LINKSYS WUSB54GCV2 User Manual

USER GUIDE
11G USB Wireless Adapter
WUSB54GC V2
About This Guide
Icon Descriptions
W
a
:
cates that there is
should
.
.
hy
ebsite address or e-ma
address.
s
address because most current web
dd
h
.
m
l
y
y
y
y
h
.
hile reading through the User Guide you may see
various icons that call attention to specific items. Below is
description of these icons
NOTE: This check mark indi
a note of interest and is something that you
pay special attention to while using the
roduct
WARNING: This exclamation point indicates
that there is a caution or warning and it is
omething that could damage your property or
product
About This Guide
WEB: This globe icon indicates a notewort
w
il
nline Resource
ebsite addresses in this document are listed without ttp:// in front of the rowsers do not require it. If you use an older web browser,
ou may have to a
Resource Website
inksys www.linksys.co
inksys Internationalwww.linksys.com/internationa
Glossar
etwork Securit
ttp://in front of the web address
www.linksys.com/glossar
www.linksys.com/securit
Copyright and Trademarks
inksys, Cisco and the Cisco Logo are
registered trademarks or trademarks
f Cisco Systems, Inc. and/or its
affiliates in the U.S. and certain other
ountries. Copyright © 2008 Cisco
Systems, Inc. All rights reserved.
er brands and product names are
Ot trademarks or registered trademarks
f their respective holders
i
Table of Contents
Chapter 1: Product Overview 3
LEDs ......................................................3
Chapter 2: Wireless Security Checklist 4
General Network Security Guidelines .................................4
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Chapter 3: Advanced Conguration 5
How to Access the Wireless Network Monitor............................ 5
How to Use the Wireless Network Monitor.............................. 5
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Proles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix A: Troubleshooting 17
Appendix B: Wi-Fi Protected Setup 18
Appendix C: Specications 20
Appendix D: Warranty Information 21
Limited Warranty..............................................21
Appendix E: Regulatory Information 23
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Safety Notices................................................23
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) . .24
Wireless Equipment (Wireless-N/G/A/B Products) . . . . . . . . . . . . . . . . . . . . . . . . .25
CE Marking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
National Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
Product Usage Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
Technical Documents on www.linksys.com/international . . . . . . . . . . . . . . . . . . . .26
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) ..............................27
Appendix F: Software License Agreement 31
Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
ii
Chapter 1
T
easier than ever.
y.
apter 1:
roduct Overview
hank you for choosing the Compact Wireless-G USB
dapter. The Adapter connects to your PC via a USB port,
leaving your PC’s slots available for other purposes. The
dapter also lets you connect with any of the growing umber of wireless hotspots in public places such as
coffee shops, airports, hotels and convention centers. With this Adapter, your wireless networking experience can be
r and
LEDs
Product Overview
Link
Green) The LED flashes when there is
ireless network activit
3
Chapter 2
t
uders than a traditiona
.
g
d
.
s
.
.
s
.
T
.
g
o
ess
Wireless Security Checklist
apter 2:
Wireless Security Checklis
ireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
t a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intr Like signals from your cellular or cordless phones, signals
rom your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.
1. Change the default wireless network name or SSID
ireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
s the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
inksys as the default wireless network name. You
should change the wireless network name to somethin
nique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
se personal information (such as your Social Security umber) because this information may be available for
nyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, an gateways, you will be asked for a password when you want to change their settings. These devices have a default
assword set by the factory. The Linksys default password
min. Hackers know these defaults and may try to se them to access your wireless device and change your etwork settings. To thwart any unauthorized changes,
customize the device’s password so it will be hard to guess.
l wired network
4. Enable encryption
Encryption protects data transmitted over a wireless
etwork. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
or wireless communication
network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
ses dynamic key encryption. To protect the information
s it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.
EP is an older encryption standard and may be the only option available on some older devices that do not support WPA.
General Network Security Guideline
ireless network security is useless if the underlying
etwork is not secure.
