Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Compact Wireless-G USB Network Adapter with SpeedBooster. With this Adapter, your wireless networking experience will be faster and easier than ever. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer.
WEB: For more information on wireless security, visit www.linksys.com/security Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
Configuration Chapter 3 Chapter 3: Link Information Advanced Configuration The Link Information screen displays network mode, signal strength, and link quality information about the current connection. Click More Information for additional status For Windows 2000 and Windows XP users, advanced information.
Page 7
Configuration Chapter 3 Wireless Network Statistics Status This shows the status of the wireless network connection. The Wireless Networks Statistics screen provides statistics SSID This is the unique name (SSID) of the wireless on your current network settings. network. Wireless Mode This is the mode of the wireless network currently in use.
Page 8
It must match the passphrase of your other MAC Address This is the MAC address of the wireless wireless network devices and is compatible with Linksys network’s wireless router or access point. wireless products only. (For non-Linksys wireless products,...
Configuration Chapter 3 WEP Key 1 If you do not have the Passphrase, enter Passphrase Enter the network’s Passphrase (Pre-Shared the WEP key, which must match the WEP key of your Key) of 8-63 characters. wireless network. For 64-bit encryption, enter exactly 10 To connect to the network, click Connect.
Page 10
Configuration Chapter 3 Create a Profile Export Select the profile you want to save in a different location, and click Export. Direct Windows to the The available networks for the Profile are in the table on appropriate folder, and click Save. the center of the screen by SSID.
Page 11
16 or fewer alphanumeric characters. It must match the passphrase of your other WPA2-Personal Security wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, Passphrase Enter the network’s Passphrase (Pre-shared enter the WEP key manually.)
Page 12
Configuration Chapter 3 Advanced Setup Default Gateway Enter the IP address of your – network’s Gateway. If your network is not listed with the available networks, DNS 1 and DNS 2 Enter the DNS address of your – use Advanced Setup. wired Ethernet network.
Page 13
Disabled and then click Next to continue. This passphrase must match the passphrase of your other Proceed to step 6. wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
Page 14
Configuration Chapter 3 WPA Personal WPA Enterprise WPA Personal offers two encryption methods, TKIP and WPA Enterprise features WPA security used in coordination AES, with dynamic encryption keys. with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
Page 15
Configuration Chapter 3 PEAP RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication Select the authentication method your network is using, EAP-TLS or PEAP.
Page 16
Configuration Chapter 3 PEAP Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. RADIUS - PEAP If you selected PEAP, configure the following: Login Name...
Make sure that the Adapter is configured with the same Wireless Network Name (SSID) and wireless security settings as the other wireless computers in the Infrastructure configuration. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Compact Wireless-G USB Network Adapter with SpeedBooster...
Windows Vista Zero Configuration Appendix B Appendix B: Select your network, and then click Connect. Windows Vista Zero Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon If your network has wireless security, go to step 5.
Page 19
Windows Vista Zero Configuration Appendix B Enter the security key, WEP key, or passphrase (also This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
Page 20
Windows Vista Zero Configuration Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select If your network does not have wireless security enabled, Use Linksys Wireless Network Monitor. click Connect Anyway to connect the Adapter to your network.
Page 22
Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Compact Wireless-G USB Network Adapter with SpeedBooster...
Regulatory Information Appendix F Appendix F: This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE Regulatory Information 802.11b or 802.11g operation of this product in the USA is firmware-limited to channels 1 through 11. Safety Notices FCC Statement Caution: To reduce the risk of fire, use only No.26 AWG...
Regulatory Information Appendix F Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
Page 29
Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 30
Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 31
ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Compact Wireless-G USB Network Adapter with SpeedBooster...
“Software” includes, and this Agreement will apply to (a) BY DOWNLOADING OR INSTALLING THE SOFTWARE, the software of Linksys or its suppliers provided in or with OR USING THE PRODUCT CONTAINING THE SOFTWARE, the applicable Linksys product, and (b) any upgrades, YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE updates, bug fixes or modified versions (“Upgrades”) or...
Page 33
Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
Page 34
Software License Agreement Appendix G freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
Page 35
Software License Agreement Appendix G If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 36
General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under the OpenSSL license: address new problems or concerns.
Page 37
(tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Linksys product contains open OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND source software licensed under the OpenSSL license ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,...
Page 38
Software License Agreement Appendix G The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...