Linksys WUSBF54G User Manual

Linksys WUSBF54G User Manual

Wireless-g usb network adapter with wi-fi finder
Hide thumbs Also See for WUSBF54G:

Advertisement

USER GUIDE
Wireless-G USB Network
Adapter with Wi-Fi Finder
WUSBF54G
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WUSBF54G

  • Page 1 USER GUIDE Wireless-G USB Network Adapter with Wi-Fi Finder WUSBF54G Model:...
  • Page 2: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........1 Side Panels.
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Side Panels Product Overview Thank you for choosing the Wireless-G USB Network Adapter with Wi-Fi Finder. This Adapter allows for greater range and mobility within your wireless network. Connecting to your PC via the USB port means that this Adapter leaves the PC’s slots open for other purposes.
  • Page 5: Lcd Screen

    Product Overview Chapter 1 LCD Screen Channel Wireless Mode Security Status Battery Power Status Scan Modes Wireless Network Name Number of Available Wireless Networks Wireless-G USB Network Adapter with Wi-Fi Finder...
  • Page 6: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 7: Chapter 3: Configuration

    Configuration Chapter 3 Chapter 3: After reading the License Agreement, click the Next button if you agree and want to continue the Configuration installation, or click the Cancel button to end the installation. The Wireless-G USB Network Adapter with Wi-Fi Finder is set up with the Setup Wizard that comes on the CD enclosed with the Adapter.
  • Page 8: Setting Up The Adapter

    Configuration Chapter 3 Setting up the Adapter Available Wireless Networks The available networks are listed in the table on the The next screen to appear will be the Available Wireless center of the screen by Wireless Network Name. Select Networks screen. It provides two options for setting up the wireless network you wish to connect to and click the Adapter.
  • Page 9 Configuration Chapter 3 Manual Setup WPA-Personal (Wi-Fi Protected Access) If your network has the wireless security WPA-Personal If your network is not listed with the available networks, enabled, this screen will appear. you can use Manual Setup. Click Manual Setup on the Available Wireless Network screen to set up the Adapter manually.
  • Page 10 Configuration Chapter 3 Subnet Mask The Adapter’s Subnet Mask must be If you chose Infrastructure Mode, go to step 5 now. the same as your wired network’s Subnet Mask. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Default Gateway Enter the IP address of your network’s Gateway here.
  • Page 11 Configuration Chapter 3 WPA2 stands for Wi-Fi Protected Access 2. WPA is a Authentication The default is set to Auto, so it will auto- stronger security method than WEP. WPA2 is a stronger detect for Shared Key or Open System authentication. security method than WPA.
  • Page 12 Configuration Chapter 3 WPA Enterprise WPA Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP. Authentication Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 13 Configuration Chapter 3 PEAP The Congratulations screen will appear next. Click Connect to Network to implement the new settings and return to If you selected PEAP, enter the login name of your wireless the Link Information screen. Click Return to Profiles to network in the Login Name field.
  • Page 14: Chapter 4: Using The Wireless Monitor

    Using the Wireless Monitor Chapter 4 Chapter 4: Link Information Using the Wireless Monitor The Link Information screen displays network mode, signal strength, and link quality information about the current connection. It also provides a button to click for additional Use the Wireless Network Monitor to check the link status information.
  • Page 15 Using the Wireless Monitor Chapter 4 Wireless Network Statistics Status This shows the status of the wireless network connection. The Wireless Networks Statistics screen provides statistics SSID This is the unique name of the wireless network. on your current network settings. Wireless Mode The mode of the wireless network currently in use is displayed here.
  • Page 16 Using the Wireless Monitor Chapter 4 Up Time This indicates the length of the most recent Channel This is the channel to which the wireless network connection to a wireless network. devices are set. Total Up Time Security This indicates the cumulative total of the The status of the wireless security feature is Adapter’s connection time.
  • Page 17: Profiles

