ASUSTeK Computer USBN11 Wireless LAN USB Adapter User Manual 20080303 XN 791 UsserManual

ASUSTeK Computer Inc Wireless LAN USB Adapter 20080303 XN 791 UsserManual

User Manual

1
WWiirreelleessss NN UUSSBB AAddaapptteerr
Model: USB-N11
Users Manual
2
Federal Communications Commission (FCC)
Interference Statement
This device, IEEE 802.11n Wireless LAN USB Adapter, complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
This device may not cause harmful interference.
This device must accept any interference received; including interference that may cause
undesired operation.
This Equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
4. Consult the dealer or an experienced radio/TV technician for help.
Warning: Changes or modifications to this unit not expressly approved by the party
responsible for compliance could void the user authority to operate the equipment.
Trade name
Model number
Caution:
1. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment, under 47 CFR 2.1093 paragraph (d)(2).
2. This Transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
3
The product name has been tested to the FCC exposure requirements (Specific Absorption
Rate)
CE Statement:
Hereby, Asustek Computer Inc., declares that this device is in compliance with the essential
requirements and other relevant provisions of the R&TTE Directive 1999/5/EC.
This device will be sold in the following EEA countries: Austria, Italy, Belgium, Liechtenstein,
Denmark, Luxembourg, Finland, Netherlands, France, Norway, Germany, Portugal, Greece,
Spain, Iceland, Sweden, Ireland, United Kingdom, Cyprus, Czech Republic, Estonia, Hungary,
Latvia, Lithuania, Malta, Slovakia, Poland, Slovenia, Bulgaria, Romania.
依據 低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更
頻率、加大功率或變更原設計之特性及功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應
立即停用,並改善至無干擾時方得繼續使用。前項合法通信,指依電信規定作業之無線電信。低
功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
4
Technical Support
The software version of the IEEE 802.11n Wireless LAN USB Adapter is displayed on the utility
About window. Users could download the most recent software version from the supplier’s web
site or refer to the selling contact for the latest software information. If you have difficulty solving
the problem while installing or using the IEEE 802.11n Wireless LAN USB Adapter, please
contact the supplier for support.
About This Manual
IEEE 802.11n Wireless LAN USB Adapter User’s Manual is first published on March 2008. This
manual is intended for people who want to configure the IEEE 802.11n Wireless LAN USB
Adapter under Windows Vista, Windows XP, and Windows 2000. You should have at least a
basic knowledge of TCP/IP networking concepts and topology.
5
Table of Contents
Technical Support ......................................................................................................................4
About This Manual .....................................................................................................................4
Table of Contents .......................................................................................................................5
Chapter 1 Preface ....................................................................................................................6
1.1 About your IEEE 802.11n Wireless LAN USB Adapter .....................................................6
1.2 Features and Benefits.......................................................................................................6
1.3 Applications.......................................................................................................................7
1.4 Product Kit ........................................................................................................................8
1.5 IEEE 802.11n Wireless LAN USB Adapter LED Indicators ...............................................8
Chapter 2 Getting Started........................................................................................................9
2.1 Installation Requirements..................................................................................................9
2.2 Installation.........................................................................................................................9
2.2.1 Install IEEE 802.11n Wireless LAN USB Adapter for Windows Vista....................10
2.2.2 Install IEEE 802.11n Wireless LAN USB Adapter for Windows XP/2000 ..............15
Chapter 3 Wireless LAN Network .........................................................................................23
3.1 Wireless LAN Overview ..................................................................................................23
3.1.1 SSID......................................................................................................................23
3.1.2 Channel.................................................................................................................23
3.1.3 Transmit Rate (Tx Rate)........................................................................................23
3.2 Wireless LAN Security Overview.....................................................................................24
3.2.1 Data Encryption with WEP....................................................................................25
3.2.2 IEEE 802.1x..........................................................................................................26
3.2.3 WPA (2).................................................................................................................26
3.3 Authentication Type ........................................................................................................32
3.3 Wi-Fi Protected Setup (WPS)..........................................................................................33
Chapter 4 Configure by Wireless Utility...............................................................................34
4.1 Use the Wireless LAN Utility ...........................................................................................34
4.2 Establish WPS Connection .............................................................................................43
Chapter 5 Management with Wireless Zero Configuration ................................................50
5.1 Windows XP Wireless Zero Configuration ......................................................................50
5.2 Windows Vista WLAN AutoConfig...................................................................................52
Limited Warranty ......................................................................................................................54
6
Chapter 1 Preface
This chapter introduces the IEEE 802.11n Wireless LAN USB Adapter and prepares you to use
your wireless adapter.
