USER GUIDE 11G USB Wireless Adapter WUSB54GC V2
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 3 LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Wireless Security Checklist 4 General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Chapter 3: Advanced Configuration 5 How to Access the Wireless Network Monitor. . . . .
Chapter 1 Product Overview Chapter 1: Product Overview Thank you for choosing the Compact Wireless-G USB Adapter. The Adapter connects to your PC via a USB port, leaving your PC’s slots available for other purposes. The Adapter also lets you connect with any of the growing number of wireless hotspots in public places such as coffee shops, airports, hotels and convention centers. With this Adapter, your wireless networking experience can be faster and easier than ever.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration Advanced configuration is performed through the Wireless Network Monitor (the Monitor). Use it to check the status information, search for available wireless networks, or create profiles that hold different configuration settings. Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor, and troubleshoot if needed.
Advanced Configuration Chapter 3 Wireless Mode This is the mode of the wireless network currently in use. Receive Rate This is the rate that the Adapter receives data. Standard Channel This is the channel used by your wireless network. Packets Received This shows the packets that the Adapter receives, in real time, after connecting to the wireless network or after clicking Refresh. Security This is the status of the wireless security feature. Authentication This is authentication method.
Advanced Configuration Chapter 3 Connect Wireless Security Disabled The Connectt screen displays a list of available networks in the table. The table shows each network’s wireless network name, radio band, signal strength, and security method. You may click the column heading (Wireless Network Name, GHz, Signal strength, or Security method) to sort by that field. If you connect to a network whose wireless security is disabled, then you will view this screen: Click Connect Anyway 1.
Advanced Configuration Chapter 3 WPA2 (Wi-Fi Protected Access 2) WEP (Wired Equivalent Privacy) If the network uses WPA2 Personal security, then the WPA2-Personal Key Needed for Connection screen appears. If the network uses WEP encryption, then the WEP Key or Passphrase Needed for Connection screen appears. WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters. To connect to the network, click Connect.
Advanced Configuration Chapter 3 Delete Select the profile you want to delete and click Delete. Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and wireless network names. NOTE: If you want to export more than one profile, you must export them one at a time. Create a New Profile The next screen is the Available Wireless Networks screen.
Advanced Configuration Chapter 3 Wireless Security Disabled WPA2 (Wi-Fi Protected Access 2) If you connect to a network whose wireless security is disabled, then you will view this screen: If the network uses WPA2 Personal security, then the WPA2-Personal Key Needed for Connection screen appears. Click Connect Anyway 1. Click Connect Anyway. 2. Click Finish. WPA2-Personal Security Passphrase Enter the network’s Passphrase (also called a pre-shared key) of 8-63 characters.
Advanced Configuration Chapter 3 WEP (Wired Equivalent Privacy) Advanced Setup If the network uses WEP encryption, then the WEP Key or Passphrase Needed for Connection screen appears. If your network is not listed with the available networks, use Advanced Setup. WEP Security Available Wireless Networks Passphrase Enter the Passphrase or WEP key. The passphrase is case-sensitive and must be 16 or fewer alphanumeric characters.
Advanced Configuration Chapter 3 – Default Gateway Enter the IP address of your network’s Gateway. – DNS 1 and DNS 2 Enter the DNS address of your wired Ethernet network. 4. If you chose Infrastructure Mode, go to step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen appears. NOTE: The Adapter only supports Ad-Hoc Mode for 2.4 GHz networks: Wireless-B, Wireless-G, and Wireless-N (using 2.4 GHz). Click Next to continue, or click Back k to return to the previous screen. 3.
Advanced Configuration Chapter 3 for Wi-Fi Protected Access 2. WPA is a stronger security method than WEP. WPA2 is a stronger security method than WPA. RADIUS stands for Remote Authentication Dial-In User Service. Click Next to continue, or click Back k to return to the previous screen. WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. Proceed to the section for your security method.
Advanced Configuration Chapter 3 PEAP WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. Authentication Select the authentication method your network is using, EAP-TLS or PEAP.
Advanced Configuration Chapter 3 Certificate Select the certificate you installed to authenticate you on your wireless network. If you want to use any certificate, keep the default, Trust Any. EAP-TLS Inner Authen. Select the authentication method used inside the PEAP tunnel. Click Next to continue, or click Back k to return to the previous screen. RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the router.
Advanced Configuration Chapter 3 7. The Congratulations screen appears. Click Connect to k to implement the new settings immediately Network and return to the Status screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. PEAP RADIUS - PEAP If you selected PEAP, configure the following: Login Name Enter the login name of your wireless network. Password Enter the password of your wireless network.
Appendix A Troubleshooting Appendix A: Troubleshooting Your computer does not recognize the Adapter. Make sure that the Adapter is properly inserted into the USB slot. The Adapter does not work properly. Remove the Adapter, and then reinsert it into the computer’s USB slot. Your computer cannot communicate with the other computers linked via Ethernet in the Infrastructure configuration. 1. Make sure that the computers are powered on. 2.
Wi-Fi Protected Setup Appendix B Appendix B: Wi-Fi Protected Setup 1. Press the Wi-Fi Protected Setup button on the router. 2. Within two minutes, click the Wi-Fi Protected Setup button on this screen. 3. The Adapter connects to the network. NOTE: Make sure the router supports Wi-Fi Protected Setup. Before you begin, make sure the router and the computer with the Adapter are in the same room. Then select the method that is most convenient for you. Connecting to the Network 4.
Wi-Fi Protected Setup Appendix B Enter the Adapter’s PIN Number 8. The Adapter connects to the network. Connecting to the Network Enter the PIN Number 5. Access the web-based utility of the router. (Refer to the router’s documentation for instructions.) 9. Click Print to print out your wireless network settings. Then clickk Finish to return to the Status screen, or click Exit to exit the Monitor. 6. On the router’s Wi-Fi Protected Setup screen, enter the Adapter’s PIN number in the PIN N field.
Specifications Appendix C Appendix C: Specifications Model WUSB54GC V2 Standards IEEE 802.11b, IEEE 802.11g, USB 1.1, USB 2.0 Channels 802.11b / 802.11g 11 Channels (most of North, Central, and South America) 13 Channels (most of Europe and Asia) LEDs Link Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps) 802.11g: OFDM Transmitted Power 802.11b:17.05 dBm for FCC 802.11g;18.38 dBm for FCC 802.11b;19.36 dBm for CE 802.11g;19.
Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants that this Linksys hardware product will be substantially free of defects in materials and workmanship arising under normal use during the Warranty Period, which begins on the date of purchase by the original enduser purchaser and lasts for the period specified below: s Two (2) years for new product s Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user pu
Appendix D Warranty Information and a copy of your dated proof of original purchase when returning your product. Products received without a RMA number and dated proof of original purchase will be rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge.
Appendix E Appendix E: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful interference to radio communications.
Regulatory Information Appendix E Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Nederlands [Dutch]: Dit apparaat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999/5/EC.
Regulatory Information Appendix E Wireless Equipment (Wireless-N/G/A/B Products) The following standards were applied during the assessment of the product against the requirements of the Directive 1999/5/EC: s Radio: EN 300 328 and s EMC: EN 301 489-1, EN 301 489-17 s Safety: EN 60950 and either EN 50385 or EN 50371 DFS: The equipment meets the DFS requirements as defined in ETSI EN 301 893. This feature is required by the regulations to avoid interference with Radio Location Services (radars).
Regulatory Information Appendix E France Product Usage Restrictions For 2,4 GHz, the product should not be used outdoors in the band 2454 - 2483,5 MHz. There are no restrictions when used in other parts of the 2,4 GHz band when used indoors. Check http://www.arcep.fr/ for more details. This product is designed for indoor usage only. Outdoor usage is not recommended, unless otherwise noted. Pour la bande 2,4 GHz, l’ équipement ne doit pas être utilisé en extérieur dans la bande 2454 - 2483,5 MHz.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix F Appendix F: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix F your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix F GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix F c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix F 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix F GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix F freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix F Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix F Software License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Software License Agreement Appendix F software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix F Software License Agreement OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). 1.
Appendix F Software License Agreement DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.