User manual LINKSYS WCF54G

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual LINKSYS WCF54G. We hope that this LINKSYS WCF54G user guide will be useful to you.


LINKSYS WCF54G : Download the complete user guide (760 Ko)

You may also download the following manuals related to this product:

   LINKSYS WCF54G INSTALL GUIDE (457 ko)
   LINKSYS WCF54G PRODUCT BROCHURE (258 ko)

Manual abstract: user guide LINKSYS WCF54G

Detailed instructions for use are in the User's Guide.

[. . . ] ® A Division of Cisco Systems, Inc. 2. 4 GHz Wireless-G 802. 11g CompactFlash Card WIRELESS Model No. User Guide WCF54G Wireless-G CompactFlash Card Copyright and Trademarks Specifications are subject to change without notice. Other brands and product names are trademarks or registered trademarks of their respective holders. WARNING: This product contains chemicals, including lead, known to the State of California to cause cancer, and birth defects or other reproductive harm. Wash hands after handling. How to Use this User Guide The user guide to the CompactFlash Card has been designed to make understanding networking with the Access Point easier than ever. [. . . ] Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is "linksys". ) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Change your SSID regularly so that any hackers who have gained access to your wireless network will have to start from the beginning in trying to break in. MAC Address filtering will allow you to provide access to only those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with a random MAC Address. Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security concerns. Again, this can only provide enough security to make a hacker's job more difficult. Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Pre-Shared Key gives you a choice of two encryption methods: TKIP (Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP. Important: Always remember that each device in your wireless network MUST use the same encryption method and encryption key or your wireless network will not function properly. Appendix B: Wireless Security Security Threats Facing Wireless Networks 29 Wireless-G CompactFlash Card WPA Pre-Shared Key. If you do not have a RADIUS server, select the type of algorithm, TKIP or AES, enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time between 0 and 99, 999 seconds, which instructs the Router or other device how often it should change the encryption keys. (This should only be used when a RADIUS server is connected to the Router or other device. ) First, select the type of WPA algorithm, TKIP or AES. Enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Last, enter a Group Key Renewal period, which instructs the device how often it should change the encryption keys. (This should only be used when a RADIUS server is connected to the Router or other device. ) First, enter the RADIUS server's IP Address and port number, along with a key shared between the device and the server. Then, select a WEP key and a level of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key manually. Implementing encryption may have a negative impact on your network's performance, but if you are transmitting sensitive data over your network, encryption should be used. These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security Security Threats Facing Wireless Networks 30 Wireless-G CompactFlash Card Appendix C: Glossary 802. 11a - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802. 11b - A wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2. 4GHz. 802. 11g - A wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2. 4GHz, and backward compatibility with 802. 11b devices. [. . . ] A label is attached to the equipment that contains, among other information, its FCC registration number and ringer equivalence number. If requested, this information must be provided to the telephone company. An FCC compliant telephone cord and modular plug is provided with this equipment. This equipment is designed to be connected to the telephone network or premises wiring using a compatible modular jack, which is FCC Part 68 compliant. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE LINKSYS WCF54G




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual LINKSYS WCF54G will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.