background image

Model No.

HU200

User Guide

WIRELESS

GHz

802.11g

2,4

USB Adaptor

Home Wireless-

G

Summary of Contents for HU200

Page 1: ...Model No HU200 User Guide WIRELESS GHz 802 11g 2 4 USB Adaptor Home Wireless G...

Page 2: ...g this guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and...

Page 3: ...s G USB Adaptor 14 Connecting the Adaptor 14 Using the Adaptor s Wall Mount 15 Chapter 6 Using the Wireless Network Monitor 16 Using the Wireless Network Monitor Icon 16 Accessing the Wireless Network...

Page 4: ...Home Wireless G USB Adaptor Appendix E Glossary 40 Appendix F Specifications 47 Appendix G Warranty Information 49 Appendix H Regulatory Information 50 Appendix I Contact Information 56...

Page 5: ...Using EAP TLS Screen 12 Figure 4 11 Setup Wizard s Wireless Security RADIUS Using PEAP Screen 12 Figure 4 12 Setup Wizard s Check Settings Screen 13 Figure 4 13 Setup Wizard s Congratulations Screen...

Page 6: ...urity PSK RADIUS Using EAP TLS for New Profile 26 Figure 6 22 Wireless Security PSK RADIUS Using PEAP for New Profile 26 Figure 6 23 Wireless Security RADIUS Using EAP TLS for New Profile 27 Figure 6...

Page 7: ...By incorporating two fast technologies USB 2 0 and Wireless G 802 11g the Adaptor delivers data rates up to 54Mbps And since the 802 11g and 802 11b standards share the same 2 4GHz radio band the Ada...

Page 8: ...to your PC Chapter 6 Using the Wireless Network Monitor This chapter explains how to use the Adaptor s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some potential probl...

Page 9: ...ormation This appendix supplies the Adaptor s warranty information Appendix H Regulatory Information This appendix supplies the Adaptor s regulatory information Appendix I Contact Information This app...

Page 10: ...d can double the effective wireless transmission range for two wireless adaptor PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure...

Page 11: ...ch as the notebook adaptors for your laptop computers PCI adaptors for your desktop PCs and USB adaptors for when you want to enjoy USB connectivity Wireless products will also communicate with a wire...

Page 12: ...port and your PC s USB port All power is provided through the USB connection so a power adaptor is not needed The LED Indicators The Adaptor s LEDs indicate the status of the Adaptor s power and wire...

Page 13: ...e Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Install Click the Install button...

Page 14: ...now If you chose Ad Hoc Mode select the correct operating channel for your network Then select the Network Mode from the drop down menu Click the Next button and go to Step 5 Click the Back button to...

Page 15: ...ucts enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bi...

Page 16: ...se that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption setting Passphrase Enter a Passphrase also called a Pre Shared Key of 8 63 c...

Page 17: ...certificate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue Click the Ba...

Page 18: ...n menu select the certificate you have installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen PEAP If you selec...

Page 19: ...o install files Click Next if you are satisfied with your settings or click Back to change any settings 8 After the software has been successfully installed the Congratulations screen will appear Clic...

Page 20: ...ngle from the Adaptor This will ensure optimum wireless operating range and performance Congratulations The installation of the Home Wireless G Adaptor is complete If you want to check the link inform...

Page 21: ...all Mount to the Adaptor slide the Wall Mount into the grooves on the back panel of Adaptor as shown in Steps A B and C 3 Using the velcro strip on the Adaptor s Wall Mount attach the Adaptor to the v...

Page 22: ...iew the version information for the driver and Wireless Network Monitor Use Windows XP Wireless Configuration Windows XP only If your computer is running Windows XP then this choice will be available...

Page 23: ...e Site Survey tab To perform configuration changes click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the curr...

Page 24: ...work s authentication method IP Address The IP Address of the Adaptor is displayed here Subnet Mask The Subnet Mask of the Adaptor is shown here Default Gateway The Default Gateway address of the Adap...

Page 25: ...last pressed Bytes Transmitted This shows the bytes transmitted from the Adaptor in real time since connecting to the Wireless Network or since the Refresh Statistics button was last pressed Noise Le...

Page 26: ...displayed here MAC The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of...

Page 27: ...e status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile se...

Page 28: ...not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS address appropriate for your network You must specify the IP Addr...

Page 29: ...be used for all the devices in your wireless network It is case sensitive It should be a unique name to help prevent others from entering your network 5 The Ad Hoc Mode Settings screen will appear If...

Page 30: ...oducts enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128...

Page 31: ...ssphrase that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption Type Passphrase Enter a Passphrase also called a Pre Shared Key of 8 6...

Page 32: ...e certificate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue Click the B...

Page 33: ...own menu select the certificate you have installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen PEAP If you sel...

Page 34: ...ack button To exit the Wireless Network Monitor click Exit 9 The Congratulations screen will appear next Click Connect to Network to implement the new settings immediately and return to the Link Infor...

Page 35: ...tation for your PC s motherboard 2 The Home Wireless G USB Adaptor does not work properly Follow the steps below until the problem is solved Reinsert the Home Wireless G USB Adaptor into the notebook...

Page 36: ...s and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different m...

Page 37: ...red backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the...

Page 38: ...more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS app...

Page 39: ...Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network Monitor To connect to a wireless network...

Page 40: ...e wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect Anyway button to c...

Page 41: ...work is active its status will be displayed as Connected For more information about wireless networking on a Windows XP computer click the Start button Select Help and choose Support Enter the keyword...

Page 42: ...Change the WEP encryption keys periodically To ensure network security steps one through five should be followed at least Security Threats Facing Wireless Networks Wireless networks are easy to find...

Page 43: ...esses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns T...

Page 44: ...ith a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with...

Page 45: ...ructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Wind...

Page 46: ...f an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks tog...

Page 47: ...DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount...

Page 48: ...resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a network me...

Page 49: ...ata to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet Network A series of com...

Page 50: ...In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wirel...

Page 51: ...rom the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for acc...

Page 52: ...ting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area N...

Page 53: ...e LEDs Power Link Transmit Power 15 17 dBm Typical 11Mbps CCK 13 15 dBm Typical 54Mbps OFDM Receive Sensitivity 65 dBm 54Mbps 80 dBm 11Mbps Antenna 2 dBi Security Features WEP Encryption WPA WEP Key B...

Page 54: ...48 Appendix F Specifications Home Wireless G USB Adaptor Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing...

Page 55: ...OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific lega...

Page 56: ...Appendix H Regulatory Information Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Confo...

Page 57: ...during the assessment of the product against the requirements of the Directive 1999 5 EC Radio EN 300 328 EMC EN 301 489 1 EN 301 489 17 Safety EN 60950 NOTE If you need any technical documentation se...

Page 58: ...er i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschr nkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1995 5 CE folgen mit Au nahme der folgenden...

Page 59: ...ndo l utilizzo di prodotti Wireless LAN a 2 4 GHz richiede una Autorizzazione Generale Consultare http www comunicazioni it it per maggiori dettagli Product Usage Restrictions This product is designed...

Page 60: ...ct Power Output 7 From the pull down menu on the right select the wireless adapter s power output percentage Windows 2000 1 Open the Control Panel 2 Double click Network and Dial Up Connections 3 Sele...

Page 61: ...ide 3 Click the name of the country in which you reside 4 Click Products 5 Click the appropriate product category 6 Select a product 7 Click the type of documentation you want The document will automa...

Page 62: ...il Address Austria support at linksys com Belgium support be linksys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Nether...

Reviews: