background image

2

 

In the 

Privacy Configuration

 window, click the 

Authentication 

Mode

 drop-down arrow and select 

Open

The USB Adapter automatically selects WEP as the 

Encryption 

Mode

.  

3

 

In the 

Preconfigured key [WEP]

 area

,

 do the following: 

a

 

b

 

c

 

d

 

e

 

In the 

Format for entering key

 list, select 

 

ASCII characters 

if your network uses all Zoom 

wireless products 

 

Hexadecimal digits

 if an access point, router, or some 

adapters are not Zoom products 

In the 

Key Length

 drop-down list, select 

64 bits

.  

In the 

Key Index

 drop-down list, select which of four keys 

– 1, 2, 3, or 4 – will be used to encrypt the data. The key 
you select must be the same one that is selected on the 
access point. We recommend that you use Key

 1

In the 

Network Key

 text box, enter a key. 

  If you selected ASCII format, enter 5 characters. The 

characters can be any upper- or lower-case letters and 
numbers. 

  If you selected Hexadecimal format, enter 10 

characters. Each character can be any of the following: 
0 1 2 3 4 5 6 7 8 9 A B C D E F 

The network key must be the same for all the devices on 
your network. 
Re-enter the key in the 

Confirm Network Key

 text box. 

Summary of Contents for 4410B/TF

Page 1: ...ge appears saying An unidentified program wants access to your computer click Allow 2 On the Language Selection screen select your language 3 On the next screen select Installation Wizard and then on...

Page 2: ...e security you should now be connected To check your connection open your Web browser and go to your favorite site Note that you can monitor your wireless connection with the Zoom Wireless G USB icon...

Page 3: ...iFi Protected Access Pre Shared Key and WPA PSK but all the devices on your network must support those methods If you want to use WPA2 or WPA please see the User Guide on the CD for instructions To se...

Page 4: ...p down list select 64 bits In the Key Index drop down list select which of four keys 1 2 3 or 4 will be used to encrypt the data The key you select must be the same one that is selected on the access...

Page 5: ...rks only Use the Status area on the utility s Configuration tab to monitor the strength of the wireless radio signal as well as the transmission speed and quality If your link deteriorates you can con...

Page 6: ...does not seem to be hardware related click the Zoom icon on your desktop to run the Wireless G USB software 1 Check the Configuration tab to make sure that the SSID and Network Type settings for the a...

Page 7: ...equipment is compliant to Directive 1999 5 EC via the following This product is CE marked Producenten erkl rer under eneansvar at dette udstyr er i overensstemmelse med direktivet 1999 5 EC via f lge...

Page 8: ...b n y tu n theo H ng d n 1999 5 EC th ng qua c c m c sau S n ph m n y c nh d u l CE 2006 95 EC LVD EN 60950 1 2001 2004 108 EC EN 301 489 1 v1 4 1 2002 08 EN 301 489 17 v1 2 1 2002 08 1999 5 EC EN 300...

Reviews: