USER GUIDE Compact Wireless-G USB Network Adapter with SpeedBooster Model: WUSB54GSC
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 1 LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Compact Wireless-G USB Network Adapter with SpeedBooster. With this Adapter, your wireless networking experience will be faster and easier than ever. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer. To help protect your data and privacy, you can use industrial-strength WPA2 encryption to protect your wireless connection.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Configuration Chapter 3 Chapter 3: Advanced Configuration For Windows 2000 and Windows XP users, advanced configuration is performed through the Wireless Network Monitor (the Monitor). Windows Vista users should refer to Appendix B: Windows Vista Wireless Zero Configuration. Link Information The Link Information screen displays network mode, signal strength, and link quality information about the current connection. Click More Information for additional status information.
Configuration Chapter 3 Status This shows the status of the wireless network connection. SSID This is the unique name (SSID) of the wireless network. Wireless Network Statistics The Wireless Networks Statistics screen provides statistics on your current network settings. Wireless Mode This is the mode of the wireless network currently in use. Transfer Rate This is the data transfer rate of the current connection. Channel network.
Configuration Chapter 3 Click Back to return to the initial Link Information screen. Click Status to go to the Wireless Network Status screen. Click Save to Profile to save the currently active connection settings to a profile. Click Refresh to reset the statistics. Connect To connect to one of the networks on the list, select the wireless network, and click Connect.
Configuration Chapter 3 WEP Key 1 If you do not have the Passphrase, enter the WEP key, which must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters (“0” to “9” and “A” to “F”.) For 128‑bit encryption, enter exactly 26 hexadecimal characters. Passphrase Enter the network’s Passphrase (Pre-Shared Key) of 8-63 characters. To connect to the network, click Connect. To cancel the connection, click Cancel.
Configuration Chapter 3 Export Select the profile you want to save in a different location, and click Export. Direct Windows to the appropriate folder, and click Save. Delete Select the profile you want to delete and click Delete. Create a Profile The available networks for the Profile are in the table on the center of the screen by SSID. NOTE: If you want to export more than one profile, you must export them one at a time.
Configuration Chapter 3 WEP If the network has WEP encryption enabled, then you see the WEP Key Needed for Connection screen. Encryption Select the type of algorithm you want to use, TKIP or AES. Passphrase Enter the network’s Passphrase (Pre-shared Key) of 8-63 characters. Click Connect and proceed to step 3. WPA2 Personal If the network has WPA2 Personal security enabled, then you see the WPA2 Personal Needed for Connection screen. WEP Security WEP Select 64-bit or 128-bit encryption.
Configuration Chapter 3 Advanced Setup –– Default Gateway Enter the IP address of your If your network is not listed with the available networks, use Advanced Setup. –– DNS 1 and DNS 2 Enter the DNS address of your network’s Gateway. wired Ethernet network. Click Next to continue, or click Back to return to the previous screen. 3. The Wireless Mode screen shows a choice of two wireless modes. Available Wireless Networks 1.
Configuration Chapter 3 than WPA. RADIUS stands for Remote Authentication Dial-In User Service. Click Next to continue, or click Back to return to the previous screen. Proceed to the section for your security method. WEP Make sure the settings you configure match the settings of your wireless network. Ad-Hoc Mode Settings –– Channel Select the correct channel for your wireless network. If you are unsure about which channel to use, keep the default, Auto.
Configuration Chapter 3 WPA Personal WPA Enterprise WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Configuration Chapter 3 RADIUS PEAP RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS WPA Enterprise - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network.
Configuration Chapter 3 7. The Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. PEAP RADIUS - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network.
Appendix A Troubleshooting Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot. Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. 1. Make sure that the computers are powered on. 2.
Windows Vista Zero Configuration Appendix B Appendix B: Windows Vista Zero Configuration 3. Select your network, and then click Connect. Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon When your mouse pointer hovers over the icon, the status information of your wireless connection appears. 4.
Windows Vista Zero Configuration Appendix B 5. Enter the security key, WEP key, or passphrase (also known as a pre‑shared key), depending on your type of security. Click Connect. 7. This screen appears when you are connected to your network. Select Save this network, if you want to save your settings. Click Close. Secured Network Connected to Network 6. This screen appears while the Adapter connects to your network. Do not cancel, unless you want to end the installation. 8.
Windows Vista Zero Configuration Appendix B 9. This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start > Help and Support. button Your computer is now connected to your wireless network.
Windows XP Wireless Zero Configuration Appendix C Appendix C: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the Adapter, instead of using the Wireless Network Monitor, then right-click the Wireless Network Monitor icon, and select Use Windows XP Wireless Configuration.
Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. 5. Your wireless network will appear as Connected when your connection is active. Wireless Network Connection For more information about wireless networking on a Windows XP computer, click Start > Help > Support.
Specifications Appendix D Appendix D: Specifications Model WUSB54GSC ver. 2 Standards IEEE 802.11g, IEEE 802.11b, USB 1.1 and 2.0 Channels 802.11b / 802.11g 11 Channels (US, Canada) LEDs Link Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps); 802.11g: OFDM Transmitted Power 802.11g: 13 ± / 1.5 dBm (Typical) 802.11b: 16 ± / 1.
Appendix E Appendix E: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix E Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix F Appendix F: Regulatory Information This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE 802.11b or 802.11g operation of this product in the USA is firmware-limited to channels 1 through 11. FCC Statement Safety Notices This device complies with Part 15 of the FCC Rules.
Appendix F Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. il ne doit pas produire de brouillage et 2. il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
Appendix F User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix F Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix F Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix F Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix G Appendix G: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix G used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulatory authority or government agency.
Appendix G freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix G c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix G 4. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix G This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Linksys product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.openssl.org/source/license.html. The OpenSSL toolkit stays under a dual license, i.e.
Appendix G Software License Agreement The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. 1. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.