background image

The content and copyrights of the attached

 material are the property of its owner.

Distributed by:

www.Jameco.com

  

✦ 

1-800-831-4242

Summary of Contents for 487023U

Page 1: ...The content and copyrights of the attached material are the property of its owner Distributed by www Jameco com 1 800 831 4242 ...

Page 2: ...A Division of Cisco Systems Inc Model No Notebook Adapter Wireless G WPC54G User Guide WIRELESS GHz 2 4802 11g ...

Page 3: ... this User Guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is s...

Page 4: ...allation 12 Connecting the Adapter 12 Chapter 6 Using the Wireless Network Monitor 13 Accessing the Wireless Network Monitor 13 Link Information 13 Site Survey 16 Profiles 17 Creating a New Profile 18 Appendix A Troubleshooting 28 Common Problems and Solutions 28 Frequently Asked Questions 29 Appendix B Wireless Security 32 Security Precautions 32 Security Threats Facing Wireless Networks 32 Appen...

Page 5: ...notebook 12 Figure 6 1 Link Information 13 Figure 6 2 Wireless Network Status 14 Figure 6 3 Wireless Network Statistics 15 Figure 6 4 Site Survey 16 Figure 6 5 Profiles 17 Figure 6 6 Importing a Profile 17 Figure 6 7 Exporting a Profile 17 Figure 6 8 Creating a New Profile 18 Figure 6 9 Enter Profile Name 18 Figure 6 10 Wireless Mode for New Profile 19 Figure 6 11 Ad Hoc Mode Settings 19 Figure 6 ...

Page 6: ... LEAP Authentication 24 Figure 6 24 RADIUS Settings 25 Figure 6 25 EAP TLS Authentication 25 Figure 6 26 EAP TTLS Authentication 25 Figure 6 27 EAP MD5 Authentication 26 Figure 6 28 EAP PEAP Authentication 26 Figure 6 29 LEAP Authentication 26 Figure 6 30 Confirm New Settings 27 Figure 6 31 The Congratulations Screen 27 ...

Page 7: ... Setup Wizard will walk you through configuring the adapter to your network s settings step by step Then just slide it into your computer s PC Card slot and enjoy your wireless network Future changes to your network settings can be made with the Wireless Network Monitor explained in Chapter 6 Further information about the Adapter s functions can be found in Appendix A Troubleshooting If you re con...

Page 8: ...ou how to connect the Adapter to your PC Chapter 6 Using the Wireless Network Monitor This chapter show you how to use the Adapter s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Wireless Security This appendix discusses security issues regarding ...

Page 9: ...ess G Notebook Adapter Appendix G Regulatory Information This appendix supplies the Adapter s regulatory information Appendix H Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ... a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they both share the same channel and SSID Before enabling you consider roaming choose a ...

Page 11: ...op PC and USB Adapters for when you want to enjoy USB connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go...

Page 12: ...apter 3 Getting to Know the Wireless G Notebook Adapter The LED Indicators The Network Adapter s LEDs display information about network activity Power Green The Power LED lights up when the Adapter is powered on Link Green The Link LED lights up when the Adapter has an active connection Figure 3 1 Front Panel ...

Page 13: ... does not click the Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Install Click the Install button to begin the software installation process User Guide Click the User Guide button to open the PDF file of this User Guide Exit Click the Exit button to exit the Setup Wizard NOTE You...

Page 14: ...o button if you want your wireless computers to network with computers on your wired network using an access point or wireless router Click the Ad Hoc Mode radio button if you want multiple wireless computers to network directly with each other In the SSID field enter your wireless network s SSID The SSID must be identical for all devices in the network The default setting is linksys all lowercase...

Page 15: ... WEP key is automatically generated It is case sensitive and should not be longer than 16 alphanumeric characters This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only If you have any non Linksys wireless products enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your...

Page 16: ...red Key of 8 63 characters in the Passphrase field Click the Next button to continue Click the Back button to return to the previous screen Click the Help button for more information 6 The Setup Wizard will ask you to review and finalize your settings before it starts to install files Click Next if you are satisfied with your settings or click Back to change any settings Figure 4 6 The Setup Wizar...

Page 17: ...nstallation Procedure Wireless G Notebook Adapter 7 After the software has been successfully installed the Congratulations screen will appear Click the Exit button Proceed to Chapter 5 Hardware Installation Figure 4 8 The Setup Wizard s Congratulations Screen ...

Page 18: ...d light up when the Adapter is installed correctly 5 Windows will begin copying the driver files to your computer If Windows asks you for the original Windows CD ROM insert the CD ROM and direct Windows to its correct location e g D The installation of the Wireless G Notebook Adapter is complete If you want to check the link information search for available wireless networks or make additional con...

Page 19: ...Information button to view additional status information about the current wireless connection To search for available wireless networks click the Site Survey tab To create new profiles for different network configurations click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the current connection It also provi...

Page 20: ...dress of the Adapter s Default Gateway DNS This is the DNS address for the Adapter DHCP Client This displays the status of the network s DHCP client MAC The MAC address of the wireless network s access point or wireless router Signal Strength This bar indicates strength of the signal transmitted by the Adapter Link Quality The Link Quality bar indicates the quality of the wireless network connecti...

Page 21: ...sh button was last pressed Bytes Transmitted This shows the bytes transmitted from the Adapter in real time since connecting to the wireless network or since the Refresh button was last pressed Noise Level This shows the level of background noise affecting the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of the wireless signal receiv...

Page 22: ...annel upon which the network broadcasts Signal The percentage of signal strength from 0 to 100 Site Information For each network selected the following settings are listed SSID The wireless network s name Wireless Mode The mode of the wireless network currently in use Channel The channel to which the wireless network devices are set Encryption The status of the encryption security feature MAC The ...

Page 23: ...twork devices are set Encryption The status of the encryption security feature Authentication The authentication setting for the network Connect To connect to a wireless network using a specific profile select the profile and click the Connect button New Click New to create a new profile See the next section Creating a New Profile for detailed instructions Edit Select a profile and click Edit to c...

Page 24: ...Adapter Creating a New Profile 1 On the Profiles screen click New to create a new profile 2 Enter a name for the new profile and click the OK button Click the Cancel button to return to the Profiles screen without entering a name Figure 6 8 Creating a New Profile Figure 6 9 Enter Profile Name ...

Page 25: ... for all the devices in your wireless network It is case sensitive It should be a unique name to help prevent others from entering your network 4 The Ad Hoc Mode Settings screen will appear If you chose Infrastructure Mode go to Step 5 now If you chose Ad Hoc Mode select the correct operating channel for your network from the Channel drop down menu Then select the Network Mode from the drop down m...

Page 26: ...S address leave these fields empty IP Address This IP Address must be unique to your network Subnet Mask The Adapter s Subnet Mask must be the same as your wired network s Subnet Mask Default Gateway Enter the IP address of your network s Gateway here DNS 1 2 Enter the DNS address of any wired Ethernet network here Click Next to continue or Cancel to return to the Profiles screen Figure 6 12 Netwo...

Page 27: ...e WEP key manually on those products Transmit Key The default transmit key number is 1 If your network s access point or wireless router uses transmit key number 2 3 or 4 select the appropriate number from the Transmit Key drop down box Key 1 The WEP key you enter must match the WEP key of your wireless network If you are using 64 bit WEP encryption then the key must consist of exactly 10 hexadeci...

Page 28: ... WPA PSK WPA PSK offers the TKIP encryption method with dynamic encryption keys Click Next to continue or Back to return to the previous screen Select TKIP for the Encryption Type Enter a WPA Shared Key of 8 63 characters in the Passphrase field Figure 6 15 WPA PSK Settings Figure 6 16 TKIP Settings ...

Page 29: ...S server is connected to the Router WPA Radius offers the TKIP encryption method with dynamic encryption keys It offers five authentication methods EAP TLS EAP TTLS EAP MD5 EAP PEAP and LEAP Click Next to continue or Back to return to the previous screen Select TKIP for the Encryption Type Click Next to continue or Back to return to the previous screen Figure 6 17 WPA RADIUS Settings Figure 6 18 E...

Page 30: ...hat the certificate for the server is valid Select the TTLS Protocol from the drop down menu Click Next to continue or Back to return to the previous screen EAP MD5 Enter the Login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Click Next to continue or Back to return to the previous screen EAP PEAP Enter the Login name of yo...

Page 31: ...e Login Name field From the Certificate drop down menu select the certificate you have installed to authenticate you on your wireless network Select Validate server certificate to make sure that the certificate for the server is valid Click Next to continue or Back to return to the previous screen EAP TTLS Enter the Login name of your wireless network in the Login Name field Enter the password of ...

Page 32: ... Enter the password of your wireless network in the Password field Select Validate server certificate to make sure that the certificate for the server is valid Then select the Peap Inner EAP from the drop down menu Click Next to continue or Back to return to the previous screen LEAP Enter the Login name of your wireless network in the Login Name field Enter the password of your wireless network in...

Page 33: ...ick Back To exit the Wireless Network Monitor Exit 8 The Congratulations screen will appear next Click Activate new settings now to implement the new settings immediately and return to the Link Information screen Click Activate new settings later to keep the current settings active and return to the Profiles screen You have successfully created a connection profile Figure 6 30 Confirm New Settings...

Page 34: ...ook Adapter does not work properly Reinsert the Wireless G Notebook Adapter into the notebook s PC Card slot For Windows 98SE or Me right click on My Computer and select Properties Select the Device Manager tab and click on the Network Adapter You will find the Wireless G Notebook Adapter if it is installed successfully If you see a yellow exclamation mark the resources may be conflicting and you ...

Page 35: ...ed that the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the 802 11g standard One of the standards for wireless networks that allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11g standard The 802 11g standard ...

Page 36: ...gnal strength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF transm...

Page 37: ... generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintende...

Page 38: ...nge the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the steps you can take...

Page 39: ...our network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2 Use Shared Key authentication 3 Change...

Page 40: ...he Router or other device WPA Radius offers two encryption methods TKIP and AES with dynamic encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network encrypt...

Page 41: ...tions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared...

Page 42: ...twork functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capaci...

Page 43: ...A mutual authentication method that uses a combination of digital certificates and another system such as passwords EAP TLS Extensible Authentication Protocol Transport Layer Security A mutual authentication method that uses digital certificates Encryption Encoding data transmitted in a network Ethernet A standard network protocol that specifies how data is placed on and retrieved from a common tr...

Page 44: ...nit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products RADIUS Remote Authentication Dial In User Service A protocol that uses an authentication server to control network access Roaming The ability to take a wireless device from one access point s range to anothe...

Page 45: ...owledgement from the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network TKIP Temporal Key Integrity Protocol a wireless encryption protocol that provides dynamic encryption keys for each packet transmitted Topology The physical layout of a network WEP Wired Equivalent Privacy A method of encrypting network data ...

Page 46: ...CCK 11 Mbps DQPSK 2 Mbps DBPSK 1 Mbps 802 11g OFDM Network Protocols TCP IP IPX SPX NetBEUI Security Features WEP TKIP 802 1x WEP Key Bits 64 128 Bit Dimensions 4 53 x 2 13 x 0 30 115 mm x 54 mm x 7 5 mm Unit Weight 1 66 oz 0 047 kg Certifications FCC IC 03 CE Operating Temp 32ºF to 131ºF 0ºC to 55ºC Storage Temp 13ºF to 158ºF 25ºC to 70ºC Operating Humidity 5 to 95 Non Condensing Storage Humidity...

Page 47: ...NS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys ...

Page 48: ... of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equ...

Page 49: ...nnas contact Linksys Corporate Compliance Linksys vakuuttaa täten että dieses produkt tyyppinen laite on direktiivin 1999 5 EY oleellisten vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen Linksys Group déclare que le produit est conforme aux conditions essentielles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l exté...

Page 50: ... near a swimming pool Avoid using this product during an electrical storm There may be a remote risk of electric shock from lightning SAFETY NOTICES Caution To reduce the risk of fire use only No 26 AWG or larger telecommunication line cord Do not use this product near water for example in a wet basement or near a swimming pool Avoid using this product during an electrical storm There may be a rem...

Page 51: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 261 8868 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Reviews: