Linksys WUSB54GC manual Setting Up the Adapter with Available Networks

Page 19

Compact Wireless-G USB Adapter

Setting Up the Adapter with Available Networks

If you’re not setting up the Adapter with SecureEasySetup, another method for setting up the Adapter is with the available networks listed on the Available Wireless Network screen. The available networks are listed in the table on the center of the screen by SSID. Select the wireless network you wish to connect to and click the Connect button. (If you do not see your network listed, you can click the Refresh button to bring the list up again.) If the network utilizes wireless security, you will need to configure security on the Adapter. If not, you will be taken directly to the Congratulations screen.

1.If wireless security has been enabled on this network, you will see a wireless security screen. If your network utilizes WEP (Wired Equivalent Privacy) encryption, the WEP Key Needed for Connection screen will appear. If your network utilizes WPA-Personal (Wi-Fi Protected Access) encryption, the WPA-Personal Needed for Connection screen will appear. If your network utilizes PSK2 (Pre-Shared Key 2) encryption, the PSK2 Needed for Connection screen will appear.

Figure 4-9: Available Wireless Network

encryption: encoding data transmitted in a network.

WEP Key Needed for Connection

Select 64-bit or 128-bit.

Then, enter a passphrase or WEP key.

Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. The passphrase is case-sensitive and should not be longer than 16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)

WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Then, click Connect and proceed to the Congratulations screen. To cancel the connection, click Cancel.

Figure 4-10: WEP Key Needed for Connection

wep (wired equivalent privacy): a method of encrypting network data transmitted on a wireless network for greater security.

Chapter 4: Setting up and Connecting the USB Adapter

12

Setting Up the Adapter

Image 19
Contents 4802GHz.11gWireless-G Copyright and Trademarks How to Use this User GuideTable of Contents Compact Wireless-G USB Adapter Front Panel List of FiguresMore Information Wireless Network Status 39 Leap Welcome IntroductionWhat’s in this Guide? Compact Wireless-G USB Adapter Network Topology Planning your Wireless NetworkRoaming Network Layout Planning your Wireless NetworkLED Indicators Getting to Know the Compact Wireless-G USB AdapterStarting the Setup Wizard Setting up and Connecting the USB AdapterConnecting the Adapter Screen Connecting the AdapterAvailable Wireless Network Setting Up the AdapterSecureEasySetup Logo and Location Setting Up the Adapter with SecureEasySetupChanges, refer to Using the Wireless Network Monitor Encryption encoding data transmitted in a network Setting Up the Adapter with Available Networks12 PSK2 Needed for Connection Changes, refer to Using the Wireless Network Monitor 15 Network Settings Setting Up the Adapter with Manual Setup16 Wireless Mode WEP PSK2 WPA PersonalEAP-TLS WPA EnterpriseRadius Leap 27 Confirm New Settings Accessing the Wireless Network Monitor Using the Wireless Network MonitorLink Information Screens Wireless Network Status Wireless Network Statistics SecureEasySetup Button SecureEasySetupSecureEasySetup is Complete Site Information Site SurveyProfile Information Profiles15 Export a Profile Creating a New Profile19 The SecureEasySetup Logo and Location 21 SecureEasySetup Complete 22 Available Wireless Network 25 PSK2 Needed for Connection 26 The Congratulations Screen 28 Network Settings 31 Wireless Security 32 Wireless Security WEP 33 Wireless Security WPA Personal 35 Wireless Security WPA Enterprise EAP-TLS 37 Wireless Security Radius EAP-TLS 39 Leap 41 The Congratulations Screen Common Problems and Solutions Appendix a TroubleshootingWhat is the Ieee 802.11b standard? Frequently Asked QuestionsWhat is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Figure B-1 Wireless Network Monitor Icon Appendix B Using Windows XP Wireless ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Precautions Appendix C Wireless SecuritySecurity Threats Facing Wireless Networks Appendix C Wireless Security Compact Wireless-G USB Adapter Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Limited Warranty Appendix F Warranty InformationDbpsk 1 Mbps 802.11g Ofdm Appendix G SpecificationsModel StandardsOperating Humidity Storage TempStorage Humidity FCC Statement Appendix H Regulatory InformationCompact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Dual-Band Wireless Access Point Appendix I Contact Information