User Guide
Page 3
... 1 Front Panel 1 Side Panels 1 LCD Screen 2 Chapter 2: Wireless Security Checklist 3 General Network Security Guidelines 3 Additional Security Tips 3 Chapter 3: Configuration 4 Connecting the Adapter 4 Setting up the Adapter 5 Chapter 4: Using the Wireless Monitor 11 Accessing the Wireless Network Monitor 11 Link Information Screens 11 Profiles 14 Appendix A: Troubleshooting 21 Common... Electronic Equipment (WEEE 28 Appendix E: Software License Agreement 32 Software in Linksys Products 32 Software Licenses 32 Wireless-G USB Network Adapter with Wi-Fi Finder ii
... 1 Front Panel 1 Side Panels 1 LCD Screen 2 Chapter 2: Wireless Security Checklist 3 General Network Security Guidelines 3 Additional Security Tips 3 Chapter 3: Configuration 4 Connecting the Adapter 4 Setting up the Adapter 5 Chapter 4: Using the Wireless Monitor 11 Accessing the Wireless Network Monitor 11 Link Information Screens 11 Profiles 14 Appendix A: Troubleshooting 21 Common... Electronic Equipment (WEEE 28 Appendix E: Software License Agreement 32 Software in Linksys Products 32 Software Licenses 32 Wireless-G USB Network Adapter with Wi-Fi Finder ii
User Guide
Page 4
.... Side Panels Product Overview ON/OFF The ON/OFF switch is wireless activity. There are three Wireless Network Scan Modes: A = All Networks (default mode), U = Unsecured Networks, S = Specific Network Name To change the icon to scan for choosing the Wireless-G USB Network Adapter with Wi-Fi Finder 1 Front Panel Power (Green) The Power LED lights up when there is located...
.... Side Panels Product Overview ON/OFF The ON/OFF switch is wireless activity. There are three Wireless Network Scan Modes: A = All Networks (default mode), U = Unsecured Networks, S = Specific Network Name To change the icon to scan for choosing the Wireless-G USB Network Adapter with Wi-Fi Finder 1 Front Panel Power (Green) The Power LED lights up when there is located...
User Guide
Page 5
Chapter 1 LCD Screen Wireless Mode Channel Security Status Battery Power Status Wireless Network Name Scan Modes Number of Available Wireless Networks Product Overview Wireless-G USB Network Adapter with Wi-Fi Finder 2
Chapter 1 LCD Screen Wireless Mode Channel Security Status Battery Power Status Wireless Network Name Scan Modes Number of Available Wireless Networks Product Overview Wireless-G USB Network Adapter with Wi-Fi Finder 2
User Guide
Page 6
... wireless network, and can access your network secure. 1. WEB: For more vulnerable to intruders than a network encrypted with specific MAC addresses. Wireless-G USB Network Adapter with high-speed Internet access are adopting them to access your wireless device and change their settings. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with Wi-Fi Finder Wireless...
... wireless network, and can access your network secure. 1. WEB: For more vulnerable to intruders than a network encrypted with specific MAC addresses. Wireless-G USB Network Adapter with high-speed Internet access are adopting them to access your wireless device and change their settings. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with Wi-Fi Finder Wireless...
User Guide
Page 8
... you will appear. Valid hexadecimal characters are listed in the Passphrase field, so a WEP key is compatible with Wi-Fi Finder 5 The networks available to this Adapter will be the Available Wireless Networks screen. This method of setting up the Adapter is intended for Connection Passphrase Enter a passphrase in the table on the Adapter...
... you will appear. Valid hexadecimal characters are listed in the Passphrase field, so a WEP key is compatible with Wi-Fi Finder 5 The networks available to this Adapter will be the Available Wireless Networks screen. This method of setting up the Adapter is intended for Connection Passphrase Enter a passphrase in the table on the Adapter...
User Guide
Page 9
...with Wi-Fi Finder Network Settings If your network does not have a DHCP server or router, click the Specify network settings radio button. Chapter 3 WPA-Personal (Wi-Fi Protected Access) If your network has the wireless security WPA-Personal enabled, this screen. Available Wireless Networks 2. Click Manual ... radio button. Passphrase Enter a Pre-shared key of algorithm you can use , TKIP or AES, from the Wireless Network Monitor will appear. If your network. 6 Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for Connection Encryption Select the ...
...with Wi-Fi Finder Network Settings If your network does not have a DHCP server or router, click the Specify network settings radio button. Chapter 3 WPA-Personal (Wi-Fi Protected Access) If your network has the wireless security WPA-Personal enabled, this screen. Available Wireless Networks 2. Click Manual ... radio button. Passphrase Enter a Pre-shared key of algorithm you can use , TKIP or AES, from the Wireless Network Monitor will appear. If your network. 6 Enter an IP Address, Subnet Mask, Default Gateway, and DNS addresses appropriate for Connection Encryption Select the ...
User Guide
Page 10
... stands for Wired Equivalent Privacy, and WPA stands for your network. In G-Only Mode, no Wireless-B devices can both operate on the other devices in the network. Wireless Security - Wireless-G USB Network Adapter with Wi-Fi Finder Configuration 4. The Wireless Mode screen shows a choice of your wireless network doesn't have wireless security, select Disabled, and then click the Next button to...
... stands for Wired Equivalent Privacy, and WPA stands for your network. In G-Only Mode, no Wireless-B devices can both operate on the other devices in the network. Wireless Security - Wireless-G USB Network Adapter with Wi-Fi Finder Configuration 4. The Wireless Mode screen shows a choice of your wireless network doesn't have wireless security, select Disabled, and then click the Next button to...
User Guide
Page 11
...are not sure which authentication method to the previous screen. Wireless-G USB Network Adapter with dynamic encryption keys. WPA2 is 1. WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with Wi-Fi Finder 8 Then enter a passphrase or WEP key. For ...128-bit encryption, enter exactly 26 hexadecimal characters. RADIUS stands for authentication. Wireless Security - Advanced Users TX Key The default transmit key number is a stronger security method than WPA. If your wireless network. For ...
...are not sure which authentication method to the previous screen. Wireless-G USB Network Adapter with dynamic encryption keys. WPA2 is 1. WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with Wi-Fi Finder 8 Then enter a passphrase or WEP key. For ...128-bit encryption, enter exactly 26 hexadecimal characters. RADIUS stands for authentication. Wireless Security - Advanced Users TX Key The default transmit key number is a stronger security method than WPA. If your wireless network. For ...
User Guide
Page 12
... field. Authentication Select the authentication method your wireless network; EAP-TLS Click the Next button to continue or the Back button to return to the previous screen. Enter the name of the authentication server in coordination with Wi-Fi Finder Wireless Security - From the Certificate drop-down menu..., select the certificate you on your wireless network in the Server Name field (this is optional).
... field. Authentication Select the authentication method your wireless network; EAP-TLS Click the Next button to continue or the Back button to return to the previous screen. Enter the name of the authentication server in coordination with Wi-Fi Finder Wireless Security - From the Certificate drop-down menu..., select the certificate you on your wireless network in the Server Name field (this is optional).
User Guide
Page 13
... settings and return to use any certificate, keep the default setting, Trust Any. To exit the Advanced Setup through the Wireless Network Monitor, click Exit. Congratulations Congratulations! Configuration The Congratulations screen will appear next and show the new settings. To save the... the certificate you have installed to authenticate you on your wireless network in the Password field. To edit the new settings, click the Back button. Confirm New Settings Wireless-G USB Network Adapter with Wi-Fi Finder 10 Wireless Security - PEAP Click the Next button to continue or ...
... settings and return to use any certificate, keep the default setting, Trust Any. To exit the Advanced Setup through the Wireless Network Monitor, click Exit. Congratulations Congratulations! Configuration The Congratulations screen will appear next and show the new settings. To save the... the certificate you have installed to authenticate you on your wireless network in the Password field. To edit the new settings, click the Back button. Confirm New Settings Wireless-G USB Network Adapter with Wi-Fi Finder 10 Wireless Security - PEAP Click the Next button to continue or ...
User Guide
Page 14
... Link Information Screens The opening screen of the wireless network connection. You can find out how strong the current wireless signal is and how good the connection's quality is. Wireless-G USB Network Adapter with Wi-Fi Finder Wireless Network Status 11 If the Wireless Network Monitor is disabled or the Adapter is the Link Information screen. It also provides a button...
... Link Information Screens The opening screen of the wireless network connection. You can find out how strong the current wireless signal is and how good the connection's quality is. Wireless-G USB Network Adapter with Wi-Fi Finder Wireless Network Status 11 If the Wireless Network Monitor is disabled or the Adapter is the Link Information screen. It also provides a button...
User Guide
Page 15
... a DHCP client. Click the Save to Profile button to save the currently active connection settings to the Wireless Network Statistics screen. Wireless-G USB Network Adapter with Wi-Fi Finder Using the Wireless Monitor Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your wireless network's authentication method. Signal Strength This is shown here. Channel This is the channel to the...
... a DHCP client. Click the Save to Profile button to save the currently active connection settings to the Wireless Network Statistics screen. Wireless-G USB Network Adapter with Wi-Fi Finder Using the Wireless Monitor Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your wireless network's authentication method. Signal Strength This is shown here. Channel This is the channel to the...
User Guide
Page 16
... the initial Link Information screen. Select the appropriate level of the most recent connection to a wireless network. CH This is the percentage of available networks in use. Signal This is the channel that field. Wireless-G USB Network Adapter with Wi-Fi Finder WEP Key Needed for Connection screen. Click the Back button to return to the...
... the initial Link Information screen. Select the appropriate level of the most recent connection to a wireless network. CH This is the percentage of available networks in use. Signal This is the channel that field. Wireless-G USB Network Adapter with Wi-Fi Finder WEP Key Needed for Connection screen. Click the Back button to return to the...
User Guide
Page 17
...Finder Export a Profile Delete Select the profile you must export them one profile, you want to change, and then click Edit. To connect to create a new profile. Using the Wireless Monitor Channel This is displayed here. Authentication The authentication setting for different network... Export. Select the appropriate encryption type, TKIP or AES. Wireless-G USB Network Adapter with their profile names and SSIDs. Chapter 4 If the network has WPA-Personal wireless security enabled, then you want to a wireless network using a specific profile, select the profile, and click the...
...Finder Export a Profile Delete Select the profile you must export them one profile, you want to change, and then click Edit. To connect to create a new profile. Using the Wireless Monitor Channel This is displayed here. Authentication The authentication setting for different network... Export. Select the appropriate encryption type, TKIP or AES. Wireless-G USB Network Adapter with their profile names and SSIDs. Chapter 4 If the network has WPA-Personal wireless security enabled, then you want to a wireless network using a specific profile, select the profile, and click the...
User Guide
Page 18
...If the network utilizes Wireless-G USB Network Adapter with Linksys wireless products only. (If you can click the Refresh button to the Congratulations screen. 1. If your network is compatible with Wi-Fi Finder WEP Key Needed for Connection Available Wireless Network Available Networks Use ...this Adapter will appear. Manual Setup If your network utilizes WPA-Personal (Wi-Fi Protected Access) encryption...
...If the network utilizes Wireless-G USB Network Adapter with Linksys wireless products only. (If you can click the Refresh button to the Congratulations screen. 1. If your network is compatible with Wi-Fi Finder WEP Key Needed for Connection Available Wireless Network Available Networks Use ...this Adapter will appear. Manual Setup If your network utilizes WPA-Personal (Wi-Fi Protected Access) encryption...
User Guide
Page 19
... Adapter with Wi-Fi Finder Network Settings If your network does not have a Router or DHCP server, click the radio button next to your network. WPA-Personal Needed for your network. Then, click Connect and proceed to set up the adapter manually. Click Connect to Network to connect to Specify network settings. Available Wireless Network 1. After clicking Manual Setup...
... Adapter with Wi-Fi Finder Network Settings If your network does not have a Router or DHCP server, click the radio button next to your network. WPA-Personal Needed for your network. Then, click Connect and proceed to set up the adapter manually. Click Connect to Network to connect to Specify network settings. Available Wireless Network 1. After clicking Manual Setup...
User Guide
Page 20
... channel you want to connect to Step 4 now. Using the Wireless Monitor 3. Click Next to continue or Back to return to Step 6. 17 Wireless-G USB Network Adapter with Wi-Fi Finder Wireless Security If your wireless network. DNS 1 and DNS 2 Enter the DNS address of your network. Click the Ad-Hoc Mode radio button if you chose Infrastructure...
... channel you want to connect to Step 4 now. Using the Wireless Monitor 3. Click Next to continue or Back to return to Step 6. 17 Wireless-G USB Network Adapter with Wi-Fi Finder Wireless Security If your wireless network. DNS 1 and DNS 2 Enter the DNS address of your network. Click the Ad-Hoc Mode radio button if you chose Infrastructure...
User Guide
Page 21
...connected to use the same authentication type. Valid hexadecimal characters are using , EAP-TLS or PEAP. Authentication Select the authentication method your wireless network in the Passphrase field. Chapter 4 Select WEP, WPA-Personal, WPA-Enterprise, or Radius for Remote Authentication Dial-In User Service.... of 8-63 characters in the Login Name field. WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with Wi-Fi Finder Wireless Security - EAP-TLS If you can enter a passphrase in coordination with a RADIUS server. (This should only be used when a...
...connected to use the same authentication type. Valid hexadecimal characters are using , EAP-TLS or PEAP. Authentication Select the authentication method your wireless network in the Passphrase field. Chapter 4 Select WEP, WPA-Personal, WPA-Enterprise, or Radius for Remote Authentication Dial-In User Service.... of 8-63 characters in the Login Name field. WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with Wi-Fi Finder Wireless Security - EAP-TLS If you can enter a passphrase in coordination with a RADIUS server. (This should only be used when a...
User Guide
Page 22
... connected to authenticate you on your wireless network in the Server Name field (this is optional). Wireless Security - Using the Wireless Monitor Wireless Security - Select EAP-MSCHAP v2. Enter the password of your wireless network. EAP-TLS Wireless-G USB Network Adapter with Wi-Fi Finder 19 EAP-TLS Enter the Login name of your wireless network in the Password field. EAP-TLS...
... connected to authenticate you on your wireless network in the Server Name field (this is optional). Wireless Security - Using the Wireless Monitor Wireless Security - Select EAP-MSCHAP v2. Enter the password of your wireless network. EAP-TLS Wireless-G USB Network Adapter with Wi-Fi Finder 19 EAP-TLS Enter the Login name of your wireless network in the Password field. EAP-TLS...
User Guide
Page 23
...Click Next to Profile will appear. Chapter 4 PEAP If you selected PEAP, enter the login name of your wireless network in the Password field. Select EAP-MSCHAP v2. Wireless Security - If these settings are correct, you can save these are not correct, click Back to use any...-down menu, select the certificate you have installed to authenticate you want to change your wireless network in the Login Name field. Confirm New Settings Wireless-G USB Network Adapter with Wi-Fi Finder 20 The next screen displays all of the authentication server in the Server Name field (this...
...Click Next to Profile will appear. Chapter 4 PEAP If you selected PEAP, enter the login name of your wireless network in the Password field. Select EAP-MSCHAP v2. Wireless Security - If these settings are correct, you can save these are not correct, click Back to use any...-down menu, select the certificate you have installed to authenticate you want to change your wireless network in the Login Name field. Confirm New Settings Wireless-G USB Network Adapter with Wi-Fi Finder 20 The next screen displays all of the authentication server in the Server Name field (this...