background image

Model No.

USB Network Adapter

Wireless-

G

WUSB54GSC

 ver.2

User Guide

WIRELESS

GHz

2.4

802.11g

Compact

with SpeedBooster

Summary of Contents for WUSB54GSC

Page 1: ...Model No USB Network Adapter Wireless G WUSB54GSC ver 2 User Guide WIRELESS GHz 2 4802 11g Compact with SpeedBooster ...

Page 2: ...ented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning and is something that could damage your property or the Compact Wireless G USB Adapter This checkmark means t...

Page 3: ... the Adapter with SecureEasySetup 10 Setting Up the Adapter with Available Networks 11 Setting Up the Adapter with Manual Setup 14 Chapter 5 Using the Wireless Network Monitor 21 Accessing the Wireless Network Monitor 21 Link Information Screens 21 Site Survey 24 Profiles 25 Creating a New Profile 26 Appendix A Troubleshooting 27 Common Problems and Solutions 27 Frequently Asked Questions 28 Appen...

Page 4: ...Compact Wireless G USB Network Adapter with SpeedBooster Appendix G Warranty Information 44 Appendix H Regulatory Information 45 Appendix I Contact Information 51 ...

Page 5: ... Connection 12 Figure 4 13 WPA Personal Needed for Connection 12 Figure 4 14 WPA2 Personal Needed for Connection 13 Figure 4 15 The Congratulations Screen 13 Figure 4 16 Available Wireless Network 14 Figure 4 17 Network Settings 14 Figure 4 18 Wireless Mode 15 Figure 4 19 Ad Hoc Mode Settings 15 Figure 4 20 Wireless Security 16 Figure 4 21 Wireless Security WEP 16 Figure 4 22 Wireless Security WPA...

Page 6: ...nection 24 Figure 5 8 WPA2 Personal Needed for Connection 25 Figure 5 9 Profiles 25 Figure 5 10 Import a Profile 25 Figure 5 11 Export a Profile 26 Figure 5 12 Create a New Profile 26 Figure B 1 Wireless Network Monitor Icon 31 Figure B 2 Windows XP Use Windows XP Wireless Configuration 31 Figure B 3 Windows XP Wireless Configuration Icon 31 Figure B 4 Available Wireless Network 32 Figure B 5 No W...

Page 7: ...ted on another computer s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can also be fun PCs equipped with wireless cards and adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network And now with SecureEasySetup setting up yo...

Page 8: ...is chapter show you how to use the Adapter s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some problems and solutions as well as frequently asked questions regarding installation and use of the Adapter Appendix B Using Windows XP Wireless Configuration This appendix describes how Windows XP users can use Window s built in wireless configuration to monitor their Adapt...

Page 9: ... G Warranty Information This appendix supplies the Adapter s warranty information Appendix H Regulatory Information This appendix supplies the Adapter s regulatory information Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ... range for two wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that ...

Page 11: ...y USB connectivity Wireless products will also communicate with the wireless PrintServer When you wish to connect your wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for m...

Page 12: ...Compact Wireless G USB Network Adapter with SpeedBooster Chapter 3 Getting to Know the Compact Wireless G USB Network Adapter The LED Indicators The Adapter s LEDs display information about network activity Link Green The Link LED flashes when there is network activity Figure 3 1 Front Panel ...

Page 13: ... and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Click Here to Start Click the Click Here to Start button to begin the software installation process User Guide Click the User Guide button to open this User Guide Exit Click Exit to exit the Setup Wizard 1 To install the Adapter click the Click He...

Page 14: ...les will be installed onto your PC 4 The Setup Wizard will now prompt you to connect the Adapter to your PC s USB port Connect the Adapter s connector to one of the USB ports on your computer Once you ve connected click Next 5 Windows 98SE and ME users will need to restart their PCs Figure 4 4 The Connecting the Adapter Screen Figure 4 3 Installing files ...

Page 15: ...for networks with devices that do not have SecureEasySetup Available Wireless Network The networks available to this Adapter will be listed on this screen Refresh Use this button to update the Available Wireless Network list Connect You can select one of the available networks and click the Connect button to connect to it Manual Setup Select this option to set up the adapter manually if you are no...

Page 16: ...n The logo or button will stop flashing on the wireless router or access point when the Adapter has been successfully added to the network Repeat this procedure for any additional SecureEasySetup device 3 When SecureEasySetup is complete you may save your configuration to a text file by clicking the Save button or print the configuration by clicking the Print button Click Connect to Network to con...

Page 17: ...l be taken directly to the Congratulations screen Click Connect to Network to connect to your network and configuration is complete If the network utilizes wireless security you will need to configure security on the Adapter Proceed to the next step below 2 If wireless security has been enabled on this network you will see a Secured Wireless Network message Click Continue and the appropriate conne...

Page 18: ...nter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bit encryption enter exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Then click Connect and proceed to the Congratulations screen To cancel the connection click Cancel WPA Personal Needed for Connection Encryption Select the type of algorit...

Page 19: ...e Congratulations screen To cancel the connection click Cancel 3 After the Adapter has been configured for the network the Congratulations screen will appear Click Connect to Network to connect to your network Congratulations Setup is complete To check the link information search for available wireless networks or make additional configuration changes refer to Chapter 5 Using the Wireless Network ...

Page 20: ...CP If your network does not have a DHCP server click the option next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS addresses appropriate for your network You must specify the IP Address and Subnet Mask on this screen If you are unsure about the Default Gateway and DNS addresses leave these fields empty IP Address This IP Address must be unique to your network ...

Page 21: ...eless network name that must be used for all the devices in your wireless network It is case sensitive and should be a unique name to help prevent others from entering your network Click Next to continue or Back to return to the previous screen 3 If you chose Infrastructure Mode go to Step 4 now If you chose Ad Hoc Mode the Ad Hoc Mode Settings screen will appear Select the correct Channel for you...

Page 22: ...you are using 128 bit WEP encryption then the key must consist of exactly 26 hexadecimal characters Valid hexadecimal characters are 0 to 9 and A to F Passphrase Instead of manually entering a WEP key you can enter a passphrase in the Passphrase field so a WEP key is automatically generated This case sensitive passphrase must match the passphrase of your other wireless network devices and is compa...

Page 23: ...ct the type of algorithm you want to use TKIP or AES from the Encryption drop down menu Passphrase Enter a Passphrase also called a pre shared key of 8 63 characters in the Passphrase field Click the Next button to continue or the Back button to return to the previous screen WPA2 Personal Enter a Passphrase of 8 63 characters in the Passphrase field Click the Next button to continue to the Confirm...

Page 24: ...nstalled to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue or the Back button to return to the previous screen PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the...

Page 25: ...rop down menu select the certificate you have installed to authenticate you on your wireless network PEAP If you selected PEAP enter the login name of your wireless network in the Login Name field Enter the password of your wireless network in the Password field Enter the name of the authentication server in the Server Name field this is optional From the Certificate drop down menu select the cert...

Page 26: ...setup click Exit 6 After the software has been successfully installed the Congratulations screen will appear Click Connect to Network to connect to your network Clicking Return to Profiles screen will open the Wireless Network Monitor s Profiles screen For more information about the Wireless Network Monitor refer to Chapter 5 Using the Wireless Network Monitor Congratulations Setup is complete To ...

Page 27: ...n to view additional status and statistics about the current wireless connection To search for available wireless networks click the Site Survey tab To perform configuration changes or create connection profiles click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the current connection It also provides a butto...

Page 28: ...ireless network s authentication method IP Address The IP Address of the Adapter is displayed here Subnet Mask The Subnet Mask of the Adapter is shown here Default Gateway The Default Gateway address of the Adapter is displayed here DNS This is the DNS address of the Adapter DHCP Client This displays the Adapter s status as a DHCP client MAC Address The MAC address of the wireless network s access...

Page 29: ...ast pressed Driver Version This shows the version of the Adapter s driver Firmware Version This is the version of the Adapter s firmware Noise Level This shows the level of background noise affecting the wireless signal A lower reading translates into a higher quality signal Signal Strength This is the intensity of the wireless signal received by the Adapter Up Time This indicates the length of th...

Page 30: ...o which the wireless network devices are set Security The status of the wireless security feature is displayed here MAC Address The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of the networks on the list select the wireless network and click the Connect button If the net...

Page 31: ...work currently in use Transfer Rate This is the transfer rate setting Channel This is the channel to which the wireless network devices are set Security The status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile select the profile and click the Connect button...

