background image

Wireless A/G USB Network Adapter

Copyright and Trademarks

Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco 
Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2004 Cisco Systems, Inc. All 
rights reserved. Other brands and product names are trademarks or registered trademarks of their respective 
holders. 

This User Guide

The User Guide to the Wireless A/G USB Network Adapter has been designed to make understanding networking 
easier than ever. Look for the following items when reading this guide:

In addition to these symbols, there are definitions for technical terms that are presented like this:

Also, each figure (diagram, screenshot, or other image) is provided with a figure number and description, like 
this:

Figure numbers and descriptions can also be found in the “List of Figures” section in the “Table of Contents”.

This exclamation point means there is a caution or 
warning and is something that could damage your 
property or the Adapter.

word: 

definition.

This checkmark means there is a note of interest and 
is something you should pay special attention to while 
using the Adapter.

This question mark provides you with a reminder about 
something you might need to do while using the Adapter.

Figure 0-1: Sample Figure Description

WUSB54A/G-UG-40924NC KL

Summary of Contents for WUSB54AG

Page 1: ...A Division of Cisco Systems Inc Model No USB Network Adapter Wireless A G WUSB54AG User Guide WIRELESS ...

Page 2: ...ading this guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is s...

Page 3: ... 5 Connecting the Wireless A G USB Network Adapter 12 Connecting the Adapter 12 Using the Adapter s Wall Mount 13 Chapter 6 Using the Wireless Network Monitor 14 Using the Wireless Network Monitor Icon 14 Accessing the Wireless Network Monitor 15 Link Information 15 Site Survey 18 Profiles 19 Creating a New Profile 20 Appendix A Troubleshooting 29 Common Problems and Solutions 29 Frequently Asked ...

Page 4: ...Wireless A G USB Network Adapter Appendix F Warranty Information 43 Appendix G Regulatory Information 44 Appendix H Contact Information 45 ...

Page 5: ...Wizard s Congratulations Screen 11 Figure 5 1 How the Adapter Connects to Your PC 12 Figure 5 2 Adapter s USB Port 12 Figure 5 3 PC s USB Ports 12 Figure 5 4 Using the Wall Mount Step A 13 Figure 5 5 Using the Wall Mount Step B 13 Figure 5 6 Using the Wall Mount Step C 13 Figure 6 1 Wireless Network Monitor Icon 14 Figure 6 2 Windows XP Use Windows XP Wireless Configuration 14 Figure 6 3 Windows X...

Page 6: ... 21 Wireless Security WPA Enterprise Encryption Methods for New Profile 24 Figure 6 22 Wireless Security WPA Enterprise using EAP TLS for New Profile 24 Figure 6 23 Wireless Security WPA Enterprise using EAP PEAP for New Profile 25 Figure 6 24 Wireless Security WPA Enterprise using EAP TTLS for New Profile 25 Figure 6 25 Wireless Security RADIUS using EAP TLS for New Profile 26 Figure 6 26 Wireles...

Page 7: ... 802 11b network standard as well as the Wireless A 802 11a standard And your wireless communications can be protected by 128 bit encryption so your data stays safe The Wireless A G USB Network Adapter s high performance antenna lets you put your computer almost anywhere in the building without the cost and hassle of running cables Once you re connected you can keep in touch with your e mail acces...

Page 8: ...is chapter shows you how to connect the Adapter to your PC Chapter 6 Using the Wireless Network Monitor This chapter explains how to use the Adapter s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some potential problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Wireless Security This appendix discusse...

Page 9: ... A G USB Network Adapter Appendix G Regulatory Information This appendix supplies the Adapter s regulatory information Appendix H Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ... Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal provided that they both share the same channel and SSID Choose a feasible radio channel and optimum access point position Proper access point positioning combined with a clear radio signal will greatly enhance performance Network Layout Linksys wireless access points an...

Page 11: ... wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more information about wireless products ...

Page 12: ...this port and your PC s USB port All power is provided through the USB connection so a power adapter is not needed The LED Indicators The Adapter s LEDs indicate the status of the Adapter s power and wireless connection Power Green The Power LED lights up when the Adapter is adequately powered by the USB connection Link Green The Link LED lights up when the Adapter has an active wireless connectio...

