User Manual for the NETGEAR 54 Mbps Wireless PC Card WG511v2
A Road Map for ‘How to Get There From Here’
The introduction and adoption of any new technology can be a difficult process. Wireless technology has removed one of the barriers to
To help overcome potential barriers to successfully using wireless networks, the table below identifies how to accomplish such things as connecting to a wireless network, assuring appropriate security measures are taken, browsing the Internet through your wireless connection, exchanging files with other computers and using printers in the combined wireless and wired network.
Table | A Road Map for How to Get There From Here ... |
|
| |||
|
|
|
|
| ||
If I Want To ... ? | What Do I Do? | What’s Needed? | How Do I? |
| ||
Connect to a | 1. | Get the | 1. | A wireless network | To set up the WG511v2, see |
|
wireless | Chapter 3, “Basic Setup” and |
| ||||
| wireless | 2. A computer within the |
| |||
network |
| follow the instructions. |
| |||
| network name |
| operating range of the wireless |
| ||
|
| (SSID) and, if |
| network. | For wireless network range, see |
|
|
| used, the |
|
| “Observe Wireless Location and |
|
|
| wireless |
|
| Range Guidelines” on page |
|
|
| security |
|
| To learn about wireless |
|
|
| settings. |
|
|
| |
|
|
|
| networking technology, see the |
| |
| 2. | Set up the |
|
|
| |
|
|
| Web link to “Wireless |
| ||
|
| WG511v2 with |
|
|
| |
|
|
|
| Communications:” on page |
| |
|
| the settings |
|
|
| |
|
|
|
|
|
| |
|
| from step 1. |
|
|
|
|
|
|
|
|
|
|
|
Protect my | 1. | Enable | 1. A wireless network with | To use wireless security |
| |
wireless | features, see “Using Wireless |
| ||||
| wireless |
| authentication and WEP, WPA, |
| ||
connection from |
| security for the |
| Security Features” on page |
| |
snooping, |
|
| and set up your WG511v2 |
| ||
| wireless |
| encryption enabled. |
| ||
hacking, or |
|
| accordingly. |
| ||
| network. | 2. | Wireless networking |
| ||
information |
|
|
| |||
2. | Set up wireless |
| equipment such as the |
|
| |
theft. |
|
|
| |||
| security for |
| WG511v2 that supports these |
|
| |
|
| your WG511v2 |
| security features. |
|
|
|
| to match the |
|
|
|
|
|
| network. |
|
|
|
|
| 3. | Use Windows |
|
|
|
|
|
| security |
|
|
|
|
|
| features. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Introduction |
|
|
|
| Chapter |
|