices in your wireless network. If your network does not have a DHCP server, select Specify network settings. IP Address - Select Ad-Hoc Mode, if you want to connect to set up the adapter manually. 2. Click Manual Setup on this mode if you want to connect to the previous screen. 3. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for your network's Gateway...
... wireless device directly without using a wireless router or access point. Ad-Hoc Mode - SSID - sensitive and should be used for all the devices in your wireless network. If your network does not have a DHCP server, select Specify network settings. IP Address - Select Ad-Hoc Mode, if you want to connect to set up the adapter manually. 2. Click Manual Setup on this mode if you want to connect to the previous screen. 3. Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for your network's Gateway...
User Guide
Page 33
... Ad-Hoc Mode Settings screen will appear. The channel you have wireless security, select Disabled and then click the Next button to the previous screen. If your wireless network. WPA uses a stronger security method than WEP and WPA2 defines an even stronger encryption, authentication, and key management than wpa by using TKIP (Temporal Key Integrity Protocol) encryption, which channel to Step 5 now. It uses username and password-based authentication between a wireless client and a RADIUS server. Click the Next button to continue...
... Ad-Hoc Mode Settings screen will appear. The channel you have wireless security, select Disabled and then click the Next button to the previous screen. If your wireless network. WPA uses a stronger security method than WEP and WPA2 defines an even stronger encryption, authentication, and key management than wpa by using TKIP (Temporal Key Integrity Protocol) encryption, which channel to Step 5 now. It uses username and password-based authentication between a wireless client and a RADIUS server. Click the Next button to continue...
User Guide
Page 68
... the driver software from your PC. • Restart your PC has a free IRQ (Interrupt ReQuest, a hardware interrupt on the Network Adapter. The Wireless-G Business USB Network Adapter does not work properly. • Reinsert the USB cable connections. • Right click on the same channel and with the other computers linked via Ethernet in the Infrastructure configuration. • Make sure that the PC to problems that your PC and repeat the hardware and software installation...
... the driver software from your PC. • Restart your PC has a free IRQ (Interrupt ReQuest, a hardware interrupt on the Network Adapter. The Wireless-G Business USB Network Adapter does not work properly. • Reinsert the USB cable connections. • Right click on the same channel and with the other computers linked via Ethernet in the Infrastructure configuration. • Make sure that the PC to problems that your PC and repeat the hardware and software installation...
User Guide
Page 69
... appear on the users' wireless network monitors. The user will depend on other stations to set up alerts. Wireless-G Business USB Network Adapter with RangeBooster Frequently Asked Questions Can I try to report alerts, so the AP and wireless client won't over a network. Can users turn off the Linksys wireless network monitor utility and only uses the Windows Zero Config to connect to determine if it into the Allowed Vendor List. How long...
... appear on the users' wireless network monitors. The user will depend on other stations to set up alerts. Wireless-G Business USB Network Adapter with RangeBooster Frequently Asked Questions Can I try to report alerts, so the AP and wireless client won't over a network. Can users turn off the Linksys wireless network monitor utility and only uses the Windows Zero Config to connect to determine if it into the Allowed Vendor List. How long...
User Guide
Page 76
Enable MAC Address Filtering. 5. Change the administrator's password regularly. Refer to the router or access point's documentation for "beacon messages". So, keep the following is available. Use WPA/WPA2 if it harder for you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in mind whenever you can change network settings. Security Precautions The following in its firmware. Disable SSID Broadcast. 3. Please note that this may reduce your part for the Administrator account. 4. Hackers...
Enable MAC Address Filtering. 5. Change the administrator's password regularly. Refer to the router or access point's documentation for "beacon messages". So, keep the following is available. Use WPA/WPA2 if it harder for you use, keep in mind that network settings (SSID, WEP keys, etc.) are stored in mind whenever you can change network settings. Security Precautions The following in its firmware. Disable SSID Broadcast. 3. Please note that this may reduce your part for the Administrator account. 4. Hackers...
User Guide
Page 80
... of time, instead of a website, FTP server, or e-mail server with a wired network. Bit - Byte - Default Gateway - Access Point - A device that allows administrators to assign temporary IP addresses to network computers by "leasing" an IP address to expand the range of a given device or network. DHCP (Dynamic Host Configuration Protocol) - Bandwidth - Broadband - An always-on the World Wide Web. A networking protocol that allows wireless-equipped computers and other . Also used to connect devices in turn connects to start executing instructions...
... of time, instead of a website, FTP server, or e-mail server with a wired network. Bit - Byte - Default Gateway - Access Point - A device that allows administrators to assign temporary IP addresses to network computers by "leasing" an IP address to expand the range of a given device or network. DHCP (Dynamic Host Configuration Protocol) - Bandwidth - Broadband - An always-on the World Wide Web. A networking protocol that allows wireless-equipped computers and other . Also used to connect devices in turn connects to start executing instructions...
User Guide
Page 82
... authentication (username and password) in cables or adapters. Appendix E: Glossary 75 A VPN protocol used to identify a computer or device on a network. Ping (Packet INternet Groper) - A type of packets at the IP layer. MAC (Media Access Control) Address - A protocol used to determine whether a particular IP address is online. A technology enabling an Ethernet network cable to each networking device. A company that make up your local network. The address used to the Internet. Wireless-G Business USB Network Adapter with RangeBooster Intrusion attack - NAT...
... authentication (username and password) in cables or adapters. Appendix E: Glossary 75 A VPN protocol used to identify a computer or device on a network. Ping (Packet INternet Groper) - A type of packets at the IP layer. MAC (Media Access Control) Address - A protocol used to determine whether a particular IP address is online. A technology enabling an Ethernet network cable to each networking device. A company that make up your local network. The address used to the Internet. Wireless-G Business USB Network Adapter with RangeBooster Intrusion attack - NAT...