Home

User Manual

image

Contents

1. 15 NESSUN 16 S MEER UE E ME 18 3 d SONIC ULE the qu ee heben roban as arab c eis cas lated 19 EMEN TTE 23 2 07 UNS NC Sie 24 o WIF Protect scup WPS aenn ears Dcus oec ent acetal nn re aan eda are GU dec tesi emcees 2D 3 0 SOLDI D Dun 28 Soe AP Properes SOUS tutanc dU a 29 NT IUUD 30 300 9 a a 31 T PED 32 4 TROUBLESHOOTING eoa poe Eee auda oe pe aaa s 33 1 Thank you for purchasing this high speed wireless network Excepting common wireless standards 802 11b g this wireless network card is also able to access 802 11n wireless networks data transfer rate is 300Mbps and that s three times faster than 802 11g wireless network For WLAN security issues this adapter supports 64 128 bit WEP data encryption that protects your wireless network from eavesdropping It also supports WPA Wi Fi Protected Access feature technology Client users are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this adapter supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and
2. Profile Mame Jesse Network 5510 esse This is computer to computer ad hac network wireless access points are not used Channel Wireless network security This network requires key for the following Hetwork Authentication System ASCI PASSPHRASE index advanced Confirm network key Cancel 802 1 configure BAP WEE Tunnel Privision Made Username po Identity ES a Domain M Password RR Certificate Auto Select PAC Use Windows Zero Configuration on Windows Vista A For Windows Vista user you can use Windows Zero Configuration to connect to wireless access point Click Start button then click Control Panel Click Network and Internet in Control Panel A Control Panel i p Control Panel Home Classic View e kal Recent Tasks Connect to a network Uninstall a program View hardware and devices 5 or System and Maintenance Get started with Windows Back up your computer User Accounts and Family Safety Set up parental controls for any user Add or remove user accounts Security Check for updates Check this computer s security status e Allow a program through Windows ecce t Appearance and Personalization Change desktop background Customize c
3. Link Quality Tx Power 1 E 9f m 100 Network Address MAC Address 0 1 1 81 00 02 IP Address 10 0 20 152 Subnet Mask 255 255 255 0 Gateway 10 0 2 0 254 Rehew IP um Show Tray Icon Disable Adapter C Radio Off Parameter Description Refresh Refresh adapter list in the B block A Mode There are two modes Station and Access Point If Station is selected the adapter works as a wireless adapter If Access Point is selected the adapter will works as a wireless AP View Enable Status Bar and the block in the utility will display the current status of the utility About To check the version of the utility select this item This is a list for you to configure several adapters in your PC from the utility Show Tray Icon To show the icon in the system tray select the c item Disable Adapter This function is for you to disable or enable the adapter Windows Zero Config To configure the adapter from Windows XP Zero Configuration check the item Radio Off This function is for you to turn off or turn on the radio of the adapter If the radio is turned off the adapter will not work 14 is the status bar that displays the current status of the utility close it please disable the Status Bar in the View item There are several tabs in the block for you to setup the function of the adapter Please refer to the description in th
4. NETWORKING PEOPLE TOGETHER 300Mbps Wireless 802 11b g n High Power USB Adapter EW 7612HPn User Manual Version 1 0 December 2009 COPYRIGHT Copyright 2009 2010 by this company All rights reserved No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language or computer language in any form or by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of this company This company makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Further this company reserves the right to revise this publication and to make changes from time to time in the contents thereof without obligation to notify any person of such revision or changes Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC
5. Federal Communication Commission FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure set forth for an uncontrolled environment In order to avoid the possibility of exceeding the FCC radio frequency exposure limits human proximity to the antenna shall not be less than 20cm 8 inches during normal operation The antenna s used for this transmitter must not be co located or operating in conjunction with any other antenna or transmitter 36 R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France Germany
6. please follow the instruction as following step in user mnaual I Install Driver and Utility A Insert the Installation CD to your CD ROM Drive Execute the Setup exe program B Select Setup Language and click OK to proceed REALTEK 11n USB Wireless LAN InstallShield Wizard Choose Setup Language Select the language for the installation from the choices below Basque Bulgarian Catalan Chinese Simplified Chinese Traditional French Canadian French Standard German Greek InstallShield C Click Next to go to the next step Edimax 11n USB Wireless LAN Driver and Utility X Edimax 11n USB Wireless LAM Driver and Utility The Installshield Wizard wall install Edimax 1150 USE Wireless LAN Driver and Utility on your computer continue click Next D Now you ll see the following message please click Install to begin the installation Edimax lln USB Wireless LAN Driver Edimax USB Wireless LAM Driver and Utility Click Install to begin the installation IF want to review change any of your installation settings click Back Click Cancel to exit the wizard InstallShield E The system starts to install the driver and utility Now installing Edimax 11n USE Wireless LAN Driver F Click Finish to complete the driver and utility installation Edimax lln USB Wireless LAN Driver and Utility InstallShield Wizard Co
7. Adapter Radio Off 32 4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter 1 Whatis the IEEE 802 11g standard 802 11g is the new IEEE standard for high speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2 4 GHz band 802 11g is quickly becoming the next mainstream wireless LAN technology for the home office and public networks 802 11g defines the use of the same OFDM modulation technique specified in IEEE 802 11a for the 5 GHz frequency band and applies it in the same 2 4 GHz frequency band as IEEE 802 11b The 802 119 standard requires backward compatibility with 802 11b The standard specifically calls for A Anew physical layer for the 802 11 Medium Access Control MAC in the 2 4 GHz frequency band known as the extended rate PHY ERP The ERP adds OFDM as a mandatory new coding scheme for 6 12 and 24 Mbps mandatory speeds and 18 36 48 and 54 Mbps optional speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 Whatis the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wireless LAN hardware from differ
8. Connect to a network Successfully connected to VarioxNET Save this network Start this connection automatically 12 3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN Mini USB Adapter and monitor the link status and the statistics during the communication process The Configuration Utility appears as an icon on the system tray and desktop of Windows You can open it by double click on the icon Right click the icon in the system tray there are some items for you to operate the configuration utility e Open Config Utility Select Open Config Utility to open the configuration utility e About Select About to show the utility information Hide Select Hide to hide the utility in the system tray Quit Select Quit to quit the utility in the system tray Config Utility Edimax 1 2 19 In the Desktop In the System Tray In the System Tray Right click 13 3 1 Utility Overview There are several parts in the utility screen Please refer to the following table for the description Edimax USB Wireless LAN Utility Refresh E About mu MyComputer General P ile Available Network Status Statistics Wi Fi Protect Setup d Edimax 802 E B Status Associated Speed Tx 43 5 Mbps Rx 58 Mbps Infrastructure Encryption Mone SSID Edimax LIE 522
9. Greece Ireland Italy Luxembourg Bulgaria Cyprus Czech Republic Estonia Hungary Latvia Lithuania Malta Poland Romania Slovakia Slovenia the Netherlands Portugal Spain Sweden and the United Kingdom The ETSI version of this device is also authorized for use in EFTA member states Iceland Liechtenstein Norway and Switzerland EU Countries not intended for use None Please check the declaration of conformity on www edimax com Ceo FE C 37 EDIMAX NETWORKING PEOPLE TOGETHER EDIMAX Technology Co Ltd www edimax com
10. Spain Sweden and the United Kingdom The ETSI version of this device is also authorized for use in EFTA member states Iceland Liechtenstein Norway and Switzerland EU Countries Not intended for use None DIMAX NETWORKING PEOPLE TOGETHER English Copyright by Edimax Technology Co LTD all rights reserved part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language or computer language in any form or by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of this Company This company makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Further this company reserves the right to revise this publication and to make changes from time to time in the contents here of without obligation to notify any person of such revision or changes The product you have purchased and the setup screen may appear
