Home

Hama Wireless LAN PC Card 300 Mbps

image

Contents

1. f Die Konformitatserklarung nach der R amp TTE Richtlinie 99 5 EG finden Sie unter www hama com See www hama com for declaration of conformity according to R amp TTE Directive 99 5 EC guidelines La d claration de conformit a la directive R amp TTE 99 5 CE se trouve sur www hama com La declaraci n de conformidad seg n la directiva R amp TTE 99 5 CE la encontrar en www hama com De conformiteitsverklaring conform de R amp TTE richtlijn 99 5 EG vindt u onder www hama com La dichiarazione di conformita secondo la direttiva R amp TTE 99 5 CE disponibile sul sito www hama com 9 6 0 09 9 A declara o de conformidade segundo a directiva R amp TTE 99 5 CE pode ser consultada em www hama com Konformitetsf rklaring enligt R amp TTE riktlinje 99 5 EG finner du p www hama com Software D GB F Radio ja telepaatelaitteita koskevan direktiivin 99 5 EY mukainen vaatimustenmukaisuusvakuutus l ytyy osoitteesta www hama com Overensstemmelseserkl ringen i henhold til R amp TTE retningslinierne finder du under HYPERLINK http www hama com Deklaracja zgodno ci wed ug dyrektywy R amp TTE 99 5 EG dost pna na stronie internetowej www hama com A megfelel s gi k vetelm nyek megegyeznek az R amp TTE Ir nyelvek 99 5 EG aj nl saival www hama com Prohl en
2. In the next screen select Configure for best WiFi compatibility and click Next Then click Install to start the installation and connect the WLAN adapter to the computer Click Finish to complete the installation You may have to restart the operating system 2 The configuration program introduction and operation on Windows 2000 XP Open the Hama Configuration Program To do so click Start gt Programs gt Hama Wireless LAN gt Hama Wireless LAN Utility If the program is already running in the background you will find in the task bar at the bottom right of the screen Click the circled symbol to open the utility Hama Wireless Utility A he task bar The Hama Wi AN E 8 B 2 13 from t e tas bar ama ireless Profile Network Advanced Statistics WAAMA WPS h Utility starts with the following screen sorted by gt 0 mp goen Se whereby the values in the columns may be Des Gu B D vos mmm different This screen shows all available wireless networks The lower section of this window shows the connection status Connected Disconnected Click Update to search for wireless networks again Rescan Connec t Add to Profile Status gt gt Disconnected Link Quality lt lt 0 Extra Info gt gt Signal Strength 1 gt gt 0 Channel gt gt Signal Strength 2 lt lt 0 Authentication gt gt Noise Strength gt gt 0 2 1 WPS Automatic configuration WPS WiFi Protected Se
3. Page 10 Operation of the Windows Vista Configuration program Page 11 Page 2 Configuring the operating system and computer Windows Page 12 Uninstalling the driver and configuration program on Windows 2 Page 14 Installing the driver and configuration program on MAC USA Page 14 Configuring the operating system and computer MAC USx Page 14 The configuration program introduction and operation on MAC OS X Page 16 ela l at aas Page 17 Detailed configuratiOn 44 sa sass Page 18 8 2 1 Creating a new profile 44 Page 18 8 2 2 Setting the wireless LAN encrvpton Page 19 8 2 2 1 WEP encryption ee Page 20 degeeng Page 20 0 WPA WPA2 8 2 2 2 Page 1 6 6 6 Support and Package contents 1x Wireless LAN PC Card 300 Mbps 1x driver CD Rom 1x printed operating instructions Remark concerning the positioning The connection quality depends strongly on the place or surroundings where you put up the WLAN device Please ensure that the device or its antennae are neither covered nor built in We advise yo
4. Disconnected Click RESCAN to search for wireless networks again Connected lt gt PM_MM RESCAN CONNECT ADD PROFILE 16 8 1 Quick configuration First select the required WLAN network by clicking the corresponding line in the list The network selected is highlighted in blue in the list Now click the Connect button You are connected to the network if the selected network is run without encryption and the signal is strong enough This is indicated by the green symbol and Connect is shown in the status window If you have activated encryption you are asked for the code Enter the code in the corresponding field 0 Wireless Utility Authentication Type Open wow Encryption Type WEP WPA Pre Shared Key WEP SETTING BOX Key 1 Hexadecimal O Key 2 Hexadecimal O Key 3 Hexadecimal 3 3 6 O Key 4 Hexadecimal OK CANCEL You can enter the data required for encryption here The data must be identical to the router or access point settings The authentication type and encryption are generally already selected in accordance with the target network Enter the code which must correspond exactly with the code used by the router or access point Click OK to confirm after you make your entries If you do not have this code yourself please contact the person
5. authorisation Encryption Encryption is a process in which a plain text is transformed into a coded text via an encryption process algorithm One or more codes can be used for this It must also be mentioned that each individual encryption process offers one or more authentication options Now switch to the Advanced tab Wireless mode allows you to set the standard to be used This depends on the other devices used in your network You can choose either 802 11 B only mode 11 Mbps Then this standard only is used or 802 11 B G mixed mode up to 54 Mbps Both standards are then supported If you are not sure which of the standards your devices support you should use the mixed mode 802 11 B G mixed mode Make all other settings as shown in the image below Click Apply to confirm your entries 960 Wireless Utility Profile Link Status Site Survey Statistics Advanced About This device can be used with the following encryption types Wireless Mode 802 11 B G mixed mode ES 11 B G Protection Auto i 3 64 and 128 bit WEP encryption S WPA En d ry pti on 0 oa Se OFDM rate Note Encryption is deactivated by default However for security be reasons we recommend Radio Off APPLY that you always use encryption 19 8 2 2 1 WEP encryption Wired Equivalent Privacy WEP is a standard encryption a
6. o shod podle sm rnice R amp TTE 99 5 EG naleznete na www hama com Prehl senie o zhode pod a R amp TTE smernice 99 5 EG n jdete na www hama com Ty SHAWON 0 00 0 0 6 060 8 HE TNV o nyia 99 5 EK nepi R amp TTE 8a Tn Bpeite om 616000 0 www hama com D Dieses Ger t darf nur in den folgenden L ndern betrieben werden GB The operation of this device is only allowed in the following countries F Cet appareil ne peut tre utilis que dans les pays suivants E Este aparato se puede utilizar s lo en los pa ses siguientes I uso di questo apparecchio ammesso soltanto nei seguenti Paesi NL Ditapparaat mag alleen gebruikt worden in de volgende landen DK Dette apparat m kun benyttes i f lgende lande PL Urz dzenie sprzedawane jest tylko w nast puj cych krajach H Eza k sz l k a k vetkez orsz gokban zemeltethet CZ Tento p stroj se sm pou vat pouze v n sleduj c ch zem ch SK Toto zariadenie sa m e pou va len v t chto krajin ch S Denna apparat f r endast anv ndas i f ljande l nder FIN T t laitetta saa k ytt vain P Este aparelho pode ser utilizado somente na GR Aut n ovokeur 611 8 16 0 Agttoupyei Ovo OTIC TAPAKATW X PEG D A CH GB F B I NL E DK S H PL CZ SK GR P FIN L IRL Hama GmbH amp Co KG D 86651 Monheim Germany www hama com All listed brands are trademarks of th
7. WPA FETE preshared key field OK CANCEL The code entered must be absolutely identical with that used in the network It must be min 8 and max 63 random characters for ASCII Letters A Z numbers and punctuation marks can be used 64 characters are required for HEX whereby only characters from 0 9 and a f can be used If you do not have this code it can be found in your router access point or you can ask the person responsible for these devices Save the settings and click OK 9 Support and contact information If products are defective Please contact your dealer or Hama Product Consulting if you have any product claims Internet World Wide Web Product support new drivers or product information can be found at www hama com Support Hotline Hama Product Consulting Tel 49 0 9091 502 115 Fax 49 0 9091 502 272 E mail produktberatung hama de Note This product may only be used in Germany Austria Switzerland France England Belgium Spain Holland Italy Denmark Hungary Poland Sweden Portugal Luxemburg Ireland Greece the Czech Republic Slovakia and Finland See www hama com for the declaration of conformity with R amp TTE Directive 99 5 EC CE 06810
8. automatically If the 62741 menu does not start automatically double click the corresponding CD ROM drive icon in My Computer Remark Please click Run autorun exe if the window Auto Play appears when the CD ROM English has been inserted The following window opens after the program starts Select the required Ge on guage Exit Beenden Terminer hama Click Install Win Vista The message An unidentified Hama wian Use stick InstallShield wesa El program wants access to your computer appears Allow Jnstaling Hama WLAN USB Stick Ww access by clicking Allow Click gt Next in the next i hid nk cle at window Welcome to the InstallShield Wizard 3 Se wolt while Continue with Install and connect the WLAN stick with 2 your computer Wait until the window InstallShield Wizard completed appears and finish with Finish 3 1 WPS Automatic configuration WPS WiFi Protected Setup is a function 1 Hama Wireless Utility that makes the security configuration of B Bt E KA a 0 3 the Wireless LAN connection easier In WPS AP Ls order to be able to use the function the a router access point and the remote station e WLAN USB stick PCI card or PCMCIA ae card must have the WPS function To carry out the security configuration proceed as follows 5 SE The router access point specifies wh
9. aknesses If you want to use WEP encryption select zeien Cou Rm WEP under encryption Two options are mS beem wee D sn available for the Authentication type under Weg i WER Kem Hexadecimal w Hexadecimal w z Hexadecimal w Select Open if all clients are to be enabled von pe o D seenen for WLAN Now there is virtually no other ox Com authentication Select Shared if you want to use authentication with the challenge response process A shared code is used for authentication in this method All WLAN users must know this code All other selection options under Authentication type are meaningless under WEP You can now store four codes in the lower section of the window The selected code is always used 64 bit or 128 bit encryption is supported 128 bit encryption is more secure First select whether you want to use Hex allows characters from 0 9 and a f to be used or ASCII characters You can use any characters The setting and the selection of either 64 or 128 bit encryption determines the length of the code to be entered WEP 64 bit ASCII requires 5 characters WEP 128 bit ASCII requires 13 characters WEP 64 bit HEX requires 10 characters WEP 128 bit HEX requires 26 characters Examples 64 bit Hex 10 characters 231074a6ef 64 bit ASCII 5 characters j31n 128 bit Hex 26 characters 231074a6b9773ce43f91 abbef3 128 bit ASCII 13 characters urlaub2006 0 2 2 2 2 WPA WPA2 encrypti
10. d 64 characters are required for HEX whereby only characters from 0 9 and a f can be used If you do not have this code it can be found in your router access point or you can ask the person responsible for these devices Save the settings and click OK To use WPAZ encryption select system REE WPA2 PSK under Authentication type EE E ES and AES under Encryption TOR ea Now enter the code used in the WPA preshared key field The code entered must be absolutely a Se identical with that used in the network It must be min 8 and max 63 random characters for ASCII Letters A Z numbers and punctuation marks can be used 64 characters are required for HEX whereby only characters from 0 9 and a f can be used If you do not have this code it can be found in your router access point or you can ask the person responsible for these devices Save the settings and click OK To activate the profile created switch to the Profiles tab select the profile and then click Activate 3 Installation and configuration under Windows Vista Before installation please save any open documents you may be working on Then close all running programs Insert the CD ROM provided in Panda Antivirus Firewall WIRE ESS ee the drive Usually the CD starts
11. e corresponding companies Errors and omissions excepted and subject to technical changes Our general terms of delivery and payment are applied CE 06810 2 8 8 3 9 00062741 09 07 Ok f N E Sg SS WLAN PC Card 300 Mbps 00062741 Contents 1 2 2 2 9 1 2 Installing the driver and configuration program on Windows 2000 6 Page 03 The configuration program introduction and operation on Windows 2000 XP Page 04 WPS Automatic configuration E Page 04 Detailed 10 aiaei Page 05 2 2 1 Creating a new 0 eee sass Page 05 2 2 1 1 Wuer Page 06 2 2 1 2 neue TE Page 07 2 2 2 Setting the wireless LAN encryption s ses ssrssnrssressreseresnresrenrrnernsnrnsnrnsnennrenrrenrrsnenns Page 7 2 2 2 1 WEP MN OMI anise Page 08 2 2 2 2 WWPA WPA2 encryption s enesnsensnnenennninensnnersnrninnrnnnsrnnnsrnnrnnnnrnnrnnnnnnnnrenrnneennns Page 08 Installation and configuration under Windows Vista Page 10 WPS Automatic configuration
12. eless LAN encryption If your network is not encrypted click OK to accept the settings To activate the profile created switch to the Profiles tab select the profile and then click Activate 2 2 2 Setting the wireless LAN encryption First itis important to understand a range of terms The next section will explain the main terms used here Authentication Authentication is a process in which the identity e g of a person is determined based on a certain characteristic This can be done by fingerprint password or any other proof of authorisation Encryption Encryption is a process in which a plain text is transformed into a coded text via an encryption process algorithm One or more codes can be used for this It must also be mentioned that each individual encryption process offers one or more authentication options Please switch to the Authentication and Security tab This device can be used with the following encryption types 64 and 128 bit WEP encryption WPA and 2 Note Encryption is deactivated by default However for security reasons we recommend that you always use encryption 2 2 2 1 WEP encryption Wired Equivalent Privacy WEP is a standard encryption algorithm for WLAN It both controls the access to the network and guarantees the integrity of the data This method is considered vulnerable due to a range of we
13. ers Examples 64 bit hexadecimal 10 characters 231074a6ef 64 bit ASCII 5 characters j31n 128 bit hexadecimal 26 characters 231074a6b9773ce43f91 abbef3 128 bit ASCII 13 characters urlaub2006 0 8 2 2 2 WPA encryption Wi Fi Protected Access WPA is an encryption method for WLAN WPA contains the WEP architecture but offers additional protection via dynamic codes which are based on the Temporal Key Integrity Protocol TKIP and also offers pre shared keys PSK or extensible authentication protocol EAP for user authentication However a radius server is required for this 20 WPA offers two types of authentication either pre shared key or authentication via special authentication protocols which are generally variations of EAP Extensible Authentication Protocol An authentication server RADIUS server is used for the latter authentication method which is rarely used for private applications Your administrator can give you the information you require to configure this authentication method The pre shared key method is more common and 8 0 Wireless Utility offers a high degree of security E wea psx 3 Encryption Type TKIP ie To use WPA encryption select WPA PSK under WPA Pre Shared Key S Authentication type and TKIP or AES under WEP SETTING BOX Encryption 3 E Hexadecimal y 2 Hexadecimal 3 Hexadecimal Now enter the code used in the
14. ful a profile is created which is restored automatically when you reconnect For detailed information on setting encryption please see Page 7 under the heading Setting the wireless LAN encryption 2 2 Detailed configuration When configuring it is useful to create a profile A profile serves to save various settings for a connection under a certain name For example if you want to connect to various wireless networks you can save the settings for the networks in profiles which allows you to change the configuration quickly 2 2 1 Creating a new profile You need the following information to create a profile SSID network ID This is the name of the required network Encryption used in the target network Network type type of network Infrastructure or ad hoc There are two basic ways to create a profile Version 1 Change to the Profile tab and click Add or Version 2 Open the Network tab All networks are listed in this tab Select the required network in the list and click Add to profile For hidden networks only If the SSID field is empty the router or access point is set to hide the network The SSID cannot therefore be copied automatically In both cases the following window is SEET Auth Encry displayed on the screen OF etek Tyee gt enen v The device supports the infrastructure and S EE ad hoc network type
15. he next prompt click Remove completely and then Yes Remove the WLAN adapter and then click Finish to restart the computer 6 Installing the driver and configuration program on MAC OS X Before installation please save any open documents you may be working on Then close all running programs Ensure that you have administrator authorisations to enable you to install the driver correctly Connect the device to a free PEMCIA Cardbus slot After the operating system has loaded completely and the desktop is complete insert the enclosed driver CD ROM in your drive An icon with the CD ROM then appears on your desktop Double click the icon and select the MAC driver directory in the Finder window This directory contains the DMG file required for installation Double click the DMG file to activate the image After you activate the image select the correct directory for your installed MAC OS X Version and then double click the corresponding PKG file Installation is now started Select your hard drive on which you want to install the driver and the configuration program You must then restart the system 7 Configuring the operating system and computer on MAC OS X After you have installed the driver you must configure the network environment in accordance with the new situation To do so proceed as follows 14 Click the Apple symbol in the upper menu bar and select the Environment menu item Select the Network setting me
16. ich rec WPS Probe E encryption and which key is used The encryption entered here applies to all users of the network 10 There are two methods a Configuration using the button Press the WPS button on the router access point Within two minutes you must press the PBC button on the WPS tab page in the WLAN adanters configuration program The connection is now established automatically b Pin code Make a note of the pin code which is displayed in the WLAN adapter s configuration program Select the target network in the upper list and then click PIN Switch to the user interface of the router If your router supports this method you will find an entry field for the pin code in the WPS settings Enter the code you noted earlier and start the transmission The connection is now established automatically If the connection is successful a profile is created which is restored automatically when you reconnect 3 2 Operation of the Windows Vista configuration program Click the symbol with the two computer monitors in the task bar with ERE WON 13 30 the left mouse button Afterwards you can establish connections to existing WLAN networks Click Wireless networks are available for this purpose Not Connected Wait a minute if this optio
17. lgorithm for WLAN It both controls the access to the network and guarantees the integrity of the data This method is considered vulnerable due to a range of weaknesses If you want to use WEP encryption select the BDO Wireless Utility following settings Authentication Type Open Encryption Type WEP H Two options are available for the Authentication WPA Pre Shared Key type under WEP ELE Key 1 Hexadecimal D O Key 2 Hexadecimal DI Select Open if all clients are to be enabled for WLAN Now there is virtually no other O Key 4 Hexadecimal 8 authentication 9 Select Shared if you want to use authentication with the challenge response process A shared code is used for authentication in this method All WLAN users must know this code All other selection options under Authentication type are meaningless under WEP You can now store four codes in the lower section of the window The selected code is always used 64 bit or 128 bit encryption is supported 128 bit encryption is more secure First select whether you want to use Hexadecimal allows characters from 0 9 and a f to be used or ASCII you can use any characters The setting and the selection of either 64 or 128 bit encryption determines the length of the code to be entered WEP 64 bit ASCII requires 5 characters WEP 64 bit hexadecimal requires 10 characters WEP 128 bit ASCII requires 13 characters WEP 128 bit hexadecimal requires 26 charact
18. llation process is suitable for Windows 98SE ME 2000 XP XP x64 Edition Vista Click Install Win2000 XP to continue with the installation Click User Guide to open the operating instructions Adobe Reader is required to display PDF files If you have not yet installed Adobe Reader you will find a free version on the enclosed driver CD Click Download driver to download the latest driver from the Hama website This allows you to check whether drivers have now been deve Install Win 2000 XP Install Win Vista Users Guide Download Driver Adobe Reader Back WIRELESS LAN 300 Mbps 62741 loped for previously unsupported systems Click Back to return to language selection When you select Install the InstallShield Wizard is loaded This can take a few seconds Please wait until the InstallShield Wizard starts Read the licence agreement Select accept the terms of the license agreement if you accept them and then click Next For Windows XP users only The next screen prompts you to choose whether you want to configure the Wireless LAN Adapter using the Hama Configuration Program or the configuration program integrated in Windows We recommend that you use the Hama Configuration Program To do so select Hama Wireless Utility and click Next
19. n cannot be selected Please check if the WLAN router or Access Point is operational if this does not help Wireless networks are available ech The found networks are displayed now Select the correct network Connect to a network and click Connect Network and Sharing Center Remark concerning hidden networks the name is not shown in this case Instead of that it is called Unnamed Network When the Swi Oo 2 02 PM connection has been established you are asked for the name Afterwards you are mostly asked to enter the network security key For reasons of safety we advise you against using uncoded networks Click Connect for confirmation Windows establishes now the connection to the desired WLAN Afterwards you can store the network Z Start this connection automatically and start it automatically next time The connection is so automatically established in future Finish the configuration by clicking with the mouse Close Close 11 3 3 Setting up an Ad hoc network This enables direct connections to another Wireless LAN Client device e g a USB stick or a WLAN PCI add in card No wireless LAN router or Accesspoint is required for this If such a network already exists you can establish a connection with this one as described above If it is to be set up a ne
20. nu item The following window opens New Port Detected A we A new network port has been detected Ethernet Adaptor en1 Click OK to confirm the message Please verify that it is configured correctly then press Apply Now to activate it Note the message shown above is not displayed the device was not correctly identified by your PowerMac Ensure that the device is connected properly After the Hama WLAN Adapter has been 990 Network properly detected the following window QD opens Location AOLELE New Location Edit Locations Select the New environment option under Environment Name the new Ethernet Adaptor environment e g WLAN and click the OK me button Internes Modem Internes Modem is not set up Connect Click the lock to prevent further changes Apply Now 15 Select the Environment menu item again 90 Network in the Network window and select the ele New environment which has also been Location ALAN 7 selected WLAN in our case Next select ao para the Show Display menu item in the Network window and select the Network Check a configuration to make it active Drag configurations into the order you want to try them when configurations option connecting to a network On Port Configurations N
21. on Authentication amp Securi connect to from the list of available networks eene Power Saving Mode CAM Constantly Awake Mode O Power Saving Mode To reduce the energy consumption you can run the device in Power saving mode In this mode certain a Network Type Infrastructure ie Tx Power 100 5 functions are deactivated or run at a lower setting 2 if they are not fully used Select CAM Constantly a ge Awake Mode if you want to run the stick at full 2346 power all the time OK CANCEL This device allows you to set up two different network types Select Infrastructure under Network type if you want to connect to a router or access point The settings for TX Power RTS Threshold and Fragment Threshold can be left at the default settings If you want to connect to another WLAN client device without a router or access point select 802 11 Ad hoc The settings for TX Power Channel RTS Threshold and Fragment Threshold can be left at the default settings 18 8 2 2 Setting the wireless LAN encryption First it is important to understand a range of terms The next section will explain the main terms used here Authentication Authentication is a process in which the identity e g of a person is determined based on a certain characteristic This can be done by fingerprint password or any other proof of
22. on Wi Fi Protected Access WPA is an encryption method for WLAN WPA contains the WEP architecture but offers additional protection via dynamic codes which are based on the Temporal Key Integrity Protocol TKIP and also offers pre shared keys PSK or extensible authentication protocol EAP for user authentication However a radius server is required for this 2 is a development of WPA and uses a different encryption algorithm advanced encryption standard AES WPA offers two types of authentication either pre shared key or authentication via special authentication protocols which are generally variations of EAP Extensible Authentication Protocol An authentication server RADIUS server is used for the latter authentication method which is rarely used for private applications Your administrator can give you the information you require to configure this authentication method The pre shared key method is more common and offers a high degree of security To use WPA encryption select WPA PSK System E under Authentication type and TKIP under ett S SE Encryption Now enter the code used inthe WPA preshared key field The code entered must be absolutely identical with that used in the network It must be min 8 S and max 63 random characters for ASCII 9 cone Letters A Z numbers and punctuation marks can be use
23. on uses the following items QoS Packet Scheduler a 2 AEGIS Protocol IEEE 802 1 v3 2 0 3 ie me Internet Protocol TCP IP ZS E Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected Notify me when this connection has limited or no connectivity Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain DNS server address automatically Use the following DNS server addresses 13 Select Use the following IP address and enter your IP address in accordance with the sample 1 PC IP address 192 168 1 1 Subnet mask 255 255 255 0 2 PC IP address 192 168 1 2 Subnet mask 255 255 255 0 Click Ok to confirm your entries 5 Uninstalling the driver and configuration program on Windows Save all open documents and close all programs before uninstalling Select Start gt Settings gt Control Panel gt Software To do so select Hama Wireless Utility and click Remove At t
24. ote The process for selecting the con means coer O Built in Ethernet nections can vary depending on the MAC Seier model and features In our case remove the tick for all con nections except the Ethernet connection en2 Then click the Activate button The configuration process is now complete for your system a Click the lock to prevent further changes Apply Now 8 The configuration program introduction and operation on MAC OS X As this device is not an official Apple Airport product you cannot use the Airport program integrated in the system You must open Re the enclosed utility to configure the device Open the finder and select the hard drive where you installed the driver and the utility earlier The utility is installed in the Programs directory by default Double click the icon Wireless Utility 5 x The following window opens Profile Link Status Ste Surver Statistics Advanced About This screen shows all available wireless networks TREE eye The SSID which is used to identify WLAN devices Se eC ee in the respective wireless LAN the router MAC ES PMMM 00 0E 2E 6A 100 11 wear TKIP Infrastructur address BSSID the signal strength signal the channel used channel the encryption algorithm encryption and the authentication authentication and the type of network network type are displayed The lower section of this window shows the connection status Connected
25. reless LAN encryption If your network is not encrypted click OK to accept the settings To activate the profile created switch to the Profiles tab select the profile and then click Activate 6 2 2 1 2 Ad hoc mode First enter a name for your profile Profile name e g PROF1 If you have selected version 1 to create the profile you must enter the network ID SSID of the target network in the SSID field This is in the wireless LAN settings in your router or access point or you can ask the person in charge If you have selected version 2 the SSID has already been copied automatically from the network overview To reduce the energy consumption you can run the device in Power saving mode PSM In this mode certain functions are deactivated or run at a lower setting if they are not fully used Select Constantly Awake Mode CAM if you want to work at full power all the time Select Ad hoc under network type This mode allows you to connect to other wireless LAN client devices e g USB sticks PCI cards or cardbus The settings for TX Power Preamble RTS Threshold and Fragment Threshold can be left at the default settings You must also set the wireless LAN channel used under Channel In Europe there are 13 channels in the 2 4 GHz frequency range If your network uses encryption switch to the Authentication and Security tab and continue configuration under Setting wir
26. responsible for configuring the router or access point For detailed information on setting encryption please see Page 20 under the heading Setting the wireless LAN encryption For further information on the connection made open the Link status tab This shows information such as the Link quality and Signal strength 17 8 2 Detailed configuration When configuring it is useful to create a profile A profile serves to save various settings for a connection under a certain name For example if you want to connect to various wireless networks you can save the settings for the networks in profiles which allows you to change the configuration quickly 8 2 1 Creating a new profile You need the following information to create a profile Profile e SSID network ID This is the name of the required network e Encryption Type Encryption used in the target network e Network Type type of network Infrastructure or ad hoc Open the Wireless Utility Using the Network overview Site survey tab you can select the required network and then open the dialog box using the ADD PROFILE button or open the Profile tab and start the dialog box by clicking the ADD button First enter a name for your profile Profile name OOO Wireless Utility Under SSID select the network you want to Proa Nama ROFL es 9 i f m Configurati
27. s A Infrastructure Select this type if you want SE to connect this wireless LAN device to a R wireless LAN router or access point Ad hoc Select this type if you want to connect directly to another wireless LAN client device e g another USB stick or a WLAN PCI card without a wireless LAN router or access point Two WLAN client devices are required for this 2 2 1 1 Infrastructure mode First enter a name for your profile Profile name e g PROF1 If you have selected version 1 to create the new profile you must enter the network ID SSID of the target network in the SSID field This is in the wireless LAN settings in your router or access point or you can ask the person in charge If you have selected version 2 the SSID has already been copied automatically from the network overview To reduce the energy consumption you can run the device in Power saving mode PSM In this mode certain functions are deactivated or run at a lower setting if they are not fully used Select Constantly Awake Mode CAM if you want to work at full power all the time Select Infrastructure under network type This mode facilitates connection to a wireless LAN router or access point The settings for TX Power RTS Threshold and Fragment Threshold can be left at the default settings If your network uses encryption switch to the Authentication and Security tab and continue configuration under Setting wi
28. tup is a function A ste ae Ny that makes the security configuration of L A oa A WM WPS h the Wireless LAN connection easier In IW 5 ro order to be able to use the function the BE router access point and the remote station an _ WPS Profile List Config Mode WLAN USB stick PCI card or PCMCIA card must have the WPS function To carry out the security configuration m proceed as follows e TEASE 7 Weem PBC 8 WPS Probe IE The router access point specifies which encryption and which key is used The encryption entered here applies to all users of the network There are two methods a Configuration using the button Press the WPS button on the router access point Within two minutes you must press the PBC button on the WPS tab page in the WLAN adapter s configuration program The connection is now established automatically b Pin code Make a note of the pin code which is displayed in the WLAN adapter s configuration program Select the target network in the upper list and then click PIN Switch to the user interface of the router If your router supports this method you will find an entry field for the pin code in the WPS settings Enter the code you noted earlier and start the transmission The connection is now established automatically If the connection is success
29. u against putting it up near metallic objects or other electric or radiant devices In case of reception fluctuations or connection interruptions we recommend you to move interference sources such as DECT telephones mobile phones Bluetooth devices or other WLAN networks out of the way If this is not possible it may also be helpful to change the cable System requirements e Free PCMCIA Cardbus slot e Operating system Windows 98SE ME 2000 XP XP x64 Edition Vista or MAC OS X 10 3 x 10 4 x 2 Safety instructions Do not operate the device in damp or extremely dusty environments Protect the device from pressure and impact The device may not be opened or moved during operation 1 Installing the driver and configuration program on Windows 2000 XP Before installation please save any open documents you may be working on Then close all running programs Insert the CD ROM provided in the drive Usually the CD starts automatically If the menu does not start automatically double click the corresponding CD ROM drive icon in My Computer The following window opens after the program starts Panda Antivirus Firewall Deutsch English Fran ais Exit Beenden Terminer WIRELESS LAN 300 Mbps 62741 Select the required language The following window is displayed when you select the language This insta
30. unction you should leave the setting on Get automatically Proceed as follows to check the settings on your PC Start gt Settings gt Control panel gt Network connections L your PC is connected to the router e g LAN connection When you right click the corresponding connection the following screen is displayed when EE you select Properties Select the Internet Protocol TCP IP entry in the list and click Properties Select Optain an IP address automatically and Optain DNS server address automatically if there is a DHCP server in your network Confirm by clicking OK and again in the subsequent window Your PC is now configured such that the router assigns the IP address automatically If you do not have a device with an integrated DHCP server you must assign the IP addresses manually The following example describes basic setup using manual address assignment For local networks special address ranges are provided which are not transmitted over the internet As an example a range that you can use for your network is 192 168 1 1 to 192 168 1 254 The first PC is assigned the address 192 168 1 1 the second 192 168 1 2 the third 192 168 1 3 etc Select the connection network adapter via which 4 Local Area Connection Properties General Authentication Advanced Connect using This connecti
31. w so that other users can connect themselves you have to proceed as described below Click the symbol with the two computer monitors in the task bar with the left mouse button Bers G1 13 30 8 A8 Click Connect to a network Set up a connection or network and then Set up a wireless Ad hoc computer to computer network Confirm with gt Next gt Next In the next window you are asked to enter data concerning the network name and the security type More information is shown if you move the mouse cursor towa rds the Give your network a name and choose security options appropriate field Additional remarks concerning the network name and WPA2 EE security key Here you should only use letters Security type Help me choose from A Z as well as numbers from 0 9 Security hey Passphrase Oped E Display characters Confirm your specifications with gt Next gt Close Save this network 4 Configuring the operating system and computer Windows After you have successfully installed the network adapter you still have to install or configure a protocol This protocol governs the data exchange between the computer and the network TCP IP is most common Each computer has to be assigned Its own address for the protocol Automatic address assignment is only reliable if a DHCP server exists in the network e g a router or access point If you have one of these devices with a DHCP f

Download Pdf Manuals

image

Related Search

Related Contents

Model 87 & 89 Series IV - Medical Devices Center  Q-Lab 第 2 回 OD プロジェクト - Q  KARENTOL® EXPERT Ca  ノータッチ錠の開発経緯 HACCP 実践研究会 副会長 宇井カロ美  MX2 GUÍA RÁPIDA  Benutzerhandbuch MAXDATA Server PLATINUM    RAV520NI SI 0579-M046-0  UNO ID Card Printer/510324/2  RKP Power System user`s manual  

Copyright © All rights reserved.
Failed to retrieve file