Password protect all computers on the network and
ndividually password protect sensitive files
Change passwords on a regular basis
Install anti-virus software and personal firewall software.
Disable file sharing (peer-to-peer). Some applications
ay open file sharing without your consent and/or
knowledge.
Additional Security Tip
Keep wireless routers, access points, or gateways away
rom exterior walls and windows
urn wireless routers, access points, or gateways off when they are not being used (at night, during vacations)
Use strong passphrases that are at least eight characters
n length. Combine letters and numbers to avoid usin
standard words that can be found in the dictionary.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters
ssigned to every networking device. With MAC address
iltering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can
ccess your wireless network.
WEB: F
ecurity, visit www.linksys.com/security
r more information on wirel
4
Chapter 3
.
.
r
y.
.
T
reen
additional status
b.
The
n
f
.
l
.
reen.
p
d
lable on all WUSB54GC
us
The
ess Netwo
Status
.
ess Netwo
Status
ess network.
V2 models.
apter 3:
dvanced Configuration
dvanced configuration is performed through the Wireless
Network Monitor (the Monitor). Use it to check the status
nformation, search for available wireless networks, or create profiles that hold different configuration settings
Diagnostics is performed through the Diagnostic utility. Use it to detect the Adapter, test the driver and Monitor,
nd troubleshoot if needed
How to Access the Wireless Network
onito
Advanced Configuration
ter installing the Adapter, the Monitor icon appears in the system tray of your computer. If the Monitor is enabled, the icon is green. If the Monitor is disabled or the Adapter
s not inserted, the icon is gra
ireless Network Monitor Icon
Double-click the icon to open the Monitor
How to Use the Wireless Network Monitor
he opening screen of the Monitor is the
From this screen, you can find out how strong the current
ireless signal is and how good the connection’s quality
s.
lick More Information to view
nformation about the current connection. To search for
vailable wireless networks, click the
erform configuration changes or create connection rofiles, click the
rofiles ta
tatus
c
onnect tab. To
tatus
Signal Strength The Signal Strength bar indicates signa
strength.
Link Quality The Link Quality bar indicates the quality of
the wireless network connection
More Information
dditional information about the wireless network
connection on the
Wi-Fi Protected Setup
utton
Protected Setup. Proceed to Appendix B, “Wi-Fi Protecte
etup”.
.
o connect to a router that supports Wi-Fi
NOTE: The Wi-Fi Protected Setup feature is not
vai
lickMore Information to view
ireless Network Status sc
lick theWi-Fi Protected Setu
Wireless Network Stat
Wirel
on your current network settings
rk
screen provides information
nd link quality information about the current connection.
Clickore Informatio
screen displays network mode, signal strength,
or additional status information
Wirel
Wireless Network Name This is the unique name (SSID)
f the wirel
rk
5
Chapter 3
.
.
.
.
.
.
.
.
ess netwo
ection.
reen
to return to the initial
.
.
Th
.
ess Netwo
Statistics
data transmissio
ate of
)
.
.
.
.
.
.
ess netwo
ection.
k
to return to the initial
ck
eless Network Status
.
ly
ckfresh
Advanced Configuration
Wireless ModeThis is the mode of the wireless network
currently in use
Standard Channel This is the channel used by your
wireless network
SecurityThis is the status of the wireless security feature.
Authentication This is your wireless network’s
uthentication method
Network Type This is the wireless network type
IP Address This is the IP Address of the Adapter.
Subnet Mask This is the Adapter’s Subnet Mask
Default Gateway This is the Default Gateway address
DNS1 This is the DNS address of the Adapter
MAC AddressThis is the MAC address of the wireless
etwork’s wireless router or access point
Signal Strength The Signal Strength bar indicates the
signal strength.
Link Quality The Link Quality bar indicates the quality of
he wirel
Statistics
tatistics sc
Back
Save to Profile
lick
ctive connection settings to a profile
rk conn
lickStatisticsto go to the Wireless Network
.
reen
lickSave to Profile to save the currently
Wireless Network Statistics
e Wireless Networks Statisticsscreen provides statistics
on your current network settings
Receive RateThis is the rate that the Adapter receives
Packets ReceivedThis shows the packets that the
dapter receives, in real time, after connecting to the
wireless network or after clicking Refresh
Packets Transmitted This shows the packets that the
dapter transmits, in real time, after connecting to the
wireless network or after clicking Refresh
Bytes Received This shows the bytes that the Adapter
eceives, in real time, after connecting to the wireless
etwork or after clicking Refresh
Bytes Transmitted This shows the bytes that the Adapter
transmits, in real time, after connecting to the wireless
etwork or after clicking Refresh
Driver Version This shows the Adapter’s driver version
Signal Strength This is the intensity of the wireless signal
that the Adapter receives
Transmit PowerThis is the power output at which the
apter transmits.
Signal Strength The Signal Strength bar indicates the
signal strength.
Link Quality The Link Quality bar indicates the quality of
he wirel
Back Clic
Status
reen
Save to Profile ClickSave to Profileto save the current
ctive connection settings to a profile.
Refresh
i
li
rk conn
Statuscreen.
to go to the Wir
to update the statistics.
Transmit Rate This is the
the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transmission rate at
ny given time.
irel
rk
n r
6
Chapter 3
t
Th
t
screen displays a list of available networks
table.
table shows eac
ess
.
ect
ess network.
)
k.
p
d
ckres
.
,
ect
y
sable
ble
d
:
y
sh
s
k.
d
.
V2 models.
V2 models.
Advanced Configuration
Connec
e
onnec
n the
etwork name, radio band, signal strength, and security
ethod. You may click the column heading (Wireless Network Name, GHz, Signal strength, or Security method) to sort by that field
The
h network’s wirel
nn
Wireless Security Disable
If you connect to a network whose wireless security is
isabled, then you will view this screen
lick Connect Anyway
Clickonnect Anywa
lick
Fini
Wireless Network Name This is the SSID or unique name
f the wirel
GHz This is the radio band used on the network. The
umber 2.4 indicates Wireless-B, -G, or -N (2.4 GHz). (TBD - Is this still displayed? Not needed since only band is 2.4 GHz
Signal This is the percentage of signal strength, from 0
to 100%.
SecurityThis is the security method used by the
wor
Wi-Fi Protected Setup
utton Protected Setup. Proceed to Appendix B, “Wi-Fi Protecte
etup”.
Refresh
wireless devices
Connect To connect to one of the networks on the list
select the wireless network, and click
o connect to a router that supports Wi-Fi
NOTE: The Wi-Fi Protected Setup feature is not
vailable on all WUSB54GC
li
lick theWi-Fi Protected Setu
h to perform a new search for
nn
Congratulation
Congratulations! The Adapter is connected to the networ
Wireless Security Enable
If you connect to a network whose wireless security is enabled, then you will view one of three screens
Proceed to the appropriate instructions below for the type of wireless security that the network is using:
A2, WPA, or WEP.
NOTE: The Wi-Fi Protected Setup feature is not
available on all WUSB54GC
Proceed to the appropriate section, Di
Ena
Wireless Securit
7
Chapter 3
)
reen appears
.
T
l
l
)
reen appears.
y
.
T
ect
l
)
y
y.
T
lly.)
ly
adecimal characters. Fo
T
l
cel
h
s
.
Advanced Configuration
PA2 (Wi-Fi Protected Access 2
If the network uses WPA2 Personal security, then the
WPA2-Personal Key Needed for Connection
PA2-Personal Security
Passphrase
nter the network’s Passphrase (also
c
called a pre-shared key) of 8-63 characters
o connect to the network, click
onnect. To cance
the connection, click Cance
PA (Wi-Fi Protected Access
If the network uses WPA Personal security, then the
ersonal Key Needed for Connection sc
EP (Wired Equivalent Privacy
If the network uses WEP encryption, then the
.
r Passphrase Needed for Connection
WEP Securit
Passphrase
nter the Passphrase or WEP ke
creen appears.
EP Key
he passphrase is case-sensitive and must be 16 or
ewer alphanumeric characters. It must match the
assphrase of your other wireless network devices nd is compatible with Linksys wireless products only.
(For non-Linksys wireless products, enter the WEP key
anua
If you enter the network’s WEP key, enter the
ropriate number of hexadecimal characters (“0” to
9” and “A” to “F”). For 64-bit encryption, enter exact
hex
r 128-
it encryption,
enter exactly 26 hexadecimal characters.
PA-Personal Securit
Passphrase
nter the network’s Passphrase (also
called a pre-shared key) of 8-63 characters
o connect to the network, click
nn
the connection, click Cance
To cancel
o connect to the network, click
the connection, click
n
onnect. To cance
ClickFinis
Congratulation
ongratulations! The Adapter is connected to
he network
8
Chapter 3
Th
.
s
.
ess network.
n
:
ode of the
ess network
.
ess network.
y.
.
ck
.
t
e
.
Th
reen
T
.
s
oose one of these networks and click
ect
ect to it. Click
esh
p
y.
T
.
The available networks are
sted
table on the cente
ect
esh
y
.
Advanced Configuration
Profiles
e
rofiles screen lets you save different configuration
rofiles for different network setups. The table on the left displays a list of available profiles with their profile names
nd wireless network names
rofile
ProfileThis is the name of the profile
Delete Select the profile you want to delete and click
Delete
NOTE: If you want to export more than one
profile, you must export them one at a time
reate a New Profile
e next screen is the Available Wireless Networks sc
.
Wireless Network Name This is the SSID or unique
me of the wirel
Profile Informatio
For each profile selected, the following are listed
Wireless Mode This is the m
currently in use
Standard Channel This is the channel used by your
wirel
SecurityThis is the status of the wireless securit
Authentication This is the authentication setting for the
work
IP Address This is the method used by the network to
ssign IP addresses.
Connect To connect to a wireless network using a
specific profile, select the profile, and click
New
section, “Create a New Profile,” for instructions
Edit
Edi
Import
i
w to create a new profile. See the next
elect the profile you want to change and click
lickImport to import a profile that is saved in
nother location. Select the appropriate file, and click
pen
wirel
onnect
vailable Wireless Networks
his screen provides two options for setting up the
apter
Available Wireless Networks (For most users)
option if you already have a network set up. The networks
vailable to this Adapter are listed on this screen. You
n ch conn ireless Networks list.
Advanced Setup
screen, select Advanced Setu
anually. This method is for advanced users onl
he setup for each option is described, step by step, under
the appropriate heading on the following pages
fr
to update the Available
your network is not listed on this
to set up the Adapter
thi
nn
Available Wireless Networks
li
in the
of the screen by Wireless Network Name. Select the wireless
etwork you wish to connect to and click
do not see your network listed, click
ist up again.)
Proceed to the appropriate section, Disabled” or “Wireless Security Enabled”
nn
fr
to bring the
Wireless Securit
r
. (If you
Export Select the profile you want to save in a different
ocation, and click
ppropriate folder, and click
xport Direct Windows to the
v
9
Chapter 3
d
:
y
sh
s
k.
d
.
y
.
T
ect
cel
cel
)
n
scree
.
y
.
T
ect
cel
Advanced Configuration
Wireless Security Disable
If you connect to a network whose wireless security is
isabled, then you will view this screen
lick Connect Anyway
Clickonnect Anywa
lick
Fini
PA2 (Wi-Fi Protected Access 2)
If the network uses WPA2 Personal security, then thePA2-Personal Key Needed for Connection screen
PA2-Personal Securit
Passphrase
called a pre-shared key) of 8-63 characters
o connect to the network, click
the connection, click
nter the network’s Passphrase (also
nn
To can
n
Congratulation
ongratulations! The Adapter is connected to
networ
Wireless Security Enable
If you connect to a network whose wireless security is enabled, then you will view one of three screens
Proceed to the appropriate instructions below for the type of wireless security that the network is using:
PA 2, WPA, or WEP.
PA (Wi-Fi Protected Access
If the network uses WPA Personal security, then
hePA-Personal Key Needed for Connectio
ears
PA-Personal Securit
Passphrase
called a pre-shared key) of 8-63 characters
o connect to the network, click
the connection, click
nter the network’s Passphrase (also
nn
To cancel
n
n
10
Chapter 3
)
y
y.
T
y
lly.)
ly
adecimal characters. Fo
T
ect
cel
cel
k2.
h
s
.
p
ess Networks
p
on the
lable
eless
.
Th
.
ess Netwo
)
ect
.
.
Advanced Configuration
EP (Wired Equivalent Privacy
If the network uses WEP encryption, then the
r Passphrase Needed for Connection
WEP Securit
Passphrase
nter the Passphrase or WEP ke
creen appears.
EP Key
he passphrase is case-sensitive and must be 16 or
ewer alphanumeric characters. It must match the
assphrase of your other wireless network devices
nd is compatible with Linksys wireless products only.
(For non-Linksys wireless products, enter the WEP ke
anua
Advanced Setu
If your network is not listed with the available networks,
se Advanced Setup.
vailable Wirel
ickAdvanced Setu
Networksscreen to set up the Adapter manually
e 2
etwork Settings screen appears.
Avai
Wir
If you enter the network’s WEP key, enter the
ropriate number of hexadecimal characters (“0” to
9” and “A” to “F”). For 64-bit encryption, enter exact
hex
r 128-
it encryption,
enter exactly 26 hexadecimal characters.
o connect to the network, click
the connection, click
Clic
Finis
n
Congratulation
nn
To can
irel
rk
If your network has a router or other DHCP server, select
btain network settings automatically (DHCP
If your network does not have a DHCP server or router,
l
Specify network settings. Enter an IP Address, ubnet Mask, Default Gateway, and DNS addresses ppropriate for your network. You must specify the
IP Address and Subnet Mask on this screen. If you are
nsure about the Default Gateway and DNS addresses,
leave these fields blank.
IP Address
This IP Address must be unique to
our network
ongratulations! The Adapter is connected to
Subnet Mask
he network
the same as your wired network’s Subnet Mask
The Adapter’s Subnet Mask must be
11
Chapter 3
.
to return to the
.
.
.
eless network
d
.
to return to the
.
.
,
.
uto
to return to the
.
.
y
Advanced Configuration
Default Gateway
Enter the IP address of your
network’s Gat eway.
DNS 1 and DNS 2
Enter the DNS address of your
wired Ethernet network
Clickext to continue, or click previous screen.
The
Wireless Mode screen shows a choice of two
wireless modes
If you chose Infrastructure Mode, go to step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen appears
NOTE:The Adapter only supports Ad-Hoc Mode
for 2.4 GHz networks: Wireless-B, Wireless-G
and Wireless-N (using 2.4 GHz)
Ad-Hoc Mode Settings
ireless Mode
Infrastructure Mode
Select this mode if you want
to connect to a wireless router or access point
Ad-Hoc Mode
Select this mode if you want to
onnect to another wireless device directly without
using a wireless router or access point
Wireless Network Name
nter a wir
ame (SSID) that must be used for all devices in
our wireless network. It is case-sensitive an
should be a unique name to help prevent others
rom entering your network
Clickext to continue, or click
revious screen
Standard Channel
elect the correct channel
or your wireless network. If you are unsure about
hich channel to use, keep the default, A
lick Next to continue, or click revious screen
If your wireless network does not have wireless security, select
isable and then click Next to continue. Proceed
o step 6
Wireless Securit
If your wireless network has wireless security, select the method of security used: WEP, WPA Personal,
PA2 Personal, WPA Enterprise, WPA2 Enterprise, or
RADIUS. WEP stands for Wired Equivalent Privacy, and
PA stands for Wi-Fi Protected Access. WPA2 stands
12
Loading...
+ 30 hidden pages