background image

A Division of Cisco Systems, Inc.

®

Model No.

PCI Adapter

Wireless-

G

WMP54GS (EU/UK/LA)

User Guide

WIRELESS

with SpeedBooster

GHz

802.11g

2,4

Summary of Contents for WMP54GS EU

Page 1: ...A Division of Cisco Systems Inc Model No PCI Adapter Wireless G WMP54GS EU UK LA User Guide WIRELESS with SpeedBooster GHz 802 11g 2 4...

Page 2: ...In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description...

Page 3: ...or 20 Accessing the Wireless Network Monitor 20 Link Information Screens 20 SecureEasySetup 23 Site Survey 25 Profiles 26 Creating a New Profile 27 Appendix A Troubleshooting 39 Common Problems and So...

Page 4: ...ction 11 Figure 3 13 WPA Personal for Connection 12 Figure 3 14 WPA2 Personal Needed for Connection 12 Figure 3 15 The Congratulations screen 12 Figure 3 16 Available Wireless Network 13 Figure 3 17 N...

Page 5: ...work 28 Figure 4 18 The SecureEasySetup Logo and Location 28 Figure 4 19 SecureEasySetup 28 Figure 4 20 SecureEasySetup complete 29 Figure 4 21 Available Wireless Network 30 Figure 4 22 WEP Key Needed...

Page 6: ...work Monitor Icon 43 Figure B 2 Windows XP Use Windows XP Wireless Configuration 43 Figure B 3 Windows XP Wireless Configuration Icon 43 Figure B 4 Available Wireless Network 44 Figure B 5 No Wireless...

Page 7: ...connected you can keep in touch with your e mail access the Internet and share files and other resources such as printers and network storage with other computers on the network At home you can surf...

Page 8: ...ns as well as frequently asked questions regarding installation and use of the Adapter Appendix B Windows XP Wireless Zero Configuration This chapter instructs you on how to install Window XP Wireless...

Page 9: ...Introduction What s in this Guide Wireless G PCI Adapter with SpeedBooster Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Techni...

Page 10: ...ess point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobil...

Page 11: ...ters PCI Card for your desktop PC and USB Adapters for when you want to enjoy USB connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired...

Page 12: ...appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Click Here to Start Click the Click Here to Start button to begin the software in...

Page 13: ...en your PC case and locate an available PCI slot on the motherboard Check with your computer manufacturer for instructions 3 Slide the PCI Adapter into the PCI slot Make sure that all of its pins are...

Page 14: ...most users Use this option if you already have a network set up with devices that do not have SecureEasySetup The networks available to this Adapter will be listed on this screen You can choose one of...

Page 15: ...router or access point 1 Starting from the Available Wireless Network screen click the SecureEasySetup button on the right hand side 2 You will be asked to locate the SecureEasySetup button on the de...

Page 16: ...ssfully added to the network Repeat this procedure for any additional SecureEasySetup device 4 When SecureEasySetup is complete you may save your configuration to a text file by clicking the Save butt...

Page 17: ...s WPA Personal or WPA2 Personal a screen will appear for those encryption methods WEP Key Needed for Connection Select 64 bit or 128 bit Then enter a passphrase or WEP key Passphrase Enter a passphras...

Page 18: ...ase Enter a Passphrase also called a pre shared key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Then click Connect an...

Page 19: ...es not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP...

Page 20: ...that must be used for all the devices in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click Next to continue or Back to ret...

Page 21: ...exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Passphrase Instead of manually entering a WEP key you can enter a passphrase in the Passphrase field so a WEP key...

Page 22: ...of 8 63 characters in the Passphrase field Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen WPA2 Personal WPA2 Personal offers a...

Page 23: ...wireless network in the Login Name field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network PEAP Enter the Login name of your w...

Page 24: ...n the Login Name field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network PEAP Enter the Login name of your wireless network in...

Page 25: ...en successfully installed the Congratulations screen will appear Click Connect to Network to connect to your network Clicking Return to Profile will open the Wireless Network Monitor s Profiles screen...

Page 26: ...additional status and statistics about the current wireless connection To search for available wireless networks click the Site Survey tab To perform configuration changes or create connection profil...

Page 27: ...etwork s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Ad...

Page 28: ...tatistics button was last pressed Driver Version This shows the version of the Adapter s driver Noise Level This shows the level of background noise affecting the wireless signal A lower reading trans...

Page 29: ...ting the Adapter to such as a wireless router or access point 1 After clicking the SecureEasySetup button you will be asked to locate the SecureEasySetup button on the device with which the Adapter wi...

Page 30: ...t when the Adapter has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device 3 SecureEasySetup is now complete and a configuration profile will has bee...

Page 31: ...on to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has encryption enabled a s...

Page 32: ...displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect butto...

Page 33: ...oth point on the network must feature SecureEasySetup for this to work Available Networks Use this option if you already have a network set up with devices that do not have SecureEasySetup The network...

Page 34: ...screen click the SecureEasySetup button on the right hand side 2 You will be asked to locate the SecureEasySetup button on the device with which the Adapter will be communicating If you are not sure w...

Page 35: ...point when the Adapter has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device 4 SecureEasySetup is now complete and a configuration profile will ha...

Page 36: ...encryption the WEP Key Needed for Connection screen will appear If your network utilizes WPA Personal or WPA2 Personal a screen for that setup will appear WEP Key Needed for Connection Select 64 bit...

Page 37: ...cancel the connection click Cancel WPA2 Personal Needed for Connection Passphrase Enter a Passphrase also called a pre shared key of 8 63 characters in the Passphrase field The longer and more comple...

Page 38: ...not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Ad...

Page 39: ...at must be used for all the devices in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click Next to continue or Back to return...

Page 40: ...imal characters If you are using 128 bit WEP encryption then the key must consist of exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Passphrase Instead of manually...

Page 41: ...ase of 8 63 characters in the Passphrase field Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen WPA2 Personal WPA2 Personal offe...

Page 42: ...ireless network in the Login Name field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network PEAP Enter the Login name of your wir...

Page 43: ...he Login Name field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network PEAP Enter the Login name of your wireless network in the...

Page 44: ...clicking Save Click Next to continue If these settings are not correct click Back to change your settings 6 After the software has been successfully installed the Congratulations screen will appear Cl...

Page 45: ...Adapter if it is installed successfully If you see the yellow exclamation mark the resources are conflicting You will see the status of the Wireless G PCI Adapter If there is a yellow question mark p...

Page 46: ...hat the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one...

Page 47: ...user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and quality as well as the message load currently being carried by ea...

Page 48: ...ing code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in...

Page 49: ...nitor and select Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network...

Page 50: ...etwork does not have wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect...

Page 51: ...wireless network will appear as Connected when your connection is active For more information about wireless networking on a Windows XP computer click the Start button select Help and choose Support E...

Page 52: ...7 Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking pro...

Page 53: ...your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can on...

Page 54: ...be used when a RADIUS server is connected to the Router or other device WPA Radius offers two encryption methods TKIP and AES with dynamic encryption keys RADIUS WEP used in coordination with a RADIU...

Page 55: ...nstructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled W...

Page 56: ...od that uses up to 256 bit key encryption to secure data Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission cap...

Page 57: ...ocol A protocol used to send data over a network IP Address The address used to identify a computer or device on a network ISM band Radio bandwidth utilized in wireless transmissions ISP Internet Serv...

Page 58: ...ifier Your wireless network s name Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number...

Page 59: ...sitivity 80 dBm Modulation 802 11b CCK 11 Mbps DQPSK 2 Mbps DBPSK 1 Mbps 802 11g OFDM Security features WEP WPA and WPA2 WEP key bits 64Bit and 128Bit Dimensions 160 mm x 210 mm x 21 mm Unit Weight 0...

Page 60: ...Y OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific leg...

Page 61: ...Linksys Wireless B and Wireless G products the following CE mark notified body number where applicable and class 2 identifier are added to the equipment Check the CE label on the product to find out w...

Page 62: ...n allen EU Staaten ohne Einschr nkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten Belgium The Belgian Institute f...

Page 63: ...i it it per maggiori dettagli Product Usage Restrictions This product is designed for indoor usage only Outdoor usage is not recommended Any modification or alteration to the product shall void the wa...

Page 64: ...ect Power Output 7 From the pull down menu on the right select the wireless adapter s power output percentage Windows 2000 1 Open the Control Panel 2 Double click Network and Dial Up Connections 3 Sel...

Page 65: ...may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to...

Page 66: ...ratus complies with Canadian ICES 003 RSS210 Cet appareil num rique de la classe B est conforme aux normes NMB 003 et RSS210 du Canada The use of this device in a system operating either partially or...

Page 67: ...com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Portugal...

Reviews: