manualshive.com logo in svg
background image

Model No.

HU200

User Guide

WIRELESS

GHz

802.11g

2,4

USB Adaptor

Home Wireless-

G

Содержание HU200

Страница 1: ...Model No HU200 User Guide WIRELESS GHz 802 11g 2 4 USB Adaptor Home Wireless G...

Страница 2: ...g this guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and...

Страница 3: ...s G USB Adaptor 14 Connecting the Adaptor 14 Using the Adaptor s Wall Mount 15 Chapter 6 Using the Wireless Network Monitor 16 Using the Wireless Network Monitor Icon 16 Accessing the Wireless Network...

Страница 4: ...Home Wireless G USB Adaptor Appendix E Glossary 40 Appendix F Specifications 47 Appendix G Warranty Information 49 Appendix H Regulatory Information 50 Appendix I Contact Information 56...

Страница 5: ...Using EAP TLS Screen 12 Figure 4 11 Setup Wizard s Wireless Security RADIUS Using PEAP Screen 12 Figure 4 12 Setup Wizard s Check Settings Screen 13 Figure 4 13 Setup Wizard s Congratulations Screen...

Страница 6: ...urity PSK RADIUS Using EAP TLS for New Profile 26 Figure 6 22 Wireless Security PSK RADIUS Using PEAP for New Profile 26 Figure 6 23 Wireless Security RADIUS Using EAP TLS for New Profile 27 Figure 6...

Страница 7: ...By incorporating two fast technologies USB 2 0 and Wireless G 802 11g the Adaptor delivers data rates up to 54Mbps And since the 802 11g and 802 11b standards share the same 2 4GHz radio band the Ada...

Страница 8: ...to your PC Chapter 6 Using the Wireless Network Monitor This chapter explains how to use the Adaptor s Wireless Network Monitor Appendix A Troubleshooting This appendix describes some potential probl...

Страница 9: ...ormation This appendix supplies the Adaptor s warranty information Appendix H Regulatory Information This appendix supplies the Adaptor s regulatory information Appendix I Contact Information This app...

Страница 10: ...d can double the effective wireless transmission range for two wireless adaptor PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure...

Страница 11: ...ch as the notebook adaptors for your laptop computers PCI adaptors for your desktop PCs and USB adaptors for when you want to enjoy USB connectivity Wireless products will also communicate with a wire...

Страница 12: ...port and your PC s USB port All power is provided through the USB connection so a power adaptor is not needed The LED Indicators The Adaptor s LEDs indicate the status of the Adaptor s power and wire...

Страница 13: ...e Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Install Click the Install button...

Страница 14: ...now If you chose Ad Hoc Mode select the correct operating channel for your network Then select the Network Mode from the drop down menu Click the Next button and go to Step 5 Click the Back button to...

Страница 15: ...ucts enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128 bi...

Страница 16: ...se that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption setting Passphrase Enter a Passphrase also called a Pre Shared Key of 8 63 c...

Страница 17: ...certificate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue Click the Ba...

Страница 18: ...n menu select the certificate you have installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen PEAP If you selec...

Страница 19: ...o install files Click Next if you are satisfied with your settings or click Back to change any settings 8 After the software has been successfully installed the Congratulations screen will appear Clic...

Страница 20: ...ngle from the Adaptor This will ensure optimum wireless operating range and performance Congratulations The installation of the Home Wireless G Adaptor is complete If you want to check the link inform...

Страница 21: ...all Mount to the Adaptor slide the Wall Mount into the grooves on the back panel of Adaptor as shown in Steps A B and C 3 Using the velcro strip on the Adaptor s Wall Mount attach the Adaptor to the v...

Страница 22: ...iew the version information for the driver and Wireless Network Monitor Use Windows XP Wireless Configuration Windows XP only If your computer is running Windows XP then this choice will be available...

Страница 23: ...e Site Survey tab To perform configuration changes click the Profiles tab Link Information The Link Information screen displays network mode signal strength and link quality information about the curr...

Страница 24: ...work s authentication method IP Address The IP Address of the Adaptor is displayed here Subnet Mask The Subnet Mask of the Adaptor is shown here Default Gateway The Default Gateway address of the Adap...

Страница 25: ...last pressed Bytes Transmitted This shows the bytes transmitted from the Adaptor in real time since connecting to the Wireless Network or since the Refresh Statistics button was last pressed Noise Le...

Страница 26: ...displayed here MAC The MAC address of the wireless network s access point is displayed here Refresh Click the Refresh button to perform a new search for wireless devices Connect To connect to one of...

Страница 27: ...e status of the wireless security feature is displayed here Authentication The authentication setting for the network is shown here Connect To connect to a wireless network using a specific profile se...

Страница 28: ...not have a DHCP server click the radio button next to Specify network settings Enter an IP Address Subnet Mask Default Gateway and DNS address appropriate for your network You must specify the IP Addr...

Страница 29: ...be used for all the devices in your wireless network It is case sensitive It should be a unique name to help prevent others from entering your network 5 The Ad Hoc Mode Settings screen will appear If...

Страница 30: ...oducts enter the WEP key manually on those products WEP Key The WEP key you enter must match the WEP key of your wireless network For 64 bit encryption enter exactly 10 hexadecimal characters For 128...

Страница 31: ...ssphrase that is 8 63 characters in length Encryption Select the type of algorithm you want to use TKIP or AES for the Encryption Type Passphrase Enter a Passphrase also called a Pre Shared Key of 8 6...

Страница 32: ...e certificate you have installed to authenticate you on your wireless network Select the type of encryption TKIP or AES from the Encryption drop down menu Click the Next button to continue Click the B...

Страница 33: ...own menu select the certificate you have installed to authenticate you on your wireless network Click the Next button to continue Click the Back button to return to the previous screen PEAP If you sel...

Страница 34: ...ack button To exit the Wireless Network Monitor click Exit 9 The Congratulations screen will appear next Click Connect to Network to implement the new settings immediately and return to the Link Infor...

Страница 35: ...tation for your PC s motherboard 2 The Home Wireless G USB Adaptor does not work properly Follow the steps below until the problem is solved Reinsert the Home Wireless G USB Adaptor into the notebook...

Страница 36: ...s and an operating frequency of 2 4GHz What is the IEEE 802 11g standard It is one of the IEEE standards for wireless networks The 802 11g standard allows wireless networking hardware from different m...

Страница 37: ...red backbone Based on that information the node next selects the right access point and registers its address Communications between end node and host computer can then be transmitted up and down the...

Страница 38: ...more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS app...

Страница 39: ...Configuration If you want to switch back to the Wireless Network Monitor right click the Wireless Network Monitor icon and select Use Linksys Wireless Network Monitor To connect to a wireless network...

Страница 40: ...e wireless security enabled go to step 3 If your network does have wireless security enabled go to step 4 3 If your network does not have wireless security enabled click the Connect Anyway button to c...

Страница 41: ...work is active its status will be displayed as Connected For more information about wireless networking on a Windows XP computer click the Start button Select Help and choose Support Enter the keyword...

Страница 42: ...Change the WEP encryption keys periodically To ensure network security steps one through five should be followed at least Security Threats Facing Wireless Networks Wireless networks are easy to find...

Страница 43: ...esses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns T...

Страница 44: ...ith a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with...

Страница 45: ...ructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Wind...

Страница 46: ...f an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks tog...

Страница 47: ...DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount...

Страница 48: ...resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a network me...

Страница 49: ...ata to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet Network A series of com...

Страница 50: ...In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wirel...

Страница 51: ...rom the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for acc...

Страница 52: ...ting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area N...

Страница 53: ...e LEDs Power Link Transmit Power 15 17 dBm Typical 11Mbps CCK 13 15 dBm Typical 54Mbps OFDM Receive Sensitivity 65 dBm 54Mbps 80 dBm 11Mbps Antenna 2 dBi Security Features WEP Encryption WPA WEP Key B...

Страница 54: ...48 Appendix F Specifications Home Wireless G USB Adaptor Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing...

Страница 55: ...OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific lega...

Страница 56: ...Appendix H Regulatory Information Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Confo...

Страница 57: ...during the assessment of the product against the requirements of the Directive 1999 5 EC Radio EN 300 328 EMC EN 301 489 1 EN 301 489 17 Safety EN 60950 NOTE If you need any technical documentation se...

Страница 58: ...er i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschr nkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1995 5 CE folgen mit Au nahme der folgenden...

Страница 59: ...ndo l utilizzo di prodotti Wireless LAN a 2 4 GHz richiede una Autorizzazione Generale Consultare http www comunicazioni it it per maggiori dettagli Product Usage Restrictions This product is designed...

Страница 60: ...ct Power Output 7 From the pull down menu on the right select the wireless adapter s power output percentage Windows 2000 1 Open the Control Panel 2 Double click Network and Dial Up Connections 3 Sele...

Страница 61: ...ide 3 Click the name of the country in which you reside 4 Click Products 5 Click the appropriate product category 6 Select a product 7 Click the type of documentation you want The document will automa...

Страница 62: ...il Address Austria support at linksys com Belgium support be linksys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Nether...

Отзывы: