EW-7722UTn V2 EW-7612UAn V2 User Manual

EW-7722UTn V2 EW-7612UAn V2 User Manual
EW-7722UTn V2
EW-7612UAn V2
User Manual
10-2011 / v1.0
Copyright by Edimax Technology Co, LTD. all rights reserved.
No part of this
publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
or translated into any language or computer language, in any form or by any means,
electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the
prior written permission of this Company .
This company makes no representations or warranties, either expressed or implied,
with respect to the contents hereof and specifically disclaims any warranties,
merchantability or fitness for any particular purpose. Any software described in this
manual is sold or licensed "as is". Should the programs prove defective following their
purchase, the buyer (and not this company, its distributor, or its dealer) assumes the
entire cost of all necessary servicing, repair, and any incidental or consequential
damages resulting from any defect in the software. Further, this company reserves the
right to revise this publication and to make changes from time to time in the contents
here of without obligation to notify any person of such revision or changes.
The product you have purchased and the setup screen may appear slightly different
from those shown in this QIG. For more detailed information about this product, please
refer to the User Manual on the CD-ROM. The software and specifications are subject
to change without notice. Please visit our web site www.edimax.com for the update.
All rights reserved including all brand and product names mentioned in this manual
are trademarks and/or registered trademarks of their respective holders .
Federal Communication Commission
Interference Statement
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
4. Consult the dealer or an experienced radio technician for help.
FCC Caution
This device and its antenna must not be co-located or operating in conjunction with
any other antenna or transmitter.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) this device may not cause harmful interference, and (2)
this device must accept any interference received, including interference that may
cause undesired operation.
Any changes or modifications not expressly approved by the party responsible for
compliance could void the authority to operate equipment.
Federal Communication Commission (FCC) Radiation Exposure Statement
This EUT is compliance with SAR for general population/uncontrolled exposure limits
in ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement
methods and procedures specified in OET Bulletin 65 Supplement C.
The equipment version marketed in US is restricted to usage of the channels 1-11
only.
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE
EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio
equipment and telecommunication terminal Equipment and the mutual recognition of
their conformity (R&TTE)
The R&TTE Directive repeals and replaces in the directive 98/13/EEC
(Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As
of April 8, 2000.
Safety
This equipment is designed with the utmost care for the safety of those who install and
use it. However, special attention must be paid to the dangers of electric shock and
static electricity when working with electrical equipment. All guidelines of this and of
the computer manufacture must therefore be allowed at all times to ensure the safe
use of the equipment.
EU Countries Intended for Use
The ETSI version of this device is intended for home and office use in Austria,
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg,
the Netherlands, Portugal, Spain, Sweden, and the United Kingdom.
The ETSI version of this device is also authorized for use in EFTA member states:
Iceland, Liechtenstein, Norway, and Switzerland.
EU Countries Not intended for use
None.
CONTENTS
1
INTRODUCTION .................................................................................... 1
1.1 Features ......................................................................................................... 1
1.2 Specifications .................................................................................................. 1
1.3 Package Contents .......................................................................................... 2
2
INSTALLATION PROCEDURE ................................................................ 3
3
CONFIGURATION UTILITY .................................................................. 17
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
4
Utility Overview ............................................................................................. 18
Available Network ......................................................................................... 20
General ......................................................................................................... 21
Profile ........................................................................................................... 23
3.4.1 Configure the Profile ............................................................. 24
Status............................................................................................................ 29
Statistics ....................................................................................................... 30
Wi-Fi Protect Setup (WPS) ........................................................................... 31
Software AP .................................................................................................. 35
3.8.1 AP Properties Setting ............................................................ 37
3.8.2 AP Advanced ........................................................................ 40
3.8.3 AP Statistics.......................................................................... 41
3.8.4 SoftAP .................................................................................. 42
TROUBLESHOOTING .......................................................................... 43
1 Introduction
Thank you for purchasing this high-speed wireless network card! Excepting common
wireless standards 802.11b/g, this wireless network card is also able to access
802.11n wireless networks - data transfer rate is 300Mbps!
For WLAN security issues, this adapter supports 64/128-bit WEP data encryption that
protects your wireless network from eavesdropping. It also supports WPA (Wi-Fi
Protected Access) feature technology. Client users are required to authorize before
accessing to APs or AP Routers, and the data transmitted in the network is
encrypted/decrypted by a dynamically changed secret key. Furthermore, this adapter
supports WPA2 function, WPA2 provides a stronger encryption mechanism through
AES (Advanced Encryption Standard), which is a requirement for some corporate and
government users.
This adapter is cost-effective, together with the versatile features; it is the best
solution for you to build your wireless network.
