background image

41

Appendix F: Warranty Information

Wireless-G USB Network Adapter with SpeedBooster

Appendix F: Warranty Information

LIMITED WARRANTY

Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be 
substantially free of defects in materials and workmanship under normal use.  Your exclusive remedy and 
Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or 
refund Your purchase price less any rebates.  This limited warranty extends only to the original purchaser.  

If the Product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a 
Return Authorization Number, if applicable.  BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN 
CALLING.  If You are requested to return the Product, mark the Return Authorization Number clearly on the outside 
of the package and include a copy of your original proof of purchase.  RETURN REQUESTS CANNOT BE 
PROCESSED WITHOUT PROOF OF PURCHASE.  You are responsible for shipping defective Products to Linksys.  
Linksys pays for UPS Ground shipping from Linksys back to You only.  Customers located outside of the United 
States of America and Canada are responsible for all shipping and handling charges. 

ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE 
ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD.  ALL OTHER EXPRESS OR IMPLIED CONDITIONS, 
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE 
DISCLAIMED.  Some jurisdictions do not allow limitations on how long an implied warranty lasts, so the above 
limitation may not apply to You.  This warranty gives You specific legal rights, and You may also have other rights 
which vary by jurisdiction.

This warranty does not apply if the Product (a) has been altered, except by Linksys, (b) has not been installed, 
operated, repaired, or maintained in accordance with instructions supplied by Linksys, or (c) has been subjected 
to abnormal physical or electrical stress, misuse, negligence, or accident.  In addition, due to the continual 
development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the 
Product will be free of vulnerability to intrusion or attack.

TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE 
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF 
THE THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY 
TO USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF 
SUCH DAMAGES.  IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.  
The foregoing limitations will apply even if any warranty or remedy provided under this Agreement fails of its 
essential purpose.  Some jurisdictions do not allow the exclusion or limitation of incidental or consequential 
damages, so the above limitation or exclusion may not apply to You.

Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623.

Summary of Contents for WUSB54GS

Page 1: ...A Division of Cisco Systems Inc Model No USB Network Adapter Wireless G WUSB54GS ver 2 User Guide WIRELESS GHz 2 4802 11g with SpeedBooster ...

Page 2: ...ed like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning and is something that could damage your property or the Wireless G USB Network Adapter This checkmark means ther...

Page 3: ...ireless Network Monitor 15 Using the Wireless Network Monitor Icon 15 Accessing the Wireless Network Monitor 16 Link Information 16 Site Survey 19 Profiles 20 Creating a New Profile 21 Appendix A Troubleshooting 28 Common Problems and Solutions 28 Frequently Asked Questions 29 Appendix B Wireless Security 32 Security Precautions 32 Security Threats Facing Wireless Networks 32 Appendix C Windows He...

Page 4: ...ws XP Digital Signature Screen 11 Figure 3 13 The Congratulations Screen 12 Figure 4 1 The Adapter s USB Port 13 Figure 4 2 A USB Port 13 Figure 4 3 The New Hardware Wizard 13 Figure 4 4 The Windows 2000 Digital Signature Screen 14 Figure 4 5 The Windows XP Digital Signature Screen 14 Figure 5 1 Wireless Network Monitor Icon 15 Figure 5 2 Windows XP Use Windows XP Wireless Configuration 15 Figure ...

Page 5: ...rofile 23 Figure 5 19 Wireless Security WEP for New Profile 23 Figure 5 20 Wireless Security PSK for New Profile 24 Figure 5 21 Wireless Security PSK RADIUS Using EAP TLS for New Profile 25 Figure 5 22 Wireless Security PSK RADIUS Using EAP PEAP for New Profile 25 Figure 5 23 Wireless Security RADIUS Using EAP TLS for New Profile 26 Figure 5 24 Wireless Security RADIUS Using EAP PEAP for New Profi...

Page 6: ...rom different computers and access data located on another computer s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs equipped with wireless cards and adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless networ...

Page 7: ...hapter show you how to use the Adapter s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network Appendix...

Page 8: ...roduction What s in this Guide Wireless G USB Network Adapter with SpeedBooster Appendix H Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 9: ...ge for two wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they...

Page 10: ...B connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more ...

Page 11: ...all the Wireless Network Monitor and driver as well as configure the Adapter 1 Insert the Setup Wizard CD ROM into your CD ROM drive The Setup Wizard should run automatically and the Welcome screen should appear If it does not click the Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive IMPORTANT You must run the Setup Wizard to install ...

Page 12: ... SSID Service Set Identifier The SSID is your network name and must be identical for all devices in the network The default setting is linksys all lowercase Next choose a wireless mode Click the Infrastructure Mode radio button if you want your wireless computers to network with computers on your wired network using an access point Click the Ad Hoc Mode radio button if you want multiple wireless c...

Page 13: ...nel set on the other devices in your wireless network If you are unsure about which channel to use select the default channel Channel 6 Network Mode Keep the default setting Mixed if you have Wireless G and Wireless B devices in your network Select G Only if you have only Wireless G devices in your network 5 Select the type of security you want to use from the first Wireless Security screen The ch...

Page 14: ...ly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Transmit Key The default transmit key number is 1 If your network s access point or wireless router uses transmit key number 2 3 or 4 select the appropriate number from the Transmit Key drop down box Authentication The default is set to Auto where it auto detects for Shared Key or Open system Shared Key is when both th...

Page 15: ...cate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue Click the Back button to return to the previous screen RADIUS RADIUS features use of a RADIUS server This should only be used when a RADIUS server is connected to the Router RADIUS offers two authentication types EAP TLS...

Page 16: ...settings or click the Back button to change any settings 7 At this point a screen stating that a digital signature was not found may appear This software has been tested and found to work properly with Windows 2000 and XP Click the Yes or Continue Anyway button to continue installation Figure 3 10 The Check Settings Screen Figure 3 11 The Windows 2000 Digital Signature Screen Figure 3 12 The Windo...

Page 17: ...ter 8 After the files have been successfully copied the Congratulations screen will appear Click the Exit button Now that the software installation is complete proceed to Chapter 4 Connecting the Wireless G USB Network Adapter Figure 3 13 The Congratulations Screen software instructions for the computer ...

Page 18: ...USB port 2 Once you ve connected the Adapter Windows XP users may see a New Hardware Wizard appear for the installation of drivers into your operating system Make sure the Recommended radio button is selected and click the Next button Figure 4 1 The Adapter s USB Port Figure 4 2 A USB Port port the connection point on a computer or networking device used for plugging in a cable or an adapter Figur...

Page 19: ... the Wireless G USB Network Adapter is complete If you want to check the link information search for available wireless networks or make additional configuration changes proceed to Chapter 5 Using the Wireless Network Monitor The LED Indicators The Adapter s LEDs indicate the status of the Adapter s power and wireless connection Power Green The Power LED lights up when the Adapter is adequately po...

Page 20: ...ck About to view the version information for the driver and Wireless Network Monitor Use Windows XP Wireless Configuration Windows XP only If your computer is running Windows XP this choice will be available If you want to use Windows XP Wireless Zero Configuration to control the Adapter instead of using the Wireless Network Monitor select Use Windows XP Wireless Configuration If you want to switc...

Page 21: ...ks click the Site Survey tab To perform configuration changes click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the current connection It also provides a button to click for additional status information Ad Hoc Mode or Infrastructure Mode The screen indicates whether the Adapter is currently working in ad ho...

Page 22: ...ireless network s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS This is the DNS address of the Adapter DHCP Client This displays the Adapter s status as a DHCP client MAC The MAC address of the wireless network s access point i...

Page 23: ... translates into a higher quality signal Signal Strength This is the intensity of the wireless signal received by the Adapter Up Time This indicates the length of the most recent connection to a wireless network Total Up Time This indicates the cumulative total of the Adapter s connection time Firmware Version This shows the version of the Adapter s firmware Signal Strength The Signal Strength bar...

Page 24: ...y feature is displayed here MAC The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the network has encryption enabled then you will see a new screen appear From the Security drop down me...

Page 25: ...Security The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect button New Click the New button to create a new profile See the next section Creating a New Profile for detailed instructions Edit Select a profile an...

Page 26: ...twork does not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS address appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS address leave these fields empty Click the Next button to continue or click the Cancel button to retur...

Page 27: ...etwork name It must be used for all the devices in your wireless network It is case sensitive It should be a unique name to help prevent others from entering your network 5 The Ad Hoc Mode Settings screen will appear If you chose Infrastructure Mode go to Step 6 now If you chose Ad Hoc Mode select the correct operating channel for your network from the Channel drop down menu Then select the Networ...

Page 28: ... and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F ...

Page 29: ... enter a Passphrase that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption Type Passphrase Enter a Passphrase also called a Pre Shared Key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase is the more secure your network will be Click the Next button to continue Click the Back button to return to...

Page 30: ...down menu select the certificate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES for the Encryption field Click the Next button to continue Click the Back button to return to the previous screen EAP PEAP If you selected EAP PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network...

Page 31: ...te drop down menu select the certificate you have installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen EAP PEAP If you selected EAP PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication...

Page 32: ...click the Back button To exit the Wireless Network Monitor click Exit 9 The Congratulations screen will appear next Click Connect to Network to implement the new settings immediately and return to the Link Information screen Click Return to Profiles Screen to keep the current settings active and return to the Profiles screen You have successfully created a connection profile Figure 5 25 Confirm Ne...

Page 33: ...etwork Adapter does not work properly Reinsert the USB Network Adapter into the notebook or desktop s USB port Right click on My Computer and select Properties Select the Adapter then chose the Device Manager tab and click on the Network Adapter You will find the USB Network Adapter if it is installed successfully If you see a yellow exclamation mark the resources may be conflicting and you must f...

Page 34: ... the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11g stand...

Page 35: ...rength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transmitter r...

Page 36: ...undant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS ...

Page 37: ...ance 7 Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps yo...

Page 38: ...ent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2 Use Shared Key authentication 3 Change your WEP key regularly WPA Wi Fi Protected Access WPA is the newe...

Page 39: ...ed to the Router or other device WPA RADIUS offers two encryption methods TKIP and AES with dynamic encryption keys Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network encryption should be used These security recommendations should help keep your mind at ease while you are enjoying the most flexible and conve...

Page 40: ...uctions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shar...

Page 41: ...nd networks together and handles the most data Bandwidth The transmission capacity of a given device or network Bit A binary digit CSMA CA Carrier Sense Multiple Access Collision Avoidance A method of data transfer that is used to prevent data loss in a network CTS Clear To Send A signal sent by a device to indicate that it is ready to receive data Default Gateway A device that forwards Internet t...

Page 42: ... institute that develops networking standards Infrastructure Mode Configuration in which a wireless network is bridged to a wired network via an access point IP Internet Protocol A protocol used to send data over a network IP Address The address used to identify a computer or device on a network ISM band Radio band used in wireless networking transmissions ISP Internet Service Provider A company t...

Page 43: ...ternet RTS Request To Send A packet sent when a computer has data to transmit The computer will wait for a CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services Software Instructions for the computer A series of instructions that performs a particular task is called a program Sprea...

Page 44: ...2 11b 802 11g USB 1 1 USB 2 0 Ports USB Port Channels 802 11b 802 11g 11 Channels US Canada 13 Channels Europe 14 Channels Japan LEDs Power Link Transmitted Power 15 18dBm Typical 11Mbps CCK 14 17dBm Typical 54Mbps OFDM Receive Sensitivity 67dBm 54Mbps 82dBm 11Mbps Security features WEP Encryption WEP key bits 64 128 bit Warranty 3 Year ...

Page 45: ...peedBooster Dimensions 3 58 x 0 91 x 2 80 W x H x D 91 mm x 23 mm x 71 mm Unit Weight 0 18 lbs 0 08 kg Certifications FCC Operating Temp 0 C 55 C 32 F 131 F Storage Temp 40 C 85 C 40 F 185 F Operating Humidity 10 85 Non Condensing Storage Humidity 5 90 Non Condensing ...

Page 46: ...PRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except ...

Page 47: ...ion exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body Linksys declares that WUSB54GS ver 2 FCC ID Q87 WUSB54GSV2 is limited in CH1 CH11 for 2 4 GHz by specified firmware controlled in U S A INDUSTRY CANADA CANADA This Class B digital apparatus complies with Canadian RSS210 Cet appa...

Page 48: ...bout networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization de...

Reviews: