Linksys WUSB200 manual Wireless-G Business USB Network Adapter with RangeBooster

Page 84

Wireless-G Business USB Network Adapter with RangeBooster

TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network.

Telnet - A user command and TCP/IP protocol used for accessing remote PCs.

TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.

Throughput - The amount of data moved successfully from one node to another in a given time period.

TKIP (Temporal Key Integrity Protocol) - a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted.

Topology - The physical layout of a network.

TX Rate - Transmission Rate.

Upgrade - To replace existing software or firmware with a newer version.

Upload - To transmit a file over a network.

URL (Uniform Resource Locator) - The address of a file located on the Internet.

VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another over the Internet.

WAN (Wide Area Network)- The Internet.

WEP (Wired Equivalent Privacy) - A method of encrypting network data transmitted on a wireless network for greater security.

WLAN (Wireless Local Area Network) - A group of computers and associated devices that communicate with each other wirelessly.

WPA (Wi-Fi Protected Access) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.

Appendix E: Glossary

77

Image 84
Contents Wireless-G Business USB Network Adapter with RangeBooster How to Use this User Guide Copyright and TrademarksTable of Contents Appendix C Wireless Security Windows XP Wireless Zero ConfigurationList of Figures LEDsCreating a Profile WEP Key Needed 43 Editing a Profile Congratulations Introduction WelcomeWhat’s in this User Guide? Wireless-G Business USB Network Adapter with RangeBooster Planning your Wireless Network Network TopologyRoaming Network Layout Getting to Know the Wireless-G Business USB Network Adapter LED IndicatorsStarting the Setup Setup Wizard’s Welcome ScreenConnecting the Adapter Setup Wizard’s License AgreementSetting up the Adapter Available Wireless NetworkWEP WPA-Personal WPA2-PersonalManual Setup 10 Creating a Profile12 Ad-Hoc Mode Settings 14 Wireless Security WPA Personal TLS WPA Enterprise EAP-TLS20 Wireless Security Radius EAP-TLS WPA2 EnterpriseRadius Using the Wireless Network Monitor Accessing the Wireless Network MonitorUsing the Wireless Network Monitors Link InformationLink Information Wireless Network Status StatusLink Information Wireless Network Statistics StatisticsProfiles Profile InformationCreating a Profile Available Wireless Network Create a New Profile10 Creating a Profile WPA-Personal 12 Creating a Profile Manual Setup Network Settings 15 Creating a Profile Manual Setup Wireless Security WEP Using the Wireless Network Monitor Create a New Profile WPA Enterprise WPA2 Enterprise Radius 24 Creating a Profile Manual Setup Wireless Security Leap 26 Creating a Profile Manual Setup Congratulations Editing a Profile29 Editing a Profile Ad Hoc Mode WEP 32 Editing a Profile Wireless Security WPA Personal 35 Editing a Profile Wireless Security WPA Enterprise Peap 37 Editing a Profile Wireless Security WPA2 Enterprise Peap Radius EAP-TLS Leap 43 Editing a Profile Congratulations Site Survey Site InformationTroubleshooting AdministrationAccess Point Account Log in as the Access Points administrator49 Administration Security Monitor Account Administrative Functions in the Wireless Network Monitor ClassificationClassification AP ClassificationAdvanced Settings Trusted MAC AddressesAllowed Vendor List Configuration Allowed Channel Configuration Security MonitorChannel Usage AP Inventory Client InventoryAlert Alerts SummaryAlert List Alert DetailsAdvice 18 Security Monitor Alert AdviceDisassociation attacking Alert Description Advice Legitimate AP Attacks or sniffing AP does not have any encryption Updated Client computers Ssid and MAC address Windows Firewall 19 Security Monitor Windows Firewall ScreenAppendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Can users turn off the pop-up alerts?What is the 802.11b standard? What is ISM band? What is WEP? Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G Business USB Network Adapter with RangeBooster Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Wireless-G Business USB Network Adapter with RangeBooster Appendix F Specifications Unit Weight 15 oz 0.061 kg Certifications Operating TempStorage Temp Operating HumidityAppendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Dual-Band Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information