Wireless-G Business USB Network Adapter with RangeBooster

Frequently Asked Questions

Can I run an application from a remote computer over the wireless network?

This will depend on whether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network.

How will the Wireless networking technology help with my business?

Keeping your business connected to the internet and managing networking in your office without wires give you the freedom to create a dynamic office environment that changes and grows as your business needs. The Linksys Wirelees–G Business Notebook Adapter will not only let you communicate sensitive data in a wireless setting, but also give you the security and management options within your monitored networks. We designed our wireless products to be simple to set up with the advances of the latest data encryption methods and Security Monitor functions.

How long does it take for intrusions and policy violation events to appear in the alert lists?

Periodic polling is used to report alerts, so the AP and wireless client won’t over-burdened. It may take up to five minutes for the alert to appear in the alert lists.

Can non-administrative users have pop-up alerts appear on their screens?

Yes, if the administrator enables receive pop-up alerts on the users’ wireless network monitors.

Can users turn off the pop-up alerts?

Pop-up alerts are disabled by default and are enabled by the administrator on other stations to aid him in monitoring the airspace. Only someone with administrative rights or a designate of the administrator can turn off the pop-up alerts.

What if user a user turns off the Linksys wireless network monitor utility and only uses the Windows

Zero Config to connect to the wireless network?

The user will not be able to enjoy the benefits of the Linksys utility, including participation in classification and security monitoring, which helps the administrator to detect intrusions and policy violations and improve the state of the network. For example, if not using the wireless network monitor utility, the user might compromise the network by inadvertently associating to an Untrusted AP.

My new AP is automatically classified as untrusted when I try to classify using the “Vendor OUI” filter.

Why does this happen?

It is possible that the device is new and the Vendor OUI of the AP was not available when we released our software. In this case, visit the website: http://standards.ieee.org/regauth/oui/index.shtml and add it into the Allowed Vendor List. The Vendor OUI is the three octet (the first 6 digits) of the MAC address.

Appendix A: Troubleshooting

62

Frequently Asked Questions

Page 69
Image 69
Linksys WUSB200 manual Frequently Asked Questions, Can users turn off the pop-up alerts?