User Manual for the NETGEAR 54 Mbps Wireless USB 2.0 Adapter WG111
Table | A Road Map for How to Get There From Here |
| |||
|
|
|
| ||
|
|
|
| ||
If I Want To? | What Do I Do? | What’s Needed? | How Do I? | ||
Connect to a | 1. | Identify the | 1. A wireless network | To set up the WG111, see | |
wireless | Chapter 3, “Basic Setup” and | ||||
| wireless network | 2. A PC within the operating | |||
network |
| follow the instructions provided. | |||
| name (SSID) and, | ||||
| range of the wireless | ||||
|
|
| |||
|
| if used, the |
| ||
|
| network. For guidelines | To learn about wireless | ||
|
| wireless security | |||
|
| about the range of | |||
|
| networking technology, see | |||
|
| settings. | |||
|
| wireless networks, see | |||
|
| Appendix , “Wireless Networking | |||
| 2. | Set up the | |||
| “Observing Location and | ||||
| Overview” for a general | ||||
|
| NETGEAR 54 | Range Guidelines” on | ||
|
| introduction. | |||
|
| Mbps Wireless | page | ||
|
|
| |||
|
| USB 2.0 Adapter |
|
| |
|
| WG111 with the |
|
| |
|
| settings from step |
|
| |
|
| 1. |
|
| |
|
|
|
|
| |
Protect my | 1. | Assure that the | 1. A wireless network with | To learn about wireless | |
wireless | networking security, see | ||||
| wireless network | authentication and WEP | |||
connection from |
| “Authentication and WEP” on | |||
| has security | encryption enabled. | |||
snooping, |
| page | |||
| features enabled. | 2. Wireless networking | |||
hacking, or |
|
| |||
2. | Configure my |
| |||
equipment that supports |
| ||||
information | To use WEP security features, | ||||
| WG111 with the | WEP encryption, such as | |||
theft. |
| see “Enabling Wireless Security | |||
| security settings of | the WG111 and all | |||
|
| Features” on page | |||
|
| the wireless | NETGEAR wireless | ||
|
| configure your WG111 | |||
|
| network. | networking products. | ||
|
| accordingly. | |||
| 3. | Use Windows |
| ||
|
|
| |||
|
| security features. |
|
| |
| |||||
Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers | |||||
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in | |||||
addition to those already in place on secure Internet sites. |
| ||||
|
|
|
|
|
Introduction |