55
O
obtaining an IP address automatically
in Windows 7
. . . . . . . . . . . . . . . . . 46
in Windows Vista . . . . . . . . . . . . . . 48
in Windows XP . . . . . . . . . . . . . . . . 49
operation requirements . . . . . . . . . . . . . 8
P
package contents . . . . . . . . . . . . . . . . . . 8
program icon FRITZ!WLAN . . . . . . . . . . 19
R
recycling of the device . . . . . . . . . . . . . . 6
remote site
establishing a connection
. . . . . . . 22
requirements for operation . . . . . . . . . . 8
S
safety instructions . . . . . . . . . . . . . . . . . 6
security in wireless networks. . . . . . . . 32
settings
FRITZ!WLAN USB Stick N 2.4
. . . . . 41
IP (Internet protocol) . . . . . . . . . . . 46
Stick & Surf. . . . . . . . . . . . . . . 12, 18, 21
support . . . . . . . . . . . . . . . . . . . . . . . . . 52
T
taking over security settings of a
FRITZ!Box
. . . . . . . . . . . . . . . . . . . . . . 12
technical specifications . . . . . . . . . . . . 10
troubleshooting . . . . . . . . . . . . . . . . . . 38
assistance . . . . . . . . . . . . . . . . . . . 51
diagnostics. . . . . . . . . . . . . . . . . . . 38
U
uninstallation . . . . . . . . . . . . . . . . . . . . 37
W
WEP key . . . . . . . . . . . . . . . . . . . . . . . . .33
WEP security mechanism . . . . . . . . . . .33
Wi-Fi Protected Setup . . . . . . . . . . . . . .35
Windows 7, installing in . . . . . . . . . . . .14
Windows Vista, installing in . . . . . . . . .14
Windows XP, installing in . . . . . . . . . . .16
wireless networks . . . . . . . . . . . . . . . . 29
WLAN
access point
. . . . . . . . . . . . . . . . . .21
ad-hoc network . . . . . . . . . . . . . . . .21
connecting via an access point . . 22
connecting with FRITZ!WLAN. . . . . .21
connecting with Microsoft WLAN
service
. . . . . . . . . . . . . . . . . . . . .25
connection between WLAN adapters22
direct connection . . . . . . . . . . . . . 22
encryption . . . . . . . . . . . . . . . . . . . .33
frequency range . . . . . . . . . . . . . . .34
icon in the task bar . . . . . . . . . . . . 22
infrastructure network . . . . . . . . . .21
more information . . . . . . . . . . . . . 30
network key. . . . . . . . . . . 22, 26, 27
remote site . . . . . . . . . . . . . . . . . . .21
security . . . . . . . . . . . . . . . . . . . . . .32
standards . . . . . . . . . . . . . . . . . . . 30
taking over security settings. . . . . .12
transmission channels . . . . . . . . . .34
troubleshooting . . . . . . . . . . . . . . .41
types of WLAN connections . . . . . .21
using Stick & Surf for connections .12
Wi-Fi Protected Setup . . . . . . . . . . .35
WPS . . . . . . . . . . . . . . . . . . . . . . . . .35
WLAN devices
searching for
. . . . . . . . . . . . . . . . . 22
WPA security mechanisms . . . . . . . . . .33
WPS . . . . . . . . . . . . . . . . . . . . . . . . . . . .35