1.1 Features









Work with 802.11b/g/n wireless network devices.
High-speed transfer data rate - up to 300 Mbps.
Supports Green WLAN to reduce power consumption.
Supports hardware/software WPS button
High throughput supports multi-media data bandwidth requirement.
Support 64/128-bit WEP Data Encryption, WPA, WPA2.
Automatic fallback increases data security and reliability.
Supports the most popular operating system: Windows XP/Vista/7.
Supports USB 2.0 interface.
1.2 Specifications




Standard: IEEE 802.11b/g/n
Interface: USB 2.0 Type A
Frequency Band: 2.4000 ~ 2.4835GHz (Industrial Scientific Medical Band)
Data Rate:
11b: 1/2/5.5/11Mbps
11g: 6/9/12/24/36/48/54Mbps
11n (20MHz): MCS0-15 (up to 150Mbps)
11n (40MHz): MCS0-15 (up to 300Mbps)

Security: 64/128-bit WEP Data Encryption, WPA, WPA2
1

Antenna: Chip Antenna (EW-7722UTn V2)
High-Gain 3dBi Antenna (EW-7612UAn V2)





Hardware WPS button
Drivers: Windows XP/Vista/7
LEDs: Link/Activity
Temperature: Operating 32~104°F (0 ~40°C), Storage -13~149°F (-25~65°C)
Humidity: Max. 95% (Non-Condensing)
1.3 Package Contents
Before you begin the installation, please check the items of your package. The
package should include the following items:




One USB Adapter (EW-7722UTn V2 / EW-7612UAn V2)
One USB Cable
One CD (Utility / Multi-Language QIG / User‟s Manual)
One Quick Guide
If any of the above items is missing, contact your supplier as soon as possible.
2
2 Installation Procedure
Before you proceed with the installation, please notice following descriptions.
Note1: The following installation was operated under Windows XP.
(Procedures are similar for Windows Vista/7.)
Note2: If you have installed the Wireless PC Adapter driver & utility before,
please uninstall the old version first.
Hardware Installation
EW-7722UTn V2
1. Link/Activity LED (Under the case)
2. WPS Button
1
2
LED Name
Light Status
Description
Link/
Off
No wireless network card is installed.
Activity
On
Solid light 5 seconds means WPS connection is
established successfully.
Blinking
Wireless network card is normally installed
/Linked to a wireless access point .
Transferring or receiving data.
Fast Blinking three times per second means
WPS is activated. The network card will wait for 2
minutes to establish WPS connection.
3
EW-7612UAn V2
1. USB connector
2. Link/Activity LED (Under the case)
3. WPS Button
1
2
3
LED Name
Link/
Activity
Light Status Description
Off
No wireless network card is installed.
On
Blinking
Solid light 5 seconds means WPS connection
is established successfully.
Wireless network card is normally installed
/Linked to a wireless access point /
Transferring or receiving data.
Fast Blinking three times per second means
WPS is activated. The network card will wait
for 2 minutes to establish WPS connection.
4
Insert the USB wireless network card into an empty USB 2.0 port of your computer
when computer is switched on .
EW-7722UTn V2
EW-7612UAn V2
Never use force to insert the card, if you feel it’s stuck, flip the card over
and try again.
5
The following message will appear on your computer, click „Cancel‟
Software Installation
This wizard can be run in Windows XP/Vista/7.
You can install the Wireless Adapter by EZMAX Setup Wizard in the CD-ROM
including in the package. The wizard is an easy and quick configuration tool for
internet connection with series process. When you start EZMAX Setup Wizard, you
will get the following welcome screen. Please choose the language to start the
configuration. The wizard will guide you to finish your network connection. We will not
provide any instruction for the EZMAX Setup Wizard here.
If you lose the CD ROM or you prefer the traditional setup procedure, please follow
the instruction as following step in user manual.
6
I.
Install the Driver and Utility
If you prefer the traditional setup procedure. Please insert the installation CD to your
CD-ROM Drive, and click “ Exit “ to disable EZmax Wizard.
If your OS is Windows Vista/7. Please execute the “ Utility \ Setup.exe “ program as
follows.
7
Click “Next” to go to the next step.
8
Now you‟ll see the following message, please click „Install‟ to begin the installation.
The system starts to install the driver and utility.
Click “Finish” to complete the driver and utility installation.
9
II. Connect to Wireless Access Point
A.
To start configuring the adapter, double click the icon in the system tray or right click
the icon and select open configuration utility.
B.
The utility of the adapter is displayed. Click “Available Network” and double-click on
the wireless access point you want to connect to.
If the wireless access point you wish to connect does not appear here, you can click
„Refresh‟ button to scan for wireless access points again; if the wireless access point
you‟re looking for still not appear, try to move the computer closer.
When the access point you‟re looking for is on the list, left-click it and then double click
it or click „Add to Profile‟
If a password (a.k.a. „Network Key‟) is required to access the wireless access point,
please input it in „Network key‟ (and input it again in „Confirm network key‟ for
confirmation). Click „OK‟ when password is properly inputted.
10
NOTE: Network security type (‘Network Authentication’ and ‘Data encryption’) will be
selected automatically based on wireless access point’s security setting. It’s not required to
change these settings by yourself.
C.
Input the security setting (WEP key) and click “OK” to start network connection.
All options in this page will be filled automatically according to the access point you
wish to add to profile. However, you can still modify any of them to meet your
requirement.
Profile name
Network Name (SSID)
This is a
computer-to-computer
(ad hoc) network
Channel
You can give a name to this profile, so you can
remember its purpose easily. It can be any
phrase to help you remember.
The SSID (Service Set ID entifier, i.e. access
point‟s name). This field will be filled as the
access point you selected when SSID is not
hidden and grayed out. If SSID is hidden, you
have to input correct SSID you yourself.
Check this box if you wish to connect to another
computer / network device by ad hoc method.
When not accessing to wireless access point,
you have to check this box.
Select wireless channel for ad hoc connection.
This option only appears when you‟re using ad
11
Network
Authentication
Data encryption
ASCII / PASSPHRASE
Key index
Network key / Confirm
network key
EAP TYPE / Tunnel /
Provision Mode
Username / Identity /
Domain / Password
Certificate
PAC
hoc connection.
Select the network authentication type from
drop-down menu. This setting must be identical
with the setting of wireless access point you with
to connect.
Select the data encryption type from drop-down
menu. This setting must be identical with the
setting of wireless access point you with to
connect.
When the encryption type is „WEP‟, it‟s required
to input a set of „passphrase‟ to connect to
wireless access point. Check „ASCII‟ or
„PASSPHRASE‟ depends on the security setting
of access point, and input it in the box; if you
select „PASSPHRASE‟ you also need to select
the length of the key.
The passphrase must be identical with the setting
of wireless access point you with to connect.
Select WEP key index. For most of access points
you can select „1‟, but please refer to the setting
of the access point.
When the encryption type is „WPA‟ or
„WPA2-PSK‟, it‟s required to input a set of
„passphrase‟ to connect to wireless access point.
Please input the same passphrase in two boxes
for confirmation.
When authentication type is any of 802.1X, you
have to select EAP type, tunnel, and provision
mode from dropdown menu. This setting must be
identical with your 802.1x authentication server.
Please input 802.1x related authentication
information here.
If certification is required to authenticate with
802.1x authentication server, please select a
local certificate from dropdown list.
Check this box and PAC (Privilege Access
Certificate) will be automatically selected.
Please click „OK‟ when ready.
Network card will attempt to connect to access point now, this may require few
seconds to minutes, please be patient. When the „Status‟ become „Associated‟,
your computer is connected to access point you selected. Click „Close‟ to close
configuration menu.
12
NOTE: If you connected to an access point but the connection has been dropped soon, please
check security settings and re-check password spelling.
13
* Use Windows Zero Configuration on Windows Vista:
A.
For Windows Vista user, you can use Windows Zero Configuration to connect to
wireless access point.
Click „Start‟ button, then click „Control Panel. Click „Network and Internet‟ in Control
Panel.
B.
Click „Connect to a network‟ under „Network and Sharing Center‟
14
C.
Click the access point you want to use if it‟s shown, then click „Connect‟.
D.
If it‟s an unnamed access point (i.e. the SSID of this wireless access point is
hidden), you‟ll be prompted to input it‟s name, and the name must be identical to
the SSID setting of the wireless access point you‟re connecting to.
15
E.
If the access point is protected by encryption method, you have to input its security
or passphrase here. It must match the encryption setting on the access point.
F.
If you can see this image, the connection between your computer and wireless
access point is successfully established. Click „Close‟ to start network connection.
16
3 Configuration Utility
The Configuration Utility is a powerful application that helps you configure the
Wireless LAN Mini USB Adapter and monitor the link status and the statistics during
the communication process.
The Configuration Utility appears as an icon on the system tray and desktop of
Windows. You can open it by double-click on the icon.
Right click the icon in the system tray there are some items for you to operate the
configuration utility.

Open Config Utility
Select “Open Config Utility” to open the configuration utility.

About
Select “About” to show the utility information.

Hide

Select “Hide” to hide the utility in the system tray.

Quit
Select “Quit” to quit the utility in the system tray.
In the Desktop
click)
In the System Tray
17
In the System Tray(Right
3.1
Utility Overview
There are several parts in the utility screen. Please refer to the following table for the
description.
A
D
B
E
C
Parameter
A
B
C
Description
Refresh – Refresh adapter list in the “B“ block.
Mode – There are two modes: Station and Access
Point. If “Station“ is selected, the adapter works as a
wireless adapter. If “Access Point“ is selected, the
adapter will works as a wireless AP.
View – Enable “Status Bar“ and the “D“ block in the
utility will display the current status of the utility.
About – To check the version of the utility, select this
item.
This is a list for you to configure several adapters in
your PC from the utility.
Show Tray Icon – To show the icon in the system tray,
select the item.
Disable Adapter – This function is for you to disable or
enable the adapter.
Windows Zero Config – To configure the adapter from
18
Windows XP Zero Configuration, check the item.
Radio Off – This function is for you to turn off or turn
on the radio of the adapter. If the radio is turned off, the
adapter will not work.
D
E
It is the status bar that displays the current status of the
utility. To close it, please disable the “Status Bar“ in the
“View“ item.
There are several tabs in the block for you to setup the
function of the adapter. Please refer to the description
in the following sections.
19
3.2
Available Network
When you open the Configuration Utility, the system will scan all the channels to find
all the access points/stations within the accessible range of your adapter and
automatically connect to the wireless network with the highest signal strength. From
the “Available Network” tab, all the networks nearby will be listed. You can change the
connection to another network.
Parameter
Available Network(s)
Description
This list shows all information of the available wireless
networks within the range of your adapter. The
information includes SSID, Channel, Encryption,
Network Authentication, Signal and etc. If you want to
connect to any network on the list, double-click the
selected network.
Refresh
Click “Refresh“ to update the available networks list. It
is recommended that refresh the list while you have
changed the connection network.
Add to Profile
A profile stores the setting of a network, so that you can
connect to the network quickly. To add the selected
network to a profile, click this button.
20
3.3
General
To check the connection status of the adapter, select “General“. This screen shows
the information of Link Speed, Network Type, Encryption Method, SSID, Signal
Strength, Link Quality and Network Address of the adapter.
Parameter
Status
Description
Speed
It shows the current speed
Type
Infrastructure – This operation mode requires the
presence of an 802.11 Access Point. All
communication is done via the Access Point or Router.
IBSS – Select this mode if you want to connect to
another wireless stations in the Wireless LAN network
without through an Access Point or Router.
It will show the connection status of the adapter.
IBSS – Select this mode if you want to connect to
another wireless stations in the Wireless LAN network
without through an Access Point or Router.
Encryption
It displays the encryption setting of the current
21
connection including None, WEP, TKIP or AES.
SSID
The SSID (up to 32 printable ASCII characters) is the
unique name identified in a WLAN. The ID prevents the
unintentional merging of two co-located WLANs.
Signal Strength
It indicates the wireless signal strength.
Link Quality
It indicates the wireless link quality.
Network Address
It shows the MAC, IP address and other information of
the adapter.
22
3.4
Profile
The “Profiles List” is for you to manage the networks you connect to frequently. You
are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile.
Parameter
Available Profile(s)
Description
This list shows the preferred networks for the wireless
connection. You can add, remove, edit, duplicate the
preferred networks or set one of the networks as the
default connection.
Add/ Remove/ Edit Button
Click these buttons to add/ delete/ edit the selected
profiles.
Duplicate
If you like to build up the new profile with the same
settings as the current profile, then you can select this
feature.
Set Default
To designate a profile as the default network for the
connection from the available profiles list, click the
button.
23
3.4.1
Configure the Profile
Parameter
Profile Name
Description
Define a recognizable profile name for you to identify
the different networks ( Access Point ).
Network Name (SSID)
The SSID (up to 32 printable ASCII characters) is the
unique name identified in a WLAN. The ID prevents the
unintentional merging of two co-located WLANs.
You may specify a SSID for the adapter and then only
the device with the same SSID can interconnect to the
adapter.
This is a
computer-to-computer
(ad hoc) network; wireless
access points are not used.
There are two kinds of network type described as
follows.
Infrastructure – This operation mode requires the
presence of an 802.11 Access Point. All
communication is done via the Access Point or Router.
Ad Hoc – Connect to another wireless adapter in the
Wireless LAN network without through an Access Point
24
or Router.
Channel
Network Authentication
If this item is selected, the adapter will work in Ad Hoc
mode.
This setting is only available for Ad Hoc mode. Select
the number of the radio channel used for the
networking. The channel setting should be the same
with the network you are connecting to.
This setting has to be consistent with the wireless
networks that the adapter intends to connect.
Open System – No authentication is needed among
the wireless network.
Shared Key – Only wireless stations using a shared
key (WEP Key identified) are allowed to connecting
each other.
WPA-PSK – It is a special mode designed for home
and small business users who do not have access to
network authentication servers. In this mode, known as
Pre-Shared Key, the user manually enters the starting
password in their access point or gateway, as well as in
each wireless stations in the network. WPA-PSK takes
over automatically from that point, keeping
unauthorized users that don‟t have the matching
password from joining the network, while encrypting
the data traveling between authorized devices.
WPA2-PSK – WPA2-PSK is also for home and small
business. The difference between WPA-PSK and
WPA2-PSK is that WPA2-PSK provides data
encryption via the AES. In contrast, WPA-PSK uses
Temporal Key Integrity Protocol (TKIP).
WPA 802.1X – WPA provides a scheme of mutual
authentication using either IEEE 802.1x/Extensible
Authentication Protocol (EAP) authentication or
pre-shared key (PSK) technology. It provides a high
level of assurance to enterprises, small businesses
and home users that data will remain protected and
that only authorized users may access their networks.
For enterprises that have already deployed IEEE
802.1x authentication, WPA offers the advantage of
leveraging existing authentication databases and
infrastructure.
25
WPA2 802.1X – Like WPA, WPA2 supports IEEE
802.1x/EAP authentication or PSK technology. It also
includes a new advanced encryption mechanism using
the Advanced Encryption Standard (AES). AES is
required to the corporate user or government users.
The difference between WPA and WPA2 is that
WPA2 provides data encryption via the AES. In
contrast, WPA uses Temporal Key Integrity Protocol
(TKIP).
Parameter
Data Encryption
WEP 802.1X – It‟s a special mode for using IEEE
802.1x/EAP technology for authentication and WEP
keys for data encryption.
Description
Disabled – Disable the WEP Data Encryption.
WEP – Enable the WEP Data Encryption. When the
item is selected, you have to continue setting the WEP
Encryption keys.
TKIP – TKIP (Temporal Key Integrity Protocol)
changes the temporal key every 10,000 packets (a
packet is a kind of message transmitted over a
network.) This insures much greater security than the
standard WEP security.
AES – AES has been developed to ensure the highest
degree of security and authenticity for digital
information and it is the most advanced solution
defined by IEEE 802.11i for the security in the wireless
network.
Note: All devices in the network should use the same
encryption method to ensure the communication.
ASCII
WEP Key can be ASCII format. Alphanumeric values
or signs are allowed to be the WEP key. It is more
recognizable for user.
PASSPHRASE
It is a text string with a maximum of 32 alphanumeric
characters, for example: “Test“. The WEP Key is based
upon the Passphrase determined by you. This
passphrase may not work with other vendors‟ products
due to possible incompatibility with other vendors‟
passphrase generators. You must use the same
passphrase or WEP key settings for all wireless
26
computers within the network.
Key Length
When you select the “WEP and “PASSPHRASE“ and
this function will display in the current status of the
utility.
The keys are used to encrypt data transmitted in the
wireless network. Fill the text box by following the rules
below.
64-bit – Input 10-digit Hex values as the encryption
keys. For example: “0123456aef“.
128-bit – Input 26-digit Hex values as the encryption
keys. For example: “01234567890123456789abcdef“.
Key Index (advanced)
Select one of the four keys to be the data encryption
key.
Network Key
Parameter
Please enter network security key here to make sure
the password is correct.
Description
Confirm Network Key
Please enter network security key here again.
EAP Type
GTC – GTC is an authentication protocol which allows
the exchange of clear text authentication credentials
across the network.
TLS – TLS is the most secure of the EAP protocols but
not easy to use. It requires that digital certificates be
exchanged in the authentication phase. The server
presents a certificate to the client. After validating the
server‟s certificate, the client presents a client
certificate to the server for validation.
LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol,
with many of the features of EAP protocols. Cisco
controls the ability of other vendors to implement this
protocol, so it should be selected for use only when
limited vendor choice for client, access-point, and
server products is not a concern. When you have set
up LEAP authentication, you have to enter the user
name and password of your computer.
PEAP & TTLS – PEAP and TTLS are similar and
easier than TLS in that they specify a stand-alone
authentication protocol be used within an encrypted
tunnel. TTLS supports any protocol within its tunnel,
27
including CHAP, MSCHAP, MSCHAPv2 and PAP.
PEAP specifies that an EAP-compliant authentication
protocol must be used; this adaptor supports MD5,
TLS, GTC (Generic Token Card) and MSCHAPv2. The
client certificate is optional required for the
authentication.
Tunnel
Includes MD5, GTC, TLS, MSCHAP-v2.
Username
The certificate username in the RADIUS server.
Identity
User‟s identity in the RADIUS server.
Password
User‟s password in the RADIUS server.
Certificate
Select the certificate for RADIUS server authentication
.
28
3.5
Status
This screen shows the information of manufacturer, driver version, settings of the
wireless network the adapter is connecting to, linking time and link status. If you don‟t
ensure the status of the adapter and the network you are connecting, please go to the
screen for more details.
29
3.6
Statistics
You can get the real time information about the packet transmission and receiving
status during wireless communication from the screen. If you want to recount the
statistics value, please click “Reset“.
30
3.7
Wi-Fi Protect Setup (WPS)
Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes
wireless network setup become very simple. If you have WPS-enabled wireless
access point, and you want to establish a secure connection to it, you don‟t have to
configure the wireless access point and setup data encryption by yourself. All you
have to do is to go to the WPS setup page of this wireless card, click the PBC or PIN
button, and then press a WPS button or enter a set of 8-digit code on the wireless
access point you wish to establish a secure connection.
I.
Pin Input Config (PIN)
1. The PIN code of your wireless network card is an eight-digit number located
at the upper-right position of configuration utility. Remember it, and input
the number to your wireless access point as the WPS PIN code (Please
refer to the user manual of your wireless access point for instructions about
how to do this)
2. Click „Pin Input Config (PIN)‟ button now, and the following message will
appear on your computer, click „Yes‟ to select a specific wireless access
point or click „No‟ to start PIN method of WPS .
31
3. If you click „Yes‟, and the following message will appear on your computer,
please select the SSID of wireless access point that you wish to connect
and click „Select‟.
4. Please wait while the install procedure is running and wait for few seconds
to two minutes. If a wireless access point with correct PIN code is found,
you‟ll be connected to that access point.
32
II.
Push Button Config (PBC)
1. Start PBC pairing procedure at access point side (please refer to the
instruction given by your access point‟s manufacturer), then click „PBC‟
button in wireless configuration utility to start to establish wireless
connection by WPS. Please be patient (This may require several seconds
to one minute to complete).
33
2. When the connection between this wireless network card and access point
is successfully established by WPS, and the information about access point
you connected to will be displayed.
34
3.8
Software AP
Excepting become a wireless client of other wireless access points, this wireless
card can act as a wireless service provider also! You can switch this wireless
card‟s operating mode to „AP‟ mode to simulate the function of a real wireless
access point by software, and all other computers and wireless devices can
connect to your computer wirelessly, even share the internet connection you
have!
Please follow the instructions in following chapters to use the AP function of your
wireless card
Select „Mode‟, and then select „Access Point‟
After mode switch is complete, you‟ll see general information of software AP, which
shows AP‟s SSID and connected wireless clients.
35
Parameter
SSID
Description
The SSID (up to 32 printable ASCII characters) is the
unique name identified in a WLAN. The ID prevents the
unintentional merging of two co-located WLANs.
The default SSID of the AP is Full Computer Name +
“_AP“. Wireless adapters connect to the AP should set
up the same SSID as the AP.
BSSID
Display the MAC address of the adapter.
Associate Table
All the wireless adapters connected to the software AP
will be displayed in the list.
Config
Click “Config“ for setting more configuration of the AP.
36
3.8.1
AP Properties Setting
To configure software AP, please click “ Config” button.
37
Please note that Ad-Hoc mode is not available when network card is in AP mode. The
description of major setup items are listed below:
Network Name (SSID)
Please input the SSID (the name used to identify this
wireless access point) here. Up to 32 numerical
characters can be accepted here, excepting space.
Channel
Please select the wireless channel you wish to use,
from 1 to 13.
To save changes, click „OK‟; otherwise click „Cancel‟ to leave this menu and keep
settings untouched.
To setup security options for Soft-AP, configure „Wireless Network Security‟ section as
follow:
The description of setup items about wireless security are listed below:
Network Authentication
Data Encryption
Select network authentication mode from dropdown
menu.
Select data encryption method from dropdown
38
ASCII / PASSPHRASE
Key Index
Network key / Confirm
network key
menu.
If the encryption method is WEP, check either „ASCII‟
or „PASSPHRASE‟ box and input it in the box as
WEP passphrase.
Select WEP key index (1-4). If you don‟t know which
one you should use, select 1.
IF network authentication mode is WPA, please input
WPA passphrase in both box.
To save changes, click „OK‟; otherwise click „Cancel‟ to leave this menu and keep
settings untouched.
39
3.8.2
AP Advanced
If you want to setup advanced settings of software access point, select „Advanced‟
menu. If you don‟t know the meaning and affects of these settings, keep them
untouched.
Parameter
Beacon Interval
Description
Beacon Interval that specifies the duration between
beacon packets (milliseconds). The range for the
beacon period is between 20-1000 milliseconds with a
typical value of 100.
DTIM Period
Determines the interval the Access Point will send its
broadcast traffic. Default value is 3 beacons.
Preamble
The preamble defines the length of the CRC block for
communication among the wireless stations. There are
two mode including Long and Short. High network
traffic areas should use the shorter preamble type.
Set Defaults
Set the setting values return to defaults.
Apply
Confirm the settings in the “Advanced“.
40
3.8.3
AP Statistics
You can get the real time information about the packet transmission and receiving
status during wireless communication from the screen. If you want to recount the
statistics value, please click “Reset“.
41
3.8.4
ICS
In this page, you can assign a network card on your computer as the path for all
wireless clients to get connected to Internet.
If you have only one network card (except this software access point), you don‟t have
to select network card here; if you have more than one network card, select the one
you wish to be used as Internet gateway.
42
4 Troubleshooting & Glossary
This chapter provides solutions to problems usually encountered during the
installation and operation of the adapter.
If you encounter any problem when you‟re using this wireless network card, don‟t
panic! Before you call your dealer of purchase for help, please check this
troubleshooting table, the solution of your problem could be very simple, and you can
solve the problem by yourself!
Scenario
I can‟t find any wireless
access point / wireless
device in „Site Survey‟
function.
Nothing happens when I
click „Open Config Utility‟
I can not establish
connection with a certain
wireless access point
Solution
1. Click „Rescan‟ for few more times and see if you
can find any wireless access point or wireless
device.
2. Please move closer to any known wireless access
point.
3. „Ad hoc‟ function must be enabled for the wireless
device you wish to establish a direct wireless link.
4. Please adjust the position of network card (you
may have to move your computer if you‟re using a
notebook computer) and click „Rescan‟ button for
few more times. If you can find the wireless
access point or wireless device you want to
connect by doing this, try to move closer to the
place where the wireless access point or wireless
device is located.
1. Please make sure the wireless network card is
inserted into your computer‟s USB port.
2. Reboot the computer and try again.
3. Remove the card and insert it into another USB
port.
4. Remove the driver and re-install.
5. Contact the dealer of purchase for help.
1. Click „Add to Profile‟ for few more times.
2. If the SSID of access point you wish to connect is
hidden (nothing displayed in „SSID‟ field in „Site
Survey‟ function), you have to input correct SSID
of the access point you wish to connect. Please
contact the owner of access point to ask for
correct SSID.
3. You have to input correct passphrase / security
key to connect an access point with encryption.
Please contact the owner of access point to ask
for correct passphrase / security key.
4. The access point you wish to connect only allows
network cards with specific MAC address to
establish connection. Please go to „Status‟ menu
and write the value of „MAC Address‟ down, then
present this value to the owner of access point so
43
The network is slow /
having problem when
transferring large files
he / she can add the MAC address of your
network card to his / her access point‟s list.
1. Move closer to the place where access point is
located.
2. There could be too much people using the same
radio channel. Ask the owner of the access point
to change the channel number.
Please try one or more solutions listed above.
Glossary
1. What is the IEEE 802.11g standard?
802.11g is the new IEEE standard for high-speed wireless LAN communications
that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly
becoming the next mainstream wireless LAN technology for the home, office and
public networks.
802.11g defines the use of the same OFDM modulation technique specified in
IEEE 802.11a for the 5 GHz frequency band and applies it in the same 2.4 GHz
frequency band as IEEE 802.11b. The 802.11g standard requires backward
compatibility with 802.11b.
The standard specifically calls for:
A. A new physical layer for the 802.11 Medium Access Control (MAC) in the 2.4
GHz frequency band, known as the extended rate PHY (ERP). The ERP adds
OFDM as a mandatory new coding scheme for 6, 12 and 24 Mbps (mandatory
speeds), and 18, 36, 48 and 54 Mbps (optional speeds). The ERP includes
the modulation schemes found in 802.11b including CCK for 11 and 5.5 Mbps
and Barker code modulation for 2 and 1 Mbps.
B. A protection mechanism called RTS/CTS that governs how 802.11g devices
and 802.11b devices interoperate.
2. What is the IEEE 802.11b standard?
The IEEE 802.11b Wireless LAN standard subcommittee, which formulates the
standard for the industry. The objective is to enable wireless LAN hardware from
different manufactures to communicate.
3. What does IEEE 802.11 feature support?
The product supports the following IEEE 802.11 functions:






CSMA/CA plus Acknowledge Protocol
Multi-Channel Roaming
Automatic Rate Selection
RTS/CTS Feature
Fragmentation
Power Management
44
4. What is Ad-hoc?
An Ad-hoc integrated wireless LAN is a group of computers, each has a
Wireless LAN adapter, Connected as an independent wireless LAN. Ad hoc
wireless LAN is applicable at a departmental scale for a branch or SOHO
operation.
5. What is Infrastructure?
An integrated wireless and wireless and wired LAN is called an Infrastructure
configuration. Infrastructure is applicable to enterprise scale for wireless access
to central database, or wireless application for mobile workers.
6. What is BSS ID?
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS
must be configured with the same BSS ID.
7. What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit
shared key algorithm, as described in the IEEE 802 .11 standard.
8. What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP
security, especially the reuse of encryption keys. TKIP is involved in the IEEE
802.11i WLAN security standard, and the specification might be officially
released by early 2003.
9. What is AES?
AES (Advanced Encryption Standard), a chip-based security, has been
developed to ensure the highest degree of security and authenticity for digital
information, wherever and however communicated or stored, while making more
efficient use of hardware and/or software than previous encryption standards. It
is also included in IEEE 802.11i standard. Compare with AES, TKIP is a
temporary protocol for replacing WEP security until manufacturers implement
AES at the hardware level.
10. Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products. Therefore,
Wireless products can work with Netware, Windows 2000, or other LAN
operating systems to support printer or file sharing.
11. Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side, as with
Direct Sequence Spread Spectrum technology, it has the inherent security
feature of scrambling. On the software side, WLAN series offer the encryption
function (WEP) to enhance security and Access Control. Users can set it up
depending upon their needs.
45
12. What is DSSS?What is FHSS?And what are their differences?
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that
changes frequency in a pattern that is known to both transmitter and receiver.
Properly synchronized, the net effect is to maintain a single logical channel. To
an unintended receiver, FHSS appears to be short-duration impulse noise.
Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for
each bit to be transmitted. This bit pattern is called a chip (or chipping code). The
longer the chip is, the greater the probability that the original data can be
recovered. Even if one or more bits in the chip are damaged during transmission,
statistical techniques embedded in the radio can recover the original data
without-the need for retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by most narrowband
receivers.
13. What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique
developed by the military for use in reliable, secure, mission-critical
communication systems. It is designed to trade off bandwidth efficiency for
reliability, integrity, and security. In other words, more bandwidth is consumed
than in the case of narrowband transmission, but the trade off produces a signal
that is, in effect, louder and thus easier to detect, provided that the receiver
knows the parameters of the spread-spectrum signal being broadcast. If a
receiver is not tuned to the right frequency, a spread –spectrum signal looks like
background noise. There are two main alternatives, Direct Sequence Spread
Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
46
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
4. Consult the dealer or an experienced radio technician for help.
FCC Caution
This device and its antenna must not be co-located or operating in conjunction with
any other antenna or transmitter. This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions: (1) this device may not cause
harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation. Any changes or
modifications not expressly approved by the party responsible for compliance could
void the authority to operate equipment.
Federal Communication Commission (FCC) Radiation Exposure Statement
This equipment complies with FCC radiation exposure set forth for an uncontrolled
environment. In order to avoid the possibility of exceeding the FCC radio frequency
exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches)
during normal operation.
The antenna(s) used for this transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
47
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE
EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio
equipment and telecommunication terminal Equipment and the mutual recognition of
their conformity (R&TTE)
The R&TTE Directive repeals and replaces in the directive 98/13/EEC
(Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As
of April 8, 2000.
Safety
This equipment is designed with the utmost care for the safety of those who install and
use it. However, special attention must be paid to the dangers of electric shock and
static electricity when working with electrical equipment. All guidelines of this and of
the computer manufacture must therefore be allowed at all times to ensure the safe
use of the equipment.
EU Countries Intended for Use
The ETSI version of this device is intended for home and office use in Austria,
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg,
Bulgaria, Cyprus, Czech Republic, Estonia, Hungary, Latvia, Lithuania, Malta, Poland,
Romania, Slovakia, Slovenia, the Netherlands, Portugal, Spain, Sweden, and the
United Kingdom.
The ETSI version of this device is also authorized for use in EFTA member states:
Iceland, Liechtenstein, Norway, and Switzerland.
EU Countries not intended for use
None
Please check the declaration of conformity on www.edimax.com
48
49
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement