background image

2.  Turn off your wireless router, gateway or access point and 

wait a few seconds. 

3.  Turn the router, gateway or access point back on. 
4.  Turn on the computer. 

Windows Vista

 users: Try again to connect your wireless 

adapter to a network using Windows Networking. 

 

If you are using the USB extender cable, try changing the 
orientation of the adapter. 

 

Try the adapter in another USB port. 

 

Unplug other USB devices from your computer one at a time 
and see if that allows the adapter to work. 

 

If possible, try installing the adapter on another computer. 

If the problem does not seem to be hardware-related, click the 
Zoom icon on your desktop to run the 

Wireless-G USB

 software. 

1

 

Check the 

Configuration

 tab to make sure that the 

SSID

 and 

Network Type

 settings for the adapter are the same as these 

settings for the other devices in your wireless network. 

2

 

Then click the 

Security

 tab and check the settings to make sure 

that the adapter is configured for the same security system as 
the other devices in your wireless network. Make sure that your 
security key is the same – remember that the keys are case-
sensitive.  

3

 

Check your TCP/IP settings as discussed in Appendix A of the 
User Guide. 

4

 

If the adapter still does not work, uninstall the software and then 
re-install it. Unplug the adapter from the USB port, then select 

Summary of Contents for 4410B/TF

Page 1: ...ge appears saying An unidentified program wants access to your computer click Allow 2 On the Language Selection screen select your language 3 On the next screen select Installation Wizard and then on...

Page 2: ...e security you should now be connected To check your connection open your Web browser and go to your favorite site Note that you can monitor your wireless connection with the Zoom Wireless G USB icon...

Page 3: ...iFi Protected Access Pre Shared Key and WPA PSK but all the devices on your network must support those methods If you want to use WPA2 or WPA please see the User Guide on the CD for instructions To se...

Page 4: ...p down list select 64 bits In the Key Index drop down list select which of four keys 1 2 3 or 4 will be used to encrypt the data The key you select must be the same one that is selected on the access...

Page 5: ...rks only Use the Status area on the utility s Configuration tab to monitor the strength of the wireless radio signal as well as the transmission speed and quality If your link deteriorates you can con...

Page 6: ...does not seem to be hardware related click the Zoom icon on your desktop to run the Wireless G USB software 1 Check the Configuration tab to make sure that the SSID and Network Type settings for the a...

Page 7: ...equipment is compliant to Directive 1999 5 EC via the following This product is CE marked Producenten erkl rer under eneansvar at dette udstyr er i overensstemmelse med direktivet 1999 5 EC via f lge...

Page 8: ...b n y tu n theo H ng d n 1999 5 EC th ng qua c c m c sau S n ph m n y c nh d u l CE 2006 95 EC LVD EN 60950 1 2001 2004 108 EC EN 301 489 1 v1 4 1 2002 08 EN 301 489 17 v1 2 1 2002 08 1999 5 EC EN 300...

Reviews: