Linksys WUSB200 manual Client computers Ssid and MAC address

Page 66

Wireless-G Business USB Network Adapter with RangeBooster

 

 

Table 1: Alerts

 

 

 

 

Item

Alert

Description

Advice

 

 

 

 

 

 

 

Description:

 

 

 

New wireless client computer is detected.

 

 

New client is detected. For details,

Action:

15

New Client Detected

1. Contact the network administrator and inform the administrator about the new

press the Advice button.

 

 

client computer's SSID and MAC address.

 

 

 

 

 

 

2. The new Client needs to be classified and the classification table needs to be

 

 

 

updated.

 

 

 

 

 

 

 

Description:

 

 

 

Data packets are being transferred at a very slow rate. Possible cause may be a

 

 

 

poor signal reception due to some interference or the client is too far away from

 

 

 

the AP.

16

Low Speed Connection

Connection is at low speed. For details,

 

press the Advice button.

Action:

 

 

 

 

 

1. Check the environment and find possible causes for wireless signal interference,

 

 

 

e.g., a microwave oven or a cordless telephone.

 

 

 

2. Check the MAC association table on the AP for any illegitimate wireless clients.

 

 

 

 

 

 

 

Description:

 

 

 

A Rogue AP is detected doing an illegal action. The AP is using the same SSID and

 

 

 

encryption as the Trusted AP and is trying to crack the client computer's encryption

 

 

 

key. During the decryption process, the AP has a 4-way handshake and if

17

Rogue AP Detected

Rogue AP is detected. For details, press

compromised, the client computer will detect a MIC error, indicating a Rogue AP.

the Advice button.

 

 

 

 

 

 

 

Action:

 

 

 

1. Contact network administrator.

 

 

 

2. Try to physically locate the Access Point.

 

 

 

 

Chapter 6: The Administrative Functions in the Wireless Network Monitor

59

Security Monitor

Image 66
Contents Wireless-G Business USB Network Adapter with RangeBooster How to Use this User Guide Copyright and TrademarksTable of Contents Appendix C Wireless Security Windows XP Wireless Zero ConfigurationList of Figures LEDsCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Introduction WelcomeWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Planning your Wireless Network Network TopologyRoaming Network Layout Getting to Know the Wireless-G Business USB Network Adapter LED IndicatorsStarting the Setup Setup Wizard’s Welcome ScreenConnecting the Adapter Setup Wizard’s License AgreementSetting up the Adapter Available Wireless NetworkWEP WPA-Personal WPA2-PersonalManual Setup 10 Creating a Profile12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS WPA Enterprise EAP-TLS20 Wireless Security Radius EAP-TLS WPA2 EnterpriseRadius Using the Wireless Network Monitors Using the Wireless Network MonitorAccessing the Wireless Network Monitor Link InformationLink Information Wireless Network Status StatusLink Information Wireless Network Statistics StatisticsProfiles Profile InformationCreating a Profile Available Wireless Network Create a New Profile10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap 26 Creating a Profile Manual Setup Congratulations Editing a Profile29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Survey Site InformationTroubleshooting AdministrationAccess Point Account Log in as the Access Points administrator49 Administration Security Monitor Account Administrative Functions in the Wireless Network Monitor ClassificationClassification AP ClassificationAdvanced Settings Trusted MAC AddressesAllowed Vendor List Configuration Allowed Channel Configuration Security MonitorChannel Usage AP Inventory Client InventoryAlert Alerts SummaryAlert List Alert DetailsAdvice 18 Security Monitor Alert AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address Windows Firewall 19 Security Monitor Windows Firewall ScreenAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Can users turn off the pop-up alerts?What is the 802.11b standard? What is ISM band? What is WEP? Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Storage Temp Unit Weight 15 oz 0.061 kg CertificationsOperating Temp Operating HumidityAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information