Wireless-G Business USB Network Adapter with RangeBooster
Frequently Asked Questions
Can I run an application from a remote computer over the wireless network?
This will depend on whether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network.
How will the Wireless networking technology help with my business?
Keeping your business connected to the internet and managing networking in your office without wires give you the freedom to create a dynamic office environment that changes and grows as your business needs. The Linksys
How long does it take for intrusions and policy violation events to appear in the alert lists?
Periodic polling is used to report alerts, so the AP and wireless client won’t
Can
Yes, if the administrator enables receive
Can users turn off the pop-up alerts?
What if user a user turns off the Linksys wireless network monitor utility and only uses the Windows
Zero Config to connect to the wireless network?
The user will not be able to enjoy the benefits of the Linksys utility, including participation in classification and security monitoring, which helps the administrator to detect intrusions and policy violations and improve the state of the network. For example, if not using the wireless network monitor utility, the user might compromise the network by inadvertently associating to an Untrusted AP.
My new AP is automatically classified as untrusted when I try to classify using the “Vendor OUI” filter.
Why does this happen?
It is possible that the device is new and the Vendor OUI of the AP was not available when we released our software. In this case, visit the website: http://standards.ieee.org/regauth/oui/index.shtml and add it into the Allowed Vendor List. The Vendor OUI is the three octet (the first 6 digits) of the MAC address.
Appendix A: Troubleshooting | 62 |
Frequently Asked Questions