Netgear WG111U WG111U User Manual - Page 21

Table 2-1., A Road Map for How to Get There From Here, If I Want To?, What's Needed?, What Do I Do?

Page 21 highlights

User's Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U Table 2-1. A Road Map for How to Get There From Here If I Want To? What's Needed? What Do I Do? How Do I? Connect to a wireless network 1. A wireless network 2. A PC within the operating range of the wireless network. For guidelines about the range of wireless networks, see "Observing Location and Range Guidelines" on page 3-2. 1. Identify the wireless network name (SSID) and, if used, the wireless security settings. 2. Set up the WG111U Wireless USB 2.0 Adapter with the settings from step 1. To set up the WG111U, see Chapter 3, "Basic Setup" and follow the instructions provided. To learn about wireless networking technology, see "Wireless Networking Overview" on page B-1 for a general introduction. Protect the 1. A wireless network with wireless authentication and WEP connection from encryption enabled. snooping, 2. Wireless networking hacking, or equipment that supports information WEP encryption, such as theft. the WG111U and all NETGEAR wireless networking products. 1. Assure that the To learn about wireless security, wireless network see "Wireless Networking has security Overview" on page B-1. features enabled. 2. Configure your To understand WEP security WG111U with the features, see "WEP Wireless security settings of Security" on page B-4. the wireless network. To understand WPA security 3. Use Windows features, see "WPA Wireless security features. Security" on page B-8. Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers like Internet Explorer and Netscape. Any wireless networking security features you might implement are in addition to those already in place on secure Internet sites. Introduction 2-5 202-10065-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
Introduction
2-5
202-10065-01
Table 2-1.
A Road Map for How to Get There From Here
If I Want To?
What’s Needed?
What Do I Do?
How Do I?
Connect to a
wireless
network
1.
A wireless network
2.
A PC within the operating
range of the wireless
network. For guidelines
about the range of
wireless networks, see
“Observing Location and
Range Guidelines” on
page 3-2
.
1.
Identify the
wireless network
name (SSID) and,
if used, the
wireless security
settings.
2.
Set up the
WG111U Wireless
USB 2.0 Adapter
with the settings
from step 1.
To set up the WG111U, see
Chapter 3, “Basic Setup”
and
follow the instructions provided.
To learn about wireless
networking technology, see
“Wireless Networking Overview”
on page B-1
for a general
introduction.
Protect the
wireless
connection from
snooping,
hacking, or
information
theft.
1.
A wireless network with
authentication and WEP
encryption enabled.
2.
Wireless networking
equipment that supports
WEP encryption, such as
the WG111U and all
NETGEAR wireless
networking products.
1.
Assure that the
wireless network
has security
features enabled.
2.
Configure your
WG111U with the
security settings of
the wireless
network.
3.
Use Windows
security features.
To learn about wireless security,
see
“Wireless Networking
Overview” on page B-1
.
To understand WEP security
features, see
“WEP Wireless
Security” on page B-4
.
To understand WPA security
features, see
“WPA Wireless
Security” on page B-8
.
Note:
Secure Internet sites such as banks and online merchants use encryption security built into browsers
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in
addition to those already in place on secure Internet sites.