Page 13: ...ot click the Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Install Click the Install button to begin the software installation process User Guide Click the User Guide button to open the PDF file of this User Guide Exit Click the Exit button to exit the Setup Wizard 1 To install th...

Page 14: ...works 4 From the Wireless Settings Advanced screen you will need to choose a type of network Click the Infrastructure Mode radio button if you want your wireless computers to network with computers on your wired network using a wireless access point Click the Ad Hoc Mode radio button if you want multiple wireless computers to network directly with each other In the SSID field enter the SSID of you...

Page 15: ...k Mode Select Mixed Mode if you want to allow Wireless G and Wireless B computers on the network even though network speeds will be reduced For maximum speed select G Only Mode however no Wireless B users will be allowed on the network 6 Select the Encryption method you want to use WEP or WPA Personal WEP stands for Wired Equivalent Privacy If you don t want to use encryption select Disabled and t...

Page 16: ...smit key number 2 3 or 4 select the appropriate number from the TX Key drop down box Authentication The default is set to Auto so it will auto detect for Shared Key or Open System authentication For Shared Key authentication both the sender and the recipient share a WEP key for authentication For Open System authentication the sender and the recipient do not share a WEP key for authentication If y...

Page 17: ...ts to install files Click Next if you are satisfied with your settings or click Back to change any settings 9 After the software has been successfully installed the Congratulations screen will appear Click the Exit button Proceed to Chapter 5 Connecting the Wireless A G USB Network Adapter Figure 4 9 Setup Wizard s Check Settings Screen Figure 4 10 Setup Wizard s Congratulations Screen ...

Page 18: ...a 90º angle from the Adapter This will ensure optimum wireless operating range and performance Congratulations The installation of the Wireless A G Network Adapter is complete If you want to check the link information search for available wireless networks or make additional configuration changes go to Chapter 6 Using the Wireless Network Monitor Figure 5 1 How the Adapter Connects to Your PC NOTE...

Page 19: ...e Wall Mount to the Adapter slide the Wall Mount into the grooves on the back panel of Adapter as shown in Steps A B and C 3 Using the velcro strip on the Adapter s Wall Mount attach the Adapter to the velcro strip on your wall Congratulations The installation of the Wireless A G Network Adapter is complete If you want to check the link information search for available wireless networks or make ad...

Page 20: ...t to view the version information for the driver and Wireless Network Monitor Use Windows XP Wireless Configuration Windows XP only If your computer is running Windows XP then this choice will be available If you want to use Windows XP Wireless Zero Configuration to control the Adapter instead of using the Wireless Network Monitor then select Use Windows XP Wireless Configuration If you want to sw...

Page 21: ... the Site Survey tab To perform configuration changes click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the current connection It also provides a button to click for additional status information Ad Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in ad hoc or inf...

Page 22: ...twork s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS This is the DNS address of the Adapter DHCP Client This displays the Adapter s status as a DHCP client MAC The MAC address of the wireless network s access point is shown he...

Page 23: ...Refresh Statistics button was last pressed Noise Level This shows the level of background noise affecting the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of the wireless signal received by the Adapter Up Time This indicates the length of the most recent connection to a wireless network Total Up Time This indicates the cumulative tot...

Page 24: ...reless security feature is displayed here MAC The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has encryption enabled then you will see a new screen appear From the Securit...

Page 25: ...ryption The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect button New Click the New button to create a new profile See the next section Creating a New Profile for detailed instructions Edit Select a profile and...

Page 26: ... not have a DHCP server click the radio button next to Specify the network settings Enter an IP Address Subnet Mask Default Gateway and DNS address appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS address leave these fields empty Click the Next button to continue or click the Cancel button to return to t...

Page 27: ...ame It must be used for all the devices in your wireless network It is case sensitive It should be a unique name to help prevent others from entering your network 5 The Ad Hoc Mode Settings screen will appear If you chose Infrastructure Mode go to Step 6 now If you chose Ad Hoc Mode select the correct operating channel for your network from the Channel drop down menu Then select the Network Mode f...

Page 28: ...ireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Advanced Users TX Key The default transmit key number is 1 If your network s access ...

Page 29: ...ter a Passphrase that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption Type Passphrase Enter a Passphrase also called a Pre Shared Key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Click the Next button to continue Click the Back button to return to th...

