Home

Edimax EW-7612PIn

image

Contents

1. Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to enhance security and Access Control Users can set it up depending upon their needs 12 What is DSSS What is FHSS And what are their differences Frequency hopping spread spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence spread spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip is the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistical techniques embedded in the radio can recover the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers 28 13 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is designed to trade off bandwidth efficiency for reliability integrity and security In
2. Profile Name test Network Name SSID 802 1x configure EAP TYPE Channel Wireless network security Tunnel This network requires a key for the following Network Authentication Open System Username Data encryption yyEPp Clasct OPASSPHRASE Identity i Password Key index advanced 1 v Network key ae ertificate Confirm network key Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks Network Name SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs You may specify a SSID for the adapter and then only the device with the same SSID can interconnect to the adapter This is acomputer to computer There are two kinds of network type described as follows ad hoc network wireless access Infrastructure This operation mode requires the presence of an points are not used 802 11 Access Point All communication is done via the Access Point or Router Ad Hoc Connect to another wireless adapter in the Wireless LAN network without through an Access Point or Router If this item is selected the adapter will work in Ad Hoc mode Channel This setting is only available for Ad Hoc mode Select the number 18 Network Authentication of the radio channel used for the networking The channel setting should be t
3. layer for the 802 11 Medium Access Control MAC in the 2 4 GHz frequency band known as the extended rate PHY ERP The ERP adds OFDM as a mandatory new coding scheme for 6 12 and 24 Mbps mandatory speeds and 18 36 48 and 54 Mbps optional speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps Aprotection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wireless LAN hardware from different manufactures to communicate 3 What does IEEE 802 11 feature support The product supports the following IEEE 802 11 functions CSMA CA plus Acknowledge Protocol Multi Channel Roaming Automatic Rate Selection RTS CTS Feature Fragmentation Power Management 4 What is Ad hoc An Ad hoc integrated wireless LAN is a group of computers each has a Wireless LAN adapter Connected as an independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 5 What is Infrastructure An integrated wireless and wireless and wired LAN is called an Infrastructure configuration Infrastructure is applicable to enterprise scale for wireless access to central database or wireless application for mobile work
4. network the adapter is connecting to linking time and link status If you don t ensure the status of the adapter and the network you are connecting please go to the screen for more details Refresh R Mode MM View About MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup Edimax el Manufacturer Edimax NDIS Driver Version 1084 19 1012 2009 Short Radio Header No Encryption Disabled Authenticate Open System Channel Set FCC MAC Address 00 1F 1F 91 15 c3 Data Rate AUTO Tx 43 5 Mbps Rx 43 5 Mbps Channel Frequency 6 2437 MHz Status Associated SSID Edimax Network Type Infrastructure Power Save Mode None Associated 4P MAC 00 1F 1F 57 30 24 Up Time hh mm ss 0 27 16 C Disable Adapter 22 3 6 Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please click Reset Refresh R Modei View Abovut 4 MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup Edimax 8 s i E Counter Name Tx OK Tx Error Rx OK Rx Packet Count Rx Retry Rx ICV Error Show Tray Icon C Disable Adapter C Radio Off 23 3 7 Wi Fi Protect Setup WPS Wi Fi Protected Setup WPS is the latest wireless network technology which makes wirel
5. setting of a network so that you can connect to the network quickly To add the selected network to a profile click this button 3 3 General To check the connection status of the adapter select General This screen shows the information of Link Speed Network Type Encryption Method SSID Signal Strength Link Quality and Network Address of the adapter General Profle Available Network Status Statistics WiFi Protect Setup Status Associated Speed Tx 29 Mbps Rx 58 Mbps Type Infrastructure Encryption None SSID Signa Strength AAADADONOOOUOONADI Unk Qualty AAANADAONADAONOOAODOODADADOODAN oors Network Address MAC Address 00 50 FC 61 21 01 IP Address 10 0 20 113 Subnet Mask 255 255 255 0 Gateway 10 0 20 254 ReNew IP o O Windows Zero Config Parameter Description Status It will show the connection status of the adapter Speed It shows the current speed Type Infrastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access 15 Encryption SSID Signal Strength Link Quality Network Address Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Rou
6. a 2 DI NETWORKING PEOPLE TOGETHER 300Mbps Wireless 802 11b g n PCI Express Adapter EW 7612PIn User Manual Version 1 0 7 4 2010 COPYRIGHT Copyright 2009 2010 by this company All rights reserved No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language or computer language in any form or by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of this company This company makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Further this company reserves the right to revise this publication and to make changes from time to time in the contents thereof without obligation to notify any person of such revision or changes Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rul
7. ed IEEE 802 1x authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure WPA2 802 1X Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES AES is required to the corporate user or government users The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES In contrast WPA uses Temporal Key Integrity Protocol TKIP WEP 802 1X It s a special mode for using IEEE 802 1x EAP technology for authentication and WEP keys for data encryption Parameter Data Encryption ASCII PASSPHRASE Key Length Key Index advanced Network Key Description Disabled Disable the WEP Data Encryption WEP Enable the WEP Data Encryption When the item is selected you have to continue setting the WEP Encryption keys TKIP TKIP Temporal Key Integrity Protocol changes the temporal key every 10 000 packets a packet is a kind of message transmitted over a network This insures much greater security than the standard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the commu
8. er Please refer to the description in the following sections 3 2 Available Network When you open the Configuration Utility the system will scan all the channels to find all the access points stations within the accessible range of your adapter and automatically connect to the wireless network with the highest signal strength From the Available Network tab all the networks nearby will be listed You can change the connection to another network General Profile Available Network Status Statistics WiFi Protect Setup Available Network s SSID Channel Encryption Network Authentication Signal p 1 None Unknown 60 1 7215apn 8 None Unknown 80 Der 11 None Unknown 46 p 11 TKIP AES WPA Pre Shared Keyf 84 p 11 None Unknown 52 2 IPCam 11 None Unknown 82 PLLLLLKT 11 TKIP WPA Pre Shared Key 62 r inknowr 68 Double click on item to join create profile is C Windows Zero Config Parameter Description Available Network s This list shows all information of the available wireless networks within the range of your adapter The information includes SSID Channel Encryption Network Authentication Signal and etc If you want to connect to any network on the list double click the selected network Refresh Click Refresh to update the available networks list It is 14 recommended that refresh the list while you have changed the connection network Add to Profile Aprofile stores the
9. ers 27 6 Whatis BSS ID A specific Ad hoc LAN is called a Basic Service Set BSS Computers in a BSS must be configured with the same BSS ID 7 What is WEP WEP is Wired Equivalent Privacy a data privacy mechanism based on a 40 bit shared key algorithm as described in the IEEE 802 11 standard 8 What is TKIP TKIP is a quick fix method to quickly overcome the inherent weaknesses in WEP security especially the reuse of encryption keys TKIP is involved in the IEEE 802 111 WLAN security standard and the specification might be officially released by early 2003 9 Whatis AES AES Advanced Encryption Standard a chip based security has been developed to ensure the highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption standards It is also included in IEEE 802 11i standard Compare with AES TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level 10 Can Wireless products support printer sharing Wireless products perform the same function as LAN products Therefore Wireless products can work with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with
10. es These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device and its antenna must not be co located or operating in conjunction with any other antenna or transmitter This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation Any changes or modifications not expressly approved by the party responsible for compliance could void the authorit
11. ess network setup become very simple If you have WPS enabled wireless access point and you want to establish a secure connection to it you don t have to configure the wireless access point and setup data encryption by yourself All you have to do is to go to the WPS setup page of this wireless card click the PBC or PIN button and then press a WPS button or enter a set of 8 digit code on the wireless access point you wish to establish a secure connection Refresh R Mode M View About A MyComputer General Profile Available Network Status Statistics Wi Fi Protect Setup Edimax et Wi Fi Protected Setup WPS An easy and secure setup solution for Wi Fi network Pin Input Config PIN After pushing the PIN button Please enter the PIN code into your AP PIN Code 60442833 Pin Input Config PIN Push Button After pushing the PBC button Please push the physical button on your AF or visual button on the WPS config page Push Button Config PBC Show Tray Icon C Disable Adapter O Radio Off Ready L Pin Input Config PIN 1 The PIN code of your wireless network card is an eight digit number located at the upper right position of configuration utility Remember it and input the number to your wireless access point as the WPS PIN code Please refer to the user manual of your wireless access point for instructions about how to do this 2 Click Pin Input Config PINY button now and the followi
12. go to the next step Edimax EW 7612PIn Wireless LAN Driver and Utility Edimax EW 7612PIn Wireless LAN Driver and Utility The InstallShi will install Edimax EW 7612PIn Wireless LAN Driver and Utility on your computer To click Next InstallShield D Now you ll see the following message please click Install to begin the installation eless LAN Driver and Utility Edimax EW 7612PIn Wireless LAN Driver and Utility Click Install to begin the installation If you want to review or change any of your installation settings click Back Click Cancel to exit the wizard InstallShield E The system starts to install the driver and utility Ee imax EW 7612PIn Wireless LAN Driver and Utility E Setup Status The InstallShield Wizard ling Edimax EW 7612PIn LAN Driver and Utility salia F Click Finish to complete the driver and utility installation Edimax EW 7612PIn Wireless LAN Driver and Utility InstallShield Wizard Complete The InstallShield Wizard has successfully installed Edimax EW 7612Pln Wireless LAN Driver and Utility Before you can use the program you must restart your computer Yes want to restart my computer now Y No will restart my computer later Remove any disks from their drives and then click Finish to complete setup InstallShield II Connect to Wireless Access Point After you finish installation the Configuration Utility appears as an icon on the sy
13. he same with the network you are connecting to This setting has to be consistent with the wireless networks that the adapter intends to connect Open System No authentication is needed among the wireless network Shared Key Only wireless stations using a shared key WEP Key identified are allowed to connecting each other WPA PSK It is a special mode designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the data traveling between authorized devices WPA2 PSK WPA2 PSK is also for home and small business The difference between WPA PSK and WPA2 PSK is that WPA2 PSK provides data encryption via the AES In contrast WPA PSK uses Temporal Key Integrity Protocol TKIP WPA 802 1X WPA provides a scheme of mutual authentication using either IEEE 802 1x Extensible Authentication Protocol EAP authentication or pre shared key PSK technology It provides a high level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deploy
14. in Sweden and the United Kingdom The ETSI version of this device is also authorized for use in EFTA member states Iceland Liechtenstein Norway and Switzerland EU Countries Not intended for use None CONTENTS 1 INTRODUCTION iii ds 1 LE A A A AN 1 AS A 25 e255 55 ehe eos T E E E Poe ev a 1 1 3 Package Contents ini tadas 2 2 INSTALLATION PROCEDURE cccccccccccccccccccccccccccccccccccccsccccececs 3 3 CONFIGURATION UTILITY cccccccccccccccccccccnonoccoononcononcororcorocconos 12 IL UE QVERVIGW id 13 3 2 Available NCtWOFKk cccccccccccesssesesesesesesesesesesesesessessesesesesesesesesesessssususususususreeseeeeees 14 A A E IT 15 SA POPS ind ada 17 3 4 1 Configure the Profile a el ida 18 3D SATUS A AAA A A A AAA A E AA RE 22 SiO ISTC A iii 23 3 7 Wi Fi Protect Setup IPod AE a 24 4 TROUBLESHOOTING 20 isa 27 1 Introduction EW 7612PIn is a wireless PCI Express adapter that provides a simple and easy way to add or upgrade wireless connectivity to your desktop This PCI Express adapter supports higher data rates up to 300Mpbs when connected to a 300Mbps wireless 802 11n device You can also connect to any public wireless hotspot for Internet access to retrieve email surf web sites or use instant messaging EW 7612PIn gives you the freedom to join the network 1 1 Features Work with 802 11b g n wireless network devices High speed transfer data rate up to 300 Mbps High throughput su
15. ina strength AAAADAADAANONAONAI s6 Unk Qualty AANADAADONOADDADOOOODDODONADAN 49 Network Address MAC Address 00 1F 1F 91 15 C3 IP Address 10 0 20 152 Subnet Mask 255 255 255 0 Gateway 10 0 20 254 lt Show Tray Icon O Rado Off Ready Y Parameter Description Refresh Refresh adapter list in the B block A Mode There are two modes Station and Access Point If Station is selected the adapter works as a wireless adapter If Access Point is selected the adapter will works as a wireless AP View Enable Status Bar and the D block in the utility will display the current status of the utility About To check the version of the utility select this item This is a list for you to configure several adapters in your PC from B the utility Show Tray Icon To show the icon in the system tray select the E item Disable Adapter This function is for you to disable or enable the adapter Windows Zero Config To configure the adapter from Windows XP Zero Configuration check the item Radio Off This function is for you to turn off or turn on the radio of the adapter If the radio is turned off the adapter will not work 13 It is the status bar that displays the current status of the utility To close it please disable the Status Bar in the View item There are several tabs in the block for you to setup the function of the adapt
16. is computer s security status qu Allow 2 program through Windows Personalization a ma Change desktop background Customize colors Se Adjust screen resolution Network and Internet e View network status and tasks Set up file sharing E Clock Language and Region e FEE Change keyboards or other input methods e e e ol sauer art Change display language Printer Mouse Ease of Access Let Windows suggest settings Programs Optimize visual display E Uninstall a program IA PS Additional Options Recent Tasks Connect to a network Uninstall a prog ew hardware and d B Click Connect to a network under Network and Sharing Center CIO Control Panel Network cand paa au nA i 42 Search lt a Network and Sharing Cent and Maintenance View network status and tasks Cg nect to a network View network computers and cajan Add a device to the network Set up file sharing o trol Panel Ho se IM Change your homepage Manage browser add ons Delete browsing history and cookies Offline Files Encrypt your offline files Manage disk space used by your offline files Windows Firewall Clock Language and Region Turn Windows Firewall on or off Allow a program through Windows Firewall Ease of People Near Me Sign in or out of People Near Me Change People Near Me settings Additional Opi Sync Center Sync with other computers mobile devices or
17. items is missing contact your supplier as soon as possible 2 Installation Procedure Before you proceed with the installation please notice following descriptions Note1 The following installation was operated under Windows XP Procedures are similar for Windows Vista and Windows 7 Note2 If you have installed the Wireless PC Adapter driver amp utility before please uninstall the old version first You can install the Wireless Adapter by EZMAX Setup Wizard in the CD ROM including in the package The wizard is an easy and quick configuration tool for internet connection with series process When you start EZMAX Setup Wizard you will get the following welcome screen Please choose the language to start the configuration The wizard will guide you to finish your network connection We will English Nederlands Deutsch Francais Italiano Espa ol Portugu s Polski Cesky Magyar Pyccku Romana T rk e Slovensky 72 MPX Exit f www edimax com 3 Contact U If you lose the CD ROM or you prefer the traditional setup procedure please follow the instruction as following step in this quick installation guide I Install the Driver and Utility A Insert the Installation CD to your CD ROM Drive Execute the Setup exe program B Select Setup Language and click OK to proceed Choose Setup Language Select the lanquage for the installation from the choices below C Click Next to
18. lly established Click Close to start network connection E uy Connect to a network Successfully connected to VarioxNET Y Save this network Y Start this connection automatically 11 3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN PCI Express Adapter and monitor the link status and the statistics during the communication process The Configuration Utility appears as an icon on the system tray and desktop of Windows You can open it by double click on the icon Right click the icon in the system tray there are some items for you to operate the configuration utility e Open Config Utility Select Open Config Utility to open the configuration utility e About Select About to show the utility information Hide Select Hide to hide the utility in the system tray Quit Select Quit to quit the utility in the system tray Open Config Utility About Hide Quit In the System Tray In the System Tray Right click 3 1 Utility Overview There are several parts in the utility screen Please refer to the following table for the description Ae Refresh R Modei View Y About 4 MyComputer General Profile Available Netwou otstus Statistics Wi Fi Protect Setup Edimax 802 11n Status Associated Speed Tx 21 5 Mbps Rx 21 5 Mbps De Type Infrastructure Encryption None SSID Edimax S
19. network folders View sync results Resolve sync conflicts Recent Tasks nect to a netwo Uninstall O View hi C Click the access point you want to use if it s shown then click Connect Ww Y Connect to a network Select a network to connect to Show All Mi Unnamed Network Security enabled network Set up a connection or network Open Network and Sharing Center TN e e e UA a A D If it s an unnamed access point i e the SSID of this wireless access point is hidden you ll be prompted to input it s name and the name must be identical to the SSID setting of the wireless access point you re connecting to E Ly Connect to a network Type the network name SSID for the network Ask the person who set up this network to give you the name Network Name Home 10 E If the access point is protected by encryption method you have to input its security or passphrase here It must match the encryption setting on the access point E uy Connect to a network Type the network security key or passphrase for Home The person who setup the network can give you the key or passphrase Security key or passphrase E Display characters sz Ifyou have a USB flash drive with network settings for Home insert it now F If you can see this image the connection between your computer and wireless access point is successfu
20. ng PIN method or wait for a while push the button again Status Initial WPS y et Push Button Config PBC Cancel 2 When the connection between this wireless network card and access point is successfully established by WPS and the information about access point you connected to will be displayed General Profle Available Network Status Statistics WiFi Protect Setup Status Associated Speed Tx 150 Mbps Rx 300 Mbps Type Infrastructure Encryption AES SSID WPS6fed737ee2 SCOTT cy cio TMI ITT ee Network Address MAC Address 00 50 FC 61 21 01 IP Address 192 168 2 100 Subnet Mask 255 255 255 0 Gateway 192 168 2 1 ReNew IP ra C Windows Zero Config 26 4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter 1 What is the IEEE 802 11g standard 802 11g is the new IEEE standard for high speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2 4 GHz band 802 11g is quickly becoming the next mainstream wireless LAN technology for the home office and public networks 802 11g defines the use of the same OFDM modulation technique specified in IEEE 802 11a for the 5 GHz frequency band and applies it in the same 2 4 GHz frequency band as IEEE 802 11b The 802 11g standard requires backward compatibility with 802 11b The standard specifically calls for A Anew physical
21. ng message will appear on your computer click Yes to select a specific wireless access point or click No to start PIN method of WPS Wi Fi Protected Setup WPS J Do you want to select a specific AP 24 3 If you click Yes and the following message will appear on your computer please select the SSID of wireless access point that you wish to connect and click Select Wi Fi Protected Setup Select AP WPS AP Name WPS AP MAC AP 00 0E 2E 44 84 40 WPS6fed737ee2 00 1F 1F 1F 7E E2 4 Please wait while the install procedure is running and wait for few seconds to two minutes If a wireless access point with correct PIN code is found you ll be connected to that access point Wi Fi Protected Setup PIN method Wi Fi Protected Setup PIN method Please enter the following PIN code into your AP PIN Code 98753420 Status Initial WPS _ _ _ _ _ i Cancel 25 II Push Button Config PBC 1 Start PBC pairing procedure at access point side please refer to the instruction given by your access point s manufacturer then click PBC button in wireless configuration utility to start to establish wireless connection by WPS Please be patient This may require several seconds to one minute to complete Wi Fi Protected Setup PBC method Wi Fi Protected Setup PBC method If there is more then one AP on the PBC mode there will be Session Overlap Please usi
22. nication WEP Key can be ASCII format Alphanumeric values or signs are allowed to be the WEP key It is more recognizable for user It is a text string with a maximum of 32 alphanumeric characters for example Test The WEP Key is based upon the Passphrase determined by you This passphrase may not work with other vendors products due to possible incompatibility with other vendors passphrase generators You must use the same passphrase or WEP key settings for all wireless computers within the network When you select the WEP and PASSPHRASE and this function will display in the current status of the utility The keys are used to encrypt data transmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex values as the encryption keys For example 0123456aef 128 bit Input 26 digit Hex values as the encryption keys For example 012345678901 23456789abcdef Select one of the four keys to be the data encryption key Please enter network security key here to make sure the password is correct 20 Parameter Confirm Network Key EAP Type Tunnel Username Identity Password Certificate Description Please enter network security key here again GTC GTC is an authentication protocol which allows the exchange of clear text authentication credentials across the network TLS TLS is the most secure of the EAP protocols but
23. not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a certificate to the client After validating the server s certificate the client presents a client certificate to the server for validation LEAP LEAP is a pre EAP Cisco proprietary protocol with many of the features of EAP protocols Cisco controls the ability of other vendors to implement this protocol so it should be selected for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you have to enter the user name and password of your computer PEAP amp TTLS PEAP and TTLS are similar and easier than TLS in that they specify a stand alone authentication protocol be used within an encrypted tunnel TTLS supports any protocol within its tunnel including CHAP MSCHAP MSCHAPv2 and PAP PEAP specifies that an EAP compliant authentication protocol must be used this adaptor supports MD5 TLS GTC Generic Token Card and MSCHAPv2 The client certificate is optional required for the authentication Includes MD5 GTC TLS MSCHAP v2 The certificate username in the RADIUS server User s identity in the RADIUS server User s password in the RADIUS server Select the certificate for RADIUS server authentication 21 3 5 Status This screen shows the information of manufacturer driver version settings of the wireless
24. other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS 29 EDIMAX NETWORKING PEOPLE TOGETHER EDIMAX Technology Co Ltd waw edimax com
25. pports multi media data bandwidth requirement Support 64 128 bit WEP Data Encryption WPA WPA2 Automatic fallback increases data security and reliability Supports the most popular operating system Windows XP Vista 7 and Linux Supports PCI Express interface 1 2 Specifications Standard IEEE 802 11b g n Interface PCI Express Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Data Rate 11b 1 2 5 5 11Mbps 11g 6 9 12 24 36 48 54Mbps 11n 20MHz MCSO 7 up to 72 144Mbps 11n 40MHz MCSO 7 up to 150 300Mbps Security 64 128 bit WEP Data Encryption WPA WPA2 Antenna Integrated with 3dBi Antennas Drivers Windows XP Vista 7 and Linux Temperature Operating 32 104 F 0 40 C Storage 13 149 F 25 65 C Humidity Max 95 NonCondensing Certification FCC CE 1 Antennas 3dBi detachable antenna is enclosed with the PCI card Please secure the antenna to Reverse SMA connector of the card 2 Link and Tx Rx LED Definitions LED Name Light Status Description Link On Link to a wireless access point Off Radio is switched to off Tx Rx Blinking Transferring receiving data Off No wireless activity 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items e One EW 7612PIn Adapter e 3dBi Antennas e One CD Driver Utility User s Manual e One Quick Guide If any of the above
26. stem tray and desktop of Windows You can open it by double click on the icon A To start configuring the adapter double click the icon in the system tray or right click the icon and select open configuration utility ARTE B The utility of the adapter is displayed Click Available Network and double click on the wireless access point you want to connect to Refresh R Mode M View Y About A General Profile Available Network Stetus Statistics Wi Fi Protect Setup Available Network s 1 wePresent_820 WEP Unknown Infrastru Per AES WPA2 Pre Shared Key Infrastru D KEN1 TKIP WPA Pre Shared Key Infrastru Dedmax Unknown Infrastru T MEETING_ROOM_ Unknown Infrastru Unknown Infrastru Unknown Infrastru WPA Pre Shared Key Infrastru Unknown Infrastru WPA2 Pre Shared Key Infrastru C Input the security setting and click OK to start network connection Wireless Network Properties Use Windows Zero Configuration on Windows Vista A For Windows Vista user you can use Windows Zero Configuration to connect to wireless access point Click Start button then click Control Panel Click Network and Internet in Control Panel 4 III System and Maintenance Rg User Accounts and Family Get started with Windows Safety Back up your computer Set up parental controls for any user Add or remove user accounts Security Check for updates Appearance and Check th
27. ter It displays the encryption setting of the current connection including None WEP TKIP or AES The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs It indicates the wireless signal strength It indicates the wireless link quality It shows the MAC IP address and other information of the adapter 3 4 Profile The Profiles List is for you to manage the networks you connect to frequently You are able to Add Remove Edit Duplicate Set Default to manage a profile Refresh R Mode QM View About A General Profile Available Network Status Statistics Wi Fi Protect Setup Available Profile s Profile Name Edimax Duplicate Set Default Show Tray Icon O Radio Off Ready Parameter Description Available Profile s This list shows the preferred networks for the wireless connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Button Click these buttons to add delete edit the selected profiles Duplicate If you like to build up the new profile with the same settings as the current profile then you can select this feature Set Default To designate a profile as the default network for the connection from the available profiles list click the button 3 4 1 Configure the Profile Wireless Network Properties
28. y to operate equipment Federal Communication Commission FCC Radiation Exposure Statement This EUT is compliance with SAR for general population uncontrolled exposure limits in ANSI IEEE C95 1 1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C The equipment version marketed in US is restricted to usage of the channels 1 11 only R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France Germany Greece Ireland Italy Luxembourg the Netherlands Portugal Spa

Download Pdf Manuals

image

Related Search

Related Contents

none NRV7-300-45 Instructions / Assembly  Kettler PASO 309 User's Manual  Philips QC5530 Hair Clippers User Manual  F3C30 Series User Manual  USER`S MANUAL  可視光源 取扱説明書 FVI-01  Samsung Samsung E1272 User Manual  

Copyright © All rights reserved.
Failed to retrieve file