Is there a secret to setting up a Dell 4600 to a Linksys wireless router? (model number WRT54G)? This configuration...
is really very straight-forward. Your 4600 desktop PC probably came with a built-in Intel PRO 10/100 Ethernet network adapter. You could cable that directly to an Ethernet port on your Linksys WRT54G, or you could use wireless instead.
Dell sells a TrueMobile 1300 802.11b/g USB 2.0 network adapter as an option for the 4600. If you purchased that option, then you have everything you need to connect with wireless to your WRT54G. If not, then you'll need to purchase an after-market 802.11b/g PCI or USB adapter for your 4600. For example, see my review of D-Link's DWL-122 USB adapter here.
In either case, use Windows XP's network control panel to connect your 4600 to your WRT54G. I recommend that you start with encryption disabled on your WRT54G and get your 4600's adapter connected first -- you should be able to do that by using just the default parameters. Simply enable the network adapter, use the Windows XP Available Networks control panel to select the name of your WLAN (by default, "linksys"), and accept the connection even though it is not secure.
Once you have that working, you should change the WLAN name (SSID) on your WRT54G and enable security, probably using WPA-PSK. Choose a secret passphrase that is 20+ hard-to-guess characters. Then use the Available Networks control panel again on your 4600 to select your new WLAN's name and enter exactly the same secret passphrase there. Be sure to use exactly the same lower/upper case values, etc.. Now you should be connected securely over wireless. If you fail to connect, follow the illustrated wireless trouble-shooting instructions in your Linksys or Dell documentation.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.