Page 30: ... will require you to select the authentication method your network is using EAP TLS EAP PEAP or EAP TTLS EAP TLS If you select EAP TLS enter the login name of your wireless network in the Login Name field Enter the name of the authentication server in the Server Name field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network Sel...

Page 31: ...pe of encryption TKIP or AES for the Encryption field Click the Next button to continue Click the Back button to return to the previous screen EAP TTLS Enter the Login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Select Validate server cerificate to make sure that the certificate for the server is valid Select the TTLS Prot...

Page 32: ...ate drop down menu select the certificate installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen EAP PEAP If you select EAP PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in...

Page 33: ...Name field Enter the password of your wireless network in the Password field Select Validate server cerificate to make sure that the certificate for the server is valid Select the TTLS Protocol from the drop down menu Click the Next button to continue Click the Back button to return to the previous screen Figure 6 27 Wireless Security RADIUS using EAP TTLS for New Profile ...

Page 34: ...e Back button To exit the Wireless Network Monitor click Exit 9 The Congratulations screen will appear next Click Connect to Network to implement the new settings immediately and return to the Link Information screen Click Return to Profiles Screen to keep the current settings active and return to the Profiles screen You have successfully created a connection profile Figure 6 28 Confirm New Settin...

Page 35: ...r your PC s motherboard 2 The Wireless A G USB Network Adapter does not work properly Follow the steps below until the problem is solved Reinsert the Wireless A G USB Network Adapter into the notebook or desktop s USB port Click Start and select Settings Click Control Panel Double click System Click the Hardware tab Click the Device Manager button You will find the Wireless A G USB Network Adapter...

Page 36: ...1Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11g standard The 802 11g standard states a maximum data transfer rate of 54Mbps and an operating frequency of 2 4GHz Wh...

Page 37: ...e wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transmitter regularly checks the system to determine whether it is in touch with the original access point or whether it should seek a new one When ...

Page 38: ...e or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers Would the information be intercepted while transmitting on air WLAN features two fold protection in security O...

Page 39: ...ce 7 Change the WEP encryption keys periodically To ensure network security steps one through five should be followed at least Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s informa...

Page 40: ...ddresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryp...

Page 41: ...ng with a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between ...

Page 42: ...nstructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing ...

Page 43: ... of a wireless network Adapter A device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A method that uses up to 256 bit key encryption to secure data Backbone The part of a network that connects most of the systems and networks together and handles ...

Page 44: ...uthentication method that uses a combination of digital certificates and another system such as passwords EAP TLS Extensible Authentication Protocol Transport Layer Security A mutual authentication method that uses digital certificates Encryption Encoding data transmitted in a network Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmiss...

Page 45: ...et A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Port The connection point on a computer or networking device used for plugging in cables or adapters RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to c...

Page 46: ...he recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network TKIP Temporal Key Integrity Protocol a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted Topology The physical layout of a network WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a w...

Page 47: ...0 1 1 2 0 Channels 802 11b 802 11g 11 Channels USA Canada 13 Channels Europe 14 Channels Japan 802 11a 8 Channels USA Canada LEDs Power Link Transmit Power 16 dBm Receive Sensitivity 65 dBm 54Mbps 80 dBm 11Mbps Antenna 2 dBi Security Features WEP WPA WEP Key Bits 64 128 bit Dimensions 3 58 x 0 91 x 2 80 91 mm x 23 mm x 71 mm Unit Weight 2 82 oz 0 08 kg Certifications FCC IC 03 Wi Fi A and G ...

Page 48: ... E Specifications Wireless A G USB Network Adapter Operating Temp 32ºF to 104ºF 0ºC to 40ºC Storage Temp 40ºF to 158ºF 0ºC to 70ºC Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 49: ...TIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Links...

Page 50: ...ult a dealer or an experienced radio TV technician for assistance Linksys declares that the Dual Band Wireless A G USB Network Adapter FCC ID Q87 WUSB54AG is limited in channels 1 11 for the 2 4GHz band by the specified firmware which is controlled in the USA FCC Caution Operation within the 5150 to 5250GHz band is restricted to indoor use only FCC Radiation Exposure Statement This equipment compl...

Page 51: ...tworking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization departmen...

Reviews: