background image

38

Appendix B: Using Windows XP Wireless Zero Configuration

Wireless-G USB Network Adapter with SRX400

2. The screen that appears will show any available wireless network. Select the network you want. Click the 

Connect 

button.

If your network does not have wireless security enabled, go to step 3.

If your network does have wireless security enabled, go to step 4.

3. If your network does not have wireless security enabled, click the 

Connect Anyway

 button to connect the 

Adapter to your network.

NOTE:

Steps 2 and 3 are the instructions and 

screenshots for Windows XP with Service Pack 2 
installed.

Figure B-4: Available Wireless Network

Figure B-5: No Wireless Security

Summary of Contents for WUSB54GX4

Page 1: ...Model No USB Network Adapter Wireless G WUSB54GX4 User Guide WIRELESS GHz 2 4802 11g with SRX400...

Page 2: ...each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table...

Page 3: ...dapter 7 Chapter 5 Using the Wireless Network Monitor 17 Accessing the Wireless Network Monitor 17 Link Information Screens 17 Site Survey 20 Profiles 22 Creating a New Profile 23 Appendix A Troublesh...

Page 4: ...c Mode Settings Screen 11 Figure 4 14 Wireless Security Screen 12 Figure 4 15 Wireless Security WEP Screen 12 Figure 4 16 Wireless Security WPA Personal Screen 13 Figure 4 17 Wireless Security WPA2 Pe...

Page 5: ...5 23 Wireless Security Screen 28 Figure 5 24 Wireless Security WEP Screen 28 Figure 5 25 Wireless Security WPA Personal Screen 29 Figure 5 26 Wireless Security WPA2 Personal Screen 29 Figure 5 27 Wire...

Page 6: ...u through configuring the Adapter to your wireless network settings step by step Use the instructions in this Guide to help you set up and connect the Adapter using the Setup Wizard These instructions...

Page 7: ...ecurity issues regarding wireless networking and measures you can take to help protect your wireless network Appendix D Windows Help This appendix describes how you can use Windows Help for instructio...

Page 8: ...cess point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobi...

Page 9: ...USB adapters for when you want to enjoy USB connectivity Wireless products will also communicate with a wireless print server When you wish to connect your wired network with your wireless network ne...

Page 10: ...er with SRX400 The USB Port The USB Port is where you connect the USB cable The LEDs The USB Network Adapter s LEDs displays information about network activity LINK Green The LINK LED lights up when t...

Page 11: ...r If it does not click the Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Click He...

Page 12: ...s the next screen to appear will be the Available Wireless Network screen This screen provides two options for setting up the Adapter Available Wireless Network Most users should use this option The n...

Page 13: ...4 bit or 128 bit Then enter a passphrase or WEP key Passphrase Enter a passphrase in the Passphrase field so a WEP key is automatically generated The passphrase is case sensitive and should not be lon...

Page 14: ...click Cancel WPA2 Personal Needed for Connection AES is automatically used as the encryption method Enter a passphrase on this screen Passphrase Enter a Passphrase also called a pre shared key of 8 63...

Page 15: ...net Mask on this screen If you are unsure about the Default Gateway and DNS addresses leave these fields empty IP Address This IP Address must be unique to your network Subnet Mask The Adapter s Subne...

Page 16: ...directly without using a wireless router or access point SSID This is the wireless network name that must be used for all the devices in your wireless network It is case sensitive and should be a uni...

Page 17: ...e of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WE...

Page 18: ...the Passphrase field Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen WPA2 Personal WPA2 Personal automatically uses AES which...

Page 19: ...ate you on your wireless network If you want to use any certificate keep the default setting Trust Any Encryption Select the type of algorithm you want to use TKIP or AES PEAP Login Name Enter the log...

Page 20: ...etwork If you want to use any certificate keep the default setting Trust Any PEAP Login Name Enter the login name of your wireless network Password Enter the password of your wireless network Server N...

Page 21: ...uccessfully installed the Congratulations screen will appear Click Connect to Network to connect to your network Click Return to Profiles screen to open the Wireless Network Monitor s Profiles screen...

Page 22: ...and statistics about the current wireless connection To search for available wireless networks click the Site Survey tab To perform configuration changes or create connection profiles click the Profi...

Page 23: ...work s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adap...

Page 24: ...tatistics button was last pressed Bytes Transmitted This shows the number of bytes transmitted from the Adapter in real time since connecting to the wireless network or since the Refresh Statistics bu...

Page 25: ...f the wireless network currently in use Channel This is the channel to which the wireless network devices are set Security The status of the wireless security feature is displayed here MAC Address The...

Page 26: ...assphrase or pre shared key in the Passphrase field To connect to the network click Connect To cancel the connection click Cancel If the network has WPA2 Personal security enabled then you will see th...

Page 27: ...splayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect button N...

Page 28: ...profile Available Wireless Network Most users should use this option The networks available to this Adapter will be listed on this screen You can choose one of these networks and click the Connect bu...

Page 29: ...al security a screen will appear for one of those encryption methods WEP Key Needed for Connection Select the level of encryption you want to use 64 bit or 128 bit Then enter a passphrase or WEP key P...

Page 30: ...eed to the Congratulations screen To cancel the connection click Cancel WPA2 Personal Needed for Connection AES is automatically used as the encryption method Enter a passphrase on this screen Passphr...

Page 31: ...network settings Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about t...

Page 32: ...ut using a wireless router or access point SSID This is the wireless network name that must be used for all the devices in your wireless network It is case sensitive and should be a unique name to hel...

Page 33: ...eless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter mus...

Page 34: ...ld Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen WPA2 Personal WPA2 Personal automatically uses AES which is a stronger encry...

Page 35: ...eless network If you want to use any certificate keep the default setting Trust Any Encryption Select the type of algorithm you want to use TKIP or AES PEAP Login Name Enter the login name of your wir...

Page 36: ...ed to authenticate you on your wireless network If you want to use any certificate keep the default setting Trust Any PEAP Login Name Enter the login name of your wireless network Password Enter the p...

Page 37: ...our hard drive If these settings are not correct click Back to change your settings 6 After the software has been successfully installed the Congratulations screen will appear Click Connect to Network...

Page 38: ...h your motherboard User Guide for more information 2 The USB Network Adapter does not work properly Reinsert the USB Network Adapter into the notebook or desktop s USB port Right click on My Computer...

Page 39: ...that the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one...

Page 40: ...s as signal strength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node...

Page 41: ...transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is r...

Page 42: ...Monitor and select Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Netwo...

Page 43: ...r network does not have wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Conn...

Page 44: ...the Connect button 5 Your wireless network will appear as Connected when your connection is active For more information about wireless networking on a Windows XP computer click the Start button selec...

Page 45: ...y reduce your network performance 7 Change the encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless n...

Page 46: ...ith a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide eno...

Page 47: ...hared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS se...

Page 48: ...of instructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabl...

Page 49: ...device and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information...

Page 50: ...Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that...

Page 51: ...ng storage and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generati...

Page 52: ...network s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address co...

Page 53: ...e address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Inte...

Page 54: ...dBm 17 dBm b 14 dBm g Security Features WPA WPA2 WEP and 802 1x WEP Key Bits 64 128bit Dimensions 4 53 x 3 15 x 0 79 115 mm x 80 mm x 20 mm Unit Weight 2 7 oz 0 077 kg Power 3 3V 5 Certifications FCC...

Page 55: ...ENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may...

Page 56: ...try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to a...

Page 57: ...s Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys...

Page 58: ...53 Appendix H Regulatory Information Wireless G USB Network Adapter with SRX400...

Page 59: ...54 Appendix H Regulatory Information Wireless G USB Network Adapter with SRX400...

Page 60: ...55 Appendix H Regulatory Information Wireless G USB Network Adapter with SRX400...

Page 61: ...56 Appendix H Regulatory Information Wireless G USB Network Adapter with SRX400 For more information visit www linksys com...

Page 62: ...t networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800...

Reviews: