User Manual for the NETGEAR 54 Mbps Wireless USB 2.0 Adapter WG121
Table | A Road Map for How to Get There From Here |
| |||
|
|
|
| ||
|
|
|
| ||
If I Want To? | What Do I Do? | What’s Needed? | How Do I? | ||
Connect to a | 1. | Identify the | 1. A wireless network | To set up the WG121, see | |
wireless | Chapter 3, “Basic Setup” and | ||||
| wireless | 2. A PC within the operating | |||
network |
| follow the instructions provided. | |||
| network name | ||||
| range of the wireless network. | ||||
|
|
| |||
|
| (SSID) and, if |
| ||
|
| For guidelines about the range | To learn about wireless | ||
|
| used, the | |||
|
| of wireless networks, see | networking technology, see | ||
|
| wireless | |||
|
| “Observing Location and | |||
|
| Appendix B, “Wireless | |||
|
| security | |||
|
| Range Guidelines” on | |||
|
| Networking Basics” for a | |||
|
| settings. | |||
|
| page | |||
|
| general introduction. | |||
| 2. | Set up the | |||
|
| ||||
|
|
| |||
|
| NETGEAR 54 |
|
| |
|
| Mbps Wireless |
|
| |
|
| USB 2.0 |
|
| |
|
| Adapter |
|
| |
|
| WG121 with |
|
| |
|
| the settings |
|
| |
|
| from step 1. |
|
| |
|
|
|
|
| |
Protect my | 1. | Assure that the | 1. A wireless network with | To learn about wireless | |
wireless | networking security, see | ||||
| wireless | authentication and WEP | |||
connection from |
| “Authentication and WEP” on | |||
| network has | encryption enabled. | |||
snooping, |
| page | |||
| security | 2. Wireless networking | |||
hacking, or |
|
| |||
| features |
| |||
| equipment that supports WEP |
| |||
information |
| To use WEP security features, | |||
| enabled. | ||||
| encryption, such as the | ||||
theft. |
| see “Enabling Wireless Security | |||
2. | Configure my | ||||
WG121 and all NETGEAR | |||||
| Features” on page | ||||
|
| WG121 with | wireless networking products. | ||
|
| configure your WG121 | |||
|
| the security |
| ||
|
|
| accordingly. | ||
|
| settings of the |
| ||
|
|
|
| ||
|
| wireless |
|
| |
|
| network. |
|
| |
| 3. | Use Windows |
|
| |
|
| security |
|
| |
|
| features. |
|
| |
| |||||
Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers | |||||
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in | |||||
addition to those already in place on secure Internet sites. |
| ||||
|
|
|
|
|
Introduction |