Home

Intel 2915ABG 802.11a, 802.11g/b Wireless Adapter

image

Contents

1. Transmit Receive Tx Rx Statistics Displays percent values for non directed and directed packets Total host packets The sum total number of directed and non directed packets counts e Transmit Mbps e Receive Mbps Non directed packets The number of received packets broadcast to the wireless network Directed packets The number of received packets sent specifically to the wireless adapter Total Bytes The total number of bytes for packets received and sent by the wireless adapter Reset Statistics Resets the adapter statistical counters back to zero and begins making new data measurements Close Close the dialog and return to the main window Help Displays the help information for this page Intel Wireless Troubleshooter Tools menu be Intel Wireless Troubleshooter F E Ex File Help To save logs ta a file ar to view event traces click on the A 2004 05 02 10 03 41 Did not receive IP address ES Wireless Event Viewer The wirelezs adapter failed to get a valid IP address This can be due to an authentication failure with the network incorrect encryption keys or because of a DHCP server malfunction Click here to re enter encryption keys Intel Wireless Troubleshooter can notify you when there are wireless connection errors on your computer Follow these recommended steps to resolve the issue Alert notifications are currently enabled Dis
2. Name Description Adapter Displays the name of the installed adapter currently being managed by Intel E PROSet Wireless Task Tray Show application icon in the taskbar Select this option to display the task tray status icon This icon resides in the Windows Task bar Notification area Clear to not display the task tray status icon Selecting Hide Icon from the task tray menu also clears this option The Task Tray Status Icon provides several functions e Visual feedback for the connection state and wireless activity of your wireless network The icon changes color and animation for different wireless activity See Task Tray Icons for more information e Menu A menu is displayed when you click the icon From this menu you perform tasks such as turning on off the radio or launching the Intel PROSet Wireless application See Task Tray Menu Options for more information e Tool tips and balloon prompts See Tool Tip and Balloon Prompts for more information Notifications Auto Connect Show Alert Notifications Select this option to display balloon windows next to the task tray icon When your action is required a message prompt displays Only high importance events alerts trigger a balloon window If the balloon window is selected then the appropriate action is taken Clear the box to not display balloon message prompts displayed Refer to Tool Tip and Balloon Prompts for more information
3. Profile Name Profiles are network settings that allow your wireless adapter to connect to a network access point Infrastructure mode or computer peer to peer ad hoc mode which does not use an access point Refer to Set up Profiles for more information Network Name Name of the wireless network SSID or computer Connection Icons The network profile status icons indicate the different connection states of the adapter with a wireless network the type of operating mode being used and if WEP encryption or 802 1x authentication is enabled The wireless adapter is associated with an access point or computer Ad hoc mode Ifa profile has 802 1x settings enabled this indicates that the adapter is associated and authenticated Infrastructure operating mode et Ad hoc operating mode The network is using Security encryption soa Network Name Arrows The band frequency being used by the wireless network Name of the wireless network SSID or computer Use the arrows to position profiles in a preferred order for auto connection e Up arrow Move the position of a selected profile up in the profile list e Down arrow Move the position of a selected profile down in the profile list Connect Activate the selected profile and connect to the wireless network Add Create a new profile using the Profile Wizard Refer to Profile Wizard Overviewfor more information Rem
4. Single Sign On Use Windows user name and password is targeted to the enterprise environment where users logon to their computer with a user name password and typically a domain Fast User Switching does not support domain log on x NOTE Windows Fast User Switching is enabled by default if you are using Windows XP Home Hu Edition It is targeted for the home user Fast User Switching is also available on Windows XP Professional if you install it on a stand alone or workgroup connected computer If a computer running Windows XP Professional is added to a domain then Fast User Switching option is not available Back to Contents Trademarks and Disclaimers Back to Contents Security Overview Intel R PRO Wireless 2915ABG Network Connection User Guide e WEP encryption e 802 1x Authentication e WPA WPA2 e Cisco Features WEP encryption Using the IEEE 802 11 Wired Equivalent Privacy WEP encryption can prevent unauthorized reception of wireless data WEP encryption provides two levels of security using a 64 bit key sometimes referred to as 40 bit or a 128 bit key also known as 104 bit For better security use a 128 bit key If you use encryption all wireless devices on your wireless network must use the same encryption keys Wired Equivalent Privacy WEP encryption and shared authentication provides protection for your data on the network WEP uses an encryption key to encrypt data before transmitting it Only co
5. Niniejszym Intel R Corporation deklaruje e Intel R PRO Wireless 2915ABG Network Connection speenia wymagania zasadnicze oraz stosowne postanowienia zawarte Dyrektywie 1999 5 EC Pour la France m tropolitaine 2 400 2 4835 GHz Canaux 1a 13 autoris en usage int rieur 2 400 2 454 GHz canaux 1 7 autoris en usage ext rieur Pour la Guyane et la R union 2 400 2 4835 GHz Canaux 1a 13 autoris en usage int rieur 2 420 2 4835 GHz canaux 5 13 autoris en usage ext rieur Pour tout le territoire Fan cais Seulement 5 15 5 35 GHz autoris pour le 802 1 Belgium The use of WM3A B2915ABG in 802 11a mode is prohibited due to a transmitting power greater than 60 mW L utilisation de WM3A B2915ABG en mode 802 11a est interdite parce que le puissance d mission est sup rieure 120 mW Het gebruik van WM3A B2915ABG in 802 11a mode is niet toegelaten omdat het vermogen groter dan 120 mW is Dans le cas d une utilisation priv e l ext rieur d un b timent au dessus d un espace public aucun enregistrement n est n cessaire pour une distance de moins de 300m Pour une distance sup rieure 300m un enregistrement aupres de l IBPT est requise Pour les enregistrements et licences veuillez contacter l IBPT In geval van priv gebruik buiten een gebouw op een openbare plaats is geen registratie nodig wanneer de afstand minder dan 300m is Voor een afstand groter dan 300m is een registratie bij BI
6. Select one of the following options e Information Notifications These balloons are of lower importance They do not require your interaction but can greatly improve the wireless experience e Show Information Notifications This is selected by default All informational balloon windows are displayed next to the task tray status icon These balloons improve your wireless experience by notifying you when available wireless networks are in range They also inform you when a wireless connection has been made or has been lost Refer to Tool Tip and Balloon Prompts for more information e Show alist of available networks in the area when not connected When Show Information Notifications is cleared you can select this item Since the informational balloon windows are disabled this option allows you to still be notified of available networks when the wireless adapter is not connected e Notify me when another application is using the wireless device When selected a dialog box is displayed when other applications are trying to manage your wireless adapter This is helpful if you are using software provided by a hotspot location coffee shop airport terminal To take advantage of the Intel PROSet Wireless features you want to disable this software when you leave the hotspot For more information about using the options above refer to Configuration Service Connect to available network using profiles only Default Connect the wireless adap
7. 2 4835 GHz Europe ETSI 5 15 5 35 GHz and 5 47 5 725 GHz Europe ETSI Low band 5 25 5 35 GHz is for indoor use only 5 47 5 725 GHz is current not allowed in Austria Belgium Czech Republic France and Slovakia Declaration of Conformity Ital Declaration of Conformity 1999 5 EC We INTEL CORPORATION SA Address Branch Office Veldkant 31 2550 Kontich Belgium declare under our sole responsibility that the product Name INTEL PRO Wireless 2915ABG Network Connection Model WM3B2915ABG EU to which this declaration relates is in compliance with all the applicable essential requirements and other provisions of the European Council Directive Radio and Telecommunications Terminal Equipment Directive 1999 5 EC R amp TTE The conformity assessment procedure used for this declaration is Annex IV of this Directive This product will bear the CE Mark label CE 0523 Product compliance has been demonstrated on the basis of IEC 60950 1999 3 Edition with amendments 1 2 3 4 and EN 60950 2000 1995 519 EC Council recommendation For article 3 1 a Health and Safety of the User of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields 0 Hz to 300 GHz EN 301 489 1 v1 4 1 Aug 2002 EN 301 489 17 v1 2 1 Aug 2002 For article 3 1 b Electromagnetic Compatibility Final Draft EN 300 328 v1 5 1 Mar 2004 EN 301 893 v1 2 3 Aug 2003 For article
8. Examples of such situations include the following e Using the Intel R PRO Wireless 2915ABG Network Connection adapter equipment on board airplanes or e Using the Intel R PRO Wireless 2915ABG Network Connection adapter equipment in any other environment where the risk of interference with other devices or services Is perceived or identified as being harmful If you are uncertain of the policy that applies to the use of wireless devices in a specific organization or environment an airport for example you are encouraged to ask for authorization to use the Intel R PRO Wireless 2915ABG Network Connection adapter wireless device before you turn it on Regulatory information Information for the OEMs and Integrators The following statement must be included with all versions of this document supplied to an OEM or integrator but should not be distributed to the end user e his device is intended for OEM integrators only e his device cannot be co located with any other transmitter e Please refer to the full Grant of Equipment document for other restrictions e his device must be operated and used with a locally approved access point I nformation To Be Supplied to the End User by the OEM or I ntegrator The following regulatory and safety notices must be published in documentation supplied to the end user of the product or system incorporating an Intel R PRO Wireless 2915ABG Network Connection in compliance with local regulations
9. Start exporting your profiles mport profiles mports profiles into the Profile List Import Browse your laptop hard disk for profiles to import OK Save settings and return to the previous page Cancel Close the page and cancel any changes made Help Displays the help information for this page Manage Exclusions Profiles menu The Exclude List management dialog is displayed when you select this menu option from the Profiles menu I MPORTANT You are not automatically connected to a network or an Access Point that is in this list This dialog allows you to exclude entire wireless networks SSID or for networks with more then one access point you may exclude an individual wireless access point BSSID Name Description Exclude List Management Network Name Name SSID of the wireless network BSSID MAC address for the selected access point Reason Indicates the reason that this entry was excluded from automatic connection NOTE Entries that are colored gray are excluded rogue access points These entries cannot be removed from the list Add Add an access point to the list Remove Remove an access point from the list Reset list Clear the list Close Close page and save settings Help Displays the help information for this page Turn Wireless Off On The wireless radio can be switched off and on using either the optional hardware radio switch on your computer from Intel PROSet Wireless
10. or by disabling the device in Windows L NOTE When your computer is switched on the radio is constantly transmitting signals In certain situations such as in a plane signals from the radio may cause interference Use the following methods if you need to disable the radio and use your laptop without emitting radio signals Using the optional computer radio off on switch If your computer has an external switch installed it can be used to switch the radio on or off Refer to the computer manufacturer for more information about this switch If you have Intel PROSet Wireless installed the current state of the radio displays in the Intel PROSet Wireless main window and in the Task Tray Using I ntel PROSet Wireless to switch the radio oft on From Intel PROSet Wireless the radio can be switched on or off The status icon in the Intel PROSet Wireless displays the current state of the radio From the Intel PROSet Wireless main Window clickWireless off on and toggle the radio off and on Switching the radio off or on from the Task Tray I con To switch the radio off or on click the Task Tray icon and select Wireless Off On How to Disable the Radio using Device Manager The radio can be disabled made non functional via the Windows operating system using Device Manager Microsoft Windows XP and Microsoft Windows 2000 From your desktop right click My Computer and click Properties Click the Hardware tab Click Device Manager
11. protocol It is important to understand the difference between bit rate and data rate since the overhead information may consume more than 40 of the total transmission This difference is common to many such data systems including Ethernet Device to Device Mode A wireless network structure that allows wireless clients to communicate with each other without using an access point Direct Sequence Spread Spectrum DSSS and Frequency Hop Spread Spectrum FHSS Two incompatible technologies used in radio transmission Dynamic IP Address An IP address that is automatically assigned to a client station in a TCP IP network typically by a DHCP server Network devices that serve multiple users such as servers and printers are usually assigned static IP addresses Extensible Authentication Protocol EAP An IETF standard that establishes an authentication protocol for network access Many authentication methods including passwords certificates and smart cards work within this framework EAP FAST EAP FAST like EAP TTLS and PEAP uses tunneling to protect traffic The main difference is that EAP FAST does not use certificates to authenticate EAP TLS A type of authentication method using the Extensible Authentication Protocol EAP and a security protocol called the Transport Layer Security TLS EAP TLS uses certificates which use passwords EAP TLS authentication supports dynamic WEP key management EAP TTLS A type of au
12. union 2 400 2 4835 GHz Canaux 1a 13 autoris en usage int rieur 2 420 2 4835 GHz canaux 5 13 autoris en usage ext rieur Pour tout le territoire Fan cais Seulement 5 15 5 35 GHz autoris pour le 802 1 Belgique Dans le cas d une utilisation priv e l ext rieur d un b timent au dessus d un espace public aucun enregistrement n est n cessaire pour une distance de moins de 300m Pour une distance sup rieure 300m un enregistrement aupr s de l IBPT est requise Pour les enregistrements et licences veuillez contacter l IBPT In geval van priv gebruik buiten een gebouw op een openbare plaats is geen registratie nodig wanneer de afstand minder dan 300m is Voor een afstand groter dan 300m is een registratie bij BIPT vereist Voor registraties en licenties gelieve BIPT te contacteren Latvia A license is required for outdoor use for operation in 2 4 GHz band Translation Italia The use of these equipments is regulated by D L gs 1 8 2003 n 259 article 104 activity subject to general authorization for outdoor use and article 105 free use for indoor use in both cases for private use D M 28 5 03 for supply to public of RLAN access to networks and telecom services L uso degli apparati regolamentato da D L gs 1 8 2003 n 259 articoli 104 attivit soggette ad autorizzazione generale se utilizzati al di fuori del proprio fondo e 105 libero uso se utilizzati entro il proprio fon
13. when available Administrator Profiles they are connected first Disable I ntel Profile Switching Users will only be able to connect with the first Pre Logon profile Disable Profile Switching only applies to Pre logon profiles Add Launch the Profile Wizard to create a profile Remove Remove a selected profile from the profiles list Properties Edit the selected profile contents Change the password for the Administrator Tool See Change Password for more Change Password information Export ae the settings and profiles as one package to other computers on your network Close Close the page Help Displays the help information for this page Administrator Settings Administrator Settings AX Cache Credentials Cache the user credentials during a user session Microsoft Windows XP Co existence Allow the user to enable Microsoft Windows xP Zera 5 ingle Sign D n 8 ptio n for E ri ain T setz Include Windows Logon Domain with User Mame ES Description Clear to send only user names to the authentication server Configure the authentication server to contact an external database that maintains a list of domains These settings allow the administrator to control how users of this computer use their wireless connection Name Description Cache Credentials Cache Credentials e Cache the user credentials during a user session o Select Cache user credentials in memory so
14. 1 of 2 TTLS User Authentication Protocol Use Client Certificate Roaming Identity Step 2 of 2 TTLS Server This parameter specifies the authentication protocol operating over the TTLS tunnel The protocols are PAP CHAP MD5 MS CHAP and MS CHAP V2 Using PAP CHAP MD5 MS CHAP and MS CHAP V2 protocols e Use the Windows logon user name and password If this feature is selected the user s credentials are retrieved from the user s Windows Logon process e Prompt for the user name and password Selecting this feature prompts for user name and password before you connect to the wireless network The user name and password must be first set in the authentication server by the administrator e Use the following user name and password The user name and password are securely encrypted saved in the profile o User Name This user name must match the user name that is set in the authentication server o Password This password must match the password that is set in the authentication server The entered password characters display as asterisks o Confirm Password Re enter the user password Select A client certificate from the Personal certificate store of the Windows logged in user this certificate is used for client authentication When using 802 1x MS RADIUS as an authentication server the authentication server authenticates the device by using the Roaming Identity username from Intel PROSet Wireless and i
15. 3 2 Effective use of the spectrum allocated The technical construction file is kept available at INTEL CORPORATION SA di AER EB 4 P e The technical construction file is kept available at INTEL CORPORATION SA Branch Office Veldkant 31 2550 Kontich Belgium Authorized Signature by Date July 19 2004 put Vincent Colin Worldwide Homologations Manager WPD Regulatory Department Declaration of Conformity 1999 5 EC We INTEL CORPORATION SA Address Branch Office Veldkant 31 2550 Kontich Belgium declare under our sole responsibility that the product Name INTEL PRO Wireless 2915ABG Network Connection Model WM3A2915ABG EU to which this declaration relates is in compliance with all the applicable essential requirements and other provisions of the European Council Directive Radio and Telecommunications Terminal Equipment Directive 1999 5 EC R amp TTE The conformity assessment procedure used for this declaration is Annex IV of this Directive This product will bear the CE Mark label CE 0523 Product compliance has been demonstrated on the basis of IEC 60950 1999 3 Edition with amendments 1 2 3 4 and EN 60950 2000 1995 519 EC Council recommendation For article 3 1 a Health and Safety of the User of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields 0 Hz to 300 GHz EN 301 489 1 v1 4 1 Aug 2002 EN 301 489 17
16. 802 1x is selected Verify that the correct authentication type is selected Click Next to see Step 2 of the Wireless Profile Properties Security Settings page Enter the required information Click OK The profile is now re applied Intel R PROSet Wireless attempts to connect to the wireless network cR OE T a An Administrator Profile Failed to Authenticate This error occurs when the credentials in the profile are not accepted by the authenticator such as access point or AAA server Use the following steps to help resolve this error Double click on Intel PROSet Wireless icon at the bottom right of the screen From the Tools menu select Administrator Tool Select the appropriate Administrator Profile from the profiles list Click Properties The Wireless Profile Properties General Settings page appears Click Next The Wireless Profile Properties Security Settings page opens Edit the credentials such as WEP keys and certificates Click OK The profile is now re applied Intel R PROSet Wireless attempts to connect to the wireless network ES DE LE dba sg An Administrator Failed to Obtain an I P Address from the DHCP Server This error can occur due to an authentication failure with the network incorrect encryption keys or because of a DHCP server malfunction Use the following steps to help resolve this error Double click the Intel PROSet Wireless icon at the bottom right of the screen From the Tools menu
17. Administrator Profiles Administrator Profiles are shared by all users of this WS Options computer To create a profile click Add pans Persistent Pre logon Common Profile Name Test Socrates MoT est Sncreates H Change Password Help The Administrator tool is used for administrators or the person who has administrator privileges on this computer This tool is used to configure common shared profiles This tool also allows the administrator to restrict what level of control the users of this computer have over their wireless connections Users cannot modify Administrator settings or profiles unless they have the password for this tool A password Should be chosen that is secure and not easily guessed You can export these settings and profiles as one package to other computers on your network Name Description Administrator Settings Settings Set the user control over their wireless network connections Options Enable or disable Persistent and Pre Logon profiles on the computer Persistent Connection A Persistent profile is active during boot time and when no user is logged onto the computer Pre Logon Common Connection A Pre Logon profile is active once a user logs onto the computer When Single Sign On support is installed this type of profile uses your Windows log on user name and password Pre logon Common are placed at the top of the Profiles List Since they are at the top of the list
18. Double click Network adapters Right click the installed wireless adapter in use Choose Disable from the pop up menu Click OK EO E Install and Uninstall the Software ntel Wireless Troubleshooter Intel Smart Wireless Solutions the Single Sign On feature and Administrator Tool are not installed during theTypical installation process To install these features use theCustom option during the installation process The Single Sign On Feature can also be installed or uninstalled after Intel PROSet Wireless has been installed Refer to Installing and Uninstalling Single Sign On Feature for instructions Intel R PROSet Wireless Installer Intel PROSet Wireless Gei Wireless LAN adapter driver Eee s ntel PROSet Wireless Remit vara Tea SES Intel Wireless Troubleshooter Intel Smart Wireless Solutions Single Sign On Administrator Tool bat anes This feature and related components require up to 3B2KB en your hard drive Installing Components Wireless LAN adapter driver D aA seem d s SE x Cancel To install the software Get dE E pn Insert the Installation CD in your CD drive Click I nstall Software on the Intel R PRO Network screen On the License Agreement screen after reading the license agreement Select accept the terms in the license agreement and click Next Click Custom Select from the list of features to install Intel PROSet Wireless The Intel R PROSet Wireless
19. Host system must be labeled with Contains FCC ID XXXXXXXX FCC ID displayed on label The Intel R PRO Wireless 2915ABG Network Connection adapter wireless network device must be installed and used in strict accordance with the manufacturer s instructions as described in the user documentation that comes with the product For country specific approvals see Radio approvals Intel Corporation is not responsible for any radio or television interference caused by unauthorized modification of the devices included with the Intel R PRO Wireless 2915ABG Network Connection adapter kit or the substitution or attachment of connecting cables and equipment other than that specified by Intel Corporation The correction of interference caused by such unauthorized modification substitution or attachment is the responsibility of the user Intel Corporation and its authorized resellers or distributors are not liable for any damage or violation of government regulations that may arise from the user failing to comply with these guidelines Local Restriction of 802 11a 802 11b and 802 11g Radio Usage The following statement on local restrictions must be published as part of the compliance documentation for all 802 11a 802 11b and 802 11g products Caution Due to the fact that the frequencies used by 802 11a 802 11b and 802 119 wireless LAN devices may not yet be harmonized in all countries 802 11a 802 11b and 802 119 products are designed for use onl
20. TKIP provides important data encryption enhancements including a re keying method Refer to Security Overview for more information NOTE TKIP is enabled only when Cisco Client Extentions is selected Default is cleared Disabled Select this option to enable Cisco Client Options Refer to Cisco Compatible Extensions Options for details From the Cisco Compatible Extensions Options you can enable Radio Management support and Mixed Cells mode Select this data encryption and 802 1x LEAP authentication on the Security Settings WPA Key Enter your network key wireless security password for your wireless network Verify that the network key used matches the Windows network key Password Enter a text phrase with at least 8 up to 63 characters in the pass phrase field WPA Personal uses Wi Fi Protected Access authentication Pre Shared Key WPA PSK mode does not use an authentication server WPA PSK requires configuration of a pre shared key PSK The data encryption key is derived from the PSK 802 1x MD5 Open None MD5 authentication is a one way authentication method that uses user names and passwords This method does not support key management but does require a pre configured key if data encryption is used MD5 Settings Name Description Network Authentication Open No authentication used Refer to Open and Shared Key authentication for more information Open authentication allows a wireless device acc
21. WPA enforces 802 1x authentication and key exchange and only works with dynamic encryption keys To strengthen data encryption WPA utilizes Temporal Key Integrity Protocol TKIP TKIP provides important data encryption enhancements that include a per packet key mixing function a message integrity check MIC named Michael an extended initialization vector IV with sequencing rules and a also re keying mechanism Using these improvement enhancements TKIP protects against WEP s known weaknesses Name Network Authentication Data Encryption Cisco Client eXtentions Description See Security Overview WPA2 Personal See Security Overview WEP WEP data encryption can be configured using 64 bit or 128 bit WEP settings can be used with all Network Authentication protocols When WEP encryption is enabled on an access point the WEP key provides a way to verify access to the network If the wireless device does not have the correct WEP key even though authentication is successful the device is unable to transmit data through the access point or decrypt data received from the access point CKI P Cisco Key Integrity Protocol CKIP is a Cisco proprietary security protocol for encryption in 802 11 media Refer to Security Overview for more information NOTE CKI P is enabled only when Cisco Client Extentions is selected TKI P To improve data encryption Wi Fi Protected Access utilizes its Temporal Key Integrity Protocol TKIP
22. application software a Install Click Intel PROSet Wireless Select Install this feature and all subfeatures Proceed to step 5 Not install Click Do not install this feature A red x displays next to the option indicating that it will not be installed I ntel Smart Wireless Solutions Provides an easy configuration wizard for connecting to a wireless router e Install Click Intel Smart Wireless Solutions Select Install this feature and all subfeatures Proceed to step 5 e Not Install Click Do not install this feature A red x displays next to the option indicating that it will not be installed Single Sign On Provides administrator control of Pre Logon and Persistent connections e Install Click Single Sign On Selectl nstall this feature and all subfeatures Click Next and proceed to step 5 NOTE Windows XP Fast Switching and the Welcome screen are disabled when the Single Sign On feature is installed e Uninstall Click Single Sign On Select Do not install this feature A red x displays next to the option indicating that it will not be installed Administrator Tool Provides administrator control over what level of control each user has over their wireless network connections e Install Click Single Sign On Selectl nstall this feature and all subfeatures Click Next and ek proceed to step 5 NOTE Windows XP Fast Switching and the Welcome screen are disabled when the Single Sign On feature is installed e Not In
23. authentication server o Password This password must match the password that is set in the authentication server The entered password characters display as asterisks o Confirm Password Re enter the user password e Use a client certificate You may optionally select a client certificate from the Personal certificate store of the Windows logged in user this certificate is used for client authentication e Roaming Identity When using 802 1x MS RADIUS as an authentication server the authentication server authenticates the device by using the Roaming Identity username from Intel PROSet Wireless and ignores the Authentication Protocol MS CHAP V2 User Name This feature is the 802 1x identity supplied to the authenticator Microsoft IAS RADIUS accepts only a valid username dotNet user for EAP clients Enter a valid username when using 802 1x MS RADIUS For all other servers this is an optional field therefore it is recommended that this field not contain a true identity but instead the desired realm for example anonymous myrealm Step 2 of 2 PEAP Server Certificate ssuer Specify Server Certificate Name Using TLS protocol Use my smart card or certificate Select smart card if the certificate resides on a smart card Select certificate if the certificate resides on the computer User Name This user name must match the user name that is set in the authentication server by the system administrator prior to cli
24. automatically available from the Profiles List If an attempt is made to edit a distributed profile that is password protected a password prompt appears Automatically importing profiles is accomplished by monitoring the import folder on your hard disk for new profile files Only profiles that have Enable Auto I mport selected can be automatically imported If a profile of the same name already exists in the Profiles List a dialog is displayed from which you can either reject the import or accept in which case the existing profile is replaced All imported profiles are placed at the bottom of the Profiles List and the profile file is immediately deleted after the import whether the import was successful or not To import a profile into the Profiles List Select the profile from the Profiles List and click the Properties button Click the Advanced button Select Enable Auto import Click OK to save the setting and exit Click OK to close the General Settings page Export the profile from the Profiles List Refer to Importing and Exporting Profiles for details Copy the exported profile from its directory to the Programs Files I nte Wireless Autol mport directory The profile is now ready to distribute to other computers pp aq Single Sign On Support and Microsoft Windows XP Welcome Screen and Fast User Switching The Fast User Switching and the Microsoft Windows XP Welcome Screen are disabled when Single Sign On support is installed
25. available specifications or where the original product identification markings trademark or serial number has been removed altered or obliterated from the Product or iv issues resulting from incorporation of software products into a system or v failure to apply Intel supplied modifications or corrections to any software provided with or included in the Product How to Obtain Warranty Service To obtain warranty service for the Product you may contact your original place of purchase in accordance with its instructions or you may contact Intel To request warranty service from Intel you must contact the Intel Customer Support I CS center in your region http support intel com support notebook centrino sb CS 009883 htm within the warranty period during normal business hours local time excluding holidays and return the Product to the designated ICS center Please be prepared to provide 1 your name mailing address email address telephone numbers and in the USA valid credit card information 2 proof of purchase 3 model name and product identification number found on the Product and 4 an explanation of the problem The Customer Service Representative may need additional information from you depending on the nature of the problem Upon ICS s verification that the Product is eligible for warranty service you will be issued a Return Material Authorization RMA number and provided with instructions for returning the P
26. click Administrator Tool Select the appropriate Administrator Profile from the profiles list Click Properties The Wireless Profile Properties General Settings page opens Click Next The Wireless Profile Properties Security Settings page is opens Edit the credentials such as WEP keys and certificates Click OK The profile is now re applied Intel R PROSet Wireless attempts to connect to the wireless network pP a a a Back to Contents Trademarks and Disclaimers Back to Contents Wireless Network Overview Intel R PRO Wireless 2915ABG Network Connection User Guide About Wireless Network Technology e Choosing a Wireless Network e Configuring a Wireless Network e Identifying a Wireless Network A wireless network connects computers without using network cables Computers use radio communications to send data between each other You can communicate directly with other wireless computers or connect to an existing network through a wireless access point When you set up your wireless adapter you select the operating mode for the kind of wireless network you want You can use your Intel R PRO Wireless Network Connections adapter to connect to other similar wireless devices that comply with the 802 11 standard for wireless networking Choosing a Wireless Network Mode Wireless networks can operate with or without access points depending on the number of users in the network Infrastructure mode uses access points t
27. computer After a user logs off a Persistent profile maintains a wireless connection either until the computer is turned off or a different user logs on Pre Logon Common Profiles Pre logon Common profiles are applied once a user logs on If Single Sign On Use Windows username and password support is installed the connection is made as part of the Windows log on sequence pre logon If Single Sign On support is not installed on the computer the profile is applied once the user session is active Pre logon Common profiles always appear at the top of a user s profile list A user can still prioritize their own profiles that they have created but they cannot re prioritize Pre logon Common Profiles Since these profiles appear at the top of the profile list Intel PROSet Wireless automatically attempts to connect to the Administrator profiles first before any user created profiles Pre Logon Connect Status When the Single Sign On component is installed you have Pre Logon Common support During the Windows log on sequence a Pre logon Status page is displayed This page displays the progress of the network connection After the wireless adapter is associated with the network access point the Status page closes Administrator Export Properties Use the Administrator Settings and Administrator Profiles options to configure shared profiles for exporting Exported profiles and settings can be pushed to any Intel PROSet Wireless auto import
28. for client authentication Click Select to choose a client certificate Certificate Issuer The server certificate received during TLS message exchange must have been issued by this certificate authority Trusted intermediate certificate authorities and root authorities whose certificates exist in the system Store are available for selection in the drop down list box If Any Trusted CA is selected any CA in the list is acceptable e Allow intermediate certificates The server certificate received during negotiation may have been issued directly by the certificate authority indicated in the Certificate issuer field or additionally by one of its intermediate certificate authorities Select to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA If cleared then the specified CA must have directly issued the server certificate Select if you want to specify your server certificate name The server name or a domain to which the server belongs based on which of the two options below has been selected e Server name must match exactly When selected the server name entered must match exactly the server name found on the certificate The server name should include the Server Name TTLS Authentication fully qualified domain name for example Servername Domain name in this field Domain name must end in specified name When selected the ser
29. is used MD5 Settings for Shared None Open WEP Open CKI P Network Authentication Data Encryption d Description Open No authentication used Refer to Open and Shared Key authentication for more information Open authentication allows a wireless device access to the network without 802 11 authentication The access point allows any request for authentication If no encryption is enabled on the network any wireless device with the correct network name SSID can associate with the access point and gain access to the network WER WEP data encryption can be configured using 64 bit or 128 bit WEP settings can be used with all Network Authentication protocols When WEP encryption is enabled on an access point the WEP key provides a way to verify access to the network If the wireless device does not have the correct WEP key even though authentication is successful the device is unable to transmit data through the access point or decrypt data received from the access point Enable 802 1x Step 1 of 2 WEP Key Encryption Level Key Index Wireless Security Password WEP Key Step 2 of 2 MD5 User Use the Windows logon user name and password Prompt for the user name and password CKI P Cisco Key Integrity Protocol CKIP is a Cisco proprietary security protocol for encryption in 802 11 media Refer to Security Overview for more information Selected 64 bit 64 bit or 128 bit encr
30. que l appareil Intel R PRO Wireless 2915ABG Network Connection est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999 5 CE Par la pr sente Intel R Corporation d clare que ce Intel R PRO Wireless 2200BG Network Connection est conforme aux exigences essentielles et aux autres dispositions de la directive 1999 5 CE qui lui sont applicables Harmed intygar Intel R Corporation att denna Intel R PRO Wireless 2200BG Network Connection star verensst mmelse med de v sentliga egenskapskrav och Ovriga relevanta bestammelser som framgar av direktiv 1999 5 EG Undertegnede Intel R Corporation erkl rer herved at f lgende udstyr Intel R PRO Wireless 2200BG Network Connection overholder de v sentlige krav og vrige relevante krav i direktiv 1999 5 EF Hiermit erkl rt Intel R Corporation dass sich dieser diese dieses Intel R PRO Wireless 2200BG Network Connection in bereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999 5 EG befindet BMWi Greek celandic Italian Spanish Hiermit erkl rt Intel R Corporation die bereinstimmung des Ger tes Intel R PRO Wireless 2200BG Network Connection mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999 5 EG Wien ME THN IIAPOYXA Intel R Corporation AHAONEI OTI Intel R PRO Wireless 2200BG Network Connection XYMMOP QONETAI IIP
31. server name entered must match exactly the server name found on the certificate The server name should include the complete domain name for example Servername Domain name in this field e Domain name must end in specified name When selected the server name field identifies a domain and the certificate must have a server name belonging to this domain or to one of its sub domains for example zeelans com where the server is blueberry zeelans com NOTE These parameters should be obtained from the system administrator PEAP Authentication Name Description Step 1 of 2 PEAP User Authentication Protocol This parameter specifies the authentication protocol operating over the PEAP tunnel The protocols are MS CHAP V2 GIC and TLS Using MS CHAP V2 and GTC protocols e Use the Windows logon user name and password If this feature is selected the credentials are retrieved from the Windows Logon process e Prompt for the user name and password Selecting this feature prompts for user name and password before you connect to the wireless network The user name and password must be first set in the authentication server by the Network Administrator e For GTC protocol Select whether you want to use a static password or a one time password e Use the following user name and password The user name and password are securely encrypted saved in the profile o User Name This user name must match the user name that is set in the
32. that you are only prompted the first time before connection instead of each time you connect or disconnect to the network during the Windows log on session o Clear Prompt for credentials each time wireless connectivity authentication re authentication is established using 802 1x profiles with either the Use Windows Logon credentials or the Prompt for Credentials on Connection option Microsoft Windows XP Select one of the options below Co existence Single Sign Option for Domain Users Allow the user to enable Microsoft Windows XP Zero Configuration e Select Displays a prompt Microsoft Windows XP is managing your profiles indicating that Microsoft Windows XP Zero Configuration is enabled and is managing your wireless adapter You are prompted to answer the following question Do you wish to disable Microsoft Windows XP management and allow Intel R PROSet Wireless to manage your wireless network o Select Yes if you want Intel R PROSet Wireless to manage your wireless adapter o Select No if you want Microsoft Windows XP to manage your wireless adapter Do not disable Microsoft Windows XP Zero Configuration Service when Intel R PROSet Wireless is enabled e Select Prevents Microsoft Windows XP Zero Configuration Service from being disabled when Intel R PROSet Wireless is enabled to manage your wireless adapter Single Sign On Setting Select to prefix the domain name to the user name for Single Sign
33. the access point MAC address is displayed This option directs the wireless adapter to connect to an access point using a specific MAC address 48 bit 12 hexadecimal digits for example 00 06 25 0E 9D 84 Close Close page Help Displays the help information for this page Profile List A profile is a saved group of network settings Profiles are useful when moving from one wireless network to another Different profile can be configured for each wireless network Profile settings can include the network name SSID operating mode and security settings The Profiles List displays the current user and administrator profiles in the order that they are to be applied Use the up and down arrows to arrange profiles in a specific order to automatically connect to a wireless network The Configuration Service also uses the profiles priority list to connect to wireless networks L NOTE Prelogon Common or Persistent profiles are displayed at the top of the Profiles list These profiles have priority over user based profiles Prelogon Common profiles in the Profiles list cannot be modified only viewed Use the Connect button to connect a profile to the selected wireless network You can also add edit and remove profiles from the main window A NOTE Use the Enable Auto I mport feature to import profiles into the Profile List Refer to Automatic Profile Distribution for more information Profiles Name Description
34. v1 2 1 Aug 2002 For article 3 1 b Electromagnetic Compatibility Final Draft EN 300 328 v1 5 1 Mar 2004 EN 301 893 v1 2 3 Aug 2003 For article 3 2 Effective use of the spectrum allocated The technical construction file is kept available at Final Lraft CN 3UU 35429 v1 5 1 Mar ZUUA EN 301 893 v1 2 3 Aug 2003 For article 3 2 Effective use of the spectrum allocated The technical construction file is kept available at INTEL CORPORATION SA Branch Office Veldkant 31 2550 Kontich Belgium Authorized Signature by _ Date July 19 2004 Ps T mg Vincent Colin Worldwide Homologations Manager WPD Regulatory Department Declaration of Conformity This equipment complies with the essential requirements of the European Union directive 1999 5 EC English Hereby Intel R Corporation declares that this Intel R PRO Wireless 2915ABG Network Connection is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Finnish Intel R Corporation vakuuttaa taten etta Intel R PRO Wireless 2915ABG Network Connection tyyppinen laite on direktiivin 1999 5 EY oleellisten vaatimusten ja sita koskevien direktiivin muiden ehtojen mukainen Dutch Hierbij verklaart Intel R Corporation dat het toestel Intel R PRO Wireless 2915ABG Network Connection in overeenstemming is met de essenti le eisen en de andere relevante b
35. with its action in ET Docket 96 8 has adopted a safety standard for human exposure to radio frequency RF electromagnetic energy emitted by FCC certified equipment The Intel R PRO Wireless 2200BG Network Connection meets the Human Exposure limits found in OET Bulletin 65 2001 and ANSI IEEE C95 1 1992 Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCC s recommended limits The following safety precautions should be observed e Do not touch or move antenna while the unit is transmitting or receiving e Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body especially the face or eyes while transmitting e Do not operate the radio or attempt to transmit data unless the antenna is connected if not the radio may be damaged e Use in specific environments o The use of wireless devices in hazardous locations is limited by the constraints posed by the safety directors of such environments o The use of wireless devices on airplanes is governed by the Federal Aviation Administration FAA o The use of wireless devices in hospitals is restricted to the limits set forth by each hospital Explosive Device Proximity Warning see below Antenna Warning see below Use on Aircraft Caution see below Other Wireless Devices see below Power Supply Access Point see below Explosive Device Proxim
36. 000 000 000 Hz which we can fortunately shorten to a Gigahertz GHz These frequencies are the home of both 802 11a 5 GHz and 802 11b 2 4 GHz Independent Basic Service Set Identifier I BSSI D Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point Independent Network A network that provides usually temporarily peer to peer connectivity without relying on a complete network infrastructure I nfrastructure Network A wireless network centered around an access point In this environment the access point not only provides communication with the wired network but also mediates wireless network traffic in the immediate neighborhood Institute of Electrical and Electronics Engineers IEEE An organization involved in setting computing and communications standards I SM Bands A series of frequency bands set aside by the FCC for Industrial Scientific and Medical applications Users of these bands operate equipment on a shared basis meaning that they must expect and accept interference from other legal users Products manufactured for ISM Band use must be approved by the FCC but the user does not have to be licensed In addition to WLAN ISM bands support cordless phones microwave ovens baby monitors toys ham radio transceivers and other wireless services K Kerberos An authentication system enabling protected communication over a
37. 1b g 11 Mixed mode protection Power Management t B 211la 3b Prefered Band v Description Band and Channel selection for 4d Hoc networks Hardware Version 0 0 3 MAC Address DEDE 35 DB D 4 8B Adapter Settings displays the Device Properties for the Intel PRO Wireless 2915ABG Network Connection Name Description Ad Hoc Channel Ad Hoc Transmit Power Value 802 11b g Select this option when using 802 11b and 802 11b 2 4 GHz ad hoc band frequency e Select the allowed operating channel from the list 802 11a Select this option when using 802 11a 5 GHz ad hoc band frequency e Select the allowed operating channel from the list Decreasing the transmit power level reduces the radio coverage Default setting Highest power setting e Lowest Minimum coverage Setting the transmission power level enables you to expand or confine a coverage area in respect to other wireless devices that could be operating nearby Reducing a coverage area in high traffic areas improves transmission quality by reducing the number of missed beacons and noise in that coverage area e Highest Maximum coverage Set the adapter to a maximum transmit power level Select this setting when operating in highly reflective environments and areas where other devices could be operating nearby and when attempting to communicate with mobile computers at the outer edge of a coverage area NOTE This setting takes effect when usin
38. 2 Find the Ownership ID and Device ID key printed on the bottom of your Linksys Access Point or Wireless Router and enter it in the appropriate box o Ownership ID Enter the eight character ownership identification key o Device ID Enter the eight character device identification key NOTE A Linksys access point without an ownership identification key printed on it does not support the Intel R Smart Wireless Solutions feature and cannot be configured using the Configuration Wizard Click Cancel to close the Configuration Wizard and refer to your Linksys User Guide 1 La 3 Click Next to continue Enter New Configuration for Linksys Access Point Step 3 4 To complete the configuration information add the following network and security information Enter Network Name SSID e Whatis the Network Name Enter a network name SSID that identifies this wireless network You can use a simple pass phrase such as Jerry s Wireless Network or OfficeWLAN or use a more secure stronger network name such as Main lt Office gt WLAN e he Network Name can be up to 32 characters long You may use upper and lower case letters numbers spaces and most special characters Avoid these characters lt gt Securing your Network Select one of the following options e No security Anyone can access my wireless network WPA Personal Security 8 to 63 alphanumeric characters WPA is a security system that encrypts the data sent over the a
39. Authentication failed due to an invalid server certificate Authentication failed due to invalid server credentials Authentication failed due to invalid server identity Authentication failed due to an invalid user certificate ncorrect PIN for retrieving certificate Authentication failed because the AAA server is unavailable The wireless adapter failed to get a valid IP address Authentication failed because timer expired Smart Card was unexpectedly removed Disconnection from an Access Point Error Occurred Because the GSM Adapter Was Unexpectedly Removed The AAA Server Rejected the EAP Method An Administrator Profile Failed to Authenticate An Administrator Profile Failed to Obtain an IP Address from the DHCP Server Authentication failed due to invalid user credentials Re enter credentials This authentication error can be caused by invalid user credentials when using either a TTLS or PEAP profile Use the following steps to help resolve this error Select a TTLS or PEAP profile from the profiles list Click Properties Click Next Select TTLS or PEAP for the 802 1x Authentication Type Select the Use the following option for User Credentials Verify the User Name Domain and password information o If Use Windows logon or Prompt each time I connect is selected make sure that the correct user credentials information is used when you connect to the wireless network 7 Click the OK button to save the settings pL CO PES A
40. Close the Configuration Service page Help Displays the help information for this page Intel PROSet Wireless Configuration Service Overview e Aboutthe Configuration Service e Other Wireless Managers The Intel Wireless Network Configuration Service provides automatic wireless connection to available wireless networks using profiles created and prioritized in the Profiles list This feature is constantly monitoring in the background the connection status of the wireless adapter If no matching profiles are found in the Profiles list for an available network a balloon prompt is displayed indicating that wireless networks are available If you click the balloon prompt the Connect to a wireless network notice is displayed From this notice you can select an available network and click Configure to configure the wireless network for connection About the Configuration Service The Configuration Service is launched when you log on to your computer Available networks are automatically connected when a matching profile is found in the Profile list Once the adapter is connected to a wireless network if a network with a higher priority profile becomes available the current connection is not disconnected You may manually connect to that higher profile by selecting the profile in Intel PROSet Wireless and clicking Connect The service is only available if the Intel PROSet Wireless software is installed If a connection to a wireless network cannot be
41. EP encryption is enabled on an access point the WEP key provides a way to verify access to the network If the wireless device does not have the correct WEP key even though authentication is successful the device is unable to transmit data through the access point or decrypt data received from the access point Encryption Level 64 bit or 128 bit 64 bit or 128 bit encryption Key Index 1 2 3 4 Up to four passwords may be specified by changing the Key Index Wireless Security Password WEP Type the wireless network Password WEP Key Key in the text box The Password is the same value used by the Wireless Access Point or Router Contact your wireless network administrator for this password e Pass phrase 64 bit Enter 5 alphanumeric characters 0 9 a z or A Z e Hex key 64 bit Enter 10 alphanumeric hexadecimal characters 0 9 A F e Pass phrase 128 bit Enter 13 alphanumeric characters 0 9 a z or A Z e Hex key 128 bit Enter 26 alphanumeric hexadecimal characters 0 9 A F Network Authentication Infrastructure Enable 802 1x Authentication Open authentication no encryption There is no network authentication or data encryption used on this network Name Description Network Authentication Open Open No authentication used Open authentication allows a wireless device access to the network without 802 11 authentication The access point allows any request for authentication If no encryption is enabled
42. ISM Direct Sequence Spread Spectrum DSSS and Orthogonal Frequency Division Multiplexing OFDM Data Rates 54 48 36 24 18 12 11 9 6 5 5 2 1 Mbps General Operating Systems Windows XP 2000 Wi Fi Alliance certification Wi Fi certification for 802 11b 802 11g 802 11a WLAN Standard IEEE 802 11g 802 11b Architecture Infrastructure or ad hoc peer to peer operating modes Security WPA WPA Enterprise AES 128 bit WEP 128 bit and 64 bit Cisco Compatible Extensions v2 0 802 1x Product Safety UL C UL CB IEC 60590 Back to Contents Trademarks and Disclaimers Back to Contents Glossary of Terms I ntel R PRO Wireless 2915ABG Network Connection User Guide Glossary Numerical A B D EF I K MOP RR STUW Numerical 802 11a The 802 11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz The 802 11a standard uses the Orthogonal Frequency Division Multiplexing OFDM transmission method Additionally the 802 11a standard supports 802 11 features such as WEP encryption for security 802 11b The 802 11b standard specifies a maximum data transfer rate of 11Mbps an operating frequency of 2 4GHz and WEP encryption for security 802 11b networks are also referred to as Wi Fi networks 802 11g The 802 11g standard specifies a maximum data transfer rate of 54Mbps an operating frequency of 2 4GHz and WEP encryption for security 802 11g network
43. Intel R PRO Wireless 2915ABG Network Connection User Guide With your wireless network card you can access wireless networks share files or printers or even share your Internet connection All of these features can be explored using a wireless network in your home or office This wireless LAN solution is designed for both home and business use Additional users and features can be added as your networking needs grow and change Your Intel R PRO Wireless 2915ABG Network Connection adapter is compatible with 802 11a 802 11b or 802 11g wireless standards Operating at 5 GHz or 2 4 GHz frequency at speeds of up to 54 Mbps you can now connect your computer to existing high speed networks using multiple access points within large or small environments Your wireless adapter maintains automatic data rate control according to access point location to achieve the fastest possible connection provide enhanced security measures using 802 1x network authentication All of your wireless networks connections can be easily managed by Intel PROSet Wireless software Intel R PRO Wireless profiles provide enhanced security measures using 802 1x network authentication ce 4 NOTE The software is compatible with the Intel PRO Wireless 2915ABG Network Connection and the Intel PRO Wireless 2200BG Network g Connection Table of Contents e Using Intel PROSet Wireless e Using Profiles e Setting up Security e Security Overview e Introduction to Wireless Networki
44. Intel R PRO Wireless 2915ABG Network Connection adapter wireless network device is far below the FCC radio frequency exposure limits Nevertheless the Intel R PRO Wireless LAN wireless network device should be used in such a manner that the potential for human contact during normal operation is minimized To avoid the possibility of exceeding the FCC radio frequency exposure limits you should keep a distance of at least 20 cm between you or any other person in the vicinity and the antenna that is built into the computer Interference statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy If the equipment is not installed and used in accordance with the instructions the equipment may cause harmful interference to radio communications There is no guarantee however that such interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by taking one or more of the following measures e Reorient or relocate the receiving antenna e Increase the distance between the equip
45. MAB2915ABG 003NY04089 003GZ04046 003WY04017 Korea eol Saale 2 010 014 xd EI HI CG y olr 0x o zO DIO Kuwait 5 GHz interface is not allowed at this time Oman If the modules are less than 100 milliwatts they are unlicensed but if they are more than 100 milliwatts the user is responsible for getting a license to operate from Telecommunications Regulatory Authority TRA in Sultanate of Oman Taiwan St EA E C TE ZR aA JRA RT RI Oa Skibi ES TS aie ES SR RAS DEA Ty ak 585 FR ER Eg RT RETE UI BE m I amp Th EBERT SARGVERMRERFEAARE KARA TERR AUS EINS EE MURS AGE TREIE ER EIER EES EE E EARS TE Pakistan Pakistan Telecommunication Authority PTA Approved Russia The frequencies 5 47 5 725 GHz are not allowed for use UAE 5 GHz interface is not allowed at this time Ukraine 5 GHz interface is not allowed at this time Radio approvals To determine whether you are allowed to use your wireless network device in a specific country please check to see if the radio type number that is printed on the identification label of your device is listed in the manufacture OEM Regulatory Guidance document Underwriters Laboratories Inc UL Regulatory Warning For use in or with UL Listed personal computers or compatible Regulatory Information Intel R PRO Wireless 2200BG Network Connection Information for the User Hegulatory Information Information for the user Safety Notices The FCC
46. NG AND USAGE OF TRADE Some states or jurisdictions do not allow the exclusion of implied warranties so this limitation may not apply to you ALL EXPRESS AND IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THE LIMITED WARRANTY PERI OD NO WARRANTIES APPLY AFTER THAT PERI OD Some states or jurisdictions do not allow limitations on how long an implied warranty lasts so this limitation may not apply to you LIMITATIONS OF LIABILITY INTEL S RESPONSIBILITY UNDER THIS OR ANY OTHER WARRANTY IMPLIED OR EXPRESS IS LIMITED TO REPAIR REPLACEMENT OR REFUND AS SET FORTH ABOVE THESE REMEDIES ARE THE SOLE AND EXCLUSIVE REMEDIES FOR ANY BREACH OF WARRANTY TO THE MAXIMUM EXTENT PERMITTED BY LAW INTEL IS NOT RESPONSIBLE FOR ANY DIRECT SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OF WARRANTY OR UNDER ANY OTHER LEGAL THEORY INCLUDING WITHOUT LIMITATION LOST PROFITS DOWNTIME LOSS OF GOODWILL DAMAGE TO OR REPLACEMENT OF EQUIPMENT AND PROPERTY AND ANY COSTS OF RECOVERING REPROGRAMMING OR REPRODUCING ANY PROGRAM OR DATA STORED IN OR USED WITH A SYSTEM CONTAINING THE PRODUCT EVEN IF INTEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES Some states or jurisdictions do not allow the exclusion or limitation of incidental or consequential damages so the above limitations or exclusions may not apply to you THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS AND YOU MAY ALSO HAVE OTHER RIGHTS THAT VARY BY STATE O
47. OX TI OYXIOAEIX AIIAITHXZEIXL KAT TIX AOIIIEX XXETIKE2 AIATAHED TH OAHIT AX 1999 5 EK Intel lysir her med yfir a thessi bunadur Intel R PRO Wireless 2200BG Network Connection uppfyllir allar grunnkrofur sem gerdar eru i R amp TTE tilskipun ESB nr 1999 5 EC Con la presente Intel R Corporation dichiara che questo Intel R PRO Wireless 2200BG Network Connection conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Por medio de la presente Intel R Corporation declara que el Intel R PRO Wireless 2200BG Network Connection cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Portuguese Intel R Corporation declara que este Intel R PRO Wireless 2200BG Malti Network Connection est conforme com os requisitos essenciais e outras disposic es da Directiva 1999 5 CE Hawnhekk Intel R Corporation jiddikjara li dan Intel R PRO Wireless 2200BG Network Connection jikkonforma mal tieijiet essenzjali u ma provvedimenti o rajn relevanti li hemm fid Dirrettiva 1999 5 EC New Member States requirements of Declaration of Conformity Estonian Hungary Slovak Czech Kaesolevaga kinnitab Intel R Corporation seadme Intel R PRO Wireless 2200BG Network Connection vastavust direktiivi 1999 5 EU p hin uetele ja nimetatud direktiivist tulenevatele teistele asjakohastele satetele Alul rott Intel R Cor
48. On Authentication e Select The user name and domain are sent to the authentication server for example lt DomainName gt lt UserName gt This is the default configuration set in the authentication server e Clear Sends only user names to the authentication server Configure the authentication server to contact an external database that maintains a list of domains Device to Device Ad hoc OK Cancel Device to Device Ad hoc Networking An administrator can control which settings are available to users in the Application Settings for device to device Ad hoc networks Select one of the following e Enable device to device networking Select to enable both open and secured connections with a device to device Ad hoc network e Enable secure device to device networking only Select to only enable connections to secured device to device Ad hoc networks e Disable device to device networking Select to disable connections to device to device ad hoc networks An administrator can restrict whether a user can access the Device to Device Ad hoc settings in the Application Settings Select to show or hide the settings Allow user to configure device to device ad hoc settings e Show device to device application settings e Hide device to device application settings Save settings and close the page Cancel settings and close the page Help Displays the help information for this page Administrator
49. P FAST is negotiated solely by the client as the first communication exchange when EAP FAST is requested from the server If the client does not have a pre shared secret Protected Access Credential PAC it can request to initiate a provisioning EAP FAST exchange to dynamically obtain one from the server EAP FAST documents two methods to deliver the PAC manual delivery through an out of band secure mechanism and automatic provisioning e Manual delivery mechanisms can be any delivery mechanism that the administrator of the network feels is sufficiently secure for their network e Automatic provisioning establishes an encrypted tunnel to protect the authentication of the client and the delivery of the PAC to the client This mechanism while not as secure aS a Manual method may be is more secure than the authentication method used in LEAP The EAP FAST method can be divided into two parts provisioning and authentication The provisioning phase involves the initial delivery of the PAC to the client This phase only needs to be performed once per client and user The EAP FAST method can be divided into two parts provisioning and authentication The provisioning phase involves the initial delivery of the PAC to the client This phase only needs to be performed once per client and user Mixed Cells Mode Some access points for example Cisco 350 or Cisco 1200 Support environments in which not all client stations support WEP encrypt
50. PT vereist Voor registraties en licenties gelieve BIPT te contacteren Austria The use of WM3A B2915ABG in 802 11a mode is prohibited due to a transmitting power greater than 60 mW translated in German Latvia A license is required for outdoor use for operation in 2 4 GHz band Translation Italia A general authorization is requested for outdoor use in Italy The use of these equipments is regulated by D L gs 1 8 2003 n 259 article 104 activity subject to general authorization for outdoor use and article 105 free use for indoor use in both cases for private use D M 28 5 03 for supply to public of RLAN access to networks and telecom services L uso degli apparati regolamentato da D L gs 1 8 2003 n 259 articoli 104 attivit soggette ad autorizzazione generale se utilizzati al di fuori del proprio fondo e 105 libero uso se utilizzati entro il proprio fondo in entrambi i casi per uso privato D M 28 5 03 per la fornitura al pubblico dell accesso R LAN alle reti e ai servizi di telecomunicazioni Greece A license is required for the outdoor use of band 5 470 5 725 GHz Belarus 2 4 GHz OFDM 802 119 is not allowed at this time Indonesia 5 GHz interface is not allowed at this time Japan 5 15 to 5 25 GHz offset Japanese channels Indoor use only The approval numbers of the product for the WM3B2915ABG 003NY04086 003GZ04044 OOSWY04016 The approval numbers of the product for the W
51. Profile Options These settings provide advanced profile connection options Allows the Administrator to enable or disable Persistent and or Pre Logon profiles on the computer Name Description Persistent Connection Persistent Connection A Persistent profile is active during boot time and when no user is logged onto the computer Pre Logon Common Connection Pre Logon Common Connection A Pre Logon profile is active once a user logs onto the computer These profiles appear at the top of the profile list They cannot be modified by the end user without a password OK Save settings and close the page Cancel Cancel settings and close the page Help Displays the help information for this page Change Password The Administrator Tool can be password protected The default setting is no password When a password is assigned the Administrator Settings and Profiles can only be accessed if the assigned password is entered Administrator profiles that are displayed in the Profiles list can be viewed using the Properties button To create a password 1 Click Administrator Tool from the Tools menu 2 Click Change Password 3 Enter a password in theNew Password text box 4 Enter the new password again in theConfirm Password text box The entered password characters display as asterisks 5 Click OK to save the new password and close the page To change or unlock the existing password Click Administrator Tool
52. R JURISDICTION ANY AND ALL DISPUTES ARISING UNDER OR RELATED TO THIS LIMITED WARRANTY SHALL BE ADJ UDICATED IN THE FOLLOWING FORUMS AND GOVERNED BY THE FOLLOWING LAWS FOR THE UNITED STATES OF AMERICA CANADA NORTH AMERICA AND SOUTH AMERICA THE FORUM SHALL BE SANTA CLARA CALIFORNIA USA AND THE APPLICABLE LAW SHALL BE THAT OF THE STATE OF DELAWARE FOR THE ASIA PACIFIC REGION EXCEPT FOR MAINLAND CHINA THE FORUM SHALL BE SINGAPORE AND THE APPLI CABLE LAW SHALL BE THAT OF SINGAPORE FOR EUROPE AND THE REST OF THE WORLD THE FORUM SHALL BE LONDON AND THE APPLI CABLE LAW SHALL BE THAT OF ENGLAND AND WALES IN THE EVENT OF ANY CONFLICT BETWEEN THE ENGLISH LANGUAGE VERSION AND ANY OTHER TRANSLATED VERSION S OF THIS LIMITED WARRANTY WITH THE EXCEPTION OF THE SIMPLIFIED CHINESE VERSION THE ENGLISH LANGUAGE VERSION SHALL CONTROL I MPORTANT UNLESS OTHERWISE AGREED IN WRITING BY INTEL THE INTEL PRODUCTS SOLD HEREUNDER ARE NOT DESIGNED OR INTENDED FOR USE IN ANY MEDICAL LIFE SAVING OR LIFE SUSTAINING SYSTEMS TRANSPORTATION SYSTEMS NUCLEAR SYSTEMS OR FOR ANY OTHER MISSION CRITICAL APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR
53. TE pe i reflect connection status You can still click the icon to open the task tray menu Tool Tips and Balloon Message Prompts The Tool Tips and Balloon message prompts provide feedback and interaction To display Tool tips move your mouse pointer over the icon Balloon messages prompts are displayed when your wireless network changes state For example if you are out of range of any wireless networks when you come into range a balloon prompt is displayed Balloon prompts can be enabled or disabled in the Application Settings Tool Tips Tool tips display when the mouse pointer rolls over the icon The tool tips display text for each of the connection states Tool Tip Intel R PROSet Wireless Connected to Mynetwork Signal Strength Very Good ij Intel PROSet Wireless Connected to MiyMeterork Signal Quality Very Good 4 19 PM Balloon Prompts When user action is required a balloon message prompt displays If you click the prompt then an appropriate action is taken For example when wireless networks are found the following balloon prompt displays Balloon Prompt Wireless network found Action Double click the Balloon Prompt to connect to the available network i Wireless networks found Click to connect to a wireless network Intel PROSet Wireless Main Window The Intel PROSet Wireless main window provides basic information about your connection If you are associated to a network it will c
54. able notifications Intel Wireless Troubleshooter is an application that can assist you in resolving wireless network connection issues When a connection issue is detected a balloon tip appears at the bottom right of your desktop screen Once you click on the balloon tip a diagnostic message displays the recommended steps to resolve the occurred connection issue For example if a connection issue occurred because of an invalid password the Profile Wizard application is launched when you click on a displayed hyperlink You can also launch Wireless Event Viewer from this page and enable or disable alert notifications The Intel Wireless Troubleshooter is supported under Windows XP and 2000 Intel Wireless Troubleshooter Description Intel Wireless Troubleshooter page contains two panes The left pane displays a list of available tools that can be started using your left mouse button The right pane displays the current connection issue in a section Each section has two parts the error message and the hint text parts The error message and time stamp are preceded by an icon The hint text part contains description about available utilities and help for resolving the associated connection issue If you click on a help text link the help text is displayed in a pop up window If you click on the associated issue resolver link a program is launched to resolve the connection issue You can launch Wireless Event Viewer or enable or disable from the last pan
55. ager click Use Intel PROSet Wireless from the task tray options e From Intel PROSet Wireless From the Tools menu click Use Microsoft Client in the Intel PROSet Wireless application When you are finished using the Microsoft Client click Enable Intel PROSet Wireless E Intel PROSet Wireless File Tools Profiles Help Windows is currently managing this wireless device Enable Intel PRO Sete Wireless To connect to a wireless network please use the Windows Wireless Network Properties Open Network Properties Profile Marne Network Name A wireless wireless D Connect La 7 Remove Lee L NewokName 0 0 0 0 0 0 0 0 0 0 0 Third Party Wireless Software If you are using software provided by a hotspot location coffee shop airport terminal the Configuration Service notifies you and then disables itself It cannot manage the wireless device when another wireless manager is communicating with the wireless device To take advantage of the Intel PROSet Wireless features you want to disable or remove this software when you leave the hotspot When you are finished using the third party wireless software the Configuration Service is re enabled automatically when you suspend or restart the computer If you want to manually enable the Configuration Service you can open Intel PROSet Wireless and click Enable Intel PROSet Wireless Back to Contents Trademarks and Disclaimers Back to Contents Troubles
56. ails displays the current network connection information Network Connection Details page description Name Profile Name Network Name IP address Signal Quality Signal Strength Adapter MAC Address Description Name of the profile If this is a one time connection then no active profile is displayed Network Name SSID of the current connection Internet Protocol IP address for the current connection radio frequency RF signal can be assessed by basically two component e Strength quantity of the signal e the quality of the signal The quality of the signal is determined by a combination of factors but primarily is composed of signal strength and the ratio of the RF noise present RF noise occurs both naturally in nature and artificially by electrical equipments If the amount of the RF noise is high and or the signal strength is low it results in a lower signal to noise ratio which causes poorer signal quality With a low signal to noise ratio it is more difficult for the radio receiver to discern the data information contained in the signal from the noise itself While adequate signal strength is required for good data communications even more important is the quality of the signal A strong signal of poor quality results in poor data communications If the signal quality is low investigate sources of noise nearby as interference from other wireless LANs other RF transmitters electric motors or compresso
57. all other wireless devices that access the wireless network Cisco Features Cisco LEAP Cisco LEAP Cisco Light EAP is a server and client 802 1x authentication via a user supplied logon password When a wireless access point communicates with a Cisco LEAP enabled RADIUS Cisco Secure Access Control Server ACS server Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network and provides dynamic individual user encryption keys to help protect the privacy of transmitted data Fast Roaming CCKM When a wireless LAN is configured for fast reconnection a LEAP enabled client device can roam from one access point to another without involving the main server Using Cisco Centralized Key Management CCKM an access point configured to provide Wireless Domain Services WDS takes the place of the RADIUS server and authenticates the client without perceptible delay in voice or other time sensitive applications CKI P Cisco Key Integrity Protocol CKIP is Cisco proprietary security protocol for encryption in 802 11 media CKIP uses the following features to improve 802 11 security in infrastructure mode e Key Permutation KP e Message Integrity Check MIC e Message Sequence Number EAP FAST EAP FAST like EAP TTLS and PEAP uses tunneling to protect traffic The main difference is that EAP FAST does not use certificates to authenticate Provisioning in EA
58. andard to demonstrate the compliance of low power electronic and EN 50371 electrical apparatus with the basis restrictions related to human exposure to electromagnetic fiels 10MHz 300GHz General public This declaration is made under our sole responsibility Authorized Signature by Date 01 December 2003 Ye incent Colin e Worldwide Homologations Manager WPD Regulatory Department Declaration of Conformity This equipment complies with the essential requirements of the European Union directive 1999 5 EC English Finnish Dutch French Swedish Danish German Hereby Intel R Corporation declares that this Intel R PRO Wireless 2200BG Network Connection is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Intel R Corporation vakuuttaa taten etta Intel R PRO Wireless 2200BG Network Connection tyyppinen laite on direktiivin 1999 5 EY oleellisten vaatimusten ja sita koskevien direktiivin muiden ehtojen mukainen Hierbij verklaart Intel R Corporation dat het toestel Intel R PRO Wireless 2200BG Network Connection in overeenstemming is met de essenti le eisen en de andere relevante bepalingen van richtlijn 1999 5 EG Bij deze verklaart Intel R Corporation dat deze Intel R PRO Wireless 2200BG Network Connection voldoet aan de essenti le eisen en aan de overige relevante bepalingen van Richtlijn 1999 5 EC Par la pr sente Intel R Corporation d clare
59. as an alternative to using your mouse to access this feature Refer to Adapter Settings for information Use Microsoft client Enable Windows XP as the wireless manager Use F10 from your keyboard as an alternative to using your mouse to access this feature Refer to Use Microsoft client for more information Advanced Statistics This information pertains to how the adapter is communicating with an access point Use Ctrl S from your keyboard as an alternative to using your mouse to access this feature Refer to Advanced Statistics for more information Intel Wireless Troubleshooter The Troubleshooter is an application that can assist you in resolving wireless network connection issues Use Ctrl W from your keyboard as an alternative to using your mouse to access this feature Refer to Intel Wireless Troubleshooter for information Administrator Tool The Administrator tool is for administrators or the person who has administrator privileges on this computer This option is used to configure shared profiles using Pre logon and Persistent profiles Use Ctrl T from your keyboard as an alternative to using your mouse to access this feature Refer to Administrator Tool for more information H mport Export Import and export profiles to and from the profile list Refer to Import Export Profiles for information Use Ctrl I from your keyboard as an alternative to using your mouse to access this feature Manage Exclusions Include o
60. can for existing networks and make a temporary connection or create a new profile for that network After you create profiles your computer will automatically connect when you change locations e Security he 802 11b wireless networks use encryption to help protect your data Wired equivalent privacy WEP uses a 64 bit or 128 bit shared encryption key to scramble data Before a computer transmits data it scrambles the data using the secret encryption key The receiving computer uses this same key to unscramble the data If you are connecting to an existing network use the encryption key provided by the administrator of the wireless network If you are setting up your own network you can make up your own key and use it on each computer Identifying a Wireless Network Depending on the size and components of a wireless network there are many ways to identify a wireless network e The Network Name or Service Set I dentifier SSI D Identifies a wireless network All wireless devices on the network must use the same SSID e Extended Service Set I dentifier ESSI D A special case of SSID used to identify a wireless network that includes access points e Independent Basic Service Set I dentifier I BSSI D A special case of SSID used to identify a network of wireless computers configured to communicate directly with one another without using an access point e Basic Service Set I dentifier BSSI D A unique identifier for each wire
61. cause du brouillage au service faisant l objet d une licence il doit tre utilis a l int rieur et devrait tre plac loin des fen tres afinde fournir un cran de blindage maximal Si le mat riel ou son antenne d mission est install l ext rieur il doit faire l objet d une licence Europe EU Declaration of Conformity Europe Frequency Bands 2 400 2 4835 GHz Europe ETSI C 03360 Declaration of Conformity We INTEL CORPORATION SA Branch Office Veldkant 31 2550 Kontich Belgium Declare that the INTEL amp PRO Wireless 2200BG Network Connection with model name WM3A2200BG is in conformance with the essential requirements of the European Council Directive Radio and Telecommunications Terminal Equipment Directive 1999 S EC R amp TTE Following Annex IV of this Directive The essential requirements being Following directive 73 23 EEC amp European Council Recommendation 1999 519 EC Electromagnetic Compatibility article 3 1 b Following directive 89 336 EEC Following the Notified Body Opinion from TNO Certification B V with Notified Body number 0336 Health amp Safety of the user article 3 1 a Effective use of the spectrum article 3 2 This declaration is based upon compliance to the following standards IEC 60950 1999 3 Edition with amendments Safety Information Technology Equipment Including Electrical Business 1 2 3 4 Equipment amp amp EN 60950 2000 C
62. client to the access point which authenticates the client to an Extensible Authentication Protocol EAP compliant RADIUS server This RADIUS server may authenticate either the user via passwords or certificates or the system by MAC address In theory the wireless client is not allowed to Join the networks until the transaction is complete There are several authentication algorithms used for 802 1x Some examples are MD5 Challenge EAP TLS EAP TTLS Protected EAP PEAP and EAP Cisco Wireless Light Extensible Authentication Protocol LEAP These are all methods for the wireless client to identify itself to the RADIUS server With RADIUS authentication user identities are checked against databases RADIUS constitutes a set of standards addressing Authentication Authorization and Accounting AAA Radius includes a proxy process to validate clients in a multi server environment The IEEE 802 1x standard is for controlling and authenticating access to port based 802 11 wireless and wired Ethernet networks Port based network access control is similar to a switched local area network LAN infrastructure that authenticates devices that are attached to a LAN port and prevent access to that port if the authentication process fails What is a RADI US RADIUS is the Remote Access Dial In User Service an Authorization Authentication and Accounting AAA client server protocol which is used when a AAA dial up client logs in or out of a Networ
63. d WPA Enterprise WPA2 Enterprise WPA Personal WPA2 Personal None WEP CKIP Data Encryption Enable 802 1x Authentication Type Cisco Options Back Next OK Cancel Help MD5 Open MD5 WEP Key EAP SIM TLS TTLS PEAP LEAP EAP FAST Click to view the Cisco Compatible Extensions Options page NOTE Cisco Compatible Extensions are automatically enabled for CKIP LEAP or EAP FAST profiles View the prior page in the Profile Wizard View the next page in the Profile Wizard If more security information is required then the next Step of the Security page is displayed Close the Profile Wizard and save the profile Close the Profile Wizard and cancel any changes made Displays the help information for the current page Network Authentication Device to Device Open None authentication WEP encryption This ad hoc network uses no network authentication with WEP data encryption Name Description Network Authentication Open No authentication used Open authentication allows a wireless device access to the network without 802 11 authentication The access point allows any request for authentication If no encryption is enabled on the network any wireless device with the correct network name SSID can associate with the access point and gain access to the network Data Encryption None No data encryption used WEP WEP data encryption can be configured using 64 bit or 128 bit When W
64. d Exporting Profiles e Setting a Profile Password e Administrator Profiles e Automatic Profile Distribution e Single Sign On Support and Windows XP Welcome Screen and Fast User Switching Profile Wizard Overview Use the Profile Wizard to create a network profile for connection to a specific wireless network When the Intel Configuration Service detects an available network and the adapter is not associated to another wireless network the Connect to wireless network page is displayed From Intel PROSet Wireless select a network from the Available Network list and click Configure 1 The General Settings page is displayed with the network name and operating mode for the selected network The identified Wireless Network Name SSID cannot be modified but you can change the Profile Name Wireless Profile Properties Wireless e Profile Name Wireless e General Settings B Security Settings General Settings Profile Mame Wireless Network Name SSID Wireless Operating Mode Gi Network Infrastructure Connect to wireless network s andor the internet Device to device Ad hoc Connect directly to other computers T Ce C Cmn 2 Click Next to display the Profile Wizard Security Settings page This starts the access point query process to determine the highest level of security required for the selected network Refer to Setting up Security for more information on security options 3 After the required sec
65. do in entrambi i casi per uso privato D M 28 5 03 per la fornitura al pubblico dell accesso R LAN alle reti e ai servizi di telecomunicazioni Belarus 2 4 GHz OFDM 802 119 is not allowed at this time Japan The approval numbers of the product for the WM3B2200BG OO3NY03120 5 GHz interface is not allowed at this time 003NYO3120 003GZ03071 The approval numbers of the product for the WM3A2200BG 003NYO3128 003GZ03076 Korea sol FASHE FSS AWE Jes Us Taiwan t 1k AS Il Ee ZIRE JERA 23m R8 55 8X 8 FH E T EIL eS Bs MK 7 zi BY 55 A FR S aT OZ FTE RE B OU ERR SARGVERMRERFEAAEE ER TERR AUS EINS Ph dom ERU E S HERR ARAM TREIE ER EIER EES EE E E Pakistan Pakistan Telecommunication Authority PTA Approved Radio approvals To determine whether you are allowed to use your wireless network device in a specific country please check to see if the radio type number that is printed on the identification label of your device is listed in the manufacture OEM Regulatory Guidance document Back to Contents Back to Contents Warranty Intel R PRO Wireless 2915ABG Network Connection User Guide Product Warranty I nformation One Year Limited Hardware Warranty Limited Warranty Intel warrants to the purchaser of the Intel R PRO Wireless 2915ABG Network Connection PCI Card the Product and software delivered with or as part of the Product including without limitation the Intel Wireless Connec
66. e File Help Wireless Event Viewer Launch Wireless Event Viewer Exit Exit Intel Wireless Troubleshooter application Intel R Wireless Troubleshooter Help Displays online help on the Intel Wireless Troubleshooter About Displays version information for the Intel Wireless Troubleshooter Disable Notification Enable Notification Available Help Click to disable the alert notifications Click to enable the alert notifications if an error is detected Date Time error message e Description of error e Link to resolve error if available See Resolving Errors below e Link to recommended steps to resolve error I mport Export Profiles Profiles menu Import Export Profiles Export Profiles e Step 1 Select one or mare profiles you want to export from your profile list below L Profile Name Wireless wireless Step Z Select the destination folder Step 3 Export the selected profiles Impart Profiles e Add external profiles to your profile list Close Allows you to import and export user based profiles to and from the Profiles List Wireless Profile can be automatically imported into the Profiles List See Import and Export Profiles for more information To export Administrator profiles refer to Administrator Export Properties for more information I mporting Profiles into the Pr
67. e Preference dialog e The available logs will be saved to the following file The current file name is displays in the editable text box The default location is the desktop Browse button Specify a new fully qualified file name OK button Close the dialog and apply the new changes Cancel button Close the dialog without applying any changes Exit Exit Intel Wireless Troubleshooter Level The severity level of the connection issue is indicated by an icon The severity levels are e Information e Error e Warning Description Brief description of the connection issue Date and Time Date and time of the detected connection issue This field can be sorted in ascending or descending order Click the column header to sort the displayed events Save As Save the available logs to the pre defined file name Everything in the log shall be saved to the predefined file name The default file name is Product Name Month Day Year HH MM_SS binary_file_ The default file name format can be changed to another name Clear J Removes the information in the Wireless Event Viewer Help Displays the help information for this dialog Resolving Errors Use the following recommendations to resolve network connection issues detected by Intel Wireless Troubleshooter Authentication failed due to invalid user credentials Authentication failed due to invalid username Authentication failed due to invalid user password
68. e user failing to comply with these guidelines USA Federal Communications Commission FCC This device complies with Part 15 of the FCC Rules Operation of the device is subject to the following two conditions e his device may not cause harmful interference e his device must accept any interference that may cause undesired operation NOTE The radiated output power of the Intel R PRO Wireless 2200BG Network Connection adapter wireless network device is far below the FCC radio frequency exposure limits Nevertheless the Intel PROSet Wireless LAN wireless network device should be used in such a manner that the potential for human contact during normal operation is minimized To avoid the possibility of exceeding the FCC radio frequency exposure limits you should keep a distance of at least 2 cm between you or any other person in the vicinity and the antenna that is built into the computer Interference statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy If the equipment is not installed and used in accordance with the instructions the equipment may cause harmful interference to radio communications There is no guarantee however that such interference w
69. ent s authentication The user name is case sensitive This name specifies the identity supplied to the authenticator by the authentication protocol operating over the TLS tunnel This user s identity is securely transmitted to the server only after an encrypted channel has been verified and established Select Choose a client certificate from the Personal certificate store of the Windows logged in user This certificate is used for client authentication The server certificate received during the PEAP message exchange must have been issued by this certificate authority Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection in the list box If Any Trusted CA is selected any CA in the list is acceptable Click Allow intermediate certificates The server certificate received during negotiation may have been issued directly by the certificate authority indicated by the Certificate issuer or additionally by one of its intermediate certificate authorities Select to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA If cleared then the specified CA must have directly issued the server certificate if you want to specify your server certificate name Server name must match exactly When selected the server name entered must match exactly the server name found on the certif
70. epalingen van richtlijn 1999 5 EG Bij deze verklaart Intel R Corporation dat deze Intel R PRO Wireless 2915ABG Network Connection voldoet aan de essentiele eisen en aan de overige relevante bepalingen van Richtlijn 1999 5 EC French Par la pr sente Intel R Corporation d clare que l appareil Intel R PRO Wireless 2915ABG Network Connection est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999 5 CE PRO Wireless 2915ABG Network Connection est conforme aux exigences essentielles et aux autres dispositions de la directive 1999 5 CE qui lui sont applicables Swedish Danish German Greek Icelandic Italian Spanish Portuguese Malti Harmed intygar Intel R Corporation att denna Intel R PRO Wireless 2915ABG Network Connection st r verensst mmelse med de v sentliga egenskapskrav och Ovriga relevanta bestammelser som framgar av direktiv 1999 5 EG Undertegnede Intel R Corporation erkl rer herved at f lgende udstyr Intel R PRO Wireless 2915ABG Network Connection overholder de v sentlige krav og vrige relevante krav i direktiv 1999 5 EF Hiermit erkl rt Intel R Corporation dass sich dieser diese dieses Intel R PRO Wireless 2915ABG Network Connection in bereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtli
71. er and the nearest access point or computer in peer to peer mode The number of vertical green bars indicate the strength of the transmit and receive Signals The signal quality ranges from excellent to out of range The following factors affect signal quality e Signal quality decreases with distance and is affected by metal and concrete barriers e Metal objects can reflect signals and cause interference e Other electrical devices can cause interference Details Provides adapter connection status information See Connection Details for information Turn wireless Toggle the radio off and on Refer to Turn radio On Off for more information off on Help Displays the help information for this page Close Close the Intel PROSet Wireless main window x Close the Intel PROSet Wireless main window Connection Details Connection Details Profile Name wireless Network Mame wireless IP Address 132 168 2 6 Signal Quality Excellent Signal Strength amBllll Adapter MAC Address DO OE 35 0B D 4 SB Band Buz 11g Supported Data Rates 1 2 5 5 5 8 11 12 18 2 Radio Frequency 2 437 GHz Channel Number b Network Authenticatian Open Data Encryption Mone o0z Tu Authentication Type Mone o0z Tu Authentication Protocol None LL Version 2 0 0 Cox TPC 1 0 mad LL Power Levels 1 0 5 0 20 0 31 5 50 1 mv Access Point MAC Address UU OU 4B 35 04 BC Mandatory Access Point Mone Close The Connection Det
72. ertz GHz is one billion Hertz For reference the standard US electrical power frequency is 60 Hz the AM broadcast radio frequency band is 0 55 1 6 MHz the FM broadcast radio frequency band is 88 108 MHz and microwave ovens typically operate at 2 45 GHz Range The distance over which a given system can communicate RC4 An encryption algorithm designed at RSA Laboratories specifically a stream cipher of pseudo random bytes that is used in WEP encryption Remote Authentication Dial Il n User Service RADI US An authentication and accounting system that verifles users credentials and grants access to requested resources Roaming Movement of a wireless node between two microcells Roaming usually occurs in infrastructure networks built around multiple access points S Service Set I dentifier SSID Used to identify clients on a wireless network Shared key An encryption key known only to the receiver and sender of data Static I P Address A permanent IP address that is assigned to a node in a TCP IP network T Transmission Control Protocol TCP A method protocol used with the IP Internet Protocol to send data in the form of message units between network devices over a LAN or WAN The IP carries the delivery of the data routing and TCP keeps track of the individual units of data called packets that a message is divided into for delivery over the network Transmission Control Protocol Internet Protoco
73. ess adapter for fast secure roaming When a wireless LAN is configured for fast reconnection a LEAP enabled client device can roam from one access point to another without involving the main server Using Cisco Centralized Key Management CCKM an access point configured to provide Wireless Domain Services WDS takes the place of the RADIUS server and authenticates the client without perceptible delay in voice or other time sensitive applications EAP FAST Authentication EAP FAST is an improvement on LEAP Refer to Cisco Features for more information Name Description Use the Windows logon user The user credentials are retrieved from the Windows name and password Logon process Prompt for the user name and Prompts for user name and password before you password connect to the wireless network The user name and password must be first set in the authentication server by the administrator Use the following user name The user name and password must be first set in the and password authentication server by the administrator e User Name This user name must match the user name that is set in the authentication server e Password This password must match the password that is set in the authentication server The entered password characters display as asterisks e Confirm Password Re enter the user password Allow automatic provisioning EAP FAST uses a Protected Access Credentials key to of Protected Access protect
74. ess to the network without 802 11 authentication The access point allows any request for authentication If no encryption is enabled on the network any wireless device with the correct network name SSID can associate with the access point and gain access to the network Data Encryption None No data encryption used Enable 802 1x Selected Authentication Type MD5 A one way authentication method that uses user names and passwords Use the Windows logon user If this feature is selected the user s credentials name and password are retrieved from the user s Windows Logon process Prompt for the user name and Prompts for a user name and password before password you connect the wireless network The user name and password must be first set in the authentication server by the administrator Use the following user name and The user name and password must be first set in password the authentication server by the administrator e User Name This user name must match the user name that Is set in the authentication server e Password This password must match the password that is set in the authentication server The entered password characters display as asterisks e Confirm Password Re enter the user password 802 1x MD5 WEP Key MD5 authentication is a one way authentication method that uses user names and passwords This method does not support key management but does require a pre configured key if data encryption
75. et the access point Poor beacon quality The signal quality is too low to sustain communication with the access point You have moved the adapter outside the coverage area of the access point or the access point s device address information has been changed AP load balancing The access point ended its association with the adapter based on the access point s inability to maintain communication with all its associated adapters Too many adapters are trying to communicate with one access point AP RSSI too low The Receive Signal Strength Indicator RSSI is too low to maintain an association with the adapter You may have moved outside the coverage area of the access point or the access point could have increased its data rate Poor channel quality The quality of the channel is low and caused the adapter to look for another access point AP dropped mobile unit The access point dropped a computer from the list of recognizable mobile devices The computer must re associate with an access point Miscellaneous Use this information to determine if an association with a different access point increases performance and helps maintain the highest possible data rate Received Beacons Number beacons received by the adapter Percent missed Beacons Percent value for missed beacons Percent transmit errors The percentage of data transmissions that had errors RSSI Signal strength of the access point with which the adapter is communicating
76. etic energy emitted by FCC certified equipment The Intel R PRO Wireless 2915ABG Network Connection adapter meets the Human Exposure limits found in OET Bulletin 65 2001 and ANSI IEEE C95 1 1992 Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCC s recommended limits The following safety precautions should be observed e Do not touch or move antenna while the unit is transmitting or receiving e Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body especially the face or eyes while transmitting e Do not operate the radio or attempt to transmit data unless the antenna is connected if not the radio may be damaged e Use in specific environments o The use of wireless devices in hazardous locations is limited by the constraints posed by the safety directors of such environments o The use of wireless devices on airplanes is governed by the Federal Aviation Administration FAA o The use of wireless devices in hospitals is restricted to the limits set forth by each hospital e Antenna use o In order to comply with FCC RF exposure limits low gain integrated antennas should be located at a minimum distance of 20 cm 8 inches or more from the body of all persons o High gain wall mount or mast mount antennas are designed to be professionally installed and should be located at a minimum d
77. ettiva 1999 5 EC New Member States requirements of Declaration of Conformity Estonian Hungary Slovak Czech Slovenia Latvian Lithuanian Polish France Kaesolevaga kinnitab Intel R Corporation seadme Intel R PRO Wireless 2915ABG Network Connection vastavust direktiivi 1999 5 EU p hin uetele ja nimetatud direktiivist tulenevatele teistele asjakohastele satetele Alulirott Intel R Corporation nyilatkozom hogy a Intel R PRO Wireless 2915ABG Network Connection megfelel a vonatkoz alapvet k vetelm nyeknek s az 1999 5 EC ir nyelv egy b eldirasainak Intel R Corporation tymto vyhlasuje ze Intel R PRO Wireless 2915ABG Network Connection sp a z kladn po iadavky a v etky pr slu n ustanovenia Smernice 1999 5 ES Intel R Corporation t mto prohla uje e tento Intel R PRO Wireless 2915ABG Network Connection je ve shode se z kladn mi po adavky a dal mi pe slusnymi ustanoven mi smernice 1999 5 ES iuo Intel R Corporation deklaruoja kad is Intel R PRO Wireless 2915ABG Network Connection atitinka esminius reikalavimus ir kitas 1999 5 EB Direktyvos nuostatas Ar So Intel R Corporation deklare ka Intel R PRO Wireless 2915ABG Network Connection atbilst Direktevas 1999 5 EK betiskaj m pras bem un citiem ar to saistetajiem noteikumiem Intel R Corporation deklaruoja kad Intel R Pro Wireless 2915ABG Network Connectionatitinka 1999 5 EC Direktyvos esminius reikalavimus ir kitas nuostatas
78. etwork name SSID To use a different profile name enter the new name in the Profile Name text box 3 Click Next Intel R PROSet Wireless determines the required security settings for the selected network 4 The Security Settings page displays the network security settings Enter the required WEP security key information and click OK to save the settings and close the Security Settings page 5 The profile displays in the Profiles List and is positioned at the bottom of the list Use the Profiles List arrows to position the profile in the list If the profile is positioned at the top of the list it automatically is connected to the network the next time the wireless network is detected 6 Select the profile and click Activate to connect to the selected network The connection icon indicates that you are connected to the network The network name speed and signal quality display the current connection status Click the Details button to display details of the current network connection Connect to a wireless network using a profile To connect to a wireless network using a profile l Select the profile from the Profiles List 2 Click Connect The connection icon indicates that you are connected to the network The network name speed and signal quality display the current connection status Click the Details button to display details of the current network connection x NOTE For a list of available access points on a particular wireless
79. folder They are exported as one package Administrator Export Preferences Name Description Export Administrator Preferences Step 1 Select which preferences you want to export e Administrator Settings Export all the settings These include control of Cache Credentials and Windows Microsoft XP Co existence e Administrator Profiles Export all the Persistent and Pre logon Common Profiles Step 2 Select the destination file e Browse button Select the destination path and directory The export destination file has a sso extension The directory path displays in the destination directory window Step 3 Export the selected preferences e Export button Start exporting your profiles to the assigned destination folder Close Close page Displays the help information for this page Automatic Profile Distribution The Enable Auto Import feature allows a network administrator to distribute a profile automatically to computers connected to a network These profiles can be automatically imported from the Programs FilesMntelNWirelessVAutol mport directory on the client computer Enable Auto Import option is located on the the Advanced Settings page Click Advanced on the Profile Wizard General Settings page to access the Advanced Settings The profile must be copied to a specific directory on the host computer from there it can be distributed to multiple computers Once the profile is received by the remote computer it is
80. from the Tools menu Click Change Password Enter the existing password in theOld Password text box Enter the new password in theNew Password text box Enter the new password again in theConfirm Password text box Click OK to save the new password and close the page dE E CE e Advanced Statistics Tools menu Provides current adapter connection information The following describes information for the Advanced Statistics page Name Description Statistics Advanced Statistics This information pertains to how the adapter is communicating with an access point Association If the adapter finds an access point to communicate with the value is In range Otherwise the value is Out of range AP MAC Address The twelve digit MAC address 00 40 96 31 1C 05 of the AP Number of associations The number of times the access point has found the adapter AP count The number of available access points within range of the wireless adapter Number of full scans The number of times the adapter has scanned all channels for receiving information Roaming This information contains counters that are related to reasons for the adapter roaming Roaming occurs when an adapter communicates with one access point and then communicates with another for better signal strength Roaming Count The number of times that roaming occurred AP did not transmit The adapter did not receive radio transmission from the access point You may need to res
81. g either Infrastructure or ad hoc mode I ntel Throughput Enhancement Change the value of the Packet Burst Control Mixed mode protection Power Management Preferred Band e Enable Select this option to enable throughput enhancement e Disable Default Select this option to disable throughput enhancement Use this option to avoid collision in the 11b 11g mixed environment Use RTS CTS enabled where clients may not hear each other Use CTS to self enabled to gain more throughput in an environment where clients are in close proximity and can hear each other Power Management Allows you to select a balance between power consumption and adapter performance The wireless adapter power settings slider sets a balance between the computer s power source and the battery Use default value Default Power settings based on the computer s power source Manual Adjust the slider for the desired setting Use the lowest setting for maximum battery life Use the highest setting for maximum performance NOTE Power consumption savings vary based on infrastructure settings Select the operating band The selections are e 002 11g e 802 11a e 802 11b Wireless Mode Select the wireless mode The selections are e 802 11a 802 11b and 802 11g Default Connect the either 802 11a 802 11b or 802 11g wireless networks e 802 11g only Connect the wireless adapter to 802 11g networks only e 802 11a and 802 11g only Connec
82. ghores the Authentication Protocol MS CHAP V2 User Name This feature is the 802 1x identity supplied to the authenticator Microsoft IAS dotNet user for EAP clients Enter a valid username when using 802 1x MS RADIUS For all other servers this is an optional field therefore it is recommended that this field not contain a true identity but instead the desired realm for example anonymous myrealm Certificate Issuer The server certificate received during the PEAP message exchange must have been issued by this certificate authority Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection in the list box If Any Trusted CA is selected any CA in the list is acceptable e Allow intermediate certificates The server certificate received during negotiation may have been issued directly by the certificate authority indicated in the Certificate Issuer field or additionally by one of its intermediate certificate authorities Check this box to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA If cleared then the specified CA must have directly issued the server certificate Specify The server name or a domain to which the server belongs Server Certificate depending on which of the two fields below has been selected Name e Server name must match exactly When selected the
83. hooting I ntel PRO Wireless 2915ABG Network Connection User Guide e Intel Wireless Troubleshooter e Event Viewer e Resolving Errors Intel Wireless Troubleshooter ie Intel Wireless Troubleshooter d PUES File Help To save logs to a file or ta view event traces click on the 2004 06 02 10 03 41 Did not receive IP address EJ Wireless Event Viewer The wireless adapter failed to get a valid IP address This can be due to an authentication failure with the network incorrect encryption keys or because of a DHCP server malfunction Click here to re enter encryption keys Intel Wireless Troubleshooter can notify you when there are wireless connection errors on Your computer Follow these recommended steps to resolve the issue Alert notifications are currently enabled Ey Disable notifications Intel Wireless Troubleshooter is an application that can assist you in resolving wireless network connection issues When a connection issue is detected a balloon tip appears at the bottom right of your desktop screen Once you click on the balloon tip a diagnostic message displays the recommended steps to resolve the occurred connection issue For example if a connection issue occurred because of an invalid password the Profile Wizard application is launched when you click on a displayed hyperlink You can also launch Wireless Event Viewer from this page and enable or disable alert notifications The Intel Wireless Troublesh
84. icate The server name should include the complete domain name for example Servername Domain name in this field Domain name must end in specified name When selected the server name field identifies a domain and the certificate must have a server name belonging to this domain or to one of its sub domains for example zeelans com where the server is blueberry zeelans com NOTE These parameters should be obtained from the system administrator LEAP Authentication Name Use the Windows logon user name and password Prompt for the user name and password Description Selecting this feature the user credentials are retrieved from the Windows Logon process Selecting this feature prompts for user name and password before you connect to the wireless network The user name and password must be first set in the authentication server by the system administrator Use the following user The user name and password must be first set in the name and password Allow Fast Roaming CCKM authentication server by the system administrator e User Name This user name must match the user name that is set in the authentication server e Password This password must match the password that is set in the authentication server The entered password characters display as asterisks e Confirm Password Re enter the user password Click Allow Fast Roaming Cisco Centralized Key Management CCKM to enable the client wirel
85. ies Click Next Enter the encryption key Click OK to save the security settings for the profile DIE Authentication failed because timer expired Authentication failed because timer expires while this mobile station authenticating against a possible rogue AP The Rogue AP timed out possibly because of a problem with the RADIUS server Recommended action 1 To prevent the wireless adapter from connecting with this possible Rogue AP consider adding this Rogue AP to the excluded access point list 2 Select the profile and click the Connect button and try to associate with the network and authenticate with the server Smart Card was unexpectedly removed This error occurred because the Smart Card was unexpectedly removed Recommended action l Insert the Smart Card 2 Select the 802 1x EAP SIM authentication profile and click Connect to try to associate with the network Disconnection from an Access Point The following error messages display when the wireless adapter is disconnected from the network access point Disconnect from access point due to failed associations Disconnect from access point due to authentication failures Disconnect from access point due to TKIP Michael Integrity Check failure Disconnect from access point due to Class 2 frame non authentication failure Disconnect from access point due to Class 3 frame non association failure Disconnect from access point due to re association failure Disconnec
86. ies Click Next Select the appropriate 802 1x Authentication Type o For TTLS and PEAP profiles Select the Use the following option for User Credentials a Verify the password information f Use Windows logon or Prompt each time I connect is selected make sure that the correct user credentials information is used when you connect to the wireless network o For LEAP profiles Select the Use the following user name and password option and verify the password information If Use Windows logon user name and password or Prompt for user name and password is selected make sure that the correct password information is used when you connect to the wireless network 5 Click the OK button to save the settings mer Oa Authentication failed due to an invalid server certificate Select another Certificate This authentication error can be caused by an invalid server certificate when using either a TLS TTLS or PEAP profile Use the following steps to help resolve this error Select the appropriate profile from the profiles list Click Properties Click Next Select the appropriate 802 1x Authentication Type o For TTLS and PEAP profiles Verify that the correct Authentication Type is selected from the drop down list then click the Select button and select another certificate from the list of installed certificates and click OK o For TLS profiles Click the Select button and select another certificate from the list of installed certificate
87. igate through the General and Security Setting settings o General Settings Refer to General Settings for more information o Security Settings Refer to Security Settings for more information Removing a Profile To remove a profile 1 Select the profile to be removed from the Profiles List 2 Click Remove to delete the profile T NOTE You cannot delete all profiles from the Profiles List There must always be one profile displayed in the list I mporting and Exporting Profiles TX NOTE A password protected profile can be imported and exported however before editing the profile the password must be entered Refer to Setting a Profile Password for more information Export Profiles To export profiles from your profile list From the Intel PROSet Wireless main window click Import Export on the Profiles menu Select the profile or profiles from the list Specify the destination folder on your hard drive You can use the Browse button to navigate to a folder Click OK after the profiles have been successfully exported Click Close to close Intel PROSet Wireless main window iP aud dom I mport profiles To add profiles to your profile list From the Intel PROSet Wireless main window click Import Export on the Profiles menu L 2 Click I mport 3 Locate the profile to import on your computer or enter the profile name in the file name field The profile extension is either profile or p50 The profiles to import can be l
88. ill not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by taking one or more of the following measures e Reorient or relocate the receiving antenna e Increase the distance between the equipment and the receiver e Connect the equipment to an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help NOTE The Intel R PRO Wireless 2200BG Network Connection adapter wireless network device must be installed and used in strict accordance with the manufacturer s instructions as described in the user documentation that comes with the product Any other installation or use will violate FCC Part 15 regulations U S Frequency Bands 2 400 2 462 GHz Canada l ndustry Canada IC This Class B digital apparatus complies with Canadian ICES 003 Issue 2 and RSS 210 Issue 4 Dec 2000 Cet appariel num rique de la classe B est conforme la norme NMB 003 No 2 et CNR 210 No 4 Dec 2000 To prevent radio interference to the licensed service this device is intended to be operated indoors and away from windows to provide maximum shielding Equipment or its transmit antenna that is installed outdoors is subject to licensing Pour emp cher que cet appareil
89. indows logon user name and password or Prompt for user name and password is selected make sure that the correct Domain information is used when you connect to the wireless network 5 Click the OK button to save the settings e a Authentication failed due to invalid server identity Re enter server name This authentication error can be caused by invalid server identity information when using either a TTLS or PEAP profile Use the following steps to help resolve this error Select the appropriate profile from the profiles list Click Properties Click Next Select the appropriate 802 1x Authentication Type For TTLS and PEAP profiles Verify that the Roaming Identity server name is correct Click OK to save the settings pror I Authentication failed due to an invalid user certificate Re enter user credentials This authentication error can be caused by an invalid user certificate when using either a TLS TTLS or PEAP profile Use the following steps to help resolve this error Select the appropriate profile from the profiles list Click Properties Click Next Select the appropriate 802 1x Authentication Type o For TTLS and PEAP profiles Verify that the correct Authentication Type is selected from the drop down list then click the Select button and select another certificate from the list of installed certificates and click OK o For TLS profiles Click the Select button and select another certificate from the lis
90. ing profile as specified in the order of the Profiles List e Activate Profile Select a profile from the Profiles List and click Connect If a connection is made a balloon prompt is displayed at the task tray e Manually Connect Select a network from the list of available networks and click Configure to launch the Profile Wizard You can then create a profile Connect to a wireless network without security To connect to a wireless network without security l Click Refresh The available wireless networks display in the Available network list T NOTE If your wireless adapter receives a blank network name SSID from a stealth access point both the blank SSID and i lt no profile gt display in the Available networks list After connection both the blank SSID and the associated SSID display in the Available networks list and the Profiles List Select a wireless network from the list of available networks click Configure The Connect one time to lt name of network gt page is displayed The Profile Wizard General Settings page displays The Wireless Network Name SSID displays The profile name uses the same name as the wireless network name SSID To use a different profile name enter the new name in the Profile Name text box Click Next The Security Settings page displays Click Yes want to connect to this network know it is open The next Security Settings page displays the current security status for the network access poin
91. ing up a secure wireless network using Wi Fi Protected Access WPA You can also assign a unique name to your wireless network Linksys EOU features e Setup a secure wireless network using WPA e Setup your wireless network with a new network name and no security Anyone can access my network The Linksys Access Point is setup with factory defaults which include no security open authentication and linksys g as the network name SSID In this state your wireless network is not secure and allows others to easily monitor any data transfer over the wireless link Configure a Linksys EOU Access Point To configure a Linksys Access Point from your Intel Centrino laptop computer Wireless Network Configuration Wizard Step 1 Welcome to Wireless Network Configuration This dialog box displays when a Linksys EOU access point is within the range of your wireless adapter and starts the first step to establish a secure wireless connection with your Intel Centrino laptop computer e Do not launch this Wizard again Click to postpone this process to a later time T NOTE You can re enable this feature in the Intel PROSet Wireless Application Settings 1 Click Next to continue Verify Ownership of your Linksys Access Point Step 2 The ownership identification step prevents the wizard from trying to configure the wrong wireless device The character ownership key must be verified before your notebook can communicate with the access point
92. ion this is called Mixed Cell Mode When these wireless network operate in optional encryption mode client stations that join in WEP mode send all messages encrypted and stations that join in using standard mode send all messages unencrypted These APs broadcast that the network is not using encryption but allow clients to join using WEP mode When Mixed Cell is enabled in a profile it allows you to connect to access points that are configured for optional encryption Refer to Cisco Compatible Extensions Options for more information Radio Management When this feature is enabled your wireless adapter provides radio management information to the Cisco infrastructure If the Cisco Radio Management utility is used on the infrastructure it configures radio parameters detects interference and Rogue access points Back to Contents Back to Contents Connecting to a Network Intel R PRO Wireless 2915ABG Network Connection User Guide e Connecting to a wireless network e Connect to a wireless network without security e Connect to a wireless network with WEP security e Connect to a wireless network using a profile e Scan for available networks e Configure a Linksys EOU Access Point e Intel R PROSet Wireless Configuration Service Connecting to a wireless network You can connect to a wireless network using any one of the following ways e Automatic Connection Automatically connect to an available network using an exist
93. ir on a wireless network so that only those users that know the Pass Phrase can access the network or interpret the transmitted data e Whatis a Pass Phrase The Pass Phrase is used to create constantly changing keys that encrypt the data that is transmitted between wireless devices The Pass Phrase that you enter here is used in the Linksys wireless device and this Intel R Centrino TM laptop computer If you have other WPA compliant wireless devices the same Pass Phrase must be entered into each of them Enter a Pass Phrase Choose a simple or strong pass phrase password that is easy to remember Enter at least 10 alphanumeric characters or more a z A Z 0 9 and one special character from 1 _ lt gt Write the pass phrase down on a piece of paper or save it in a text file on your laptop computer in case you forget it This password is used by other wireless devices to connect to this wireless network If you do not specify a Pass Phrase the default Pass Phrase is used This Pass Phrase is used to encrypt and transmit data securely over the wireless link between your Intel Centrino laptop computer and the Linksys access point 5 Click Next A status dialog box displays while the Linksys Access Point is being configured Wireless Configuration Complete Final Step The Configuration Wizard has successfully completed setting up your Linksys access point You can now establish a secure wireless connection from your Intel Cent
94. istance of 30 cm 12 inches or more from the body of all persons Please contact your professional installer VAR or antenna manufacturer for proper installation requirements Explosive Device Proximity Warning see below Antenna Warning see below Use on Aircraft Caution see below Other Wireless Devices see below Power Supply Access Point see below Explosive Device Proximity Warning Ad Warning Do not operate a portable transmitter such as a wireless network device near unshielded blasting caps or in an explosive environment unless the device has been modified to be qualified for such use Antenna Warnings AA Warning To comply with the FCC and ANSI C95 1 RF exposure limits it is recommended for the Intel R PRO Wireless 2915ABG Network Connection adapter installed in a desktop or portable computer that the antenna for this device be installed so as to provide a separation distance of al least 20 cm 8 inches from all persons and that the antenna must not be co located or operating in conjunction with any other antenna or radio transmitter It is recommended that the user limit exposure time if the antenna Is positioned closer than 20 cm 8 inches AA Warning Intel R PRO Wireless LAN products are not designed for use with high gain directional antennas Use of such antennas with these products is illegal Use On Aircraft Caution M Caution Regulations of the FCC and FAA prohibit airborne operation of radio fre
95. ith any wireless LAN product that is based on direct sequence spread spectrum DSSS radio technology and to comply with the following standards e IEEE Std 802 11b 1999 Standard on Wireless LAN e IEEE Std 802 119 compliant Standard on Wireless LAN e Wireless Fidelity WiFi R certification as defined by the WECA Wireless Ethernet Compatibility Alliance The Intel R PRO Wireless LAN 2200 3A Mini PCI adapter and your health The Intel R PRO Wireless 2200BG Network Connection adapter like other radio devices emits radio frequency electromagnetic energy The level of energy emitted by this device however is less than the electromagnetic energy emitted by other wireless devices such as mobile phones The Intel R PRO Wireless 2200BG Network Connection adapter wireless device operates within the guidelines found in radio frequency safety standards and recommendations These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature In some situations or environments the use of the Intel R PRO Wireless 2200BG Network Connection adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization Examples of such situations include the following e Using the Intel R PRO Wireless 2200BG Network Connection adap
96. ity Warning AA Warning Do not operate a portable transmitter such as a wireless network device near unshielded blasting caps or in an explosive environment unless the device has been modified to be qualified for such use Antenna Warnings AA Warning To comply with the FCC and ANSI C95 1 RF exposure limits it is recommended for the Intel R PRO Wireless 2200BG Network Connection installed in a desktop or portable computer that the antenna for this device be installed so as to provide a separation distance of al least 20 cm 8 inches from all persons and that the antenna must not be co located or operating in conjunction with any other antenna or radio transmitter It is recommended that the user limit exposure time if the antenna is positioned closer than 20 cm 8 inches AA Warning The Intel R PRO Wireless 2200BG Network Connection product is not designed for use with high gain directional antennas Use of such antennas with these products is illegal Use On Aircraft Caution Caution Regulations of the FCC and FAA prohibit airborne operation of radio frequency wireless devices because their signals could interfere with critical aircraft instruments Local Restrictions on 802 11b and 802 11g Radio Usage All frequencies used by 802 11b and 802 11g are harmonized Some countries though may not allow 802 119 Wireless interoperability The Intel R PRO Wireless 2200BG Network Connection adapter is designed to be interoperable w
97. k Access Server Typically a RADIUS server is used by Internet Service Providers ISP to perform AAA tasks AAA phases are described as follows o Authentication phase Verifies a user name and password against a local database After the credentials are verified the authorization process begins o Authorization phase Determines whether a request is allowed access to a resource An IP address is assigned for the Dial Up client o Accounting phase Collects information on resource usage for the purpose of trend analysis auditing session time billing or cost allocation How 802 1x authentication works A simplified description of the 802 1x authentication Is A client sends a request to access message to an access point The access point requests the identity of the client The client replies with its identity packet which is passed along to the authentication server The authentication server sends an accept packet to the access point The access point places the client port in the authorized state and data traffic is allowed to proceed 802 1x features 802 1x supplicant protocol support Support for the Extensible Authentication Protocol EAP RFC 2284 Supported Authentication Methods MD5 RFC 2284 EAP TLS Authentication Protocol RFC 2716 and RFC 2246 EAP Tunneled TLS TTLS Cisco LEAP EAP FAST EAP SIM e PEAP e Supports Microsoft Windows XP Microsoft Windows 2000 Refer to Security Settings for
98. ks 802 1x features Overview 802 1x authentication is independent of the 802 11 authentication process The 802 1x standard provides a framework for various authentication and key management protocols There are different 802 1x authentication types each providing a different approach to authentication but all employing the same 802 1x protocol and framework for communication between a client and an access point In most protocols upon the completion of the 802 1x authentication process the supplicant receives a key that it uses for data encryption Refer to How 802 1x authentication works for more information With 802 1x authentication an authentication method is used between the client and a Remote Authentication Dial In User Service RADIUS server connected to the access point The authentication process uses credentials such as a user s password that are not transmitted over the wireless network Most 802 1x types support dynamic per user per session keys to strengthen the static key security 802 1x benefits from the use of an existing authentication protocol known as the Extensible Authentication Protocol EAP 802 1x authentication for wireless LANs has three main components The authenticator the access point the supplicant the client software and the authentication server a Remote Authentication Dial In User Service server RADIUS 802 1x authentication security initiates an authorization request from the wireless
99. l TCP IP The basic communication language or set of protocols for communications over a network developed specifically for the Internet TCP IP defines a suite or group of protocols and not only TCP and IP Transceiver A commonly used term that describes a combination transmitter and receiver Both 802 11a and 802 11b devices would be properly described as data transceivers U UNI Bands Unlicensed National Information Infrastructure In contrast to the ISM bands these are a group of frequency bands set aside by the FCC for WLAN type communications only Users must accept interference from other legal WLAN users but the other sources of interference problems are or legally should be missing W WEP 64 and WEP 128 Wired Equivalent Privacy 64 bit and 128 bit 64 bit is sometimes referred to as 40 bit This is a low level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN It is recommended to use the 128 bit option at all possible times Remember that 802 1 1 devices transmit broadcast in all directions and that it is possible with very complex software to copy and decode WEP transmissions The task is not trivial but it is possible If your data is extremely sensitive you should consider some form of secondary protection such as strong passwords and an additional level of encryption ouitable software packages are available from reputable suppliers Although not in
100. lable networks If any new networks are available with range of the Refresh Network Properties adapter the list is updated to show the new network name This page displays the current connection status for the wireless adapter Network Connection Details dialog description Name Network Name Band Operation Mode Authentication Level Data Encryption Access Points in this Network 0 50 Description Displays the wireless network name Band Frequency Current band and frequency being used Displays Out of Range if no band and frequency is displayed Displays 802 11b 802 11g 802 11a 802 11b 802 119 Displays the current operating mode Infrastructure AP default or Ad hoc Displays the current authentication security mode for the profile being used Displays None No encryption used Shared WPA Enterprise WPA Personal Unknown Displays the 802 11 authentication used by the currently used profile Displays the 802 1x authentication algorithm MD5 LEAP TLS TTLS and PEAP Refer to Security Settings for more information Displays Yes Normal open or shared modes WPA and WPA PSK Refer to Security Settings for more information e Signal Strength The Signal Quality icon bars indicate the strength of the transmit and receive signals in percent values between your wireless adapter and the nearest access point Indicates how well the wireless adapter is communicating wi
101. less Access Point or Router Contact your wireless network administrator for this password Pass phrase and hex key options are e Pass phrase 64 bit Enter 5 alphanumeric characters 0 9 a z or A Z e Hex key 64 bit Enter 10 alphanumeric hexadecimal characters 0 9 A F e Pass phrase 128 bit Enter 13 alphanumeric characters 0 9 a z or A Z e Hex key 128 bit Enter 26 alphanumeric hexadecimal characters 0 9 A F Shared authentication This network uses shared authentication with WEP or CKIP data encryption Name Description Network Authentication Shared Shared authentication is accomplished with a pre configured WEP key Use this mode for 802 11 Authentication This mode can work with any 802 1x authentication protocol and with the following data encryption options None WEP 64 bit or 128 bit or CKIP 64 bit or 128 bit Refer to Security Overview Open and Shared Key authentication for more information Data Encryption e None No data encryption used e WEP WEP data encryption can be configured using 64 bit or 128 bit e CKIP Cisco Key Integrity Protocol CKIP is a Cisco proprietary security protocol for data encryption in 802 11 media Enable 802 1x Disabled Encryption Level 64 bit or 128 bit When switching between 64 bit and 128 bit encryption the previous settings are erased and a new key must be entered 1 2 3 4 Up to four passwords may be specified Key Index by changing the Ke
102. less device The BSSID is the Ethernet MAC address of the device e Broadcast SSI D An access point can respond to computers sending probe packets with the broadcast SSID If this feature is enabled on the access point any wireless user can associate with the access point by using a blank null SSID Back to Contents Back to Contents Specifications Intel PRO Wireless 2915ABG Network Connection User Guide e Intel PRO Wireless 2915ABG Network Connection e Intel PRO Wireless 2200BG Network Connection Specifications Intel PRO Wireless 2915ABG Network Connection Form Factor Mini PCI Type 3A Dimensions Width 2 85 in x Length 1 75 in x Height 0 20 in 59 75 mm x 50 95 mm x 5 mm Weight 0 7 oz 12 90 g Antenna Interface Connector Hirose U FL R SMT mates with cable connector U FL LP 066 Dual Diversity Antenna On board dual diversity switching Connector Interface 124 pin SO DIMM edge connector Voltage 3 3 Volt Operating Temperature O to 70 degrees Celsius Humidity 50 to 8596 non condensing Frequency Modulation 5 GHz 802 112 2 4 GHz 802 11b g Frequency band 5 15 GHz to 5 85 GHz 2 400 2 472 GHz dependent on country Moduatin 0 BPSK QPSK 16 QAM 64 QAM BPSK QPSK 16 QAM 64 QAM 16 QAM 64 QAM CCK DQPSK DBPSK mown Medium 5 GHz UNII Orthogonal Frequency Division Multiplexing OFDM Channels 4 to 12 non overlapping Channel 1 1 boa only depe
103. less utility is configured to manage your network profiles 4 NOTE Verify that the Application Settings option Notify me when another application is using the wireless device is selected This option prompts you when Windows XP starts to manage your network profiles Starting Intel PROSet Wireless Launch Intel PROSet Wireless either from the task tray icon the Windows Start button or from the Windows Control Panel icon To launch Intel PROSet Wireless use either of the following methods e Click Start Programs Intel Wireless Intel PROSet Wireless e hight click the task tray icon located in the lower right corner of your Windows Desktop and click the menu option Open I ntel PROSet Wireless e Double click the task tray icon to open I ntel PROSet Wireless Exit Intel PROSet Wireless e To exit Intel PROSet Wireless and close the task tray icon click Exit from the task tray menu or click the Close button on the Intel PROSet Wireless main window Launch I ntel PROSet Wireless from the task tray To launch Intel PROSet Wireless double click the task tray icon located in the lower right corner of your Windows desktop or right click the task tray icon and click Open I ntel PROSet Wireless Exit I ntel PROSet Wireless To exit Intel PROSet Wireless and hide the task tray icon right click the task tray icon and click Hide Icon on the task tray menu e To show the task tray icon after the Intel PROSet Wireless is la
104. made using any of the profiles in the Profiles List then you are notified of available networks If there are multiple profiles listed for an available network you are prompted to choose which profile to connect Other Wireless Managers If the Wireless Network Configuration Service detects another software application trying to communicate with the wireless device you are notified of this behavior Windows XP Wireless Manager To switch from Intel PROSet Wireless to the Windows XP wireless manager use either of the following methods e From the Task Tray Menu Click Use Microsoft client to switch to using Windows XP Wireless Zero Configuration Selecting this option disables Intel PROSet Wireless as your current wireless manager You can then configure your connection using Windows XP Intel PHOSet Wireless You wll now use the Windows client ta connect to wireless networks To switch back to the Intel PR Set wireless application and your existing profiles right click on the Intel PROSet Wireless icon in your taskbar and select Use Intel PROSet wireless Don t show this message again TX NOTE Any wireless profiles created in Intel PROSet Wireless are not visible by Windows XP Wireless Zero Configuration If you want to use your Intel wireless profiles you need to switch back to using Intel PROSet Wireless by selecting the Use I ntel PROSet Wireless task tray menu option To enable Intel PROSet Wireless as your wireless man
105. matic connection Refer to Manage Exclusions for more information Enable manual exclude list feature Select to enable the manual exclude list feature This feature provides a way to exclude networks from automatic connection Refer to Manage Exclusions for more information Device to Device Ad hoc Device to Device Ad hoc Networking Select one of the following e Enable device to device networking Select to enable both open and secured connections with a device to device ad hoc network e Enable secure device to device networking only Select to only enable connections to secured device to device ad hoc networks e Disable device to device networking Select to disable connections to device to device ad hoc networks NOTE An administrator is able to restrict which of these settings are displayed or whether device to device ad hoc networking is available See Administrator Settings OK Save settings and return to the previous page Cancel Close the page and cancel changes Help Displays the help information for this page Adapter Settings Tools menu Intel R PRO Wireless 2915ABG Network Connection 9 General Advanced Driver intel Go The following properties are available for this network adapter Click the property you want to change on the left and select a new value on the right Property Value Intel Throughput Enhance e 8 z 1
106. mended steps to resolve error Wireless Event Viewer Wireless Event Viewer E E n E File Help Description Date and Time 4 Information Intel Wireless Troubleshooters 2004 06 02 10 04 07 Eror Did nat receive an IP address fro 2004 06 02 10 03 41 4 Information Profile MyProfile for Socrates be 2004 06 02 10 02 07 4 Information Profile wireless for wireless being 2004 7 06 02 10 01 45 4 Information Profile wireless For wireless being 2004 06 02 10 01 00 4 Information AcStatush oStatusChange 2004 06 02 10 00 36 4 Information Profile wireless For wireless being 2004 06 02 10 00 36 Information AcStatush oStatusChange 2004 06 02 10 00 16 35 Information Profile drech Far Ma current 2004 06 02 10 00 16 The Wireless Event Viewer program displays a list of error log records You can save all available log records to a binary format file for sending to customer support In addition you can email the binary format log file to an email address pre configured with a default email address when network connection is available Wireless Event Viewer is supported under Windows XP and 2000 To launch Wireless Event Viewer click Start gt All Programs gt Intel PROset Wireless gt Intel PROset Wireless gt Tools gt Intel Wireless Troubleshooter gt Wireless Event Viewer Name Description File Preferences Change the name of the log file by selecting the Preferences menu item Click to display th
107. ment and the receiver e Connect the equipment to an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced radio TV technician for help NOTE The Intel R PRO Wireless 2915ABG Network Connection adapter wireless network device must be installed and used in strict accordance with the manufacturer s instructions as described in the user documentation that comes with the product Any other installation or use will violate FOC Part 15 regulations Canada l ndustry Canada IC This device complies with RSS210 of Industry Canada This Class B digital apparatus complies with Canadian ICES 003 Issue 4 and RSS 210 No 4 Dec 2000 and No 5 Nov 2001 Cet appariel num rique de la classe B est conforme la norme NMB 003 No 4 et CNR 210 No 4 Dec 2000 et No 5 Nov 2001 To prevent radio interference to the licensed service this device is intended to be operated indoors and away from windows to provide maximum shielding Equipment or its transmit antenna that is installed outdoors is subject to licensing Pour emp cher que cet appareil cause du brouillage au service faisant l objet d une licence il doit tre utilis a l int rieur et devrait tre plac loin des fen tres afinde fournir un cran de blindage maximal Si le mat riel ou son antenne d mission est install l ext rieur il doit faire l objet d une licence Europe Frequency Bands 2 400
108. more information WPA WPA2 Wi Fi Protected Access WPA WPA2 Is a security enhancement that strongly increases the level of data protection and access control to a wireless network WPA enforces 802 1x authentication and key exchange and only works with dynamic encryption keys To strengthen data encryption WPA utilizes its Temporal Key Integrity Protocol TKIP TKIP provides important data encryption enhancements that include a per packet key mixing function a message integrity check MIC named Michael an extended initialization vector IV with sequencing rules and a also re keying mechanism Using these improvement enhancements TKIP protects against WEP s known weaknesses The second generation of WPA that complies with the IEEE TGI specification is known as WPA2 WPA WPA 2 Enterprise provides this level of security on enterprise networks with a 802 1x RADIUS server An Authentication Type is selected to match the authentication protocol of the 802 1x server WPA WPA 2 Personal provides this level of security in the small network or home environment It uses a password also called a pre shared key PSK The longer this password the stronger the security of the wireless network If your Wireless Access Point or Router supports WPA WPA2 Personal WPA PSK then you should enable it on the access point and provide a long strong password The same password entered into access point needs to be used on this computer and
109. mputers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers Authentication provides an additional validation process from the adapter to the access point The WEP encryption algorithm is vulnerable to passive and active network attacks TKIP and CKIP algorithms include enhancements to the WEP protocol that mitigate existing network attacks and address its shortcomings Open and Shared Key authentication 802 11 supports two types of network authentication methods Open System and Shared Key e Using Open authentication any wireless station can request authentication The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station The receiving station or AP grants any request for authentication Open authentication allows any device network access If no encryption is enabled on the network any device that knows the SSID of the access point can gain access to the network e Using Shared Key authentication each wireless station is assumed to have recelved a secret shared key over a secure channel that is independent from the 802 11 wireless network communications channel Shared key authentication requires that the client configure a static WEP key The client access is granted only if it passed a challenge based authentication 802 1x Authentication How 802 1x authentication wor
110. n open network using a unique key called a ticket M Media Access Control MAC Address A hardwired address applied at the factory It uniquely identifies network hardware such as a wireless PC Card on a LAN or WAN Microcell A bounded physical space in which a number of wireless devices can communicate Because it is possible to have overlapping cells as well as isolated cells the boundaries of the cell are established by some rule or convention Microwave Technically the term describes any frequency above 1 0 GHz Multipath The signal variation caused when radio signals take multiple paths from transmitter to receiver O Orthogonal Frequency Division Multiplexing OFDM A modulation technique for transmitting large amounts of digital data over radio waves 802 11a and 802 11g use OFDM P Personal Area Network PAN A personal area network or PAN Is a networking scheme that enables computing devices such as PCs laptop computers handheld personal computers printers and personal digital assistants PDAs to communicate with each other over short distances either with or without wires Preamble A preliminary signal transmitted over a WLAN to control signal detection and clock synchronization R Radio Frequency RF Terms GHz MHz Hz The international unit for measuring frequency Is Hertz Hz which is equivalent to the older unit of cycles per second One Mega Hertz MHz Is one million Hertz One Giga H
111. n the text box Select the Operating Mode Network or Device to Device Click Advanced for the following options pu qu TM Advanced Settings Password Protection Password protect this profile maximum 10 characters Prevent the settings in this profile from being viewed or changed by protecting this profile with a password In order to make future changes this password will be required Auta Import Enable Auto Import Auta Impart allows a network administrator to easily move this profile to other computers When the exported file is placed in the Wireless Autolmport directory on another computer Intel PAO Set Wireless will automatically import the profile Mandatory Access Paint Enter the Mandatory Access Point s MAC address B5510 to make your wireless adapter associate with this specific access point only Valid entries are values between 0 9 and 4 F Address 3 o Password protect the profile Click Password protect this profile Type the password in the text box then re enter it in the Confirm Password text box o Auto Import this profile for network administrators only o Mandatory Access Point This option makes the wireless adapter associate with a specific access point 6 From the General Settings page click Next The Security Settings are displayed Configure Wireless Settings Wireless security Settings Detecting the highest level of security that your wireless network s
112. nable Mixed Cells Made Cico infrastructure supports meted cells where some clients use encryption and others do not n a mised cell the capability bit for privacy will not be set in beacons and probe response packets L NOTE Cisco Compatible Extensions are automatically enabled for CKIP LEAP or EAP FAST profiles You may override this behavior by checking or un checking options Name Enable Cisco Compatible Options Description Select this feature to enable Cisco Compatible Extensions for this wireless connection profile Radio Management Mixed Cells Mode Enable Radio Management Support Click to choose that your wireless adapter provides radio management to the Cisco infrastructure If the Cisco Radio Management utility is used on the infrastructure it configures radio parameters detect interference and Rogue access points Default setting is selected Enable Mixed Cells Mode Click to allow the wireless LAN adapter to communicate with mixed cells A mixed cell is a wireless network in which some devices use WEP and some do not Refer to Mixed Cells Mode for more information Default setting Is cleared Back to Contents Trademarks and Disclaimers Back to Contents Using Profiles Intel R PRO Wireless 2915ABG Network Connection User Guide e Profile Wizard Overview e Creating a New Profile e Editing an Existing Profile e Removing a Profile e Importing an
113. ndent on country Channel 1 13 Japan Europe 2 4 GHz ISM Orthogonal Frequency Division Multiplexing OFDM Data Rates videi 36 24 18 12 9 6 11 5 5 2 1 Mbps General Operating Systems Windows XP Windows 2000 Wi Fi Alliance certification Wi Fi certification for 802 11b 802 11g 802 11a WLAN Standard IEEE 802 11g 802 11b 802 11a Architecture Infrastructure or ad hoc peer to peer operating modes WPA WPA Enterprise AES 128 bit WEP 128 bit and 64 bit Cisco Compatible Extensions v2 0 802 1x LEAP PEAP TKIP EAP TLS EAP TTLS MD5 Product Safety UL C UL CB IEC 60590 Specifications ntel PRO Wireless 2200BG Network Connection Form Factor Mini PCI Type 3A Dimensions Width 2 85 in x Length 1 75 in x Height 0 20 in 59 75 mm x 50 95 mm x 5 mm Weight 0 7 oz 12 90 g Antenna Interface Connector Hirose U FL R SMT mates with cable connector U FL LP 066 Dual Diversity Antenna On board dual diversity switching Security Connector Interface 124 pin SO DIMM edge connector Voltage 3 3 Volt Operating Temperature O to 80 degrees Celsius Humidity 50 to 8596 non condensing 2 4 GHz Band 802 11b g Most of the World United Rest of World Europe States Japan Frequency ranges 2 412 2 462 GHz 2 412 2 472 GHz Channels l 11 active scan 1 13 active scan Modulation CCK DQPSK DBPSK BPSK QPSK 16 QAM 64 QAM Wireless Medium 2 4 GHz
114. network click the Properties button on the main window Refer to Network Properties for details Scan for available networks Use the Refresh button to detect any available network within the range of your wireless adapter When an available network is found select the network name from the Available Networks list If the adapter is currently connected to a network access point the current wireless connection is still maintained while scanning for available networks e If the wireless adapter receives a blank network name SSID from a stealth access point both the blank SSID and no profile display in the available networks list To associate with a stealth access point a new profile must first be created Click the Connect button to launch the Profile Wizard then create a profile for the selected wireless network After connection both the blank SSID and the associated SSID can be viewed in the Profiles List Setting up a Linksys Access Point Configure a Linksys EOU Access Point The Intel R Smart Wireless Solutions feature Linksys R access point with the Ease of Use EOU feature enables you to configure a secure wireless connection from your Intel R Centrino TM wireless laptop computer The feature automatically launches the Intel R Wireless Network Configuration Wizard on your Intel Centrino wireless laptop when a Linksys EOU access point is within range of your wireless adapter The Configuration Wizard guides you through sett
115. ng e Connecting to a Network e Specifications e Troubleshooting e Glossary e Customer Support e Safety and Regulatory Information e Warranty e Adapter Registration I nformation in this document is subject to change without notice 2000 2005 I ntel Corporation All rights reserved I ntel Corporation 5200 N E Elam Young Parkway Hillsboro OR 97124 6497 USA The copying or reproducing of any material in this document in any manner whatsoever without the written permission of Intel Corporation is strictly forbidden Intel R is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products Intel disclaims any proprietary interest in trademarks and trade names other than its own Microsoft and Windows are registered trademarks of Microsoft Corporation Other names and brands may be claimed as the property of others Intel Corporation assumes no responsibility for errors or omissions in this document Nor does Intel make any commitment to update the information contained herein June 2005 Back to Contents Using I ntel PROSet Wireless Software Intel R PRO Wireless 2915ABG Network Connection User Guide Using Intel R PROSet Wireless as your Wireless Manager Starting Intel PROSet Wireless Launch Intel PROSet Wireless from the ta
116. nie 1999 5 EG befindet BMWi Hiermit erkl rt Intel R Corporation die Ubereinstimmung des Ger tes Intel R PRO Wireless 2915ABG Network Connection mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999 5 EG Wien ME THN IIAPOYXA Intel R Corporation AHAONEI OTI Intel R PRO Wireless 2915ABG Network Connection SYMMOP QONETAI IIPOX TI 3 OYXIOAEISX AIIAITHXEIS KAT TI AOIIIEXZ XZXETIKEX AIATAZEIZ THX OAH I TAX 1999 5 EK Intel lysir her med yfir a thessi bunadur Intel R PRO Wireless 2915ABG Network Connection uppfyllir allar grunnkrofur sem gerdar eru i R amp TTE tilskipun ESB nr 1999 5 EC Con la presente Intel R Corporation dichiara che questo Intel R PRO Wireless 2915ABG Network Connection conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Por medio de la presente Intel R Corporation declara que el Intel R PRO Wireless 2915ABG Network Connection cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Intel R Corporation declara que este Intel R PRO Wireless 2915ABG Network Connection est conforme com os requisitos essenciais e outras disposic es da Directiva 1999 5 CE Hawnhekk Intel R Corporation jiddikjara li dan Intel R PRO Wireless 2915ABG Network Connection jikkonforma mal ti ijiet essenzjali u ma provvedimenti o rajn relevanti li hemm fid Dirr
117. o allow wireless computers to send and receive information Wireless computers transmit to the access point the access point receives the information and rebroadcasts it to other computers The access point can also connect to a wired network or to the Internet Multiple access points can work together to provide coverage over a wide area Device to Device mode also called Ad Hoc mode works without access points and allows wireless computers to send information directly to other wireless computers You can use Device to Device mode to network computers in a home or small office or to set up a temporary wireless network for a meeting Configuring a Wireless Network There are three basic components that must be configured for an 802 11 wireless network to operate properly Network Name Each wireless network uses a unique Network Name to identify the network This name is called the Service Set Identifier SSID When you set up your wireless adapter you specify the SSID If you want to connect to an existing network you must use the name for that network If you are setting up your own network you can make up your own name and use it on each computer The name can be up to 32 characters long and contain letters and numbers Profiles When you set up your computer to access a wireless network Intel R PROSet Wireless creates a profile for the wireless settings that you specify If you want to connect to another network you can s
118. ocated in any directory you choose on your computer 4 Click I mport to import the profile into the profile list 5 Click Close to return to the Intel PROSet Wireless main window The imported profile is displayed in the profile list and is ready to use Setting a Profile Password X NOTE A password protected profile can be imported and exported however before editing the profile the password must be entered To set a password for an existing profile L From the Intel PROSet Wireless main window click Properties The General Settings page is displayed 2 Click Advanced Click Password protect this profile Password Type the password Confirm Password Re type the password Click OK to save the setting and return to the General Settings page Click OK The Intel PROSet Wireless main window is displayed ER LE dd Administrator Profiles Administrator Profiles are created using the Administrator Tool Administrator Profiles are profiles or shared profiles that are owned and managed by the network Administrator or the administrator of this computer These profiles are common shared by all users on this computer However end users cannot modify these profiles they can only be modified from the Administrator Tool which is password protected There are two types of Administrator Profiles Persistent and Pre logon Common Persistent Connection Persistent profiles are applied at boot time or whenever no one is logged on the
119. ofile List Wireless profiles can be automatically imported into the Profiles List This is accomplished by Intel PROSet Wireless monitoring the import folder on your hard disk for new profile files Only profiles that have been enabled Enable Auto I mport in Advanced Settings can be automatically imported If a profile of the same name already exists in the Profiles List a dialog is displayed allowing you to either reject the imported profile or accept it in which case the existing profile is replaced All imported user based profiles are placed at the bottom of the Profiles List and the profile file is immediately deleted after it is the imported whether the import was successful or not Refer to Automatic Profile Distribution for more information Password Protected Profiles Password protected user based profiles can be imported and exported automatically to remote systems If a profile is password protected before it can be edited the assigned password must be entered Refer to Setting a Profile Password for more information I mport Export Description Name Description Export profiles Select the profiles you want to export Select individual or multiple profiles from the list The profile mode icon indicates either infrastructure or ad hoc mode is being used and if security is being used Browse Browse your hard disk for the destination directory The directory path displays in the destination directory window Export
120. ommon modifications special national conditions and National Deviation Electromagnetic compatibility and Radio spectrum Matters ERM EN 301 489 1 v1 4 1 Aug 2002 Electromagnetic Compatibility EMC standard for radio equipment and services EN 301 489 17 v1 2 1 Aug 2002 Part 1 Common technical requirements Part 17 Specific conditions for Wideband Data and Hiperlan equipment Electromagnetic compatibility and Radio Spectrum Matters ERM Wideband transmission systems Data transmission equipment operating in the 2 4 GHz EN 300 328 1 v1 4 1 Apr 2003 ISM band and using spread spectrum modulation techniques Part 2 n Harmonized EN covering essential requirements under article 3 2 of the R amp TTE Directive Generic standard to demonstrate the compliance of low power electronic and EN 50371 electrical apparatus with the basis restrictions related to human exposure to electromagnetic fiels 10MHz 300GHz General public This declaration is made under our sole responsibility Authorized Signature by Date 01 December 2003 LA incent Colin Worldwide Homologations Manager WPD Regulatory Department C 03360 Declaration of Conformity We INTEL CORPORATION SA Branch Office Veldkant 31 2550 Kontich Belgium Declare that the INTEL amp PRO Wireless 2200BG Network Connection with model name WM3A2200BG is in conformance with the essential requirements of the European Council Directive Radio and Telecommunication
121. on the network any wireless device with the correct network name SSID can associate with the access point and gain access to the network Data Encryption None No data encryption used Enable 802 1x Cleared Open authentication WEP encryption This network uses no network authentication with WEP data encryption Name Description Network Authentication Open No authentication used Open authentication allows a wireless device access to the network without 802 11 authentication The access point allows any request for authentication If no encryption is enabled on the network any wireless device with the correct network name SSID can associate with the access point and gain access to the network Data Encryption WEP WEP data encryption can be configured using 64 bit or 128 bit WEP settings can be used with all Network Authentication protocols When WEP encryption is enabled on an access point the WEP key provides a way to verify access to the network If the wireless device does not have the correct WEP key even though authentication is successful the device is unable to transmit data through the access point or decrypt data received from the access point Encryption Level Cleared 1 2 3 4 Up to four passwords may be specified Key Index by changing the Key Index Wireless Security Password WEP Type the wireless network Password WEP Key Key in the text box The Password is the same value used by the Wire
122. on the Program Maintenance screen Click Next Click Single Sign On Select Do not install this feature A red x displays next to the option Click Modify After the software is installed on your computer the component is listed as Not Present Click OK Back to Contents Trademarks and Disclaimers Back to Contents Setting up Security Intel PRO Wireless 2915ABG Network Connection User Guide e Security Settings Page Options e Network Authentication Device to Device e Network Authentication Infrastructure Enable 802 1x Authentication From the Security Settings page you can enter the required security settings for the selected wireless network See the Profile Wizard Overview for a description of when the Profile Wizard is launched See Security Overview for more information the different security options for wireless networks Security Settings Page Options Wireless Profile Properties wi General Settings security Settings s Security Settings Select the appropriate security settings Far your wireless network Your network administrator can help with these settings Network amp uthenticatian en O O _ Enable 802 1 Authentication Type FEAF Cisco Options NOTE There is na security on this wireless network The options displayed are dependent on the Operating Mode Device to Device or Infrastructure selected on the General Settings page Name Setting Network Open Authentication Share
123. ontain information such as SSID profile name speed AP settings such as 802 11 band channel and security mode The signal quality section of the main windows provides information about the quality of the wireless signal Click Details to view detailed parameters of the access point and network adapter Intel PROSet Wireless Fil Tools Profiles Help Wireless networks found Select one below and click Configure ta connect Profiles Automatically connect to wireless profiles in the order specified below _ Profile Name Network Name H P comer Lea Remwe Properties Available Networks 43 NewmkNawe DP s 55 9 8 8 55ID not broadcast anol amp g 5510 not broadcast am D adhac v Use the Intel PROSet Wireless to View the current connection status signal quality speed and current network name Scan for available wireless networks Manage profiles Auto connect profiles to available networks in a specific order defined in the Profile list Connect to infrastructure and ad hoc networks Configure adapter power settings Connection Status I cons The Intel PROSet Wireless main window displays connection status icons which indicate the current connection status of your wireless adapter The task tray icon also indicates the current connection status Refer to Task Tray Icons for more information Main Window Connection Status Description con Description Wi
124. ooter is supported under Windows XP and 2000 I ntel Wireless Troubleshooter Description Intel Wireless Troubleshooter page contains two panes The left pane displays a list of available tools that can be started using your left mouse button The right pane displays the current connection issue in a section Each section has two parts the error message and the hint text parts The error message and time stamp are preceded by an icon The hint text part contains description about available utilities and help for resolving the associated connection issue If you click on a help text link the help text is displayed in a pop up window If you click on the associated issue resolver link a program is launched to resolve the connection issue You can launch Wireless Event Viewer or enable or disable from the last pane File Exit Exit Intel Wireless Troubleshooter application Help Intel R Wireless Troubleshooter Help Displays online help on the Intel Wireless Troubleshooter About Displays version information for the Intel Wireless Troubleshooter Wireless Event Viewer Launch Wireless Event Viewer Disable Notification Click to disable the alert notifications Enable Notification Click to enable the alert notifications if an error is detected Available Help Date Time error message e Description of error e Link to resolve error if available See Resolving Errors below e Link to recom
125. ooting tips Online Support Technical Support http support intel com Network Product Support http www intel com network Corporate Web Site http www intel com Back to Contents Back to Contents Regulatory I nformation I ntel R PRO Wireless 2915ABG Network Connection User Guide Supported on the Intel R PRO Wireless 2915ABG Network Connection and Intel R PRO Wireless 2200BG Network Connection Hardware Intel R PRO Wireless 2915ABG Network Connection Information for the User Hegulatory Information Intel R PRO Wireless 2200BG Network Connection Information for the User Hegulatory Information I ntel R PRO Wireless 2915ABG Network Connection The information in this document applies to the following products Tri mode wireless LAN adapters 802 11a 802 11b 802 11g Intel R PRO Wireless 2915ABG Network Connection model WM3B2915ABG Intel R PRO Wireless 2915ABG Network Connection model WM3A2915ABG NOTE Due to the evolving state of regulations and standards in the wireless LAN field IEEE 802 11 and similar standards the information provided herein is subject to change Intel Corporation assumes no responsibility for errors or omissions in this document Nor does Intel make any commitment to update the information contained herein Information for the user Safety Notices The FCC with its action in ET Docket 96 8 has adopted a safety standard for human exposure to radio frequency RF electromagn
126. ork Connection adapter is designed to be interoperable with other wireless LAN products that are based on direct sequence spread spectrum DSSS radio technology and to comply with the following standards IEEE Std 802 1b compliant Standard on Wireless LAN IEEE Std 802 1g compliant Standard on Wireless LAN IEEE Std 802 1a compliant Standard on Wireless LAN Wireless Fidelity WiFi certification as defined by the WECA Wireless Ethernet Compatibility Alliance The Intel R PRO Wireless 2915ABG Network Connection adapter and your health The Intel R PRO Wireless 2915ABG Network Connection adapter like other radio devices emits radio frequency electromagnetic energy The level of energy emitted by this device however is less than the electromagnetic energy emitted by other wireless devices such as mobile phones The Intel R PRO Wireless 2915ABG Network Connection adapter wireless device operates within the guidelines found in radio frequency safety standards and recommendations These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature In some situations or environments the use of the Intel R PRO Wireless 2915ABG Network Connection adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization
127. ove Properties Delete a selected profile from the Profile List Not all profiles can be removed from the list one profile must remain in the list Refer to Removing a Profile for more information Edit the contents of an existing profile You can also double click a profile in the Profile List to edit the profile Refer to Editing an Existing Profile for more information Available Networks The Available Networks list displays a list of wireless networks within range of the adapter Click Connect to launch the Profile Name Wizard to create a profile for the selected wireless network Description ds The signal strength of the wireless network access point or computer Ad hoc mode The signal strength icon bars indicate that the wireless network or computer is available for connection but is still not is associated with an access point or computer Ad hoc mode The wireless network is using Infrastructure operating mode The wireless network is using Ad hoc operating mode U e The wireless network is using Security encryption DD Network Name Configure The band frequency being used by the wireless network Name of the wireless network SSID or computer Connect to the selected available Network Name The Networks Properties displays the current network connection status for the wireless Properties adapter Refer to Network Properties for information Refresh the list of avai
128. poration nyilatkozom hogy a Intel R PRO Wireless 2200BG Network Connection megfelel a vonatkoz alapvet k vetelm nyeknek s az 1999 5 EC ir nyelv egy b eldirasainak Intel R Corporation tymto vyhlasuje ze Intel R PRO Wireless 2200BG Network Connection sp a z kladn po iadavky a v etky pr slu n ustanovenia Smernice 1999 5 ES Intel R Corporation timto prohlasuje ze tento Intel R PRO Wireless 2200BG Network Connection je ve shode se z kladn mi po adavky a dal mi peislusnymi ustanoven mi smernice 1999 5 ES Slovenia iuo Intel R Corporation deklaruoja kad Sis Intel R PRO Wireless 2200BGNetwork Connection atitinka esminius reikalavimus ir kitas 1999 5 EB Direktyvos nuostatas Latvian Ar So Intel R Corporation deklare ka Intel R PRO Wireless 2200BG Network Connection atbilst Direktevas 1999 5 EK betiskaj m prasebem un citiem ar to saistetajiem noteikumiem Lithuanian Intel R Corporation deklaruoja kad Intel R Pro Wireless 2200BG Network Connectionatitinka 1999 5 EC Direktyvos esminius reikalavimus ir kitas nuostatas Polish Niniejszym Intel R Corporation deklaruje e Intel R PRO Wireless 2200BG Network Connection speenia wymagania zasadnicze oraz stosowne postanowienia zawarte Dyrektywie 1999 5 EC France Pour la France m tropolitaine 2 400 2 4835 GHz Canaux 1 13 autoris en usage int rieur 2 400 2 454 GHz canaux 1 7 autoris en usage ext rieur Pour la Guyane et la R
129. quency wireless devices because their signals could interfere with critical aircraft instruments Other Wireless Devices Safety Notices for Other Devices in the Wireless Network Refer to the documentation supplied with wireless Ethernet adapters or other devices in the wireless network Local Restrictions on 802 11a 802 11b and 802 11g Radio Usage Caution Due to the fact that the frequencies used by 802 11a 802 11b and 802 119 wireless LAN devices may not yet be harmonized in all countries 802 11a 802 11b and 802 11g products are designed for use only in specific countries and are not allowed to be operated in countries other than those of designated use As a user of these products you are responsible for ensuring that the products are used only in the countries for which they were intended and for verifying that they are configured with the correct selection of frequency and channel for the country of use The device transmit power control TPC interface is part of the Intel R PROSet Wireless software Operational restrictions for Equivalent Isotropic Radiated Power EIRP are provided by the system manufacturer Any deviation from the permissible power and frequency settings for the country of use is an infringement of national law and may be punished as such For country specific information see the additional compliance information supplied with the product Wireless interoperability The Intel R PRO Wireless 2915ABG Netw
130. r exclude specific access points Refer to Manage Exclusions for information Use Ctrl M from your keyboard as an alternative to using your mouse to access this feature Refer to Exclude List for information components Application Settings Tools menu Intel PROSet Wireless Application Settings Adapter Curent managing the following adapter Intel R PAO Wireless 297 546G Network Connection Advanced Settings gl Task Tray Show application icon in the taskbar Notifications Show Alert Notifications Information Notifications Show Information Matifications L Show a list of available networks in the area when not connected Notify me when an other application is using the wireless device e Auto Connect Connect to available network using profiles only Help Intel PROSet Wireless Help Launch the online help F1 About Displays version information for the currently installed application Connect to any available network if no matching profile found 8 Connect to any network based on profiles only Cisco mode Description These settings control how the Intel PRO Set Wireless behaves and displays Information The Application Settings control how the Intel PROSet Wireless behaves and displays information
131. reless turned off The wireless adapter is not associated to a network Click the Turn wireless on button to enable the adapter Searching for wireless networks The wireless adapter is scanning for any available wireless networks Animated Icons 000000 No wireless networks found There are no available wireless networks found Wireless network found An available wireless network is found You can choose to connect to available networks displayed in the Available Networks list Connected to a wireless network Connected to a wireless network The network name speed and signal quality display the current connection status Click the Details button to display details of the current network connection Not connected to a wireless network Not connected to a wireless network Network Name SSI D The name of the network that the adapter is connected to The Network Name SSID must be the same as the SSID of the access point using infrastructure mode also called BSSID ESSID or Net ID or other computers in an ad hoc network also called IBSSID Network Name Speed Displays the current date transfer rate in mega bits per second Mbps e 9802 11g 1 2 5 5 6 9 11 12 18 24 36 48 or 54 e 802 11b 1 2 5 5 or 11 e 902 11a 54 48 36 24 18 12 9 6 Signal Quality anol The signal quality icon bars indicate the quality of the transmit and receive signals between your wireless adapt
132. rino laptop computer 6 Configure my Broadband DSL Cable Settings Click to launch a configuration web page after you click Finish This web page provides advanced options such as Internet and Broadband settings 7 Click Finish to close the Configuration Wizard I ntel PROSet Wireless Configuration Service This page is displayed if an available wireless network access point or hotspot is detected within range of your computer and there is no matching profiles found in the profile list If balloon prompts are enabled this page is shown when you click the Taskbar Balloon message prompt Name Description Available Networks The available Network Names and Icons display the type of available network NOTE If the wireless adapter receives a blank network name SSID from a stealth access point SS D not broadcast is displayed in the list To associate with a stealth access point a new profile must first be created Click the Configure button to launch the Profile Wizard then create a profile for the selected network After connection both the blank SSID and the associated SSID can be viewed in the available networks list Do not show this again Normally this notice is not shown It is only displayed when the Display available networks when not associated setting is selected in Application Settings If it is displayed you can select to stop the notice from displaying again Configure Configure the selected wireless network Close
133. roduct to the designated ICS center When you return the Product to the ICS center you must include the RMA number on the outside of the package Intel will not accept any returned Product without an RMA number or that has an invalid RMA number on the package You must deliver the returned Product to the designated ICS center in the original or equivalent packaging with shipping charges pre paid within the USA and assume the risk of damage or loss during shipment Intel may elect to repair or replace the Product with either a new or reconditioned Product or components as Intel deems appropriate The repaired or replaced product will be shipped to you at the expense of Intel within a reasonable period of time after receipt of the returned Product by ICS The returned Product shall become Intel s property on receipt by ICS The replacement product is warranted under this written warranty and is subject to the same limitations of liability and exclusions for ninety 90 days or the remainder of the original warranty period whichever is longer If Intel replaces the Product the Limited Warranty period for the replacement Product is not extended WARRANTY LIMITATIONS AND EXCLUSIONS THIS WARRANTY REPLACES ALL OTHER WARRANTIES FOR THE PRODUCT AND INTEL DISCLAIMS ALL OTHER WARRANTIES EXPRESS OR IMPLI ED INCLUDI NG WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE NON INFRINGEMENT COURSE OF DEALI
134. rs Also reflections of the signal by metallic or other objects in the area can result in poor signal quality The Media Access Control MAC address for the wireless adapter Band Indicates the wireless band of the current connection e 802 11a e 802 11b e 002 11g Supported Data rates Rates at which the wireless adapter can send and receive data Displays the speed in Mbps for the frequency being used e 802 119 1 2 5 5 6 9 11 12 18 24 36 48 and 54 e 902 11b 1 2 5 5 and 11 e 902 11a 6 9 11 12 18 24 36 48 and 54 Radio Frequency Displays the frequency of the current wireless connection e 5 260 Ghz e 2 457 GHz Channel Number Displays the transmit and receive channel Network Authentication Displays Open Shared WPA Enterprise WPA Personal WPA2 Enterprise and WPA2 Personal modes Displays the 802 11 authentication used by the currently used profile Refer to Security Settings for more information Data Encryption Displays None WEP CKIP TKIP or AES CCMP Refer to_Security Settings for more information CCX Version Version of the Cisco Compatible Extensions on this wireless connection CCX TPC Cisco Compatible Extensions Power Levels CCX Power Levels 0 2 0 4 1 0 6 3 100 0 mW Access Point MAC Address The Media Access Control MAC address for the associated access point Mandatory Access Point Displays None if not enabled If enabled
135. s Terminal Equipment Directive 1999 S EC R amp TTE Following Annex IV of this Directive The essential requirements being Following directive 73 23 EEC amp European Council Recommendation 1999 519 EC Electromagnetic Compatibility article 3 1 b Following directive 89 336 EEC Health amp Safety of the user article 3 1 a Following the Notified Body Opinion Effective use of the spectrum ar icie 3 2 from TNO Certification B V with Notified Body number 0336 This declaration is based upon compliance to the following standards IEC 60950 1999 3 Edition with amendments Safety Information Technology Equipment Including Electrical Business 1 2 3 4 Equipment amp amp EN 60950 2000 Common modifications special national conditions and National Deviation Electromagnetic compatibility and Radio spectrum Matters ERM EN 301 489 1 v1 4 1 Aug 2002 Electromagnetic Compatibility EMC standard for radio equipment and services EN 301 489 17 v1 2 1 Aug 2002 Part 1 Common technical requirements Part 17 Specific conditions for Wideband Data and Hiperlan equipment Electromagnetic compatibility and Radio Spectrum Matters ERM Wideband transmission systems Data transmission equipment operating in the 2 4 GHz EN 300 328 1 v1 4 1 Apr 2003 ISM band and using spread spectrum modulation techniques Part 2 Harmonized EN covering essential requirements under article 3 2 of the R amp TTE Directive Generic st
136. s and click OK mid dm Note about Certificates The specified identity should match the field Issued to in the certificate and should be registered on the authentication server i e RADIUS server that is used by the authenticator Your certificate must be valid with respect to the authentication server This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority You should be logged in using the same username you used when the certificate was installed 5 Click Close 6 Click the OK button to save the settings Authentication failed due to invalid server credentials Re enter server credentials This authentication error can be caused by invalid server Domain credentials when using either a TTLS PEAP or LEAP profile Use the following steps to help resolve this error Select the appropriate profile from the profiles list Click Properties Click Next Select the appropriate 802 1x Authentication Type o For TTLS and PEAP profiles Select the Use the following option for User Credentials a Verify the Domain information f Use Windows logon or Prompt each time I connect is selected make sure that the correct Domain credentials information is used when you connect to the wireless network o For LEAP profiles Select the Use the following user name and password option and verify the Domain information If Use W
137. s are also referred to as WI Fi networks A Access Point A device that serves as a communications hub for wireless clients and provides a connection to a wired LAN Advanced Encryption Standard AES A federal information processing standard supporting 128 192 and 256 bit keys Basic Service Set Identifier BSSI D A unique identifier for each wireless client on a wireless network The BSSID is the Ethernet MAC address of each adapter on the network Bit Rate The total number of bits ones and zeros per second that a network connection can support Note that this bit rate varies under software control with different signal path conditions Bluetooth An incompatible very short range lower speed communications system PAN developed first in Europe as a cable replacement for printers and similar peripheral connections Its usage has expanded to include cordless earphones and similar devices It uses the 2 4 GHz ISM band and co exists with 802 11b Here the term co exist means that not all researchers agree on the amount of mutual interference generated when both systems operate in the same location Broadcast SSI D Used to allow an access point to respond to clients on a wireless network by sending probes D Data Rate Information Rate Not all bits carry user information Each group packet of bits contains headers trailers echo control destination information and other data required by the transmission
138. sed to validate your credentials with the network A SIM card is a special smart card that is used by GSM based digital cellular networks EAP SIM authentication can be used with e Network Authentication types Open Shared WPA Enterprise and WPA2 Enterprise e Data Encryption types None WEP and CKIP Name Description EAP SI M User Specify user name identity Select this option to specify the user name e User Name The user name assigned to the SIM card TLS Authentication These settings define the protocol and the credentials used to authenticate a user TLS authentication is a two way authentication method that exclusively uses digital certificates to verify the identity of a client and a server Name Description Step 1 of 2 TLS User Use my smart card or certificate User Name Client Certificate Step 2 of 2 TLS Server Certificate ssuer Specify Server Certificate Name e Smart card Click this option if the certificate resides on a smart card e Certificate Click this option if the certificate resides on this computer User Name This user name must match the user name that is set in the authentication server by the administrator prior to client s authentication The user name IS case sensitive Select TLS requires a Client Certificate from the Personal Certificate store of the Windows logged in user This certificate identifies you as the user This certificate is used
139. sk tray Task Tray Menu Options Tool Tips and Balloon Message Prompts Intel PROSet Wireless Main Window Connection Status Icons Connection Details Profile List Available Networks Menus Tools and Profile menus Tools Menu o Application Settings o Adapter Settings o Use Microsoft Client o Advanced Statistics o Intel Wireless Troubleshooter o Administrator Tool Profiles Menu o Import Export o Manage Exclusions Enabling and Disabling the Radio Installing and Uninstalling the Software Installing and Uninstalling Single Sign On Feature Using Intel R PROSet Wireless as your Wireless Manager Intel PROSet Wireless can be used to setup edit and manage network profiles to connect to a network It also includes advanced settings such as power management and channel selection for setting up ad hoc networks If you are using Windows XP as your wireless manager you can disable it from the Wireless Network tab To disable Windows XP as your wireless manager l 2 3 4 Verify that the Use Windows to configure my wireless network settings box is not selected If it is 5 Double click the Intel PROSet Wireless icon in the desktop task tray or click Start Settings Control Panel and double click on Network Connections Right click Wireless Network Connection and click Properties Click on Wireless Networks tab on the Wireless Network Connection Properties deselect it Click OK This confirms that the Intel PROSet Wire
140. stall Click Do not install this feature A red x displays next to the option indicating that it will not be installed Click I nstall After the software is installed on your computer the installed components are listed Click OK T NOTE If the Single Sign On feature was installed you must reboot the system Click Yes to reboot I nstall and Uninstall the Single Sign On Feature The Single Sign On feature includes Pre Logon Connect and Persistent Connect features By default they are not installed during the initial software installation process unless you choose to make a Custom install There feature can also be installed or uninstalled after Intel PROSet Wireless has been installed To install the Single Sign On features after Intel PROSet Wireless has been installed PIDE Ger EC Click Start gt Settings gt Control Panel gt Add or Remove Programs gt Intel PROSet Wireless Select Change Select Modify on the Program Maintenance screen Click Next Click Single Sign On Select I nstall this feature and all subfeatures NOTE Windows XP Fast Switching and the Welcome screen are disabled when the Single Sign On is installed Click Modify After the software is installed on your computer the component is listed as Installed Click OK To remove the Single Sign On feature POEM IE Click Start gt Settings gt Control Panel gt Add or Remove Programs gt Intel PROSet Wireless Select Change Select Modify
141. t Click Skip or OK to save the settings and close the Security Settings page 8 The profile displays in the Profiles List and is positioned at the bottom of the list Use the Profiles List arrows to position the profile in the list If the profile is positioned at the top of the list it will automatically be connected to the network the next time the wireless network is detected 9 Select the profile and click Activate to connect to the selected network The connection icon indicates that you are connected to the network The network name speed and signal quality display the current connection status Click the Details button to display details of the current network connection mista DUM Connect to a wireless network with WEP security To connect to a wireless network with WEP security l Click Refresh The available wireless networks display in the Available network list iA NOTE If your wireless adapter receives a blank network name SSID from a stealth access point both the blank SSID and l lt no profile gt display in the Available networks list After connection both the blank SSID and the associated SSID display in the Available networks list and the Profiles List 2 Select a wireless network from the list of available networks and double click the network name or click Connect The Profile Wizard General Settings page displays The Wireless Network Name SSID displays The profile name uses the same name as the wireless n
142. t Technology unmodified and in its original sealed packaging Original Purchaser that the Product if properly used and installed will be free from defects in material and workmanship and will substantially conform to Intel s publicly available specifications for the Product for a period of one 1 year beginning on the date the Product was purchased in its original sealed packaging SOFTWARE OF ANY KIND DELI VERED WITH OR AS PART OF THE PRODUCT IS EXPRESSLY PROVIDED AS IS SPECIFICALLY EXCLUDING ALL OTHER WARRANTIES EXPRESS IMPLIED INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY NON INFRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE provided however that Intel warrants that the media on which the software is furnished will be free from defects for a period of ninety 90 days from the date of delivery If such a defect appears within the warranty period you may return the defective media to Intel for replacement or alternative delivery of the software at Intel s discretion and without charge Intel does not warrant or assume responsibility for the accuracy or completeness of any information text graphics links or other items contained within the software If the Product which is the subject of this Limited Warranty fails during the warranty period for reasons covered by this Limited Warranty Intel at its option will e REPAIR the Product by means of hardware and or software OR e REPLACE the Product with another prod
143. t from access point due to Information Element failure Disconnect from access point due to EAPOL Key protocol 4 way handshake failure Disconnect from access point due to 802 1x authentication failure Recommended action To re connect remove the access point from the exclude list or manually connect i e on the Intel PROSet Wireless main window select the profile and click Connect Error Occurred Because the GSM Adapter Was Unexpectedly Removed This error occurs when the GSM adapter is not fully inserted or unexpectedly removed from the mobile station Use the following steps to help resolve this error Re insert the GSM adapter Double click the Intel PROSet Wireless icon at the bottom right of the screen Select the associated or last used profile from the profiles list Click Connect The profile is now re applied Intel PROSet Wireless attempts to connect to the wireless network IDE The AAA Server Rejected the EAP Method This error occurs when the AAA Server does not accept the configured authentication type Use the following steps to help resolve this error 1 Open Intel PROSet Wireless by double clicking the task tray icon located at the bottom right of the screen Select the associated or last used profile from the profiles list Click Properties The Wireless Profile Properties General Settings page opens Click Next The Wireless Profile Properties Security Settings page is opens Verify that Enable
144. t of installed certificates and click OK Pd iom Note about Certificates The specified identity should match the field Issued to in the certificate and should be registered on the authentication server i e RADIUS server that is used by the authenticator Your certificate must be valid with respect to the authentication server This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority You should be logged in using the same username you used when the certificate was installed 5 Click Close 6 Click OK to save the settings I ncorrect PI N for retrieving certificate Re enter PI N Recommended action The certificate retrieval failed because of an incorrect PIN Re enter the correct PIN Authentication failed because the AAA server is unavailable The wireless adapter is associated to the access point but the 802 1x authentication cannot be completed because of a response from the authentication server Recommended action Select the profile and click Connect and try to associate with the network and authenticate with the server The wireless adapter failed to get a valid I P address This error can be due to an authentication failure with the network incorrect encryption keys or because of a DHCP server malfunction Re enter encryption keys Use the following steps to resolve this error Click Propert
145. t the wireless adapter to 802 11a and 802 11g networks only e 802 11b and 802 11g only Connect the wireless adapter to 802 11b and 802 11g networks only NOTE These wireless mode Modulation type options determine the discovered access points displayed in the Available networks list OK Save settings and return to the previous page Cancel Close the page and cancel any changes made Help Displays the help information for this dialog Use Microsoft Client Tools menu Fm c4 Intel PROSet Wireless File Tools Profiles Help Windows is currently managing this wireless device Enable Intel PROS ety ireless To connect to a wireless network please use the Windows Wireless Network Properties Open Network Properties Profile Mame Network Mame LA Lad wireless wireless H JJI Network Name 1 The Microsoft Windows XP Wireless Zero Configuration feature provides a built in wireless configuration utility This feature can be enabled and disabled in Microsoft Windows XP or by clicking Use Microsoft Client on the Tools menu If Microsoft Windows XP Zero Configuration is enabled the features in Intel PROSet Wireless are disabled Refer to Intel PROSet Wireless Configuration Service for information on re enabling Intel PROSet Wireless Administrator Tool Tools menu Administrator Tool Administrator Settings You can decide what level of control your users have over their wireless network connection settings
146. t wireless connection state The connection status icon is located in the lower right corner of your Windows desktop The task tray can be set to visible or not visible in the Application Settings Tools menu selection con Description Wireless off The wireless adapter is off The wireless device does not transmit or receive while it is off Click Wireless on off to enable the adapter The icon is white and static Searching for wireless networks The wireless adapter is searching for any available wireless networks White icon with animation No wireless networks found There are no available wireless networks found Intel PROSet Wireless periodically scans for available networks If you want to force a scan double click the icon to launch Intel PROSet Wireless and clickRefresh Red icon Wireless network found An available wireless network is found Double click the icon to display the Available Networks listing select the network and click Configure Yellow icon Authentication failed Not able to authenticate with wireless network Green icon with a yellow warning triangle Connected to a wireless network Connected to a wireless network Tool tip display network name speed and signal quality The green icon with waves reflects signal quality More waves mean better signal quality If you are using Windows XP as your wireless manager the task tray icon is white It does not L NO
147. tended by the original architects WEP also helps prevents unauthorized access to your system by an outsider Hackers have been known to access systems from outside a building and to then to access the Web for a leisurely session all at the system owner s expense Wide Area Network WAN A wide area network WAN is a voice data or video network that provides connections from one or more computers or networks within a business to one or more computers or networks that are external to such business Wireless A microwave transceiver system Wireless Network Wireless LAN is a type of local area network that uses high frequency radio waves rather than wires to communicate between nodes WLAN is a flexible data communication system used as an alternative to or an extension of a wired LAN Wireless Node A user computer with a wireless network interface card adapter Back to Contents Back to Contents Customer Support Intel R PRO Wireless 2915ABG Network Connection User Guide Customer Support Welcome to s for Intel consumer products get technical help select your product type at the left to find solutions specifications compatibility information and documentation download software drivers and utilities search the support site Intel support is available online or by telephone Available services include the most up to date product information installation instructions about specific products and troublesh
148. ter equipment on board airplanes or e Using the Intel R PRO Wireless 2200BG Network Connection adapter equipment in any other environment where the risk of interference with other devices or services Is perceived or identified as being harmful If you are uncertain of the policy that applies to the use of wireless devices in a specific organization or environment an airport for example you are encouraged to ask for authorization to use the Intel R PRO Wireless 2200BG Network Connection adapter wireless device before you turn it on Regulatory information The Intel R PRO Wireless 2200BG Network Connection adapter wireless network device must be installed and used in strict accordance with the manufacturer s instructions as described in the user documentation that comes with the product For country specific approvals see Radio approvals Intel Corporation is not responsible for any radio or television interference caused by unauthorized modification of the devices included with the Intel R PRO Wireless 2200BG Network Connection adapter kit or the substitution or attachment of connecting cables and equipment other than that specified by Intel Corporation The correction of interference caused by such unauthorized modification substitution or attachment is the responsibility of the user Intel Corporation and its authorized resellers or distributors are not liable for any damage or violation of government regulations that may arise from th
149. ter to an available network using a matching profile from the Profiles List If no matching profile is found you are notified by a notification see Notifications The wireless device remains disconnected until a matching profile is found or you configure a new matching profile Connect to any available network if no matching profile found If the wireless adapter is disconnected and wireless networks are found the Intel PROSet Wireless Configuration service attempts to match a profile from the Profiles List and if a match is found connect If no matches are found and one of the available networks is open unsecured this option allows the Intel Configuration Service to connect to that open network NOTE Open networks have no security You would need to provide your own security for this wireless connection One way to secure an open wireless connection is with Virtual Private Networking VPN software Connect to any network based on profiles only Cisco mode This mode Supports multiple and blank network names SSIDs for access points that Support Cisco Compatible Extensions Select this option to try every profile in preferred order This specifies that the user knows they are in the vicinity of an access point which has more than one SSID but only advertises one Manage Exclusions Enable automatic exclude list feature Select to enable the automatic exclude list feature This feature provides a way to exclude access points from auto
150. th an access point or another wireless computer in peer to peer mode Signal Quality ranges from Excellent to Out of Range e Displays a b or g This icon indicates the band being used e Channel Displays the current transmit and receive channel being used for a particular wireless network e BSSID Infrastructure operating mode Displays the twelve digit MAC address of the access points in the selected network Manage Exclusions Close Help Menus Use theFile Tools Profiles Name File Tools Profiles Refer to Manage Exclusions for more information Close page Displays the help information for this page and Help menu options to configure your network settings Description Exit Close the Intel PROSet Wireless main window To launch Intel PROSet Wireless e Click Start gt Programs gt I ntel PROSet Wireless gt Intel PROSet Wireless e Right click the task tray icon located in the lower right corner of your Windows Desktop and click the menu option Open Intel PROSet Wireless e Double click the task tray icon to open Intel PROSet Wireless Application Settings Provide system wide connection preferences UseCtrI P from your keyboard as an alternative to using your mouse to access this feature Refer to Application Settings for information Adapter Settings Displays Adapter Settings corresponding to the settings made in Windows Device Manager Use Ctrl A from your keyboard
151. the user credentials that are exchanged Credentials PAC e Click Allow automatic provisioning if you want to obtain the PAC from the server e f a PAC has already been obtained uncheck Allow automatic provisioning and click Select to choose an existing PAC on your computer Allow Fast Roaming CCKM Click Allow Fast Roaming Cisco Centralized Key Management CCKM to enable the client wireless adapter for fast secure roaming When a wireless LAN is configured for fast reconnection a LEAP enabled client device can roam from one access point to another without involving the main server Using Cisco Centralized Key Management CCKM an access point configured to provide Wireless Domain Services WDS takes the place of the RADIUS server and authenticates the client without perceptible delay in voice or other time sensitive applications Cisco Compatible Extensions Options Cisco Options Select this feature to enable Cisco Compatible Extensions for this wireless connection profile From this dialog you can enable disable Radio Management and Mixed Cells Mode Cisco Compatible Extensions Options Enable Cisco Compatible Extensions Enable Radio Management Support Enable this Feature so that the client adapter will provide Radio Management to the Cisco infrastructure IF the Cisco Aadio Manager utility is used on the infrastructure ib will configure radio parameters detect interferenice and detect Rogue APs E
152. thentication method using the Extensible Authentication Protocol EAP and Tunneled Transport Layer Security TTLS EAP TTLS uses a combination of certificates and another method such as passwords It is more secure than MD5 authentication which uses passwords and less secure than EAP TLS authentication which exclusively uses certificates EAP TTLS authentication supports dynamic WEP key management Encryption Scrambling data so that only the authorized recipient can read it Usually a key is needed to decrypt the data Extended Service Set I Dentifier ESSI D A type of unique identifier applied to both the AP and the wireless PC Card that is attached to each packet This allows the AP to recognize each wireless client and its traffic F Firewall A firewall is a set of related programs located at a network gateway server that protects the resources of a network from users from other networks Frequencies Strike a plano key and you generate a tone Pick up the tone with a microphone and your tone turns in to a vibrating or cycling electronic signal The rate of vibration depends on the key struck In electronics we refer to this rate of vibration as the number of cycles per second The formal term for this value is Hertz As we move up in rate such as in the Broadcast Band we can use Kilohertz KHz to represent 1 000 Hz or Megahertz MHz to represent 1 000 000 Hz Continuing much further upward we finally reach 1
153. uct OR if Intel is unable to repair or replace the Product e REFUND the then current Intel price for the Product at the time a claim for warranty service is made to Intel under this Limited Warranty THIS LIMITED WARRANTY AND ANY IMPLIED WARRANTIES THAT MAY EXIST UNDER APPLICABLE STATE NATIONAL PROVINCIAL OR LOCAL LAW APPLY ONLY TO YOU AS THE ORIGINAL PURCHASER OF THE PRODUCT Extent of Limited Warranty Intel does not warrant that the Product whether purchased stand alone or integrated with other products including without limitation semi conductor components will be free from design defects or errors known as errata Current characterized errata are available upon request Further this Limited Warranty does NOT cover i any costs associated with the replacement or repair of the Product including labor installation or other costs incurred by you and in particular any costs relating to the removal or replacement of any Product soldered or otherwise permanently affixed to any printed circuit board or integrated with other products ii damage to the Product due to external causes including accident problems with electrical power abnormal mechanical or environmental conditions usage not in accordance with product instructions misuse neglect accident abuse alteration repair improper or unauthorized installation or improper testing or iii any Product which has been modified or operated outside of Intel s publicly
154. unched select Show application icon in the taskbar in the Application Settings options Close Intel PROSet Wireless e ClickClose to close the Intel PROSet Wireless main window To open the main window right click the task tray icon and clickOpen I ntel PROSet Wireless Task Tray Menu Options Open Intel PRO5Set Wireless w Wireless Op Wireless OFF Copnpect to Profile k Use Microsoft client Hide Icon u ee The Intel PROSet Wireless icon displays in the task tray located in the lower right corner of your Windows desktop Right click the status icon to display the menu options Intel PROSet Wireless can support multiple adapters These wireless adapters are displayed in the task tray menu options Menu I tem Description Open Intel PROSet Double click this option to launch Intel PROSet Wireless Wireless Wireless On Turn the wireless radio on Wireless Off Toggles the radio off Connect to Profile ue current profiles shown in the Profile List A profile can also be Use Microsoft client Toggles between the Intel PROSet Wireless and Microsoft Windows XP Wireless Zero Configuration Service When you use the Microsoft client you cannot use your Intel profiles Open I ntel PROSet Wireless Hide Icon Remove Intel PROSet Wireless icon from the task tray Refer to Application Settings to display or hide the task tray icon Task Tray Icons The task tray icon provides visual indication of the curren
155. upports Basic WEP security was detected IF this wireless network has advanced B02 1x security vou will need to select those options on the following screens Click Next ee Ge CE Cn 7 The Security Settings page displays the current security status for the network access point Click Next to set Network Authentication and Data Encryption options 8 Select the Network Authentication and Data Encryption options Enter the encryption key settings and configure the 802 1x settings as required Refer to Security Settings for more information 9 Click OK when you have completed the profile settings The Profile Wizard ends and you are returned to Intel PROSet Wireless main window To change or verify the profile settings click the Back button 10 If you are not currently connected to a network Intel PROSet Wireless detects that a new profile has been added and automatically attempts to connect to this new profile 11 If you want to manually connect to this profile click Connect to use this wireless network The connection icon displays the current connection status The network name transmit and receive speed and signal quality are also displayed Editing an Existing Profile To edit an existing profile l Select the profile to edit from the Profiles List 2 Click Properties The General Settings and Security Settings pages display all of the profile settings and parameters that can be modified 3 Click Next and Back to nav
156. urity is determined click Next 4 The Security Settings page displays the required information that must be entered to connect to that particular network For example if an Infrastructure WEP network is selected WEP encryption and key index information is displayed but only the WEP Network Key needs to be entered If you do not know the required network settings contact your system administrator Creating a New Profile Use the Profile Wizard to create a new profile If you select a network from the Available Networks list and click Configure the Profile Wizard guides you through the necessary steps to create a profile and connect to the network During this process the Profile Wizard attempts to detect the appropriate security settings for you To create a new profile and connect to a wireless network L From the Intel PROSet Wireless main window click Add The Profile Wizard is launched and the General Settings page is displayed Wireless Profile Properties Wireless Gi Frie Mame Wireless General Settings amp Security Settings General Settings Profile Name Wireless Network Name SSID Wireless Operating Mode Gi Network Infrastructure Connect to wireless networks and or the internet C Device to device Ad hac Connect directly to other computers Enter a profile name in the Profile Name text box Enter the Wireless Network Name SSID i
157. uthentication failed due to invalid username Re enter username This authentication error can be caused by an invalid user name when using either a TTLS PEAP or LEAP profile Use the following steps to help resolve this error Select the appropriate profile from the profiles list Click Properties Click Next Select the appropriate 802 1x Authentication Type o For TTLS and PEAP profiles Select the Use the following option for User Credentials a Verify the User Name information f Use Windows logon or Prompt each time I connect is selected make sure that the correct user credentials information is used when you connect to the wireless network o For LEAP profiles Select the Use the following user name and password option and mI II verify the user name information If Use Windows logon user name and password or Prompt for user name and password is selected make sure that the correct user credentials information is used when you connect to the wireless network o For EAP SIM authentication type Verify that the correct User Name is being used under Specify user name identity 5 Click the OK button to save the settings Authentication failed due to invalid user password Re enter Password This authentication error can be caused by an invalid user password when using either a TTLS PEAP or LEAP profile Use the following steps to help resolve this error Select the appropriate profile from the profiles list Click Propert
158. ver name field identifies a domain and the certificate must have a server name belonging to this domain or to one of its sub domains for example zeelans com where the server is blueberry zeelans com NOTE These parameters should be obtained from the system administrator The server name or a domain to which the server belongs depending on which of the two options below has been selected e Server name must match exactly When selected the server name entered must match exactly the server name found on the certificate The server name should include the complete domain name for example Servername Domain name in this field Domain name must end in specified name When selected the server name field identifies a domain and the certificate must have a server name belonging to this domain or to one of its sub domains for example zeelans com where the server is blueberry zeelans com NOTE These parameters should be obtained from the system administrator These settings define the protocol and the credentials used to authenticate a user In TTLS the client uses EAP TLS to validate the server and create a TLS encrypted channel between the client and server The client can use another authentication protocol typically password based protocols such as MD5 Challenge over this encrypted channel to enable server validation The challenge and response packets are sent over a non exposed TLS encrypted channel Name Step
159. y Index Wireless Security Password WEP Enter the wireless network Password WEP Key Key in the text box The Password is the same value used by the Wireless Access Point or Router Contact your wireless network administrator for this password e Pass phrase 64 bit Enter 5 alphanumeric characters 0 9 a z or A Z e Hex key 64 bit Enter 10 alphanumeric hexadecimal characters 0 9 A F e Pass phrase 128 bit Enter 13 alphanumeric characters 0 9 a z or A Z e Hex key 128 bit Enter 26 alphanumeric hexadecimal characters 0 9 A F WPA Enterprise or WPA2 Enterprise Obtain and install a client certificate refer to Setting up the Client for TLS authentication or consult your system administrator X NOTE 1 Before starting you must obtain a user name and password on the Vie er RADIUS server from your system administrator 2 For personal home networks use Wi Fi Protected Access Personal WPA Pesonal or WPA2 Personal mode WPA 2 Enterprise requires an authentication server Name Description Network Authentication WPA Enterprise Refer to Security Overview Open and Shared Key authentication for more information Data Encryption AES CCMP Enable 802 1x Selected Authentication Type TLS Refer to TLS Authentication WPA Personal or WPA2 Personal Wi Fi Protected Access WPA is a security enhancement that strongly increases the level of data protection and access control to a wireless network
160. y in specific countries and are not allowed to be operated in countries other than those of designated use As a user of these products you are responsible for ensuring that the products are used only in the countries for which they were intended and for verifying that they are configured with the correct selection of frequency and channel for the country of use Any deviation from permissible settings and restrictions in the country of use could be an infringement of national law and may be punished as such FCC Radio Frequency Interference Requirements This device is restricted to indoor use due to its operation in the 5 15 to 5 25 GHz frequency range FCC requires this product to be used indoors for the frequency range 5 15 to 5 25 GHz to reduce the potential for harmful interference to co channel Mobile Satellite systems High power radars are allocated as primary users of the 5 25 to 5 35 GHz and 5 65 to 5 85 GHz bands These radar stations can cause interference with and or damage this device e his device is intended for OEM integrators only e This device cannot be co located with any other transmitter USA Federal Communications Commission FCC This device complies with Part 15 of the FCC Rules Operation of the device is subject to the following two conditions e his device may not cause harmful interference e his device must accept any interference that may cause undesired operation NOTE The radiated output power of the
161. yption 1 2 3 4 Up to four passwords may be specified by changing the Key Index Enter the wireless network Password WEP Key in the text box The Password is the same value used by the Wireless Access Point or Router Contact your wireless network administrator for this password Pass phrase and hex key options are e Pass phrase 64 bit Enter 5 alphanumeric characters 0 9 a z or A Z e Hex key 64 bit Enter 10 alphanumeric hexadecimal characters 0 9 A F e Pass phrase 128 bit Enter 13 alphanumeric characters 0 9 a z or A Z e Hex key 128 bit Enter 26 alphanumeric hexadecimal characters 0 9 A F If this feature is selected the user s credentials are retrieved from the user s Windows Logon process Prompts for a user name and password before you connect the wireless network The user name and password must be first set in the authentication server by the system administrator Use the following user name and The user name and password must be first set in password the authentication server by the Network Administrator e User Name This user name must match the user name that Is set in the authentication server e Password This password must match the password that is set in the authentication server The entered password characters display as asterisks e Confirm Password Re enter the user password EAP SI M Authentication Your Subscriber Identity Module SIM card is u

Download Pdf Manuals

image

Related Search

Related Contents

Impresora de color Phaser 350 para grupos de trabajo  ZBM0001.01SQAdipocyt... - Zen  Nilfisk-ALTO SR 1301 P Vacuum Cleaner User Manual  照明器具取扱説明書 型番:YCL-369  「事業用自動車安全通信」第203号(H25.6.28)  Memorex MP3109 User's Manual    VoIP Singlewire-enabled Ceiling Speaker Operations Guide  Manual de instrucciones  NEC PDWHM-L  

Copyright © All rights reserved.
Failed to retrieve file