Home

Intellinet 505314

image

Contents

1. C Show Password OK Cancel 16 CONFIGURATION VY INTELLINET the authentication phase The server presents a certificate to the client and after validating the server s certificate the client presents a Client certificate to the server for validation Session Resumption Click check the box to activate or de activate ID Password Enter the password as the identity for the server Client Certification A client certificate is required for TLS but is optional for TTLS and PEAP This forces a client certificate to be selected from the appropriate Windows Certificate Store and made available to the RADIUS server for certification Tunneled Authentication Protocol When the authentication type is PEAP or TTLS select a protocol for building the encrypted tunnel Tunnel Authentication Select one of three options from the drop down menu EAP MSCHAPV2 EAP TLS Smart card or Generic Token Card 802 1x Settinc CA SERVER System Config Auth Encry J 0 EAP Method gt gt PEAP v Tunnel Authentication gt gt EAP MSCHAP v2 v LI Session Resumption ID PASSWORD Client Certification _Server Certification Use certificate chain j Any Trusted C o Allow intermidiate certificates Server name gt gt Server name must match Domain name must end in specified name OK Cancel Use certificate chain When the Extensible Authentication Protocol EAP authentication type such as TLS TTLS or
2. PEAP is selected and requires certification to tell the client what credentials to accept from the authentication server in order to verify the server you need to enable this function Choose the preferred server from the drop down menu to issue the certificate If Any Trusted CA is selected any CA certification authority on the list which is provided by the Microsoft Certificate Store is permitted Allow intermediate certificates A server designates an issuer as a trusted root authority by placing the issuer s self signed certificate VY INTELLINET CONFIGURATION which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority Server Name Enter the authentication server name Server name must match exactly When selected the server name must exactly match the server name found on the certificate Domain name must end in specified name When this is selected the server name field identifies a domain The certificate must use a server name belonging to this domain or one of its sub domains g zeelans com where the server is blueberry zeelans com but it may be any name used in the certificate name field STATISTICS This screen enables you to view compare the transmit and receive statistical inf
3. adapter is running You can a T F TER P 9 Les A 10 02 AM open it by double clicking on the icon In Windows XP there is a Windows Zero Configuration Tool option for setting up wireless clients If you prefer to use the configuration utility there are two ways to switch to it instead of using the Windows tool OpTION 1 Launch Config Utilities 1 Right click the utility icon in the Use RaContig as Configuration utility system tray and select Use Switch to AP Mode RaConfig as Configuration Exit utility OPTION 2 1 Right click the icon on the left side of the system tray and select View Available Wireless Networks 2 Click Change advanced settings xi 543 AM Network Tasks Choose a wireless network g Refresh network list Click an item in the list below to connect to a wireless network in range or to get more information 2 Set up a wireless network for a home or small office gt Related Tasks 6F_EMAX i Learn about wireless Unsecured wireless network antl networking AlexLien K o Pg Change the order of preferred networks Unsecured wireless network aall P Change advanced settings Gonnect E CONFIGURATION GINTELLINET 3 Uncheck Use Windows 4 Wireless Network Connection Properties f to configure my wireless network settings to enable the utility for the adapter NOTE If Available networks Wireless Zero
4. harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and the receiver e Connect the equipment to an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help YINTELLINET re CAUTION Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC RF RADIATION EXPOSURE STATEMENT This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment and should be installed and operated with a minimum distance of 2 5 cm 1 in between the radiator and your body SAR specific absorption rate compliance has been established in laptop co
5. received Rx Link Quality This status bar indicates the quality of the link The higher the percentage the better the quality dBm To display the signal strength measured in dBm decibels in milliwatts click this box on the Network screen see Page 9 Signal Strength This bar shows the signal strength level The higher the percentage being shown in the bar the more radio signal being received by the adapter This indicator helps to find the proper position of the wireless device for quality network operation Noise Strength This bar displays the noise level in the wireless environment INTELLINET cane a PROFILE CONFIGURATION _ System Config Auth Encry Profile Name gt gt mywireless Network Type gt gt Infrastructure v SSID gt gt fic visitor Tx Power gt gt Auto v reambl Auto v Power Save Mode gt gt cam Psm C RTS Threshold 0 _ _ 247 1835 C Fragment Threshold Be 234 234 OK Cancel Profile Name Define easily recognizable profile names to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified ina WLAN The ID prevents the unintentional merging of two co located WLANs If you specify an SSID for the adapter then only the device with the same SSID can interconnect to the adapter To add a nearby network to the profile list pull down the menu to view all the networks that can be selected Power Save Mode The
6. that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure e WPA PSK This is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key you manually enter the starting password in your access point or gateway as well as in each wireless station in the network WPA PSK takes over automatically from that point keeping unauthorized users who don t have the matching password from joining the network while encrypting the data traveling between authorized devices e WPA2 Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES AES is required for corporate or government users The difference between WPA and WPA2 is that WPA2 provides data encryption via AES In contrast WPA uses the Temporal Key Integrity Protocol TKIP e WPA2 PSK This is also for home and small business use The difference between WPA PSK and WPA2 PSK is that WPA2 PSK provides data encryption via the AES In contrast WPA PSK uses the Temporal Key Integrity Protocol TKIP e WPA NONE This is defined for Ad Hoc mode and behaves like WPA PSK WPA PSK is only defined for Infrastructure mode The user manually enters the Pre Shared Key in each wireless station in the network and
7. Access Control MAC Tabe Event Log Statistics About Utility Version 1 1 5 0 Date 12 21 2006 Driver Version 1 2 0 0 Date 12 21 2006 EEPROM Version 1 3 Firmware Yersion 2 0 MAC Address 00 0E 2E 43 89 7D oo ir INTELLINET SPECIFICATIONS General Standards IEEE 802 11b 11 Mbps Wireless LAN IEEE 802 11g 54 Mbps Wireless LAN IEEE 802 1X RADIUS Authentication e Bus type 32 bit PC card e Chipset Ralink RT256x Frequency band 2 4000 2 4835 GHz Industrial Scientific Medical Band e Modulation technologies 802 11b Direct Sequence Spread Spectrum DSSS DBPSK DQPSK CCK 802 11 Orthogonal Frequency Division Multiplexing OFDM BPSK QPSK 16QAM 64QAM e Security 64 128 bit WEP data encryption WPA and WPA2 IEEE 802 1X RADIUS Authentication Cisco CCX Transmit power 54 Mbps OFDM 15 dBm 1 dBm 11 Mbps CCK 18 dBm 1 dBm e Maximum coverage distance 100 m 328 ft indoor 300 m 980 ft outdoor e Certification FCC Class B CE Mark LEDs Link TX RX Environmental e Weight 0 18 kg 0 4 Ibs e Operating temperature 0 40 C 32 104 F e Operating humidity 10 95 RH non condensing Storage temperature 0 70 C 0 158 F System Requirements e Notebook with Pentium 300 MHz compatible processor or higher e Windows 98SE Me 2000 XP 2003 Vista Linux and MacOS X e WPA2 encryption requires Windows 2000 XP 2003 Vista e Available 32 bit PC card s
8. ET CONFIGURATION IEEE 802 1x Access Client RADIUS Client RADIUS Server i o A DD i xS w eee 1 Client requests to log in to the network 3 Username and password sent to RADIUS server 2 Log in with username and password 4 User login to the LAN approved or denied 802 1x SETTING CERTIFICATION EAP Method The EAP authentication protocols supported by this adapter require that settings be consistent with the wireless access points or routers that the adapter is intended to connect e PEAP amp TTLS These protocols are similar and easier to use than TLS below in that they specify a stand alone authentication protocol to be used within an encrypted tunnel TTLS supports any protocol within its tunnel including CHAP MS CHAP MS CHAPv2 PAP and EAP MD5 PEAP specifies that an EAP compliant authentication protocol be used this adapter supports EAP MSCHAP v2 EAP TLS Smart Card and Generic Token Card The client certificate is optional TLS Smart Card This is the most secure of the EAP protocols but isn t easy to use It requires that digital certificates be exchanged in System Config Auth Encry O A EAP Method gt gt PEAP v Tunnel Authentication gt gt EAP MSCHAP v2 v Session Resumption IDA PASSWORD Client Certification Server Certification Authentication ID Password Identity gt gt Password Domainname E Tunnel ID Password Identity gt gt Password gt gt
9. To connect to an available network click Configure Configuration Tool is T a a enabled you can only i conexant J configure the advanced settings or check the Automatically connect to available networks in the order listed link status and statistics below from the configuration utility of the adapter Preferred networks Add Learn about setting up wireless network configuration NETWORK When you open the configuration utility the system scans all the channels to find access points stations within the accessible range of the adapter and automatically connect to the wireless device with the highest signal strength On the Network screen all the networks nearby are listed You can change the connection to another network or add one of the networks to your own profile list lhe m A F B O Ro Profile Network Advanced Statistics VAAN WPS Radio On Off About Sorted by gt gt 551D Channel Signal C Show dBm AP List gt gt G router we g 34 Se IC Visitor 3 s0 C ICU Equip wu g kd ICU WLS Ws 6 Rescan Add to Profile Connect GINT ELLINET CONFIGURATION 9 Available Networks This list shows all available wireless networks within the range of the adapter It also displays network information SSID BSSID Signal Strength Channel Encryption Authentication and Network Type To connect to a network on the list double click the item and the adapter will connect automatically t
10. WIRELESS G PC CARD USER MANUAL MODEL 505314 NETWORK SOLUTIONS INT 505314 UM 0508 01 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G PC Card Model 505314 Compatible with 802 11b and 802 11g wireless access points and routers this adapter lets you upgrade your wireless network without the need to replace existing equipment Transfer or receive digital images videos and MP3 files with link speeds of up to 54 Mbps using proven and reliable Wireless G technology With the easy to follow instructions in this manual yoy ll soon be able to enjoy the benefits of these additional features Connects your notebook to a wireless network Turbo Mode technology for enhanced wireless throughput Supports WEP 64 128 bit WPA and WPA2 data encryption Supports Software AP function turns your wireless client into a wireless access point Supports WMM Wi Fi Multimedia for increased multimedia data throughput Windows 98SE 2000 Me XP Vista compatible 32 bit Cardbus PC card Lifetime Warranty FCC CERTIFICATIONS This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause
11. WPA NONE controls unauthorized users who don t have the matching Pre Shared Key from joining the network It also encrypts the data traveling between authorized devices 802 1x Setting When Authentication Type is set to Open Shared WPA or WPA2 you can also enable IEEE 802 1x Setting to use the authentication server or certification server to authenticate client users NOTE See the two separate 802 1x Setting sections below for details Encryption Select from the drop down menu e None Disables the encryption mode gi CONFIGURATION VY INTELLINET e WEP Enables the WEP Data Encryption When the item is selected you need to continue setting the WEP Encryption keys TKIP The Temporal Key Integrity Protocol changes the temporal key every 10 000 packets a kind of message transmitted over a network This ensures much greater security than the standard WEP security e AES AES has been developed to ensure the highest degree of security and authenticity for digital information It s the most advanced solution defined by IEEE 802 11i for security in the wireless network NOTE All devices in the network should use the same encryption method to ensure the security of communications WPA Pre Shared Key The WPA PSK key can be 8 to 64 characters in length and can be letters or numbers This same key must be used on all the wireless stations in the network WEP Key Key 1 4 WEP keys are used to encrypt data t
12. WPA PSK and WPA2 PSK Encryption Type Five options are available in the drop down menu Not Use Disables the encryption mode e WEP Enables WEP Data Encryption When the item is selected continue setting the WEP Key TKIP The Temporal Key Integrity Protocol changes the temporal key every 10 000 packets a kind of message transmitted over a network This ensures much greater security than standard WEP security e AES Advanced Encryption Standard was developed to provide the highest degree of security and authenticity for digital information It s the most advanced solution defined by IEEE 802 11i for security in a wireless network BOTH In this mode the AP supports both TKIP and AES WPA Pre Shared Key The WPA PSK key can be 8 to 64 characters in length and can be letters or numbers This same key must be used on all the wireless stations in the network Group Rekey Interval This function is available when using WPA PSK and WPA2 PSK encryption algorithms WEP Key Key 1 4 WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Assign a default encryption key Key 1 to Key 4 by clicking on the corresponding radio button To fill in each text field e 64 bit Input 10 digit hex values in the A F a f and 0 9 range or 5 digit ASCII characters a z and 0 9 as the encryption keys For example 0123456aef or test e 128 bit Input 26 dig
13. ated in the network the shorter the distance allowed between the adapter and the wireless stations When the wireless mode is 802 11 B Only the maximum data rate is 11 Mbps 11b making only Auto 1 Mbps 2 Mbps 5 5 Mbps and 11 Mbps available as options Enable Tx Burst This enables the adapter to deliver better throughput in the same period and environment Enable TCP Window Size The TCP window is the amount of data a sender can deliver on a particular connection before it gets an acknowledgment back from the receiver that it has gotten some of it When the router or AP the adapter is connecting to has set up the TCP window you can enable the parameter to meet the data size for the router or AP connection The larger the TCP window the better the performance Fast Roaming at 70 dBm To fast roam to a nearby network without interrupting the wireless connection such as a multimedia application or a voice call you can set this parameter The adapter will fast roam when the receive sensitivity Signal strength is below the value entered Show Authentication Status Dialog Select to display Select Your Country Region Code Channel availability varies from country to country for example USA FCC channels are 1 11 while Europe ETSI channels are 1 13 Enable CCX Cisco Compatible Extensions for radio monitoring and fast roaming Turn on CCKM During normal operation LEAP enabled client devic
14. e wireless access point AP _Use Zere Gonfi Right click the configuration utility icon on the Windows system tray and select Switch to AP Mode to activate the SoftAP function CONFIGURATION This screen enables you to configure the AP connection setting the Country Region Code and other advanced functions SSID The SSID up Ralink Wireless Utility to 32 printable Config Access Control Mac Table Event Log Statistics About ASCII characters sso poes XPa fano z cheme i le ste din WirelessMode 80211 B G Mixed v _ lt Use MACAddress a wireless LAN r Country Region Code The ID prevents nee emn z the unintentional merging of two e Senfigucation as Configuration utility Switch bo AF Mode 7 No forwarding among wireless clients J Hide SSID Beacon ms 100 co located WLANS The default SSID FO i E of the AP is Default Apply SoftAP X X a aE O A is the last number B INTELLINET of this adapter s MAC address Wireless adapters connected to the access point should be set up with the same SSID as the AP Tx Rate There are several options in the drop down menu Auto and a range of speeds from 1 Mbps to 54 Mbps When Auto is selected the device automatically chooses the most suitable transmission rate The higher the data rate designated in the network the shorter the distance allowed between the adapter and the wireless
15. er to Peer mode you can designate the wireless connection mode for the Ad Hoc network Only B Though the adapter is compatible with both 802 11g and 802 11b wireless stations if there are only 802 11b wireless stations in the network you can set the adapter to this mode B G Mixed If you have a mix of 802 11b and 802 119 wireless stations in your network it is recommended that the adapter be set to this mode This mode is also the default setting Only G Though the adapter is compatible with both 802 11g and 802 11b wireless stations if there are only 802 11g wireless stations in the network you can set the adapter to this mode Wireless Protection If you have a mix of 802 11b and 802 11g wireless Stations in the network it s recommended that you enable the protection mechanism which can decrease the rate of data collisions between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the adapter will be a little lower Auto Depending on the status of the network this automatically disables enables the protection mode On Always enables the protection mode e Off Always disables the protection mode INTELLINET cocoa el Tx Rate There are several options in the drop down menu Auto and a range of speeds from 1 Mbps to 54 Mbps When Auto is selected the device automatically chooses the most suitable transmission rate The higher the data rate design
16. ersion gt gt 2 0 4 0 Date gt gt 10 17 2007 Driver Version gt gt 1 2 3 0 Date gt gt 10 01 2007 EEPROM Version gt gt T3 Firmware Version gt gt Za Phy_Address gt gt 00 08 9F FE F7 C8 Wi RALINKTECH COM NOTE This adapter features Turbo Mode which delivers a higher throughput than IEEE 802 11g standard up to 54 Mbps by compressing data and decreasing the wait time for sending data to routers or access points Turbo Mode is enabled automatically without any configuration WPS CONFIGURATION The adapter supports WPS Wi Fi Protected Setup allowing connection to wireless APs without complicated procedures Two WPS configuration methods are available PBC push button configuration and PIN WPS AP List Wireless access points offering WPS service are shown a CONFIGURATION VY INTELLINET E FO e I Profile Network Advanced Statistics WAAMA Radio On Off About WPS AP List P A e Pin Code 85835092 Renew WPS Profile List Config Mode Wes Probe IE _Jautomatically select the AP in this list If the list is empty that means that no WPS enabled AP is in the range WPS Probe IE The Wireless Provisioning Services Information Element WPS IE makes it easier to connect to public Wi Fi networks you ve not previously connected to Your computer must have the WPS IE update for Windows XP SP2 installed in order to use the function Automatically select the AP Select to acti
17. es mutually authenticate with a new AP by performing a complete LEAP authentication including communication with the main RADIUS server When a wireless LAN is configured for fast re association however LEAP enabled client devices roam from one access point to another without involving the main server Using Cisco Centralized Key Management CCKM an access point configured to provide wireless domain services WDS takes the place of the RADIUS server and EJ CONFIGURATION VY INTELLINET authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parameter is enabled the Cisco AP can run the radio monitoring through the associated CCX compliant clients to continuously monitor the WLAN radio environment and discover any new APs that are transmitting beacons Non Serving Channel Measurements The Cisco access point can perform monitoring measurements through the CCX compliant clients on the non serving channels when this parameter is enabled Limit xxx milliseconds 0 2000 This setting limits the channel measurement time The default value is 250 milliseconds Turn off RF Click to turn off the radio of the adapter click again to turn it back on WMM This screen enables you to configure WMM Wi Fi Multimedia and other QoS settings such as Power Save and Direct Link Setup Ih Ill sob E B R Profile Network Advanced Stati
18. it hex values in the A F a f and 0 9 range or 13 digit ASCII characters a z and 0 9 as the encryption keys For example 01234567890123456789abcdef or administrator Show Password The password will be displayed in clear text instead of with asterisks INTELLINET S ACCESS CONTROL This screen lets you configure the access control policy used within the access point Ralink Wireless Utility Config Access Control Mac Tabe Event Log Statistics About Access Policy MAC Address Access List Access Policy Select from the drop down menu e Disable Disables the MAC address filtering function Allow All Only wireless adapters with a MAC address on the access list can connect to the AP e Reject All Wireless adapters with a MAC address on the access list will be prevented from connecting to the AP MAC Address This is the unique 12 digit hexadecimal identification for hardware devices in the network Access List Displays all the MAC address that have been added Add Add the MAC address to the access list e Delete Delete the selected MAC address from the access list e Remove All Remove all MAC addresses from the access list Apply Click to apply the setting change s B OINTELLINET MAC TABLE This screen displays details of the wireless adapters connected to the AP Ralink Wireless Utility Contig Access Control MAC Table Event Log Statistics About MAC Address Po
19. lot Package Contents Wireless G PC Card Setup CD and user manual VY INTELLINET SPECIFICATIONS El INTELLINET BRINGING Networks TO LIFE INTELLINET NETWORK SOLUTIONS offers a complete line of active and passive networking products Ask your local computer dealer for more information or visit www intellinet network com Copyright INTELLINET NETWORK SOLUTIONS All products mentioned are trademarks or registered trademarks of their respective owners
20. mputer configurations with a USB port on the side near the center as tested in the application for certification and can be used in laptops with substantially similar physical dimensions construction and electrical and RF characteristics Use in other devices such as PDAs or lap pads is not authorized This transmitter is restricted for use with the specific antenna s tested in the application for certification The antenna s used for this transmitter must not be co located or operated in conjunction with any other antenna or transmitter R amp TTE Comptiance STATEMENT This equipment complies with all the requirements of Directive 1999 5 EC of the European Parliament and the Council of March 9 1999 on radio equipment and telecommunication terminal equipment R amp TTE and the mutual recognition of their conformity The R amp TTE directive repeals and replaces Directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment as of April 8 2000 EU COUNTRIES INTENDED FoR USE The ETSI version of this device is intended for home office use in Austria Belgium Denmark Finland France Germany Greece Ireland Italy Luxembourg the Netherlands Portugal Spain Sweden and the U K and is also authorized for use in EFTA member states Iceland Liechtenstein Norway and Switzerland EU countries not intended for use none VY INTELLINET TABLE OF CONTENTS section page WIGS Eo a D E A T EE ETE 6 Co
21. nfiguration sds Sesto saa cxcteciar cece et seccearacinesecaeeeiesdecteeeidereeeeesee 7 NOWO Seana arian rene Cn ter Oot cas en a Doane eo aE reece cee 9 FP OU tec acetete ste cect e R 10 Profile COMMQUIAU ON iiics iaia 12 Profile Authentication amp Encryption Security c ccee 13 802 1x Setting Certification ccccccsessssssessssssseeeeees 16 802 1x Setting CA Servel ccccceccesesssssssssssessessssseeseeees 17 SOAS MGS segs coccntheesatrsisisvan anne ua nena twenties getsnatfideaeseeanrs 18 PAG QING OU POEA E E EE E E aaa E A 18 UO EEEE EEEE EEE EE EE AAA EAE NEEE Sate 21 PDU e siti shriagstyRercaascdaedpesereteieateayxy 22 WPS 86 Te cel lc 9 esio E S 22 SONA P eneen e e re 24 CORNUTA an enc aot eaeate ane enn ete nee ee 24 SC INI SO MUN AE E A T EE 26 PRG COGS COMMUN e stash dare ate eee gratancunaunentnoniatota 28 MAC Table ata cea eaten tacit coeneemenet sere daceseetwses aresnenectes 29 EVON Ro 0 peeeanreenes enone ree ater ome re rene neem nee eS ee nove 29 PIS WS a oneleeateniarus ai ietaiaraecincieetienatss 30 POOU cteoeesyccesian ete ceotea ie itera nae sree areas 30 PO SCT C AC ONS sec es dcdes evteicctceticcveted nner eeecestedesneveregronesdeesadienadadanss 31 NOTE Some screen shot images have been modified to fit the format of this user manual GINT ELLINET CONTENTS E INSTALLATION Prior to connecting the Wireless G PC Card also referred to as an adapter e Uninstall any previousl
22. nts meaning only the wireless clients set with the same SSID can connect to the AP This prevents the AP being connected to by unauthorized users Default Click to use the default value Apply Click to apply the setting change s VY INTELLINET sore EA SECURITY SETTING This screen accessed by clicking Security Setting on the previous SoftAP Configuration screen lets you to configure the authentication mode and encryption algorithm used within the AP Auth vs Security Authentication Type Open o O Encryption Type l Hot Use WPA Pre Shared Key Group Reker Interval l Show Password Cancel Authentication Type Four types of authentication mode are supported and presented in the drop down menu e Open No authentication is needed within the wireless network e WPA PSK This is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key you manually enter the starting password in your access point or gateway as well as in each wireless station in the network WPA PSK automatically takes over from that point Keeping unauthorized users who don t B sccp INTELLINET have the matching password from joining the network while encrypting the data traveling between authorized devices e WPA2 PSK This is also for home and small business use e WPA PSK WPA2 PSK When selecting this mode the AP supports both
23. o it Rescan Click Rescan to collect the new information of all the wireless networks nearby Connect Click Connect to connect to the selected network Add to Profile Click to add the selected network to the Profile list PROFILE The Profile screen is for managing networks you connect to frequently You can add delete edit and activate a profile on this screen eg F B Profile Network Advanced Statistics WIAA WPS Radio On Off About Ih Ill Profile List INTELLINET Profile Name gt gt SSID gt gt Network Type gt gt default Authentication gt gt Encryption gt gt Use 802 1x gt gt Tx Power gt gt Channel gt gt Power Save Mode gt gt RTS Threshold gt gt Delete Activate Fragment Threshold gt gt Profile List The Profile List displays all the profiles and their related settings including Profile Name SSID Channel Authentication Encryption and Network Type Add Edit Delete Click the corresponding button to add edit or delete the selected profile s Clicking Add displays the Add Profile screen which presents 1 Configuration and 2 Authentication and Encryption Security Activate To display status information about your current wireless connection select the profile and click Activate When a profile is activated the adapter will be initially connected to it 10 CONFIGURATION VY INTELLINET Profile List INTELLINET Wirele
24. ormation of the connection To reset the counters click Reset Counter ef uw g A OF 3 O i R Profile Network Advanced Statistics WPS Radio On Off About Receive Frames Transmitted Successfully Frames Retransmitted Successfully Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS RTS Frames Fail To Receive CTS Reset Counter ADVANCED This screen enables you to configure more advanced settings such as the wireless mode and the protection mode Wireless Mode Select from the drop down menu 802 11 B G mix If you have a mix of 802 11b and 802 11g wireless stations in your network it is recommended that the adapter be set 18 CONFIGURATION VY INTELLINET i dmb co S Profile Network Advanced Statistics WAAMA WPS Radio On Off FJ About Wirsleszinode Ss faoz 11B Gmix O Enable CCX Cisco Compatible eXtensions Wireless Protection AUTO v O E EE 3 Ihe Tx Rate gt gt Auto X LJ C Enable TX Burst 5 O Enable TCP Window Size im Fast Roaming at 70 dBm LI Show Authentication Status Dialog Select Your Country Region Code 11 B G gt gt 0 CH1 11 Apply to this mode This mode is also the default setting 802 11 B only Though the adapter is compatible with both 802 11g and 802 11b wireless stations if there are only 802 11b wireless Stations in the network you can set the adapter to this mode Ad Hoc Wireless Mode When the adapter is set in Ad Hoc Pe
25. ransmitted in the wireless network There are two types of key length 64 bit and 128 bit Assign a default encryption key Key 1 to Key 4 by clicking on the corresponding radio button To fill in each text field e 64 bit Input 10 digit hex values in the A F a f and 0 9 range or 5 digit ASCII characters a z and 0 9 as the encryption keys For example 0123456aef or test e 128 bit Input 26 digit hex values in the A F a f and 0 9 range or 13 digit ASCII characters a z and 0 9 as the encryption keys For example 01234567890123456789abcdef or administrator The IEEE 802 1X specification describes a protocol that can be used for authenticating both clients 802 1x Setting Certification below and servers 802 1x Setting CA Server below on a network The authentication algorithms and methods are those provided by the Extensible Authentication Protocol EAP a method of authentication that has been in use for a number of years on networks that provide Point to Point Protocol PPP support as many Internet service providers and enterprises do EAP runs before network layer protocols transmit data over the link When an AP acting as an authenticator detects a wireless station on the LAN it sends an EAP request for the user s identity to the device In turn the device responds with its identity and the AP relays this identity to an authentication server typically an external RADIUS server VY INTELLIN
26. ss G Router 523431 Profile Name gt PROFS PROF2 default a SSID gt gt IC Visitor Network Type gt gt Infrastructure gt PROFS IC Visitor Authentication gt gt Open Encryption gt gt None Use 802 1x gt gt NO Tx Power gt gt 100 Channel gt gt Auto Power Save Mode gt gt CAM RTS Threshold gt gt 2347 Add Edit Delete Activate Fragment Threshold gt gt 2346 le Status gt gt IC Visitor lt gt 00 08 9F 28 65 91 Link Quality gt gt 100 Ta Extra Info gt gt Link is Up TxPower 100 Signal Strength 1 gt gt 100 a Channel gt gt 3 lt gt 2422 MHz Noise Strength gt gt 70 Authentication gt gt Open Transmit Encryption gt gt NONE Link Speed gt gt 54 0 Mbps Network Type gt gt Infrastructure Throughput gt gt 0 000 Kbps IP Address gt gt 10 180 149 242 Sub Mask gt gt 255 255 255 252 Receive Default Gateway gt 10 180 149 241 Link Speed gt gt 54 0 Mbps Throughput gt gt 5 832 Kbps Status This field displays the SSID and MAC ID of the network the adapter is connecting to Extra Info This field displays the link status Channel This field displays the number of the radio channel and the frequency used for the networking Link Speed Mbps These fields display the transmission Tx and the reception Rx rates of the network The maximum transmission rate is 54 Mbps Throughput Kbps These fields display the speed of data being transmitted Tx and
27. stalling driver software for your device connect the Wireless G PC Card to your 2 gt Ask me again later Windows will ask again the next time you plug in your device or log on computer The system automatically Don t show this message again for this device detects the card Your device will not function until you install driver software NOTE In Windows Vista a Found New Hardware screen appears above when the card is connected You can ignore the message as it disappears once installation is complete 6 When the Finish screen appears click Finish CONFIGURATION The configuration utility which displays automatically once the card is connected is a powerful application that helps you configure the card and monitor link status and statistics during the communication process This card adapter will auto connect to the wireless device that has the better signal strength and no wireless security setting T VIME 8 B Network Advanced Statistics WAMAMA WPS Radio On Off About Profile List INTELLINET Profile Name gt gt SSID gt gt Network Type gt gt default Authentication gt gt Encryption gt gt Use 802 1x gt gt Tx Power gt gt Channel gt gt Power Save Mode gt gt RTS Threshold gt gt Activate Fragment Threshold gt gt ee 2 YINTELLINET CONFIGURATION The configuration utility appears as an icon in the Windows system tray while the
28. stations When the wireless mode is 802 11 B Only the maximum data rate is 11 Mbps 11b making only Auto 1 Mbps 2 Mbps 5 5 Mbps and 11 Mbps available as options Channel Select the number of the radio channel used by the access point Any wireless adapters connected to the AP should be set up with the same channel Wireless Mode Selects the wireless mode supported by the AP 802 11 B G Mixed The AP works in 11b g mixed mode 802 11 B Only The AP works in 11b mode 802 11 G Only The AP works in 11g mode Use MAC Address Click to create a unique SSID based on the adapter s MAC address Security Setting Click to further configure WLAN authentication and security settings See the separate Security Setting section below Country Region Code Channel availability varies from country to country e g USA FCC channels are 1 11 while Europe s ETSI are 1 13 Beacon ms Define the time between beacons default is 100 ms Tx Power To lower the transmit power of the AP to reduce the power used by the system select a lower percentage from the drop down menu NOTE A lower power level will result in lower signal strength and reduced coverage range No forwarding among wireless clients Enable to prevent wireless clients connected to this AP from sharing information with each other Hide SSID When this box is checked the AP will not appear in the site survey list of any wireless clie
29. stics WAAMA WPS Radio On Off About WMM Setup Status WMM gt gt Enabled Power Save gt gt Enabled Direct Link gt gt Enabled WM Enable m WMM Power Save Enable C ac Bk C ac_Be o ac C ac_vo Direct Link Setup Enable MAC Address gt gt i i i Hi Timeout Value 6a sec Apply Tear Down WMM Enable Click the check box then click Apply to enable the WMM function which then lets you configure the WMM Power Save and Direct Link Setup functions e WMM Power Save Enable Click the check box to enable then click Setting to further configure the function as AC_ BK AC_ BE AC_VI or AC_VO INTELLINET caret E e Direct Link Setup Enable Click the check box to enable then click Apply to further configure the function all within the Direct Link panel MAC Address Specify the MAC address of the client adapter you want to direct link to and click Apply to add to the DLS Status table below Timeout Value Specify the timeout value for the direct link being set up ABOUT On this screen you can click the hyperlink for information on the wireless chipset manufacturer Basic information about the utility driver EEPROM version etc also displays as do various addresses for quick reference i oH R Profile Network Advanced Statistics VAAN WPS Radio On Off About ic Copyright 2007 Ralink Technology Inc All rights reserved RaConfig V
30. two power saving functions are available only when Network Type see below is set to Infrastructure CAM Constantly Awake Mode With this selected the adapter will remain in an active mode e PSM Power Save Mode Enable the adapter in the power save mode when it is idle Network Type Select from the drop down menu e Infrastructure This operation mode requires the presence of an 802 11 access point All communication is done via the AP or router Ad Hoc Select this mode to connect to another wireless station in the wireless LAN network without using an access point or router Tx Power To lower the transmit power of the adapter to reduce the power used by the system select a lower percentage from the drop down menu NOTE A lower power level will result in lower signal strength and reduced coverage range LP CONFIGURATION VY INTELLINET RTS Threshold This is the minimum packet size required for an RTS request to send For packets smaller than this threshold an RTS is not sent and the packet is transmitted directly to the wireless network Select a setting within a range of 0 to 2347 bytes NOTE A minor change is recommended Fragment Threshold This value defines the maximum size of packets any packet size larger than the value will be fragmented If you ve decreased this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a setting
31. vate Rescan Click to scan for WPS enabled APs perform a site survey Information Select a found WPS enabled access point then click Information to display that AP s details in a pop up window PIN Code The WPS PIN Code of this network adapter is required for connection SSID lower panel The service set identifier of the connected WPS enabled access point MAC Address The MAC address of connected WPS enabled AP Authentication lower panel The authentication type of connected WPS enabled access point Encryption lower panel The encryption type of the connected WPS enabled access point Detail Click to show details of a selected WPS enabled access point Connect Click to connect to a WPS enabled access point on the list Rotate Click to connect to next WPS enabled access point on the list Disconnect Click to disconnect from a connected WPS enabled access point If there are other wireless access points in the profile the last INTELLINET canteen ee one will be connected if there s nothing in the profile the adapter will connect to any unsecured wireless AP nearby Delete Delete the WPS enabled access point from the list PIN To use the PIN type WPS configuration option enter the PIN code and then click PIN PBC To use the PBC type WPS configuration option put the WPS enabled access point in WPS PBC mode then click PBC SorTAP This adapter canrunasa Launch Config Utiliti
32. wer Saving Mode MAC Address The addresses of wireless adapters connected to the AP AID The Association ID of the current connection Power Saving Mode The supporting status of the power saving mode of the connected wireless adapter EVENT LOG This screen displays event times and messages Click Clear to remove displayed information Ralink Wireless Utility Contig Access Control MAC Table Event Log Statistics About Event Time yy mm dd hh mm ss Message ooo 2007 7 05 7 02 10 37 26 Restart Access Point 2007 7 05 7 02 10 37 26 Restart Access Point 2007 7 05 7 02 10 37 26 Restart Access Point GINTELLINET SortAP 29 STATISTICS This screen displays the transmit and receive statistical information of the AP Click Reset Counters to clear the data Ralink Wireless Utility Contig Access Control MACTable EventLog Statistics About Transmit Statistics Frames Transmitted Successfully Frames Transmitted Successfully Without Retry Frames Transmitted Successfully After Retry Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS RTS Frames Fail To Receive CTS m Receive Statistics Frames Received Successfully Frames Received With CRC Error Frames Dropped Due To Out of Resource Duplicate Frames Received ABOUT This screen displays basic information about the utility including the MAC address Ralink Wireless Utility Config
33. within a range of 256 to 2346 bytes NOTE A minor change is recommended PROFILE AUTHENTICATION AND ENCRYPTION SECURITY Authentication Type This pull down menu setting has to be consistent with the wireless networks that the adapter is intended to connect e Open No authentication is needed within the wireless network e Shared Only wireless devices using a shared key WEP key identified are allowed to connect to each other e LEAP This is a pre EAP Cisco proprietary protocol with many of the features of EAP protocols Cisco controls the ability of other vendors to implement this protocol so it should be selected for use only when a limited vendor choice for client access point and server products is not a concern When you ve set up LEAP authentication you need to enter the username and password of your computer e WPA WPA provides a scheme of mutual authentication using either IEEE 802 1x Extensible Authentication Protocol EAP authentication System Config _ Auth Enery BOL Authentication gt gt Open v Encryption gt gt None v o 802 1 WPA Preshared Key gt gt Wep Key Keys exadecin v para C Show Password Qin mwan lt e P keyra le aI a INTELLINET conricuranon BA or pre shared key PSK technology It provides a high level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises
34. y loaded versions of the driver and utility Install the software program from the CD NOTE The following Windows XP procedure is similar for Windows 98SE Me 2000 2003 Vista 1 Insert the setup CD in the CD ROM drive and run the setup program 2 Read the license agreement that displays click Yes to proceed 3 In Windows XP a Microsoft Windows Zero Configuration Tool option displays It s recommended that the alternative Ralink Configuration Tool option be selected as it features more functions Click Next RALINK Wireless Network Card Setup Choose Configuration Tool Select Configuration Tool fe Ralink Configuration Tool Microsoft Zero Configuration Tool 4 To run the adapter at a higher speed select Optimize for performance to enable the Tx Burst mode Otherwise Optimize for WiFi sets the adapter to run with a standard wireless network Click Next RALINK Wireless Network Card Setup x Choose Configuration TxBurst or WiFi Choose Configuration TxBurst or WiFi Optimize for WiFi mode Optimize for performance mode 6 INSTALLATION GINTELLINET ETWORK SOLUTION 2 Once the software E Found New Hardware lt installation begins Windows needs to install driver software for your 802 11 bg a Setup Status WLAN screen is followed Locate and install driver software recommended by a prom pt to Windows will guide you through the process of in

Download Pdf Manuals

image

Related Search

Related Contents

Sony DTC-690 User's Manual  impostazioni - Support Sagemcom  Guía de usuario del Nokia Bluetooth Headset BH-112 - i  FreeSpace 4400 - Produkthandbuch    HP 3312A User's Manual  Manual de Instruções Este medidor é uma pinça  ELAN Converter  平成24年度飲料水対策事業取扱業者 年度飲料水対策事業    

Copyright © All rights reserved.
Failed to retrieve file