Page 32: ...ete Creating a New Profile On the Profiles screen click the New button to create a new profile Enter a name for the new profile and click the OK button Click the Cancel button to return to the Profiles screen without entering a name For details on setting up a new connection profile please refer to Creating a Profile in Chapter 4 Figure 5 12 Create a New Profile Figure 5 11 Export a Profile ...

Page 33: ... information 2 The USB Adapter does not work properly Reinsert the USB Adapter into the notebook or desktop s USB port Right click on My Computer and select Properties Select the Adapter then chose the Device Manager tab and click on the Adapter You will find the USB Adapter if it is installed successfully If you see a yellow exclamation mark the resources may be conflicting and you must follow th...

Page 34: ...rovided that the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 8...

Page 35: ...as signal strength and quality as well as the message load currently being carried by each access point and the distance of each access point to the wired backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the backbone As the user moves on the end node s RF t...

Page 36: ...erates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended re...

Page 37: ...elect Use Windows XP Wireless Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network Monitor 1 After installing the Adapter the Windows XP Wireless Configuration icon will appear in your computer s system tray Double click the icon Figure B 1 Wireless Network Monitor Icon Figure B 2 Windows XP U...

Page 38: ... not have wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect Anyway button to connect the Adapter to your network NOTE Steps 2 and 3 are the instructions and screenshots for Windows XP with Service Pack 2 installed Figure B 4 Available Wireless Network Figure B 5 No Wire...

Page 39: ...twork will appear as Connected when your connection is active For more information about wireless networking on a Windows XP computer click the Start button select Help and choose Support Enter the keyword wireless in the field provided and press the Enter key The installation of the Windows XP Wireless Configuration is complete NOTE Windows XP Wireless Configuration does not support the use of a ...

Page 40: ...formance 7 Change the WEP encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifier Here are the step...

Page 41: ...s WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encryption possible 2 Use Shared Key authentication 3 Change your WEP key regularly WPA Wi Fi Pr...

Page 42: ... a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the dev...

Page 43: ...nstructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing ...

Page 44: ...start a device and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet D...

Page 45: ...network Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files ove...

Page 46: ...ta sharing storage and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standa...

Page 47: ...wireless network s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A de...

Page 48: ...cator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associate...

Page 49: ... Transmitted Power 802 11g 16 dBm Typical 802 11b 17 dBm Typical Receive Sensitivity 11Mbps 80dBm Typical 54Mbps 65dBm Typical Security features WEP WPA and WPA2 Encryption WEP key bits 64 Bit and 128 Bit Dimensions 3 86 x 0 43 x 1 10 W x H x D 91 mm x 11 mm x 28 mm Unit Weight 0 05 lb 0 023 kg Certifications FCC Wi Fi 802 11b g Operating Temp 0 C to 45 C 32 F to 113 F Storage Temp 20 C to 60 C 4 ...

Page 50: ...r all shipping and handling charges ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO THE DURATION OF THE WARRANTY PERIOD ALL OTHER EXPRESS OR IMPLIED CONDITIONS REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts s...

Page 51: ...ssly approved by the party responsible for compliance could void the user s authority to operate this equipment FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment End user smust follow the specific operating instructions for satisfying RF exposure compliance To maintain compliance with FCC RF exposure compliance req...

Page 52: ...ns for satisfyingRF exposure compliance To maintain compliance withIC RF exposure compliance requirements please followoperation instruction as documented in this manual This transmitter must not be co located or operating inconjunction with any other antenna or transmitter Avis d Industrie Canada concernant l expositionaux radiofréquences Ce matériel est conforme aux limites d exposition auxradio...

Page 53: ...47 Appendix H Regulatory Information Compact Wireless G USB Network Adapter with SpeedBooster ...

Page 54: ...48 Appendix H Regulatory Information Compact Wireless G USB Network Adapter with SpeedBooster ...

Page 55: ...49 Appendix H Regulatory Information Compact Wireless G USB Network Adapter with SpeedBooster ...

Page 56: ...50 Appendix H Regulatory Information Dual Band Wireless Access Point For more information visit www linksys com ...

Page 57: ...ore about networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorizati...

Reviews: