Netgear WG121 WG121 User Manual - Page 20

Table 2-1., A Road Map for How to Get There From Here, If I Want To?, What Do I Do?, What's Needed?

Page 20 highlights

User Manual for the NETGEAR 54 Mbps Wireless USB 2.0 Adapter WG121 Table 2-1. A Road Map for How to Get There From Here If I Want To? What Do I Do? What's Needed? How Do I? Connect to a wireless network 1. Identify the wireless network name (SSID) and, if used, the wireless security settings. 2. Set up the 1. A wireless network 2. A PC within the operating range of the wireless network. To set up the WG121, see Chapter 3, "Basic Setup" and follow the instructions provided. For guidelines about the range of wireless networks, see "Observing Location and Range Guidelines" on page 3-2. To learn about wireless networking technology, see Appendix B, "Wireless Networking Basics" for a general introduction. NETGEAR 54 Mbps Wireless USB 2.0 Adapter WG121 with the settings from step 1. Protect my 1. Assure that the 1. A wireless network with wireless wireless authentication and WEP connection from network has encryption enabled. snooping, hacking, or information theft. security features enabled. 2. Configure my 2. Wireless networking equipment that supports WEP encryption, such as the WG121 and all NETGEAR WG121 with wireless networking products. the security settings of the wireless network. 3. Use Windows security features. To learn about wireless networking security, see "Authentication and WEP" on page B-2. To use WEP security features, see "Enabling Wireless Security Features" on page 4-6 and configure your WG121 accordingly. Note: Secure Internet sites such as banks and online merchants use encryption security built into browsers like Internet Explorer and Netscape. Any wireless networking security features you might implement are in addition to those already in place on secure Internet sites. 2-4 Introduction

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81

User Manual for the NETGEAR 54 Mbps Wireless USB 2.0 Adapter WG121
2-4
Introduction
Table 2-1.
A Road Map for How to Get There From Here
If I Want To?
What Do I Do?
What’s Needed?
How Do I?
Connect to a
wireless
network
1.
Identify the
wireless
network name
(SSID) and, if
used, the
wireless
security
settings.
2.
Set up the
NETGEAR 54
Mbps Wireless
USB 2.0
Adapter
WG121 with
the settings
from step 1.
1.
A wireless network
2.
A PC within the operating
range of the wireless network.
For guidelines about the range
of wireless networks, see
“Observing Location and
Range Guidelines” on
page 3-2
.
To set up the WG121, see
Chapter 3, “Basic Setup”
and
follow the instructions provided.
To learn about wireless
networking technology, see
Appendix B, “Wireless
Networking Basics”
for a
general introduction.
Protect my
wireless
connection from
snooping,
hacking, or
information
theft.
1.
Assure that the
wireless
network has
security
features
enabled.
2.
Configure my
WG121 with
the security
settings of the
wireless
network.
3.
Use Windows
security
features.
1.
A wireless network with
authentication and WEP
encryption enabled.
2.
Wireless networking
equipment that supports WEP
encryption, such as the
WG121 and all NETGEAR
wireless networking products.
To learn about wireless
networking security, see
“Authentication and WEP” on
page B-2
.
To use WEP security features,
see
“Enabling Wireless Security
Features” on page 4-6
and
configure your WG121
accordingly.
Note:
Secure Internet sites such as banks and online merchants use encryption security built into browsers
like Internet Explorer and Netscape. Any wireless networking security features you might implement are in
addition to those already in place on secure Internet sites.