1.1 About your IEEE 802.11n Wireless LAN USB Adapter
The IEEE 802.11n Wireless LAN USB Adapter is a standard USB adapter that fits into any
standard USB 2.0 and 1.1 slots in a notebook computer. It’s IEEE 802.11n draft 2.0 compliant
device that support up to 300Mbps rate gives equivalent Ethernet speed to access corporate
network or the Internet in a wireless environment. When installed, IEEE 802.11n Wireless LAN
USB Adapter is able to communicate with any 802.11b/g/n compliant products.
1.2 Features and Benefits
9 Automatic rate selection.
9 Support 802.11b/g/n solution in 2.4GHz frequency band.
9 Greater flexibility to locate or move networked PCs.
9 Wireless connection without the cost of cabling.
9 Easy to install and user friendly, just Plug and Play.
9 Low power consumption.
9 With build-in antenna.
9 Security Capable: WEP, WPA, WPA2 supported.
9 Driver supports for Windows 2000, Windows XP and Vista.
9 Utility supports for Windows 2000, Windows XP, and Vista.
7
1.3 Applications
The IEEE 802.11n Wireless LAN USB Adapter offers a fast, reliable, cost-effective solution for
wireless client access to the network in applications like these:
9 Remote access to corporate network information
E-mail, file transfer and terminal emulation.
9 Difficult-to-wire environments
Historical or old buildings, asbestos installations, and open area where wiring is difficult to
deploy.
9 Frequently changing environments
Retailers, manufacturers and those who frequently rearrange the workplace and change
location.
9 Temporary LANs for special projects or peak time
- Trade shows, exhibitions and construction sites where a temporary network will be practical.
- Retailers, airline and shipping companies need additional workstations during peak period.
- Auditors requiring workgroups at customer sites.
9 Access to database for mobile workers
Doctors, nurses, retailers, accessing their database while being mobile in the hospital, retail
store or office campus.
9 SOHO (Small Office and Home Office) users
SOHO users need easy and quick installation of a small computer network.
9 High security connection
The secure wireless network can be installed quickly and provide flexibility.
8
1.4 Product Kit
IEEE 802.11n Wireless LAN USB Adapter comes with the following items. Please go through
each item below. If any of listed items appears to be damaged or missing, please contact your
local dealer.
z IEEE 802.11n Wireless LAN USB Adapter……………………… x 1
z Software and Documentation CD …………………………...….... x 1
1.5 IEEE 802.11n Wireless LAN USB Adapter LED Indicators
The IEEE 802.11n Wireless LAN USB Adapter has one LED indicators. The behavior of the
indicators is described as below:
Link LED
Off – Power off
Solid Green – Associate with the Access Point or Ad-Hoc wireless workstation
Blinking Green – Indicate the device is transmitting data through the Access Point or Ad-Hoc
wireless workstation. When the PBC button is pressed, the LED will blink to indicate WPS
status.
9
Chapter 2 Getting Started
This chapter describes the instructions that guide you through the proper installation of your
IEEE802.11n Wireless LAN USB Adapter for the Windows Vista/XP/2000 operating systems.
2.1 Installation Requirements
Before installation, make sure you have computer with following:
9 A minimum of 5MB available hard disk space.
9 A minimum of 32 MB RAM
9 A computer equipped with USB slot, and socket services compliant with revision 1.1 or 2.0 of
USB specification.
9 A CD-ROM drive.
9 Windows Vista/XP/2000.
2.2 Installation
This section describes the installation of the IEEE 802.11n Wireless LAN USB Adapter software
for the Windows 2000/XP and Windows Vista. The installation procedures for Windows Vista refer
to 2.2.1 Install IEEE 802.11n Wireless LAN USB Adapter for Windows Vista; for Windows
XP/2000 please see 2.2.2 Install IEEE 802.11n Wireless LAN USB Adapter for Windows
XP/2000.
