Linksys
Network Router
specifications
List of Figures
Troubleshooting
Specification
Password
Appendix B Wireless Security
The Setup Tab
How to
What is
Safety
Power
Page 3
Page 2
Page 4
Image 3
Page 2
Page 4
Contents
How to Use this Guide
Copyright and Trademarks
word definition
Table of Contents
List of Figures
adapter - a device that adds network functionality to your PC
Chapter 1 Introduction
Welcome
router - a networking device that connects multiple networks together
What’s in this Guide?
This appendix supplies the Range Expander’s regulatory information
Appendix F Warranty Information
This appendix supplies the Range Expander’s warranty information
Appendix G Regulatory Information
Roaming
Chapter 2 Planning your Wireless Network
SSID your wireless networks name
Network Topology
Network Layout
no network with which to connect, this light will appear red
Chapter 3 Getting to Know the Wireless-G Range Expander
Power
when there is network activity
The Power Plate
Figure 3-3 The Two Prong Power Plate Figure 3-2 The Power Plate
with Cord
tcp/ip a set of instructions PCs use to communicate over a network
Chapter 4 Connecting the Wireless-G Range Expander
Wall Mounting
Chapter 5 Setting Up the Wireless-G Range Expander
Figure 5-2 Connecting to an access point
Click the Next button to continue or Exit to exit the Setup Wizard
bit - a binary digit
Figure 5-11 The Confirm New Settings screen
Overview
Chapter 6 Configuring the Wireless-G Range Expander
subnet mask an address code that determines the size of the network
The Setup Tab
Basic Setup
firmware the programming code that runs a networking device
Figure 6-3 WEP Security screen
encryption encoding data transmitted in a network
software instructions for the computer
download to receive a file transmitted over a network
Password
Help
upgrade to replace existing software or firmware with a newer version
What IEEE 802.11b features are supported?
Appendix A Troubleshooting
Common Problems and Solutions
Frequently Asked Questions
What is ISM band?
What is Ad-hoc?
What is Infrastructure?
What is Roaming?
What is WEP?
What is Spread Spectrum?
What is DSSS? What is FHSS? And what are their differences?
Can Linksys Wireless products support file and printer sharing?
How do I reset the Range Expander?
How do I resolve issues with signal loss?
How do I avoid interference?
Appendix B Wireless Security
Security Precautions
Security Threats Facing Wireless Networks
SSID. There are several things to keep in mind about the SSID
WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99,999 seconds, which instructs the Router or other device how often it should change the encryption keys
Appendix C Upgrading Firmware
Network Neighborhood/My Network Places
Appendix D Windows Help
TCP/IP
Shared Resources
Appendix E Glossary
Encryption - Encoding data transmitted in a network
Router - A networking device that connects multiple networks together
Appendix F Specifications
Appendix G Warranty Information
Appendix H Regulatory Information
EN 609 50 Safety
An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. Connection to the telephone network should be made by using the standard modular telephone jack
Appendix H Regulatory Information
Appendix I Contact Information
Range Expander
2.4 802 GHz .11g Wireless- G
WIRELESS
User Guide
Related pages
Troubleshooting Flowcharts for Generac Power Systems 65
Section VII Burner Specifications for Burnham FM01FD00B
Caller ID Error Message for RCA Model 28301
Test flowchart for Fujitsu MAW3147NC/NP
Display does not change when keys or icons are pressed for Sharp AR-810
Rack Installation for TP-Link TL-SL1226
Pump Parts List for Harbor Freight Tools 65322
Language Code List for Sony D-VE7000S
Nonsequential read operation performed with one RAM access for ARM R4F
Temperatures for Creda S150E
How can I verify the trustpoint label with
crypto pki authenticate
?
Top
Page
Image
Contents