hit counter script
Linksys WUSB54GSC User Manual

Linksys WUSB54GSC User Manual

Compact wireless-g usb network adapter with speedbooster
Hide thumbs Also See for WUSB54GSC:

Advertisement

Quick Links

USER GUIDE
Compact Wireless-G
USB Network Adapter
with SpeedBooster
WUSB54GSC
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WUSB54GSC

  • Page 1 USER GUIDE Compact Wireless-G USB Network Adapter with SpeedBooster WUSB54GSC Model:...
  • Page 2: About This Guide

    Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc.
  • Page 3: Table Of Contents

    Software in Linksys Products ........
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Compact Wireless-G USB Network Adapter with SpeedBooster. With this Adapter, your wireless networking experience will be faster and easier than ever. Using the latest wireless networking technology, the Adapter adds or upgrades wireless connectivity on your notebook computer.
  • Page 5: Chapter 2: Wireless Security Checklist

    WEB: For more information on wireless security, visit www.linksys.com/security Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses.
  • Page 6: Chapter 3: Advanced Configuration

    Configuration Chapter 3 Chapter 3: Link Information Advanced Configuration The Link Information screen displays network mode, signal strength, and link quality information about the current connection. Click More Information for additional status For Windows 2000 and Windows XP users, advanced information.
  • Page 7 Configuration Chapter 3 Wireless Network Statistics Status This shows the status of the wireless network connection. The Wireless Networks Statistics screen provides statistics SSID This is the unique name (SSID) of the wireless on your current network settings. network. Wireless Mode This is the mode of the wireless network currently in use.
  • Page 8 It must match the passphrase of your other MAC Address This is the MAC address of the wireless wireless network devices and is compatible with Linksys network’s wireless router or access point. wireless products only. (For non-Linksys wireless products,...
  • Page 9: Profiles

    Configuration Chapter 3 WEP Key 1 If you do not have the Passphrase, enter Passphrase Enter the network’s Passphrase (Pre-Shared the WEP key, which must match the WEP key of your Key) of 8-63 characters. wireless network. For 64-bit encryption, enter exactly 10 To connect to the network, click Connect.
  • Page 10 Configuration Chapter 3 Create a Profile Export Select the profile you want to save in a different location, and click Export. Direct Windows to the The available networks for the Profile are in the table on appropriate folder, and click Save. the center of the screen by SSID.
  • Page 11 16 or fewer alphanumeric characters. It must match the passphrase of your other WPA2-Personal Security wireless network devices and is compatible with Linksys wireless products only. (For non-Linksys wireless products, Passphrase Enter the network’s Passphrase (Pre-shared enter the WEP key manually.)
  • Page 12 Configuration Chapter 3 Advanced Setup Default Gateway Enter the IP address of your – network’s Gateway. If your network is not listed with the available networks, DNS 1 and DNS 2 Enter the DNS address of your – use Advanced Setup. wired Ethernet network.
  • Page 13 Disabled and then click Next to continue. This passphrase must match the passphrase of your other Proceed to step 6. wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
  • Page 14 Configuration Chapter 3 WPA Personal WPA Enterprise WPA Personal offers two encryption methods, TKIP and WPA Enterprise features WPA security used in coordination AES, with dynamic encryption keys. with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 15 Configuration Chapter 3 PEAP RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 16 Configuration Chapter 3 PEAP Congratulations screen appears. Click Connect to Network to implement the new settings immediately and return to the Link Information screen. Click Return to Profiles screen to keep the current settings active and return to the Profiles screen. RADIUS - PEAP If you selected PEAP, configure the following: Login Name...
  • Page 17: Appendix A: Troubleshooting

    Make sure that the Adapter is configured with the same Wireless Network Name (SSID) and wireless security settings as the other wireless computers in the Infrastructure configuration. WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com Compact Wireless-G USB Network Adapter with SpeedBooster...
  • Page 18: Appendix B: Windows Vista Zero Configuration

    Windows Vista Zero Configuration Appendix B Appendix B: Select your network, and then click Connect. Windows Vista Zero Configuration Windows Vista Configuration After you have installed the Adapter, the Windows Vista Wireless Network Configuration utility icon appears on your computer’s system tray. Select Network Wireless Network Configuration Utility Icon If your network has wireless security, go to step 5.
  • Page 19 Windows Vista Zero Configuration Appendix B Enter the security key, WEP key, or passphrase (also This screen appears when you are connected to your network. Select Save this network, if you want to save known as a pre-shared key), depending on your type of security.
  • Page 20 Windows Vista Zero Configuration Appendix B This screen varies according to the selected location. Click Close. Network Settings Saved NOTE: For help with the Windows Vista Wireless Network Configuration utility, refer to Windows Vista Help and Support, by clicking Vista’s Start button >...
  • Page 21: Appendix C: Windows Xp Wireless Zero Configuration

    If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select If your network does not have wireless security enabled, Use Linksys Wireless Network Monitor. click Connect Anyway to connect the Adapter to your network.
  • Page 22 Windows XP Wireless Zero Configuration Appendix C Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your wireless router or access point. Your wireless network will appear as Connected when your connection is active.
  • Page 23: Appendix D: Specifications

    Specifications Appendix D Appendix D: Specifications Model WUSB54GSC ver. 2 Standards IEEE 802.11g, IEEE 802.11b, USB 1.1 and 2.0 Channels 802.11b / 802.11g 11 Channels (US, Canada) LEDs Link Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps); 802.11g:...
  • Page 24: Appendix E: Warranty Information

    Linksys’ entire liability under this limited warranty jurisdiction. will be for Linksys, at its option, to (a) repair the product TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT with new or refurbished parts, (b) replace the product...
  • Page 25: Technical Support

    This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Compact Wireless-G USB Network Adapter with SpeedBooster...
  • Page 26: Appendix F: Regulatory Information

    Regulatory Information Appendix F Appendix F: This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE Regulatory Information 802.11b or 802.11g operation of this product in the USA is firmware-limited to channels 1 through 11. Safety Notices FCC Statement Caution: To reduce the risk of fire, use only No.26 AWG...
  • Page 27: Avis D'industrie Canada

    Regulatory Information Appendix F Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
  • Page 28: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    úřady. Správná likvidace a recyklace pomáhá předcházet Linksys products. Consumers are required to comply with potenciálním negativním dopadům na životní prostředí a lidské this notice for all electronic products bearing the following zdraví.
  • Page 29 Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 30 Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 31 ľudí. Ak máte záujem o podrobnejšie WEB: For additional information, please visit informácie o likvidácii starého zariadenia, obráťte sa, prosím, na www.linksys.com miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov alebo obchod, v ktorom ste si produkt zakúpili. Compact Wireless-G USB Network Adapter with SpeedBooster...
  • Page 32: Appendix G: Software License Agreement

    “Software” includes, and this Agreement will apply to (a) BY DOWNLOADING OR INSTALLING THE SOFTWARE, the software of Linksys or its suppliers provided in or with OR USING THE PRODUCT CONTAINING THE SOFTWARE, the applicable Linksys product, and (b) any upgrades, YOU ARE CONSENTING TO BE BOUND BY THE SOFTWARE updates, bug fixes or modified versions (“Upgrades”) or...
  • Page 33 Schedule 2 are from the public web site at of the GPL or other open source code in this Software on a http://www.gnu.org/copyleft/gpl.html CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request. GNU GENERAL PUBLIC LICENSE Term and Termination.
  • Page 34 Software License Agreement Appendix G freedom to share and change free software–to make sure TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
  • Page 35 Software License Agreement Appendix G If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 36 General Public License from time to time. Such new versions will be similar in If this Linksys product contains open source software spirit to the present version, but may differ in detail to licensed under the OpenSSL license: address new problems or concerns.
  • Page 37 (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Linksys product contains open OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND source software licensed under the OpenSSL license ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,...
  • Page 38 Software License Agreement Appendix G The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptographic related. If you include any Windows specific code (or a derivative thereof ) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@ cryptsoft.com)”...

Table of Contents