11. Wi Fi Protect Setup lt 3 Edimax 802 Available Protilets Profile Mame SSID eal Edimax Edimax Edit Duplicate Set Default lt t Show Tray Icon Disable Adapter 1 Radio Off Parameter Description Available Profile s This list shows the preferred networks for the wireless connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Button Click these buttons to add delete edit the selected profiles Duplicate If you like to build up the new profile with the same settings as the current profile then you can select this feature Set Default To designate a profile as the default network for the connection from the available profiles list click the button 18 3 4 1 Configure the Profile Wireless Network Properties Profile Name TEST 802 1 configure Network Name ssID Tunnel Privision Made Channel Lisername Wireless network security ae This network requires a key far the following Identity pd S ees Password Doo key index advanced Certificate Network key network key Cancel Parameter Description networks Access Point Network Name SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs You may specify a SS
12. degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption standards It is also included in IEEE 802 11i standard Compare with AES TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level 10 Can Wireless products support printer sharing Wireless products perform the same function as LAN products Therefore Wireless products can work with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence opread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to enhance security and Access Control Users can set it up depending upon their needs 12 What is DSSS What is FHSS And what are their differences Frequency hopping spread spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence spread spectrum DSSS generates a redundant bit pattern for
13. each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip is the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver 0555 appears as low power wideband noise and is rejected ignored by most narrowband receivers 34 13 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is designed to trade off bandwidth efficiency for reliability integrity and security In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS 35 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits
14. ID for the adapter and then only the device with the same SSID can interconnect to the adapter This is a computer to computer There are two kinds of network type described as follows ad hoc network wireless access Infrastructure This operation mode requires the presence of an points are not used 802 11 Access Point All communication is done via the Access Point or Router Ad Hoc Connect to another wireless adapter in the Wireless LAN network without through an Access Point or Router If this item is selected the adapter will work in Ad Hoc mode 19 Channel Network Authentication This setting is only available for Ad Hoc mode Select the number of the radio channel used for the networking The channel setting should be the same with the network you are connecting to This setting has to be consistent with the wireless networks that the adapter intends to connect Open System No authentication is needed among the wireless network Shared Key Only wireless stations using a shared key WEP Key identified are allowed to connecting each other WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that point keeping unauthorized u
15. Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device and its antenna must not be co located or operating in conjunction with any other antenna or transmitter This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Any changes or modifications not expressly approved by the party responsible for compliance could void the autho
16. TLS in that they specify a stand alone authentication protocol be used within an encrypted tunnel TTLS supports any protocol within its tunnel including CHAP MSCHAP MSCHAPv2 and PAP PEAP specifies that an EAP compliant authentication protocol must be used this adaptor supports MD5 TLS GTC Generic Token Card and MSCHAPv2 The client certificate is optional required for the authentication Includes MD5 GTC TLS MSCHAP v2 The certificate username in the RADIUS server User s identity in the RADIUS server User s password in the RADIUS server Select the certificate for RADIUS server authentication 22 3 5 Status This screen shows the information of manufacturer driver version settings of the wireless network the adapter is connecting to linking time and link status If you don t ensure the status of the adapter and the network you are connecting please go to the screen for more details Edimax 11n USB Wireless LAN Utility Refresh E Mode tM About W MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup lt 2 Edimax 802 Manufacturer Edimax NDIS Driver version 1085 9 1207 2009 Short Radio Header Encryption Disabled Authenticate Open System Channel Set MAC Address 0 1 1 81 00 02 Data Rate AUTO x 43 5 Mbps Rx 58 Mbps Channel Frequency 6 2437 MHz Status Associated SSID Edimax Net
17. ZE 44 84 AU WPSBfed 3 sa2 2 4 Please wait while the install procedure is running and wait for few seconds to two minutes If a wireless access point with correct PIN code is found you ll be connected to that access point Wi Fi Protected Setup PIN method Wi Fi Protected Setup PIN method Please enter the following PIN code into your PIN Code 98753420 Status Initial WPS 26 Push Button Config 1 Start PBC pairing procedure at access point side please refer to the instruction given by your access point s manufacturer then click PBC button in wireless configuration utility to start to establish wireless connection by WPS Please be patient This may require several seconds to one minute to complete Wi Fi Protected Setup PBC method Wi Fi Protected Setup PBC method If there is mare then one the PBC mode there will be Session Overlap Please using method or wait for while push the button again Status Initial WPS Complete T LLIL JI Push Button config PBC Cancel 2 When connection between this wireless network card and access point is successfully established by WPS and the information about access point you connected to will be displ
18. apter Associate Table All the wireless adapters connected to the software AP will be displayed in the list Config Click Config for setting more configuration of the AP 28 3 8 1 Properties Setting Please refer to Section 3 4 1 for the setting of the parameters for AP Note that Ad Hoc mode is not enabled for AP Wireless Network Properties Profle Mame Network MamerssIp AP Channel 1 2412 Wireless network security This network requires a key for the following Network Authentication System Data encryption Disabled wal Key index advanced Network key Confirm network key Cancel 29 3 8 2 AP Advanced Edimax lin USB Wireless LAN Utility Refresh E About 9 MyComputer General Advanced Statistics ICS xi Edimax 802 General Beacon Interval 100 D TIM Period l Preamble Mode Long Set Defaults Apply lt gt Show Tray Icon Disable Adapter Radio Off Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packets milliseconds The range for the beacon period is between 20 1000 milliseconds with a typical value of 100 DTIM Period Determines the interval the Access Point will send its broadcast traffic Default value is 3 beacons Preamble The preamble defines the length of the CRC block for communication among t
19. are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device and its antenna must not be co located or operating in conjunction with any other antenna or transmitter This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Any changes or modifications not expressly approved by the party responsible for compliance could void the authority to operate equipment
20. ayed General Profile Avadable Network Status Statistics WiFi Protect Setup Status Associated Speed 150 Mbps Rx 300 Mbps Type Infrastructure Encryption AES SSID WwPS5fed 37eez Sona Stronath NNNM Link Quality cos Network Address MAC Address O0 50 FC 61 21 01 IP Address 192 158 2 100 Subnet Mask 255 255 255 0 Gateway 192 168 2 1 ReMew IP Disable Adapter Windows Zero Config 27 3 8 Software You should click Mode and select Access Point to enable Software AP mode This adapter can run as a wireless AP The relative configurations of the AP including channel SSID WEP encryption and so on are described as follows Edimax 11n USB Wireless LAN Utility BEEF Refresh E About Y MyComputer General Advanced Statistics ICS i Edimax 802 5510 AP BSSID 00 1 1 81 00 02 Association T able AID MAC Address Life Time gt Show Tray Icon Disable Adapter C Radio Off Parameter Description SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs The default SSID of the AP is Full Computer Name Wireless adapters connect to the AP should set up the same SSID as the AP BSSID Display the MAC address of the ad
21. e following sections 196 100 Where you can adjust wireless Tx power wireless signal of EW 7612HPn Adjust to 10096 you will get the strongest wireless signal 3 2 Available Network When you open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your adapter and automatically connect to the wireless network with the highest signal strength From the Available Network tab all the networks nearby will be listed You can change the connection to another network Edimax lln USB Wireless LAN Utility Refresh E amp boutt Y MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup i Edimax 802 Available Networks SSID Channel Encryption Network Authentication Signal im 3 TKIP AES WPA Pre Shared Keyf cu im DemoRaom Rout 3 TKIP AES WPA Pre Shared Keys Bus we KEM1 3 TKIP WPA Pre Shared Key 44 we 7415 2 4 fone Unknown Biz im 7415 P3 4 Mone Unknown Seo im 7415 4 4 fone Unknown rl i 16400 4 None Unknown 58 we 16400 4 TKIP AES WPA Pre Shared Keyt 1009 p Mone Unknown we J6400N5 TEIP AES WPA Pre Shared Keyf MEETING ROOM Mone Unknown im DemoRoom Guest TKIP amp ES WPA Pre Shared Keys ee EMAX Unknown im DemoRoorn Proje Unknown T Mote Double click on item to join create profile 4 i gt Sh
22. ent manufactures to communicate 3 What does IEEE 802 11 feature support The product supports the following IEEE 802 11 functions CSMA CA plus Acknowledge Protocol Multi Channel Roaming Automatic Rate Selection RTS CTS Feature Fragmentation Power Management 4 What is Ad hoc An Ad hoc integrated wireless LAN is a group of computers each has a Wireless LAN adapter Connected as an independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 5 What is Infrastructure An integrated wireless and wireless and wired LAN is called an Infrastructure configuration Infrastructure is applicable to enterprise scale for wireless access to central database or wireless application for mobile workers 33 6 Whatis BSS ID A specific Ad hoc LAN is called a Basic Service Set BSS Computers in a BSS must be configured with the same BSS ID 7 Whatis WEP WEP is Wired Equivalent Privacy data privacy mechanism based on 40 bit shared key algorithm as described in the IEEE 802 11 standard 8 Whatis TKIP TKIP is a quick fix method to quickly overcome the inherent weaknesses in WEP security especially the reuse of encryption keys TKIP is involved in the IEEE 802 11i WLAN security standard and the specification might be officially released by early 2003 9 Whatis AES AES Advanced Encryption Standard a chip based security has been developed to ensure the highest
23. government users This adapter is cost effective together with the versatile features it is the best solution for you to build your wireless network 1 1 Features e Work with 802 11b g n wireless network devices e High speed transfer data rate up to 300 Mbps e High throughput supports multi media data bandwidth requirement e Support 64 128 bit WEP Data Encryption WPA WPA2 Automatic fallback increases data security and reliability e Supports the most popular operating system Windows 2000 XP Vista 7 e Supports USB 2 0 interface 1 2 Specifications e Standard IEEE 802 11b g n e Interface USB 2 0 Type A Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Data Rate 11b 1 2 5 5 11 Mbps 11g 6 9 12 24 36 48 54Mbps 11n 20 2 MCSO 7 up to 150Mbps 11n 40MHz MCSO 7 up to 300Mbps Security 64 128 bit WEP Data Encryption WPA WPA2 Antenna 5dBi High Gain Antenna Drivers Windows 2000 XP Vista 7 e LEDs Link Activity Temperature Operating 32 104 F 0 40 Storage 13 149 1 25 65 C e Humidity 9596 Non Condensing 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items e One USB Adapter e One CD Driver Utility User s Manual e One Quick Guide USB cable If any of the above items is missing contact your supplier as soon as possible 2 Installation Procedure Befo
24. gth Key Index advanced Network Key Description Disabled Disable the WEP Data Encryption WEP Enable the WEP Data Encryption When the item is selected you have to continue setting the WEP Encryption keys TKIP TKIP Temporal Key Integrity Protocol changes the temporal key every 10 000 packets a packet is a kind of message transmitted over a network This insures much greater security than the standard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 111 for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the communication WEP Key can be ASCII format Alphanumeric values or signs are allowed to be the WEP key It is more recognizable for user is a text string with a maximum of 32 alphanumeric characters for example Test The WEP Key is based upon the Passphrase determined by you This passphrase may not work with other vendors products due to possible incompatibility with other vendors passphrase generators You must use the same passphrase or WEP key settings for all wireless computers within the network When you select the WEP and PASSPHRASE and this function will display in the current status of the utility The keys are used to encrypt data transmitted in the wireless network Fill the te
25. he wireless stations There are two mode including Long and Short High network traffic areas should use the shorter preamble type Set Defaults Set the setting values return to defaults Apply Confirm the settings in the Advanced 30 3 8 3 Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please click Reset Edimax 11 USB Wireless LAN Utility Aboutt A WMyComputer Genersl Advanced Statistics ICs d Edimax 802 Counter Mame Tx Tx Error Rx OK Rx Packet Count Rx Retry Rx ICY Error lt gt Show Tray Icon Disable Adapter Radio Off 3 3 8 4 ICS If you want to connect to the internet through this SoftAP you will need to make a bridge between our SoftAP and your internet connect Select the internet connection in your SoftAP host machine and press the Apply button Edimax 11n USB Wireless LAN Utility BEEF Aboutt A Y MyComputer General Advanced Statistics ICS xi Edimax 802 Setting Internet Connection Sharing ICS Device Mame 195848 Broadcom MetXtreme 57xx Gigabit Controller 38 Connection Public Network Eiai Broadcom Metxtreme 57xx Gigabit Controller Apply Show Tray Icon Disable
26. mplete The InstallShield Wizard has successfully installed Edimax 11n USB Wireless LAN Driver and Utility Before vau can use the program you must restart your computer gt No will restart my computer later Remove any disks from ther drives and then click Finish to complete setup lt Back Cancel II Connect to Wireless Access Point A To start configuring the adapter double click the icon in the system tray or right click the icon and select open configuration utility B The utility of the adapter is displayed Click Available Network and double click on the wireless access point you want to connect to Edimax lin USB Wireless LAN Utility Refresh R AboutlA E w Computer General Profile Available Network tatus statistics Wi Fi Protect Setup lt Edimax 02 Available Networkis SSID Channel Encryption Network Authentication im KEN TEIP WPA Pre Shared Key cr TKIP AES WPA Pre Shared Keys imi DemoRoom_Rout TKIP AES Pre Shared Keyf 4 Edimax Mone Unknown we default None Unknown imiDemoRoom Guest TEIP AES Pre Shared Key Unknown Unknown m i PET IL WEP Unknown 1009 Mote Double click on item ta joinjcreate profile lt lili show Tray Icon Disable Adapter C Radio Off C Input the security setting and click OK to start network connection Wireless Network Properties
27. nc Center Sync with other computers mobile devices or network folders Resolve sync conflicts View sync results 10 C Click the access point you want to use if it s shown then click Connect Connect to a network Select a network to connect to Set up a connection or network Open Network and Sharing Center NL meee e Q Se Connect Cancd Connect _ e ooconeeneco 9 D If it s an unnamed access point i e the SSID of this wireless access point is hidden you ll be prompted to input it s name and the name must be identical to the SSID setting of the wireless access point you re connecting to o Lu Connect to a network Type the network name SSID for the network Ask the person who set up this network to give you the name Network Mame Home l1 E If the access point is protected by encryption method you have to input its security passphrase here It must match the encryption setting on the access point o Connect to a network Type the network security key or passphrase for Home The person who setup the network can give you the key or passphrase Security key or passphrase E Display characters auem havea USB flash drive with network settings for Home insert it now F If you can see this image the connection between your computer and wireless access point 15 successfully established Click Close to start network connection o
28. olors Adjust screen resolution Network and Internet View network status and tasks Set up file sharing Clock Language and Region Change keyboards or other input methods Change display language Printer Mouse Ease of Access Let Windows suggest settings Programs Optimize visual display Uninstall a program Change start is sin ae ME Additional Options B Click Connect to a network under Network and Sharing Center P Control Panel Network and Ini ie bene Control Panel Home System and Maintenance Security Network and Internet Hardware and Sound Programs User Accounts and Family Safety Appearance and Personalization Clock Language and Region Ease of Access Additional Options Classic View Recent Tasks Connect to a network Uninstall a program View hardware and devices Search v Network and Sharing Center View network status and tasks Cong ct to a network View network computers and device Add a device to the network Set up file sharing NET Internet Change your homepage Manage browser add ons Delete browsing history and cookies Offline Files Encrypt your offline files Manage disk space used by your offline files Windows Firewall Turn Windows Firewall on or off Allow a program through Windows Firewall People Near Me Sign in or out of People Near Me Change People Near Me settings Sy
29. ow Tray Icon Disable Adapter Radio Off 15 Parameter Description Available Network s This list shows all information of the available wireless networks within the range of your adapter The information includes SSID Channel Encryption Network Authentication Signal and etc If you want to connect to any network on the list double click the selected network Refresh Click Refresh to update the available networks list It is recommended that refresh the list while you have changed the connection network Add to Profile A profile stores the setting of a network so that you can connect to the network quickly To add the selected network to a profile click this button 3 3 General To check the connection status of the adapter select General This screen shows the information of Link Speed Network Type Encryption Method SSID Signal Strength Link Quality and Network Address of the adapter Edimax lln USB Wireless LAN Utility Refresh E About 9 MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup i Edimax 802 Status Associated Speed Tx 43 5 Mbps Rx 58 Mbps Infrastructure Encryption Mone 550 Edimax va oo Tx Power 1 90 50 m Apply 1 95 E 100 95 Network Address MAC Address 0 1 1 81 00 02 IP Address 10 0 20 152 Subnet Mask 255 255 255 0 Gateway 10 0 2 0 254 ReMew IP Sj g
30. ral Profile Available Network Status Statistics Wi Fi Protect Setup amp Edimax 802 Wi Fi Protected Setup WPS An easy and secure setup solution for Wi Fi network Pin Input Config PIN After pushing the PIN button Please enter the PIN code into your PIN Code 161 3330 Pin Input Config PIN Push Button After pushing the PBC button Please push the physical button on your visual button on the WPS config page Push Button Config PBC s E Show Tray Icon Disable Adapter 1 Radio Off Pin Input Config PIN 1 The PIN code of your wireless network card is an eight digit number located at the upper right position of configuration utility Remember it and input the number to your wireless access point as the WPS PIN code Please refer to the user manual of your wireless access point for instructions about how to do this 2 Click Pin Input Config PIN button now and the following message will appear on your computer click Yes to select a specific wireless access point or click No to start PIN method of WPS Wi Fi Protected Setup 5 e Do you want to select a specific 25 If you click Yes and the following message will appear on your computer please select the SSID of wireless access point that you wish to connect and click Select Wi Fi Protected Setup Select AP WPS AP Mame WPS
31. re you proceed with the installation please notice following descriptions Note1 The following installation was operated under Windows XP Procedures are similar for Windows 2000 Vista 7 Note2 If you have installed the Wireless PC Adapter driver amp utility before please uninstall the old version first Hardware Installation Please follow the following instructions to install your new USB wireless network card LED Insert the USB wireless network card into an empty USB 2 0 port of your computer when computer is switched on Never use force to insert the card if you feel it s stuck flip the card over and try again Software Installation This wizard can be run in Windows 2000 XP Vista 7 You can install the Wireless Adapter by EZMAX Setup Wizard in the CD ROM including in the package The wizard is an easy and quick configuration tool for internet connection with series process When you start EZMAX Setup Wizard you will get the following welcome screen Please choose the language to start the configuration The wizard will guide you to finish your network connection We will not provide any instruction for the EZMAX Setup Wizard here English Nederlands Deutsch Fran ais Italiano Espa ol Portugu s Polski Cesky Magyar Romana T rk e Slovensky Tx DIMAX Wireless B www edimax com ContactUs gt E Y If you lose the CD ROM or you prefer the traditional setup procedure
32. rity to operate equipment Federal Communication Commission FCC Radiation Exposure otatement This EUT is compliance with SAR for general population uncontrolled exposure limits in ANSI IEEE C95 1 1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C The equipment version marketed in US is restricted to usage of the channels 1 11 only R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France Germany Greece Ireland Italy Luxembourg the Netherlands Portugal
33. sers that don t have the matching password from joining the network while encrypting the data traveling between authorized devices WPA2 PSK WPA2 PSK is also for home and small business The difference between WPA PSK and WPA2 PSK is that WPA2 PSK provides data encryption via the AES In contrast WPA PSK uses Temporal Key Integrity Protocol TKIP WPA 802 1X WPA provides a scheme of mutual authentication using either IEEE 802 1x Extensible Authentication Protocol EAP authentication or pre shared key PSK technology It provides a high level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure WPA2 802 1X Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES AES is required to the corporate user or government users The difference between WPA and WPA is that WPA2 provides data encryption the AES In contrast WPA uses Temporal Key Integrity Protocol TKIP WEP 802 1X It s a special mode for using IEEE 802 1x EAP technology for authentication and WEP keys for data encryption 20 Parameter Data Encryption ASCII PASSPHRASE Key Len
34. slightly different from those shown in this QIG For more detailed information about this product please refer to the User Manual on the CD ROM The software and specifications are subject to change without notice Please visit our web site www edimax com for the update All rights reserved including all brand and product names mentioned in this manual are trademarks and or registered trademarks of their respective holders Notice according to GNU GPL Version 2 This product includes software that is subject to the GNU GPL Version 2 You find the text of the license on the product cd dvd The program is free software and distributed without any warranty of the author We offer valid for at least three years to give you for a charge no more than the costs of physically performing source distribution a complete machine readable copy of the corresponding source code Please contact Edimax at Edimax Technology co Ltd NO 3 Wu Chuan 3rd RD Wu Ku Industrial Park Taipei Hsien Taiwan R O C TEL 886 2 77396888 FAX 886 2 77396887 sales edimax com tw CONTENTS INTRODUCTION ue tees osea E QUE Sa in aa EES 1 1 1 2 SP CIPIG HLTOTIS 1 ey Packase Conten cases e sat o N 2 2 INSTALLATION PROCEDURE e Ev Veo o ER TR oRER SE STER S E egeo des 3 gt CONFIGURATION UTIEITY I EE SEIS SUE AP 13 D T 14 3 2 Available NEWT E
35. t Show Tray Icon Disable Adapter Radio Off 16 Parameter Status Speed Type Encryption SSID Signal Strength Link Quality Network Address Description lt will show the connection status of the adapter shows the current speed Infrastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router It displays the encryption setting of the current connection including None WEP TKIP or AES The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs indicates the wireless signal strength indicates the wireless link quality It shows the MAC IP address and other information of the adapter 17 3 4 Profile The Profiles List is for you to manage the networks you connect to frequently You are able to Add Remove Edit Duplicate Set Default to manage a profile Edimax 11n USB Wireless LAN Utility Refresh E About A E My Computer General Profile Available Network Status Statistics
36. work Type Infrastructure Power Save Mode Mane Associated 001R iF 24 Up Time hh mm s55 0 25 55 gt Show Tray Icon Disable Adapter Radio Off 23 3 6 Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please click Reset Edimax USB Wireless LAN Utility ox AboutGA 9 MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup ig Edimax 802 Counter Marne Tx OK Tx Error Rx OK Rx Packet Count Rx Retry Rx IC Error hi 3 Show Tray Icon Disable Adapter Radio Off 24 3 7 Wi Fi Protect Setup WPS Wi Fi Protected Setup WPS is the latest wireless network technology which makes wireless network setup become very simple If you have WPS enabled wireless access point and you want to establish a secure connection to it you don t have to configure the wireless access point and setup data encryption by yourself All you have to do is to go to the WPS setup page of this wireless card click the PBC or PIN button and then press a WPS button or enter a set of 8 digit code on the wireless access point you wish to establish a secure connection Edimax 11n USB Wireless LAN Utility Sela y MyComputer Gene
37. xt box by following the rules below 64 bit Input 10 digit Hex values as the encryption keys For example 0123456aef 128 bit Input 26 digit Hex values as the encryption keys For example 01234567890123456789 Select one of the four keys to be the data encryption key Please enter network security key here to make sure the password is correct 21 Parameter Confirm Network Key EAP Type Tunnel Username Identity Password Certificate Description Please enter network security key here again GTC GTC is an authentication protocol which allows the exchange of clear text authentication credentials across the network TLS TLS is the most secure of the EAP protocols but not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a certificate to the client After validating the server s certificate the client presents a client certificate to the server for validation LEAP LEAP is a pre EAP Cisco proprietary protocol with many of the features of EAP protocols Cisco controls the ability of other vendors to implement this protocol so it should be selected for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password of your computer PEAP amp TTLS PEAP and TTLS are similar and easier than

Download Pdf Manuals

image

Related Search

Related Contents

Manual  AEG SKZ71800F0 User's Manual  Draytek Vigor2820VSn  Samsung 19" podnikový monitor s jednoduchou montážou na stenu Užívateľská príručka  CAN-REport User Manual  Qosmio G30 y F30 – disfrute de una experiencia  

Copyright © All rights reserved.
Failed to retrieve file