User's Manual
Table Of Contents
- Chapter 1: Introduction
- Chapter 2: Planning Your Wireless Network
- Chapter 3: Getting to Know the Wireless-G Bridge for Phone Adapters
- Chapter 4: Setting Up and Connecting the Wireless-G Bridge for Phone Adapters
- Appendix A: Troubleshooting
- Appendix B: Wireless Security
- Appendix C: Windows Help
- Appendix D: Glossary
- Appendix E: Specifications
- Appendix F: Warranty Information
- Appendix G: Regulatory Information
- Appendix H: Contact Information
22
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Bridge for Phone Adapters
WPA2. Enter a password in the Passphrase field of 8-63 characters.
Implementing encryption may have a negative impact on your network’s performance, but if you are transmitting
sensitive data over your network, encryption should be used.
These security recommendations should help keep your mind at ease while you are enjoying the most flexible
and convenient technology Linksys has to offer.