    Using the Wireless Monitor Chapter 4 If the network has WPA-Personal wireless security enabled, Channel This is the channel to which the wireless network then you will see the WPA-Personal Needed for Connection devices are set. screen. Select the appropriate encryption type, TKIP or Security The status of the wireless security feature is AES.
  • Page 18 Using the Wireless Monitor Chapter 4 Creating a New Profile wireless security, you will need to configure security on the Adapter. If not, you will be taken directly to the On the Profiles screen, click the New button to create a Congratulations screen.
  • Page 19 Using the Wireless Monitor Chapter 4 Setting Up the Adapter with Manual Setup WPA-Personal Needed for Connection If your network is not listed among the available networks, click Manual Setup on the Available Wireless Network screen to set up the adapter manually. WPA-Personal Needed for Connection Encryption Select the type of algorithm you want...
  • Page 20 Using the Wireless Monitor Chapter 4 Default Gateway Enter the IP address of your If you chose Infrastructure Mode, go to Step 4 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings network’s Gateway here. screen will appear. DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network here.
  • Page 21 Using the Wireless Monitor Chapter 4 Select WEP, WPA-Personal, WPA-Enterprise, or Authentication The default is set to Auto, where it Radius for the Encryption Method. WEP stands auto-detects for Shared Key or Open system. Shared for Wired Equivalent Privacy, WPA stands for Wi-Fi Key is when both the sender and the recipient share Protected Access, which is a security standard stronger a WEP key for authentication.
  • Page 22 Using the Wireless Monitor Chapter 4 field (this is optional). From the Certificate drop-down Wireless Security - WPA Enterprise - PEAP menu, select the certificate you have installed to Click the Next button to continue or the Back button authenticate you on your wireless network. Select the to return to the previous screen.
  • Page 23 Using the Wireless Monitor Chapter 4 PEAP After the software has been successfully installed, the Congratulations screen will appear. Click Connect to If you selected PEAP, enter the login name of your Network to connect to your network. Clicking Return wireless network in the Login Name field.
  • Page 24: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: LAN (local area network). Refer to the game’s user guide for more information. Troubleshooting What is the IEEE 802.11b standard? It is one of the IEEE standards for wireless networks. The This appendix provides solutions to problems usually 802.11b standard allows wireless networking hardware encountered during the installation and operation of from different manufacturers to communicate, provided...
  • Page 25 Troubleshooting Appendix A What is infrastructure mode? is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread- When a wireless network is set to infrastructure mode, spectrum signal being broadcast. If a receiver is not tuned the wireless network is configured to communicate with a to the right frequency, a spread-spectrum signal looks wired network through a wireless access point.
  • Page 26: Appendix B: Specifications

    Specifications Appendix B Appendix B: Specifications Model WUSBF54G Standards IEEE 802.11b, 802.11g, USB 1.1, USB 2.0 Channels 11 Channels (US, Canada) 13 Channels (Europe) 14 Channels (Japan) LEDs Power, Link Transmitted Power 18dBm (Typical)@11Mbps 16dBm (Typical)@54Mbps Receive Sensitivity -73dBm (Typical)@54Mbps,...
  • Page 27: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 28 Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 29: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: Safety Notices Regulatory Information Caution: To reduce the risk of fire, use only No.26 AWG • or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
  • Page 30: Avis D'industrie Canada

    Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 31: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 32 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 33 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 34 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme, que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom –...
  • Page 35: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 36 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 37 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 38 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 39 Software License Agreement Appendix E If, as a consequence of a court judgment or allegation not specify a version number of this License, you of patent infringement or for any other reason (not may choose any version ever published by the Free limited to patent issues), conditions are imposed on Software Foundation.
  • Page 40 Software License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 41 Software License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate and modification follow.
  • Page 42 Software License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
  • Page 43 Software License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
  • Page 44 Software License Agreement Appendix E software distributed through that system in reliance BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, on consistent application of that system; it is up to THERE IS NO WARRANTY FOR THE LIBRARY, TO THE the author/donor to decide if he or she is willing to EXTENT PERMITTED BY APPLICABLE LAW.
  • Page 45 Software License Agreement Appendix E OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All reserved. rights reserved. Redistribution and use in source and binary forms, with This package is an SSL implementation written by Eric or without modification, are permitted provided that the Young (eay@cryptsoft.com).
  • Page 46 Software License Agreement Appendix E DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Table of Contents