10
2.2.1 Install IEEE 802.11n Wireless LAN USB Adapter for Windows Vista
Step 1: Insert the included CD into the CD-ROM driver on your computer. Locate and
double-click setup.exe.
Step 2: The following screen displays. Click Next.
Step 3: Click Next to accept installing IEEE 802.11n Wireless LAN USB Adapter driver files.
11
Step 4: Click Next to accept the default file location or click Browse to select an alternate folder.
Step 5: Select a program folder or type a new folder name and click Next.
12
Step 6: You may add a shortcut in the startup folder as desired and click Next.
Step 7: The windows will appear the message about the windows can’t verify the publisher of
this driver software compatibility with Windows Vista. Select Install this driver software anyway
to continue installing
13
Step 8: Click on Finish to complete the installation.
Step 9: Insert the IEEE802.11n Wireless LAN USB Adapter into the USB port on your notebook,
and the Windows will auto-install the IEEE802.11n Wireless LAN USB Adapter driver and utility.
14
After the driver installed completed, the bellowing information will appear in the system tray.
Click the icon, to configure the wireless LAN adapter via utility. To use the utility, please refer
to Chapter 4.
15
2.2.2 Install IEEE 802.11n Wireless LAN USB Adapter for Windows XP/2000
Step 1: Insert the included CD into the CD-ROM driver on your computer. Locate and
double-click setup.exe.
Step 2: The following screen displays. Click Next.
16
Step 3: Click Next to accept installing IEEE 802.11n Wireless LAN USB Adapter driver files.
Step 4: Click Next to accept the default file location or click Browse to select an alternate folder.
17
Step 5: Select a program folder or type a new folder name and click Next.
Step 6: You may add a shortcut in the startup folder as desired and click Next.
18
Step 7: Click on Finish to complete the installation.
Step 8: Locate an available USB port on the computer and insert the IEEE 802.11n Wireless
LAN USB Adapter into the USB port.
Step 9: After inserting USB Adapter into the USB port on your computer, Windows will
auto-detect new hardware and will display a “Found New Hardware Wizard” window. Select
Install the software automatically (Recommended)” and press Next to install the driver.
19
Step 10: The windows will appear the message about the Network Control has not passed
Windows Logo testing to verify its compatibility with Windows XP. Click on Continue Anyway
button to continue installing.
20
Step 11: The windows will find 802.11n Wireless LAN USB Adapter and start copying
corresponding files into the system. Click on Next to continue.
Step 12: Click Finish to complete the installation.
21
After you install the driver and utility and insert your wireless USB adapter, the icon appears
in the system tray.
If the icon is blue and/or you see the following icon on your desktop, you’re already
connected to a wireless network.
Upon completion, clicking on the icon will open the configuration window. When you minimize the
window, the system tray icon will be loaded in the System Tray again.
22
The color behind the system tray icon indicates the link status. Refer to the following table for
details.
Color Description
A good or excellent link status.
Not connected to a wireless network or is searching for an available wireless
network.
Note for Windows XP users
If you want to use WZC, either to disable the wireless network utility (if you already install it) or just
install the driver.
To install the driver only
1. Slide the IEEE 802.11n Wireless LAN USB Adapter into an available USB port.
2. The Found New Hardware Wizard window appears. (In Windows XP SP2, select No, not
this time and click Next.)
3. Select Install from a list of specific location (Advanced) and click Next.
4. Insert the included CD into your CD-ROM drive, select Search removable media (floppy,
CD-ROM…) and then click Next.
5. Click Finish in the last wizard screen to complete the installation.
23
Chapter 3 Wireless LAN Network
This chapter provides background information on wireless LAN network.
3.1 Wireless LAN Overview
This section describes applications of IEEE 802.11n Wireless LAN USB Adapter.
3.1.1 SSID
The SSID is the unique ID used by Access Points and stations to identify a wireless Network.
Wireless clients associating to any Access Point must have the same SSID. The default setting is
ANY, which allows your IEEE 802.11n Wireless Network USB Adapter to automatically associate
to any Access Point (Infrastructure mode) in the vicinity of your wireless adapter. The ESS ID can
be set up to 32 characters and is case sensitive.
3.1.2 Channel
A radio frequency used by a wireless device is called a channel.
3.1.3 Transmit Rate (Tx Rate)
The IEEE 802.11n Wireless Network USB Adapter support various transmit (data) rate. It includes
Auto, 1 or 2 Mbps, 5.5 Mbps, 11 Mbps and up to 300Mbps. In most networking scenarios, the
factory default “Auto” setting proves the most efficient. This setting allows your IEEE 802.11n
Wireless Network USB Adapter to operate at the maximum transmit (data) rate. When the
communications quality drops below a certain level, the Wireless Network USB Adapter will
automatically switch to a lower data rate. Transmission at lower data speed is usually more
reliable. However, when the communications quality improves again, the Wireless Network USB
Adapter will gradually increase the transmit (data) rate again until it reaches the highest available
transmit rate.
Note: Actual speeds attained also depend on the distance from the AP, noise, etc.
24
3.2 Wireless LAN Security Overview
Wireless LAN security is vital to your network to protect wireless communications against hacker
entering your system and prevent unauthorized wireless station from accessing data transmitted
over the network; the WLAN Utility offers a sophisticated security algorithm.
Configure the wireless LAN security by clicking the check box next to Security Enable. A privacy
Configuration window will appear.
If you do not enable any wireless security on your IEEE 802.11n Wireless LAN USB Adapter, the
wireless communication is accessible to any wireless networking device that is in the coverage
area.
25
3.2.1 Data Encryption with WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the
wireless LAN adapter and the AP or other wireless station to keep network communication
private.
Both the wireless stations and the access points must use the same WEP key for data encryption
and decryption.
The IEEE 802.11n Wireless LAN USB Adapter allows you to configure up to four 64-bit, or 128-bit
WEP keys and only one key is used as the default key at one time. The Key index field allows
you to specify the key index you desire to use for transmitting data on your wireless LAN. You can
change the default key by clicking on the up or down arrow and make sure the default key is set
up exactly the same on the Wireless LAN stations as they are on the wireless Access Point.
For 64bit encryption you may choose:
Alphanumeric: entering 5 characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9”
(e.g. MyKey).
Hexadecimal: entering 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (e.g.
11AA22BB33, showed as below).
For 128bit encryption you may choose:
Alphanumeric: entering 13 characters (case sensitive) ranging from “a-z”, “A-Z” and
“0-9” (e.g. MyKey12345678).
Hexadecimal: entering 26 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (e.g.
00112233445566778899AABBCC).
26
3.2.2 IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using an external
RADIUS server.
3.2.2.1 EAP Authentication
EAP (Extensible Authentication Protocol) is an authentication protocol which runs on the top of
IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, an Access Point helps a wireless
station and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server and an intermediary AP that
supports IEEE 802.1X. You must first have a wired connection to the network and obtain the
certificate from a certificate authority (CA). A certificate can be used to authenticate users and a
CA issues certificates and guarantees the identity of each certificate owner.
3.2.3 WPA (2)
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 is a wireless
security standard that defines stronger encryption, authentication and key management than
WPA.
WPA: Allows you to gain access to a more secured wireless network that requires mutual
authentication between client and access point with a Radius authentication server or other
authentication server on the network. WPA uses 802.1X and Extensible Authentication Protocol
(EAP) for authentication. WPA offers Enterprise and individual needs to meet the different market
segments. This product supports various EAP types (TLS and PEAP), which require different
credential authentication. In order to access the wireless network, you must select EAP type your
service provider supplied in the section of IEEE802.11X Authentication. Choose WPA2 if
needed from Authentication Mode.
27
WPA-PSK: WPA offers a Personal mode of operation. In the Personal mode of operation, a
pre-shared key is used for authentication. WPA-PSK allows you to gain access to a secured
wireless network that the station and the access point use the same pre-shared key to
authenticate. You must type a mixture of numbers and letters in the Pre-shared key section of
this menu. You may input either 8-63 ASCII characters or 64 HEX characters. Choose WPA-PSK
if needed from Authentication Mode.
28
WPA2: WPA2 provides a stronger encryption mechanism than WPA. WPA2 is the second
generation of WPA security, providing personal and enterprise users with a high level of
assurance that only authorized users can access to their wireless network. There is no difference
between WPA and WPA2. The only difference is that WPA2 provides a stronger data encryption
via the AES, contrast to WPA, which uses Temporal Key Integrity Protocol (TKIP). Choose WPA2
if needed from Authentication Mode.
WPA2-PSK: Like WPA, WPA2-Personal offers authentication via a pre-shared key. Pre-shared
key is usually used for Personal authentication. Personal mode requires only an access point and
client on the network. Similarly, you need to type a mixture of numbers and letters in the
Pre-shared key section of this menu. You may input either 8-63 ASCII characters or 64 HEX
characters. Choose WPA2-PSK if needed from Authentication Mode.
29
3.2.3.1 Encryption Mode
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message
Integrity Check (MIC) and IEEE 802.1X. WPA2 use Advanced Encryption Standard (AES) in the
Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer
stronger encryption than TKIP.
The encryption mechanism used for WPA(2) and WPA(2)-PSK are the same. The only difference
between them is that WPA(2)-PSK uses a simple common password, instead of user specific
credentials. The common password approach makes WPA(2)-PSK susceptible to brute-force
password-guessing attacks but it’s still an improvement over WEP as it employs a consistent,
single, alphanumeric password to derive a PMK which is used to generate unique temporal
encryption keys.
3.2.3.2 IEEE 802.1X Authentication
WPA and WPA2 apply IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate
wireless stations using an external RADIUS database. WPA2 reduces the number of key
exchange messages from six to four (CCMP 4 way handshake) and shortens the time required to
connect to a network. Other WPA2 authentication features that are different from WPA include key
caching and pre-authentication.
30
After you select the EAP type, you need to click Certification Tab to make advanced setting. The
following describes configuration of each available EAP type.
TLS: Clicking the Certification tab for TLS shows the following menu.
TLS requires the entry of Certificate Information and Login Information for mutual authentication.
This utility will auto-detect the Certificate Information for you to configure TLS easily. You only
need to enter the Login Name in the Login information filed to authenticate. If you desire to use
the Server Certificate manually, you can click the check box next to “Verify Server Certificate”
and choose the usable selection in the User Certificate field using drop-down menu.
User Certificated: select one of user certificates you have enrolled.
TLS is used to create a secure tunnel through which authentication and encryption keys can be
passed and require server and client side keys. To save the information you entered in the
appropriate field, click the OK button. Otherwise, click the Cancel button to close the menu. If you
want to return to select other EAP type, click the Security tab.
PEAP: Clicking the Certification tab for PEAP displays the following menu.
31
PEAP requires the use of Certificate Information and User Information. This utility will
automatically identify Certificate Information and Login Information for users to configure PEAP
easily. You only need to enter User Name and Password in the User information filed to
authenticate. If you click the “Verify Server Certificate” check box, you are able to choose one of
User Certificate from the drop-down menu. Furthermore, you need to input User Name and
Password in the User Name field on the screen.
To save the information you entered in the appropriate field, click the button or
button. Otherwise, click the button to close the menu. If you want to
return to select other EAP type, click the tab.
32
TTLS: Clicking the Certification tab for TTLS shows the following menu.
TTLS requires the mutual authentication between station and access points. You must present a
User Name and Password in the User Information field that will be verified by TTLS-capable
server. This mutual authentication ensures that only authorized users are allowed access to the
network.
3.3 Authentication Type
The IEEE 802.11b/g standard describes a simple authentication method between the wireless
stations and AP. Two authentication types are defined: Open system mode and a Shared key
mode.
z Open system mode is implemented for ease-of-use and when security is not an issue. It
requires NO authentication, since it allows any device to join a network without performing
any security check. The wireless station and the AP do not share a secret key. Thus the
wireless stations can associate with any AP and listen to any data transmitted plaintext.
z Shared key mode involves a shared secret key to authenticate the wireless station to the AP. It
requires that the station and the access point use the same WEP key to authenticate. This
basically means that WEP must be enabled and configured on both the AP and the other
wireless stations with a same key. Shows as below:
33
3.3 Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS) is a standard for easy and secure establishment of a wireless home
network, defined by the Wi-Fi Alliance. The goal of the WPS is to simplify the process of
connecting any home device to the wireless network.
The WPS protocol defines two types of devices in a network:
z Registrar: A device with the authority to issue the credentials to enroll new clients on the
network. A Registrar may be integrated into an AP, or it may be separate from the AP.
z Enrollee: A device seeking to join a wireless LAN network.
The WPS gives users a variety of setup options. It uses PBC (Push Button Configuration) and
PIN (Personal Identification Number) to enable user to automatically configure network names
and strong data encryption and authentication.
For the PBC mode, the Access Point and the wireless client just simply push a hardware button or
software button. After pushing Access Point WPS button, the client must push software button
within 2 minutes.
For the PIN mode, input the same PIN number for the Access Point and for the wireless client.
After the connection is made successfully, the wireless client will be able to receive the data from
the Access Point such as SSID, wireless security, and etc.
34
Chapter 4 Configure by Wireless Utility
This chapter provides more detail introduce for using the utility to configure the wireless adapter.
4.1 Use the Wireless LAN Utility
The WLAN Utility enables you to make configuration changes and perform user-level diagnostics
on your IEEE802.11n Wireless LAN USB Adapter in the Windows Vista/XP/2000 operating
system environments. The WLAN Utility consists of window with 5 items for you to monitor and
configure the IEEE802.11n Wireless LAN USB Adapter: Connection, profiles, Link Test, Site
Survey and About.
Connection
The Connection item allows you to monitor the current status and quality of your connection to
the wireless network. When you click on this tab, the following screen will display.
Status: Shows the MAC address and the network type of Profile with which you are associated.
SSID: The SSID is the unique ID used by Access Points and stations to identify a wireless LAN.
Wireless clients associating to any Access Point must have the same SSID. The default setting is
ANY, which allows your Wireless USB Adapter to automatically associate to any Access Point
(Infrastructure mode) in the vicinity of your wireless adapter. The SSID can be set up to 32
35
characters and is case sensitive.
Channel: Shows the channel on which the connection is made.
Elapsed time: Shows the elapsed time of the current association.
Auth Mode: Shows the authentication mode of the connected Access Point.
Encryption Mode: Shows the current wireless network encryption mode.
Signal Strength: Based on the received signal strength measurement of the baseband
processor of the Beacon signal. There are 5 states of signal strength:
There is one button to choose from. Clicking on the to let you monitor the more
current status of your connection. To close the menu, click .
Profile
The Profiles item allows you to add a new profile or to set values for all parameters by editing a
previously defined profile. Clicking this tab displays the following screen:
36
Press to create a new profile, and configure all the parameters following the steps
below.
Step1. Input the Profile Name, Network (SSID), and select Network type
(Infrastructure/Adhoc) when Add a profile progress start.
37
Step2. To protect against hacker entering your system and prevent unauthorized wireless station
from accessing data transmitted over the network, the WLAN Utility offers a sophisticated security
algorithm. To activate security enable, click the check box next to Security Enable. A Privacy
Configuration window will then appear.
Note: Privacy Configuration consists of specifying Security and Certification. Refer to
Chapter 3 for how to configure security settings.
Step3. Setup the TCP/IP settings. When you check the box, you can choose to obtain the IP
address from the DHCP server on your network automatically. Or you can specify IP address
manually but it must be an unique IP address to your network.
38
Step4. The WLAN Utility also offers the advanced configuration for user to set the IEEE 802.11n
Wireless LAN USB Adapter under certain network environment. These advanced options include
Power Save Mode, Wireless Mode, Adhoc Channel, RTS Threshold, and Fragmentation
Threshold.
Note: Under Vista OS, these parameters are not allowed to be configures the parameters.
39
Wireless Mode
The wireless Mode supports three options 802.11B, 802.11B/G, and 802.11B/G/N.
Power Saving Mode
The Power Save option is designed to conserve battery life of you computer. When Power Save
is enabled, your IEEE 802.11n Wireless LAN USB Adapter will go into sleep mode to minimize
power consumption.
Note: When power saving mode is enabled, the Access Points you use need to
support power saving as well so that the communication can be established.
RTS Threshold
RTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. If the
“Hidden Node” problem is an issue, please specify the packet size. The RTS mechanism will be
activated if the data size exceeds the value you set. It is highly recommended that you set the
value ranging from 0 to 2347. The default value is 2347, that means disable RTS mechanism. If
you set to 0, that means always enable RTS mechanism.
40
Note: Enabling RTS Threshold would cause redundant network overhead that could
negatively affect the throughput performance instead of providing a remedy.
Fragament Threshold
Fragmentation mechanism is used for improving the efficiency when high traffic flows along in
the wireless network. If your IEEE 802.11n Wireless LAN USB Adapter often transmits large
files in the wireless network. The range is from 256 to 2346, and the default value is 2346.
Step5. This Confirm Infromation menu allows you to double-check the changes you made. To
apply any changes you made, click on the button. Otherwise, click on the
button to close this menu. If you want to return to select other security type, click on the
button.
41
Link Test:
The Link Test menu provides a suite of tests which you can run to identify the connection
between your computer and the wireless network.
Enter the IP Address of Access Point which you desire to connect. The settings following the
address allow you to setup the number and size of packets being transmitted between your
computer and the wireless network. Furthermore, clicking the check box Continuous Linktest
ignores number of packets you set. On the bottom of this menu provides current and cumulative
counters of the activity on your wireless network. The counters of packets turn to 0 once you click
on the Start button.
Use the Site Survey function to scan available wireless Access Points on your network. You
may click on the Rescan button to enforce the utility to scan Access Points around the
environment. Besides showing the ESSID of each Access Point, it also displays wireless network
mode and signal strength. To join any of the displayed Access Points, highlight the Access Point
you desire to connect and then click Join.
42
By pressing the icon you may see more information of Access Points such as
ESSID, Channel, Network Type, BSSID, Security, Signal, and Supported Rates. Click OK to close
the menu.
43
About:
The About item displays related version numbers of the Wireless LAN Utility, and driver, firmware
of the IEEE 802.11n Wireless LAN USB Adapter. Also, the MAC address and frequency domain
are displayed.
4.2 Establish WPS Connection
The IEEE 802.11n Wireless LAN USB Card supports WPS (Wi-Fi Protected-Setup) feature
defined by the Wi-Fi Alliance. It’s a new protocol for configuring a wireless network more easily,
and secure. The IEEE 802.11n Wireless LAN USB Card supports two modes of WPS protocol,
Enrollee mode (Join a WPS WLAN) and Registrar mode (Configure WPS AP).
To setup the WPS, please follow the steps below.
44
Step1. Go to profile setup page and click the button.
Or, right click on utility icon in the system tray and select “WPS (Wi-Fi Simple Config)”.
Step2. Select the WPS mode to link or manage the WPS-enabled AP you want to connect.
45
If your 802.11n Wireless LAN USB Card performs as enrollee, choose Join a WLAN (Enrollee)
and click on Next. You will have two methods to join a WPS-enabled AP.
Push Button on AP: Push the button on the Access Point and then click on the client
utility to start WPS link within 2 minutes. If WPS link is established successful, it will display the
success message.
Instead of Push Button on AP, you may use USB-N11’s hardware push button to establish WPS link
as well. Push the button on the Access Point and press PBC button on the client to start WPS
link within 2 minutes. If WPS link is established successful, it will display the success message
figured below.
Client’s PIN Mode: Select PIN and then the PIN key field will generate a dynamic PIN code
automatically. Input the PIN key into the Access Point PIN key field, and apply change. Click
to start WPS link progress.
46
47
48
If it is necessary to have your 802.11n Wireless LAN USB Card perform as Registrar on your
network, select “Configure a WLAN (Registrar)” and click on Next. The following window will
show up.
The scan list will scan the WPS-enabled AP on your network within its coverage. Select the one
that you want to configure and input the AP pin generated by the AP in the Access Point PIN field.
Click Next to proceed to the next step.
49
Manage the network profile in order to configure the AP. Settings that can be managed include SSID,
Auth Mode, Encryption Mode and Network Key.
Click to start WPS link progress.
To check whether the setting of AP is modified corresponding with the profile, you may use scan
function to display AP information.
50
Chapter 5 Management with Wireless Zero
Configuration
This chapter shows you how to manager your IEEE 802.11n Wireless LAN USB Adapter using
the Windows Vista and Windows XP wireless zero configuration tool.
5.1 Windows XP Wireless Zero Configuration
Step 1: Make sure the Use Windows to configure my wireless network settings check box is
selected in the Wireless Network Connection Properties.
Step 2: Double click the network icon for wireless connections in the system tray to open the
Wireless Network Connection Status screen.
Warning: You must choose one
way to configure Wireless LAN
USB Adapter either of using our
WLAN Utility by un-checking this
check box or using Windows XP
Automatic Wireless Network
Configuration first by checking
this check box.
51
Step 3: In the Wireless Network Connection Status screen, click View Wireless Networks to
open the Wireless Network Connection screen.
Step 4: Click Refresh network list to reload and search for available wireless devices within
transmission range. Select a wireless network in the list and click Connect to join the selected
wireless network.
52
5.2 Windows Vista WLAN AutoConfig
Step 1: Click the network icon for wireless connections in the system tray to open the Wireless
Network Connection Status screen.
Step 2: Select the Connect to a network to open the Connect to the network screen.
Step 3: Select a wireless network in the list and click Connect to join the selected wireless
network.
53
If the wireless security is activated for the selected wireless network, the related fields must be set
to the same security setting as the associated AP.
Step 4: Click Connect to connect the wireless network.
54
Limited Warranty
This Warranty constitutes the sole and exclusive remedy of any buyer or reseller’s equipment and
the sole and exclusive liability of the supplier in connection with the products and is in lieu of all
other warranties, express, implied or statutory, including, but not limited to, any implied warranty
of merchantability of fitness for a particular use and all other obligations or liabilities of the
supplier.
In no even will the supplier or any other party or person be liable to your or anyone else for any
damages, including lost profits, lost savings or other incidental or consequential damages, or
inability to use the software provided on the software media even if the supplier or the other party
person has been advised of the possibility of such damages.
The following are special terms applicable to your hardware warranty as well as services you may
use during part of the warranty period. Your formal Warranty Statement, including the warranty
applicable to our Wireless LAN products, appears in the Quick Installation Guide which
accompanies your products.
Duration of Hardware Warranty: One Year
Replacement, Repair or Refund Procedure for Hardware:
1. This product is design based on the 802.11n draft 2.0 standards, do not guarantee the
compatibility with the products that design by other vendors based on 802.11n draft or the
products that design accroding to the 802.11n formal standard that announce in the future.
2. The maximum performance defines based on 802.11g and 802.11n draft standard. The actual
throughput will be different because of using environment and conditions, including network
bandwidth, building materals, building structure, and wireless working range. These are
possible to reduce the wireless performance.
3. Don’t dismantle the housing of the device as your wish to avoid the product demage.
If your unit needs a repair or replacement, return it to your dealer/distributor in its original
packaging. When returning a defective product for Warranty, always include the following
documents:
The Warranty Repair Card
A copy of the invoice/proof of purchase, and
The RMA Report Form (To receive a Return Materials Authorization form (RMA), please
contact the party from whom you purchased the product).
Upon proof-of-purchase we shall, at its option, repair or replace the defective item at no cost to
the buyer.
55
This warranty is contingent upon proper use in the application for which the products are intended
and does not cover products which have been modified without the reseller’s approval or which
have been subjected to unusual physical or electrical demands or damaged in any way.
56
Please complete the information below and include it along with your products.
Name:
Title:
Company:
Telephone:
Fax:
Email:
City/State/Zip code:
Country:
Product Name:
Serial Number:
MAC Address:
Invoice Date:
Product Description:
If you have any further questions, please contact your local authorized reseller for support.

Navigation menu