Abocom Systems WU5508 802.11b/g/n 2T2R Wireless Mini USB User Manual WU5508 MNL English FOR only

Abocom Systems Inc 802.11b/g/n 2T2R Wireless Mini USB WU5508 MNL English FOR only

User Manual

Download: Abocom Systems WU5508 802.11b/g/n 2T2R Wireless Mini USB User Manual WU5508 MNL English  FOR             only
Mirror Download [FCC.gov]Abocom Systems WU5508 802.11b/g/n 2T2R Wireless Mini USB User Manual WU5508 MNL English  FOR             only
Document ID1329474
Application IDixq/Xsvtifvjh1zZNh9QKg==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize236.34kB (2954272 bits)
Date Submitted2010-08-19 00:00:00
Date Available2010-08-19 00:00:00
Creation Date2010-08-13 14:18:15
Producing SoftwarepdfFactory Pro 3.10 (Windows XP Professional Chinese)
Document Lastmod2010-08-16 14:51:12
Document TitleWU5508_MNL_English__FOR認證only_.doc
Document CreatorpdfFactory Pro www.ahasoft.com.tw/FinePrint
Document Author: lydia

802.11b/g/n 2T2R
Wireless Mini USB
WU5508
User’s Manual
Federal Communication Commission Interference
Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1
through 11.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
End users must follow the specific operating instructions for satisfying RF exposure compliance. To
maintain compliance with FCC RF exposure compliance requirements, please follow operation
instruction as documented in this manual.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
SAR compliance has been established in typical laptop computer(s) with USB slot, and product could be
used in typical laptop computer with USB slot. Other application like handheld PC or similar device has
not been verified and may not compliance with related RF exposure rule and such use shall be
prohibited.
CE Statement:
Hereby, AboCom, declares that this device is in compliance with the essential requirement and other
relevant provisions of the R&TTE Driective 1999/5/EC.
Table of Contents
CHAPTER 1: INTRODUCTION ........................................................1
FEATURES................................................................................................ 1
PHYSICAL DETAILS .................................................................................... 1
CHAPTER 2: INSTALLATION ..........................................................3
FOR WINDOWS 2000/XP .......................................................................... 3
Install Software............................................................................................................ 3
Install Hardware .......................................................................................................... 5
Verification ................................................................................................................... 5
FOR WINDOWS VISTA ............................................................................... 6
Install Software............................................................................................................ 6
Install Hardware .......................................................................................................... 8
Verification ................................................................................................................... 8
FOR WINDOWS 7...................................................................................... 9
Install Software............................................................................................................ 9
Install Hardware ........................................................................................................ 11
Verification ................................................................................................................. 11
CHAPTER 3: NETWORK CONNECTION...................................... 12
HOW TO MAKE A CONNECTION .................................................................. 12
HOW TO ADD A PROFILE .......................................................................... 14
CHAPTER 4: UTILITY CONFIGURATION .................................. 15
FOR WINDOWS 2000/XP ........................................................................ 15
Station Mode.............................................................................................................. 15
Switch to AP Mode..................................................................................................... 24
Soft AP mode ............................................................................................................. 25
FOR WINDOWS VISTA ............................................................................. 30
Station Mode.............................................................................................................. 30
Switch to AP Mode..................................................................................................... 39
Soft AP mode ............................................................................................................. 40
FOR WINDOWS 7.................................................................................... 45
Station Mode.............................................................................................................. 45
Switch to AP Mode..................................................................................................... 55
Soft AP mode ............................................................................................................. 56
CHAPTER 5: UNINSTALL ............................................................... 61
FOR WINDOWS 2000/XP ........................................................................ 61
FOR WINDOWS VISTA ............................................................................. 63
FOR WINDOWS 7.................................................................................... 65
Chapter 1:
Introduction
The 802.11b/g/n Wireless Mini USB brings the latest technology, 802.11n standard. Close to the price
of a wireless 11g dongle, Home/ SOHO users can enjoy download large file and multimedia by
300Mbps. Wireless security setup is friendly without configuring the utility. You only need to click the
WPS push-button once, then can set up a simple but safe wireless network. It can upgrade your desktop
or laptop to the next level and allows you to enjoy downloading, video streaming and online gaming at
the same time. It can not only provide you better internet experience but also backward compatible
with the existing 802.11b/g networks.
Features
Ø Support Wireless N standard and compatible with 11n standard.
Ø Backward compatible with IEEE 802.11 b/g network to ensure interoperability.
Ø Support WPS in SW and HW for easy wireless security setup.
Ø Support 802.11e, WMM for quality video and voice streaming over wireless connections.
Ø Support WMM-PS.
Ø Support WPA/PSK, WPA2/PSK high-level security.
Ø Transmit data rate up to 300 Mbps. Receive data rate up to 300 Mbps. (2T2R solution).
Physical Details
WPS button
To press the physical WPS button on the Wireless USB Adapter once,
then the LED will start to flash. Please make a connection with another
WPS supported device within 2 minutes.
LED
Off – Power off
Solid Green – When associate with the Access Point or Ad-Hoc wireless
workstation the LED will show solid green.
-1-
Blinking Green – Indicate the device is transmitting data through the
Access Point or Ad-Hoc wireless workstation. Also when the PBC button
is pressed, the LED will blink to indicate WPS status that the LED will
blink 2 seconds and off 2 seconds.
-2-
Chapter 2: Installation
For Windows 2000/XP
Install Software
Note:
Do not insert the Wireless USB Adapter into the computer until the
InstallShield Wizard finished installing.
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically. Please click Next to process the installation.
-3-
2. When prompt to the following message, please click Install to begin the installation.
3. When the following screen appears, click Finish to restart the computer to complete the software
installation.
-4-
Install Hardware
Note:
Insert the Wireless USB Adapter when finished software installation.
Insert the Wireless USB Adapter into the USB Port of the computer. The system will automatically
detect the new hardware.
Verification
To verify the device is active in the computer. Go to Start > Control Panel > System > Hardware>
Device Manager. Expand the Network adapters category. If the 802.11b/g/n 2T2R Wireless Mini
USB is listed here, it means that the device is properly installed and enabled.
-5-
For Windows Vista
Install Software
Note:
Do not insert the Wireless USB Adapter into the computer until the
InstallShield Wizard finished installing.
1.
Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically. Please click Next to process the installation.
-6-
2. When prompt to the following message, please click Install to begin the installation.
3.
When the following screen appears, click Finish to restart the computer to complete the software
installation.
-7-
Install Hardware
Note:
Insert the Wireless USB Adapter when finished software installation.
Insert the Wireless USB Adapter into the USB Port of the computer. The system will automatically
detect the new hardware.
Verification
To verify the device is active in the computer. Go to Start >Control Panel > Hardware and
Sound > Device Manager. Expand the Network adapters category. If the 802.11b/g/n 2T2R
Wireless Mini USB is listed here, it means that the device is properly installed and enabled.
-8-
For Windows 7
Install Software
Note:
Do not insert the Wireless USB Adapter into the computer until the
InstallShield Wizard finished installing.
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically. Please click Next to process the installation.
-9-
2. When prompt to the following message, please click Install to begin the installation
3.
When the following screen appears, click Finish to restart the computer to complete the software
installation.
- 10 -
Install Hardware
Note:
Insert the Wireless USB Adapter when finished software installation.
Insert the Wireless USB Adapter into the USB Port of the computer. The system will automatically
detect the new hardware.
Verification
To verify the device is active in the computer. Go to Start > Control Panel > Device Manager.
Expand the Network adapters category. If the 802.11b/g/n 2T2R Wireless Mini USB is listed here, it
means that the device is properly installed and enabled.
- 11 -
Chapter 3:
Network Connection
How to Make a Connection
To make a connection with an access point, please follow below steps. Here takes Windows XP OS for
example.
Step 1: After set up the Wireless USB Adapter successfully, please launch the Configuration
Utility. There are two ways to launch the utility by:
(1) Double clicking the Intelligent Wireless LAN Utility icon on the desktop.
(2) Or go to Start àAll Programs àIntelligent Wireless Utility à Intelligent Wireless LAN
Utility.
- 12 -
Step 2: Please go to the Available Network tab, the system will automatically scan access points
nearby, or click Refresh button to site survey again.
Step 3: Then, double click preferred access point or click Add to Profile button to make a
connection (if the access point has been set up security, please enter passwords and then click OK.)
- 13 -
How to Add a Profile
After launched Wireless LAN Utility and selected preferred access point, please click Add to Profile
button to enter Wireless Network Properties windows. If the access point has been set up security,
please enter passwords, and then click OK to save profile settings.
After finished above settings, please go to Profile tab to check the profile list (Available Profile(s)).
- 14 -
Chapter 4:
Utility Configuration
For Windows 2000/XP
Station Mode
l Show Tray Icon: Check to show the wireless adapter icon at the tray.
l Disable Adapter: Check this to disable the wireless adapter.
l Radio off: Check this to turn OFF radio function.
l Close: Click to leave the Intelligent 11n USB Wireless LAN Utility.
- 15 -
General
The General page displays the detail information of current connection.
General Tab
Status
Shows the current connected status. If there is no connection, it will show
Not Associated. If been connected, the system will show Associated.
When connecting, the system will show checking Status.
Speed
Shows the current transmitting rate and receiving rate.
Type
Network type in use, Infrastructure or Ad-Hoc.
Encryption
Shows the encryption type currently in use. Valid value includes WEP,
TKIP, AES, and Not Use.
SSID
Shows the connected access point network name.
Signal Strength
Shows the receiving signal strength.
Link Quality
Shows the connection quality based on signal strength.
MAC Address
The physical address of the Wireless USB Adapter.
IP Address
Shows the IP address information.
Subnet Mask
Shows the Subnet Mask information.
Gateway
Shows the default gateway IP address.
Renew IP
Click the Renew IP button to obtain IP address form the connected
gateway.
- 16 -
Profile
Profile can let users book keeping the favorite wireless setting among home, office, and other public
hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile
manager enables users to Add, Remove, Edit, Duplicate and Set Default profiles.
Profile Tab
Profile Name
Here shows a distinctive name of profile in this column.
SSID
The SSID is the unique name shared among all wireless access points in
the wireless network.
Add
Click Add button to add a profile from the drop-down screen.
- 17 -
Profile Name: Users can enter profile name at will.
Network Name (SSID): The SSID is the unique network name
(case-sensitive) shared among all wireless access points in the wireless
network. The name must be identical for all devices and wireless access
points attempting to connect to the same network.
This is a computer-to-computer (ad hoc) network; wireless access
points are not used: This function is selected to enable the ad hoc
network type that computers should be setup at the same channel to
communicate to each other directly without access point, users can share
files and printers between each PC and laptop. User can select channels
form the pull-down menu.
Wireless network security
Network Authentication: There are several types of authentication
modes including Open System, Shared Key, WPA-PSK, WPA2-PSK,
WPA 802.1X, WPA2 802.1X and WEP 802.1X.
Data encryption: For Open System, Shared Key and WEP 802.1X
authentication mode, the selection of encryption type is WEP. For
WPA-PSK, WPA2-PSK, WPA 802.1X and WPA2 802.1X authentication
mode, the encryption type supports both TKIP and AES.
When encryption is set to WEP…
ASCII: Only valid when using WEP encryption algorithm. When key
length is set to 64 bits user can enter 5 ASCII characters (case sensitive),
and 128 bits for 13 ASCII characters (case sensitive).
PASS PHRASE: Only valid when using WEP encryption algorithm.
When key length is set to 64 bits user can enter 10 Hexadecimal
characters (0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9,
a~f).
Key index (advanced): Select 1~4 key index form the pull-down menu,
must match with the connected AP’s key index.
When encryption is set to WPA-PSK/ WPA2-PSK…
Network key: Enter network key at least 8 to 64 characters.
- 18 -
Confirm network key: Enter network key again to confirm.
When encryption is set to WPA 802.1X/ WPA2 802.1X/ WEP
802.1X…
When users use radius server to authenticate client certificate for WPA
authentication mode (WPA authentication do not support EAP MethodMD5-Challenge).
EAP TYPE:
•
TLS: Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on
client-side and server-side certificates to perform authentication and
can be used to dynamically generate user-based and session-based
WEP keys to secure subsequent communications between the WLAN
client and the access point.
•
LEAP: Light Extensible Authentication Protocol. It is an EAP
authentication type used primarily in Cisco Aironet WLANs. It
encrypts data transmissions using dynamically generated WEP keys,
and supports mutual authentication.
•
TTLS: Tunnelled Transport Layer Security. This security method
provides for certificate-based, mutual authentication of the client and
network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
•
PEAP: Protect Extensible Authentication Protocol. PEAP transport
securely authentication data by using tunnelling between PEAP clients
and an authentication server. PEAP can authenticate wireless LAN
clients using only server-side certificates, thus simplifying the
implementation and administration of a secure wireless LAN.
¤
MD5: Message Digest Challenge. Challenge is an EAP
authentication type that provides base-level EAP support. It
provides for only one-way authentication - there is no mutual
authentication of wireless client and the network.
Tunnel: This is enabled under TTLS and PEAP type. For TTLS, the
selections of tunnel are CHAP, MSCHAP, MSCHAP-V2, PAP. For
PEAP, the selections of tunnel are MD5, GTC, TLS and MSCHAP-V2.
Username: Enter the username for server.
Identity: Enter the identity for server.
Domain: Enter the domain of the network.
Password: Enter the password for server.
Certificate: Choose server that issuer of certificates.
Remove
Click Remove button to delete selected profile.
Edit
Click Edit button to edit selected profile.
Duplicate
Click Duplicate button to copy selected profile.
Set Default
Click Set Default button to set selected profile to be connected first.
- 19 -
Available Network
This page displays the information of surrounding APs from last scan result. The tab lists the
information including SSID, Channel, Encryption, Network Authentication, Signal, Type, BSSID,
Supported Rate (s), and Mode.
Network Tab
SSID
Shows the network name of the access points.
Channel
Shows the currently channel in use.
Encryption
Shows the encryption type currently in use. Valid value includes WEP,
TKIP, AES, None and TKIP/AES.
Network
Authentication
Show the device network authentication.
Signal
Shows transmit power, the amount of power used by a radio transceiver to
send the signal out.
Type
Network type in use, Infrastructure or Ad-Hoc mode.
BSSID
Shows Wireless MAC address.
Supported Rate(s)
Shows the transmitting data rate.
- 20 -
Mode
Supported wireless mode. It may support 802.11b, 802.11g and 802.11n
wireless mode.
Refresh
Click Refresh button to search and rescan the available network.
Add to Profile
Select an available network (SSID) on the list and then click Add to Profile
button to add it into the profile list.
Note
Double click on item to join/create profile.
Status
This tab listed the information about the wireless USB adapter and connected access point.
- 21 -
Statistics
The Statistics screen displays the statistics on the current network settings.
Statistics
Tx OK
Shows information of packets successfully sent.
Tx Error
Shows information of packets failed transmit after hitting retry
limit.
Rx OK
Shows information of packets received successfully.
Rx Packet Count
Shows information of packets received successfully.
Rx Retry
Shows information of packets failed transmit after hitting retry
limit.
Rx ICV Error
Shows information of packets received with ICV error.
Reset
Click to reset counters to zero.
- 22 -
WPS
The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security
setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the
configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push
Button Configuration) method through an internal or external Registrar.
WPS Tab
PIN Code
8-digit numbers. It is required to enter PIN Code into Registrar when using
PIN method. When STA is Enrollee, users can use "Renew" button to
re-generate new PIN Code.
Pin Input Config
(PIN)
Click the Pin Input Config (PIN) button to select specific AP to process PIN
Config.
Push Button Config Click this button to connect with AP that supported WPS function within two
minutes. Meanwhile, the AP should also click the PBC button simultaneously.
(PBC)
- 23 -
About
This page displays the information of the Wireless USB Adapter Version.
Switch to AP Mode
To access the soft AP mode, please select the Mode on the function list of the Utility to make the
Wireless USB Adapter act as a wireless AP.
- 24 -
Soft AP mode
General
General
SSID
Shows the network name of the AP.
BSSID
Shows the MAC address of the AP.
Association Table
This table shows the connected client here.
Config
Click the Config button to set up the Wireless Network Properties.
- 25 -
Network Name (SSID): User can change the network name of this access
point.
Channel: User can select the channel form the pull-down list.
Wireless network security
Network Authentication: There are several types of authentication
modes including Open System, Shared Key, WPA-PSK and WPA2-PSK.
Data encryption: For Open System and Shared Key authentication mode,
the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK,
authentication mode, the encryption type supports both TKIP and AES.
When encryption is set to WEP…
ASCII: Only valid when using WEP encryption algorithm. When key
length is set to 64 bits user can enter 5 ASCII characters (case sensitive),
and 128 bits for 13 ASCII characters (case sensitive).
PASS PHRASE: Only valid when using WEP encryption algorithm.
When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f).
Key index (advanced): Select 1~4 key index form the pull-down menu,
must match with the connected AP’s key index.
When encryption is set to WPA-PSK/ WPA2-PSK…
Network key: Enter network key at least 8 to 64 characters.
Confirm network key: Enter network key again to confirm.
- 26 -
Advanced
Advanced
Beacon Interval
The time between two beacons. (The system default is 100 ms.)
DTIM Period
The delivery traffic indication message (DTIM) is an element included in
some beacon frames. User can specify a value from 1 to 255 beacons.
Preamble
Select from the pull-down menu to change the Preamble type into Short
or Long.
Set Defaults
Click to use the system default value.
Apply
Click to apply the above settings.
- 27 -
Statistics
Statistics
Tx OK
Shows information of packets successfully sent.
Tx Error
Shows information of packets failed transmit after hitting retry
limit.
Rx OK
Shows information of packets received successfully.
Rx Packet Count
Shows information of packets received successfully.
Rx Retry
Shows information of packets failed transmit after hitting retry
limit.
Rx ICV Error
Shows information of packets received with ICV error.
Reset
Click to reset counters to zero.
- 28 -
ICS
This page displays setting Internet connection sharing (ICS). Select a sharing public network and click
Apply button to make a connection.
- 29 -
For Windows Vista
Station Mode
l Show Tray Icon: Check to show the wireless adapter icon at the tray.
l Disable Adapter: Check this to disable the wireless adapter.
l Radio off: Check this to turn OFF radio function.
l Close: Click to leave the Intelligent 11n USB Wireless LAN Utility.
- 30 -
General
The General page displays the detail information of current connection.
General Tab
Status
Shows the current connected status. If there is no connection, it will show
Not Associated. If been connected, the system will show Associated.
When connecting, the system will show checking Status.
Speed
Shows the current transmitting rate and receiving rate.
Type
Network type in use, Infrastructure or Ad-Hoc.
Encryption
Shows the encryption type currently in use. Valid value includes WEP,
TKIP, AES, and Not Use.
SSID
Shows the connected access point network name.
Signal Strength
Shows the receiving signal strength.
Link Quality
Shows the connection quality based on signal strength.
MAC Address
The physical address of the Wireless USB Adapter.
IP Address
Shows the IP address information.
Subnet Mask
Shows the Subnet Mask information.
Gateway
Shows the default gateway IP address.
- 31 -
Renew IP
Click the Renew IP button to obtain IP address form the connected
gateway.
Profile
Profile can let users book keeping the favorite wireless setting among home, office, and other public
hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile
manager enables users to Add, Remove, Edit, Duplicate and Set Default profiles.
Profile Tab
Profile Name
Here shows a distinctive name of profile in this column.
SSID
The SSID is the unique name shared among all wireless access points in
the wireless network.
Add
Click Add button to add a profile from the drop-down screen.
- 32 -
This is a computer-to-computer (ad hoc) network; wireless access
points are not used: This function is selected to enable the ad hoc
network type that computers should be setup at the same channel to
communicate to each other directly without access point, users can share
files and printers between each PC and laptop.
Profile Name: Users can enter profile name at will.
Network Name (SSID): The SSID is the unique network name
(case-sensitive) shared among all wireless access points in the wireless
network. The name must be identical for all devices and wireless access
points attempting to connect to the same network.
Channel: If set to ad hoc network type, user can select channels form the
pull-down menu.
Wireless network security
Network Authentication: There are several types of authentication
modes including Open System, Shared Key, WPA-PSK, WPA2-PSK,
WPA 802.1X, WPA2 802.1X and WEP 802.1X.
Data encryption: For Open System, Shared Key and WEP 802.1X
authentication mode, the selection of encryption type is WEP. For
WPA-PSK, WPA2-PSK, WPA 802.1X and WPA2 802.1X authentication
mode, the encryption type supports both TKIP and AES.
When encryption is set to WEP…
ASCII: Only valid when using WEP encryption algorithm. When key
length is set to 64 bits user can enter 5 ASCII characters (case sensitive),
and 128 bits for 13 ASCII characters (case sensitive).
PASS PHRASE: Only valid when using WEP encryption algorithm.
When key length is set to 64 bits user can enter 10 Hexadecimal
characters (0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9,
a~f).
Key index (advanced): Select 1~4 key index form the pull-down menu,
must match with the connected AP’s key index.
- 33 -
When encryption is set to WPA-PSK/ WPA2-PSK…
Network key: Enter network key at least 8 to 64 characters.
Confirm network key: Enter network key again to confirm.
When encryption is set to WPA 802.1X/ WPA2 802.1X/ WEP
802.1X…
When users use radius server to authenticate client certificate for WPA
authentication mode (WPA authentication do not support EAP MethodMD5-Challenge).
EAP TYPE:
• TLS: Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on
client-side and server-side certificates to perform authentication and
can be used to dynamically generate user-based and session-based
WEP keys to secure subsequent communications between the WLAN
client and the access point.
• LEAP: Light Extensible Authentication Protocol. It is an EAP
authentication type used primarily in Cisco Aironet WLANs. It
encrypts data transmissions using dynamically generated WEP keys,
and supports mutual authentication.
•
TTLS: Tunnelled Transport Layer Security. This security method
provides for certificate-based, mutual authentication of the client and
network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
•
PEAP: Protect Extensible Authentication Protocol. PEAP transport
securely authentication data by using tunnelling between PEAP clients
and an authentication server. PEAP can authenticate wireless LAN
clients using only server-side certificates, thus simplifying the
implementation and administration of a secure wireless LAN.
¤
MD5: Message Digest Challenge. Challenge is an EAP
authentication type that provides base-level EAP support. It
provides for only one-way authentication - there is no mutual
authentication of wireless client and the network.
Tunnel: This is enabled under TTLS and PEAP type. For TTLS, the
selections of tunnel are CHAP, MSCHAP, MSCHAP-V2, PAP. For
PEAP, the selections of tunnel are MD5, GTC, TLS and MSCHAP-V2.
Username: Enter the username for server.
Identity: Enter the identity for server.
Domain: Enter the domain of the network.
Password: Enter the password for server.
Certificate: Choose server that issuer of certificates.
Remove
Click Remove button to delete selected profile.
Edit
Click Edit button to edit selected profile.
Duplicate
Click Duplicate button to copy selected profile.
Set Default
Click Set Default button to set selected profile to be connected first.
- 34 -
Available Network
This page displays the information of surrounding APs from last scan result. The tab lists the
information including SSID, Channel, Encryption, Network Authentication, Signal, Type, BSSID,
Supported Rate(s), and Mode.
Network Tab
SSID
Shows the network name of the access points.
Channel
Shows the currently channel in use.
Encryption
Shows the encryption type currently in use. Valid value includes WEP, TKIP,
AES, None and TKIP/AES.
Network
Authentication
Show the device network authentication.
Signal
Shows transmit power, the amount of power used by a radio transceiver to
send the signal out.
Type
Network type in use, Infrastructure or Ad-Hoc mode.
- 35 -
BSSID
Shows Wireless MAC address.
Supported Rate(s)
Shows the transmitting data rate.
Mode
Supported wireless mode. It may support 802.11b, 802.11g and 802.11n
wireless mode.
Refresh
Click Refresh button to search and rescan the available network.
Add to Profile
Select an available network (SSID) on the list and then click Add to Profile
button to add it into the profile list.
Note
Double click on item to join/create profile.
Status
This tab listed the information about the wireless USB adapter and connected access point.
- 36 -
Statistics
The Statistics screen displays the statistics on the current network settings.
Statistics
Tx OK
Shows information of packets successfully sent.
Tx Error
Shows information of packets failed transmit after hitting retry
limit.
Rx OK
Shows information of packets received successfully.
Rx Packet Count
Shows information of packets received successfully.
Rx Retry
Shows information of packets failed transmit after hitting retry
limit.
Rx ICV Error
Shows information of packets received with ICV error.
Reset
Click to reset counters to zero.
- 37 -
WPS
The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security
setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the
configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push
Button Configuration) method through an internal or external Registrar.
WPS Tab
PIN Code
8-digit numbers. It is required to enter PIN Code into Registrar when using
PIN method. When STA is Enrollee, users can use "Renew" button to
re-generate new PIN Code.
Pin Input Config
(PIN)
Click the Pin Input Config (PIN) button to select specific AP to process PIN
Config.
Push Button Config Click this button to connect with AP that supported WPS function within two
minutes. Meanwhile, the AP should also click the PBC button simultaneously.
(PBC)
- 38 -
About
This page displays the information of the Wireless USB Adapter Version.
Switch to AP Mode
To access the soft AP mode, please select the Mode on the function list of the Utility to make the
Wireless USB Adapter act as a wireless AP.
- 39 -
Soft AP mode
General
General
SSID
Shows the network name of the AP.
BSSID
Shows the MAC address of the AP.
Association Table
This table shows the connected client here.
Config
Click the Config button to set up the Wireless Network Properties.
- 40 -
Network Name (SSID): User can change the network name of this access
point.
Channel: User can select the channel form the pull-down list.
Wireless network security
Network Authentication: There are several types of authentication
modes including Open System, Shared Key, WPA-PSK and WPA2-PSK.
Data encryption: For Open System and Shared Key authentication mode,
the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK,
authentication mode, the encryption type supports both TKIP and AES.
When encryption is set to WEP…
ASCII: Only valid when using WEP encryption algorithm. When key
length is set to 64 bits user can enter 5 ASCII characters (case sensitive),
and 128 bits for 13 ASCII characters (case sensitive).
PASS PHRASE: Only valid when using WEP encryption algorithm.
When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f).
Key index (advanced): Select 1~4 key index form the pull-down menu,
must match with the connected AP’s key index.
When encryption is set to WPA-PSK/ WPA2-PSK…
Network key: Enter network key at least 8 to 64 characters.
Confirm network key: Enter network key again to confirm.
- 41 -
Advanced
Advanced
Beacon Interval
The time between two beacons. (The system default is 100 ms.)
DTIM Period
The delivery traffic indication message (DTIM) is an element included in
some beacon frames. User can specify a value from 1 to 255 beacons.
Preamble
Select from the pull-down menu to change the Preamble type into Short
or Long.
Set Defaults
Click to use the system default value.
Apply
Click to apply the above settings.
- 42 -
Statistics
Statistics
Tx OK
Shows information of packets successfully sent.
Tx Error
Shows information of packets failed transmit after hitting retry
limit.
Rx OK
Shows information of packets received successfully.
Rx Packet Count
Shows information of packets received successfully.
Rx Retry
Shows information of packets failed transmit after hitting retry
limit.
Rx ICV Error
Shows information of packets received with ICV error.
Reset
Click to reset counters to zero.
- 43 -
ICS
This page displays setting Internet connection sharing (ICS). Select a sharing public network and click
Apply button to make a connection.
- 44 -
For Windows 7
Station Mode
l Show Tray Icon: Check to show the wireless adapter icon at the tray.
l Disable Adapter: Check this to disable the wireless adapter.
l Radio off: Check this to turn OFF radio function.
l Virtual WiFi disallowed: Check to enable the virtual Wi-Fi function.
l Close: Click to leave the Intelligent 11n USB Wireless LAN Utility.
- 45 -
General
The General page displays the detail information of current connection.
General Tab
Status
Shows the current connected status. If there is no connection, it will show
Not Associated. If been connected, the system will show Associated.
When connecting, the system will show checking Status.
Speed
Shows the current transmitting rate and receiving rate.
Type
Network type in use, Infrastructure or Ad-Hoc.
Encryption
Shows the encryption type currently in use. Valid value includes WEP,
TKIP, AES, and Not Use.
SSID
Shows the connected access point network name.
Signal Strength
Shows the receiving signal strength.
Link Quality
Shows the connection quality based on signal strength.
MAC Address
The physical address of the Wireless USB Adapter.
IP Address
Shows the IP address information.
Subnet Mask
Shows the Subnet Mask information.
Gateway
Shows the default gateway IP address.
Renew IP
Click the Renew IP button to obtain IP address form the connected
- 46 -
gateway.
Profile
Profile can let users book keeping the favorite wireless setting among home, office, and other public
hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile
manager enables users to Add, Remove, Edit, Duplicate and Set Default profiles.
Profile Tab
Profile Name
Here shows a distinctive name of profile in this column.
SSID
The SSID is the unique name shared among all wireless access points in
the wireless network.
Add
Click Add button to add a profile from the drop-down screen.
- 47 -
This is a computer-to-computer (ad hoc) network; wireless access
points are not used: This function is selected to enable the ad hoc
network type that computers should be setup at the same channel to
communicate to each other directly without access point, users can share
files and printers between each PC and laptop.
Profile Name: Users can enter profile name at will.
Network Name (SSID): The SSID is the unique network name
(case-sensitive) shared among all wireless access points in the wireless
network. The name must be identical for all devices and wireless access
points attempting to connect to the same network.
Channel: If set to ad hoc network type, user can select channels form the
pull-down menu.
Wireless network security
Network Authentication: There are several types of authentication
modes including Open System, Shared Key, WPA-PSK, WPA2-PSK,
WPA 802.1X, WPA2 802.1X and WEP 802.1X.
Data encryption: For Open System, Shared Key and WEP 802.1X
authentication mode, the selection of encryption type is WEP. For
WPA-PSK, WPA2-PSK, WPA 802.1X and WPA2 802.1X authentication
mode, the encryption type supports both TKIP and AES.
When encryption is set to WEP…
ASCII: Only valid when using WEP encryption algorithm. When key
length is set to 64 bits user can enter 5 ASCII characters (case sensitive),
and 128 bits for 13 ASCII characters (case sensitive).
PASS PHRASE: Only valid when using WEP encryption algorithm.
When key length is set to 64 bits user can enter 10 Hexadecimal
characters (0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9,
a~f).
Key index (advanced): Select 1~4 key index form the pull-down menu,
- 48 -
must match with the connected AP’s key index.
When encryption is set to WPA-PSK/ WPA2-PSK…
Network key: Enter network key at least 8 to 64 characters.
Confirm network key: Enter network key again to confirm.
When encryption is set to WPA 802.1X/ WPA2 802.1X/ WEP
802.1X…
When users use radius server to authenticate client certificate for WPA
authentication mode (WPA authentication do not support EAP MethodMD5-Challenge).
EAP TYPE:
• TLS: Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on
client-side and server-side certificates to perform authentication and
can be used to dynamically generate user-based and session-based
WEP keys to secure subsequent communications between the WLAN
client and the access point.
• LEAP: Light Extensible Authentication Protocol. It is an EAP
authentication type used primarily in Cisco Aironet WLANs. It
encrypts data transmissions using dynamically generated WEP keys,
and supports mutual authentication.
•
TTLS: Tunnelled Transport Layer Security. This security method
provides for certificate-based, mutual authentication of the client and
network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
•
PEAP: Protect Extensible Authentication Protocol. PEAP transport
securely authentication data by using tunnelling between PEAP clients
and an authentication server. PEAP can authenticate wireless LAN
clients using only server-side certificates, thus simplifying the
implementation and administration of a secure wireless LAN.
¤
MD5: Message Digest Challenge. Challenge is an EAP
authentication type that provides base-level EAP support. It
provides for only one-way authentication - there is no mutual
authentication of wireless client and the network.
Tunnel: This is enabled under TTLS and PEAP type. For TTLS, the
selections of tunnel are CHAP, MSCHAP, MSCHAP-V2, PAP. For
PEAP, the selections of tunnel are MD5, GTC, TLS and MSCHAP-V2.
Username: Enter the username for server.
Identity: Enter the identity for server.
Domain: Enter the domain of the network.
Password: Enter the password for server.
Certificate: Choose server that issuer of certificates.
Remove
Click Remove button to delete selected profile.
Edit
Click Edit button to edit selected profile.
Duplicate
Click Duplicate button to copy selected profile.
Set Default
Click Set Default button to set selected profile to be connected first.
- 49 -
Available Network
This page displays the information of surrounding APs from last scan result. The tab lists the
information including SSID, Channel, Encryption, Network Authentication, Signal, Type, BSSID,
Supported Rate(s), and Mode.
Network Tab
SSID
Shows the network name of the access points.
Channel
Shows the currently channel in use.
Encryption
Shows the encryption type currently in use. Valid value includes WEP, TKIP,
AES, None and TKIP/AES.
Network
Authentication
Show the device network authentication.
Signal
Shows transmit power, the amount of power used by a radio transceiver to
send the signal out.
- 50 -
Type
Network type in use, Infrastructure or Ad-Hoc mode.
BSSID
Shows Wireless MAC address.
Supported Rate(s)
Shows the transmitting data rate.
Mode
Supported wireless mode. It may support 802.11b, 802.11g and 802.11n
wireless mode.
Refresh
Click Refresh button to search and rescan the available network.
Add to Profile
Select an available network (SSID) on the list and then click Add to Profile
button to add it into the profile list.
Note
Double click on item to join/create profile.
Status
This tab listed the information about the wireless USB adapter and connected access point.
- 51 -
Statistics
The Statistics screen displays the statistics on the current network settings.
Statistics
Tx OK
Shows information of packets successfully sent.
Tx Error
Shows information of packets failed transmit after hitting retry
limit.
Rx OK
Shows information of packets received successfully.
Rx Packet Count
Shows information of packets received successfully.
Rx Retry
Shows information of packets failed transmit after hitting retry
limit.
Rx ICV Error
Shows information of packets received with ICV error.
Reset
Click to reset counters to zero.
- 52 -
WPS
The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security
setup and management of Wi-Fi networks. The STA as an Enrollee or external Registrar supports the
configuration setup using PIN (Personal Identification Number) configuration method or PBC (Push
Button Configuration) method through an internal or external Registrar.
WPS Tab
PIN Code
8-digit numbers. It is required to enter PIN Code into Registrar when using
PIN method. When STA is Enrollee, users can use "Renew" button to
re-generate new PIN Code.
Pin Input Config
(PIN)
Click the Pin Input Config (PIN) button to select specific AP to process PIN
Config.
Push Button Config Click this button to connect with AP that supported WPS function within two
minutes. Meanwhile, the AP should also click the PBC button simultaneously.
(PBC)
- 53 -
Virtual WiFi
Virtual WiFi Tab
Virtual WiFi Soft
AP
Check to enable the Virtual WiFi Soft AP function, other clients can connect
with this virtual soft AP, and it also can act as a client to connect with other
AP.
Association Table
Here lists clients that connected to the Virtual WiFi Soft AP.
Setting Internet
Connection
Sharing(ICS)
Check to enable this function, and select the network adapter that you would
like to connect the Internet to.
- 54 -
About
This page displays the information of the Wireless USB Adapter Version.
Switch to AP Mode
To access the soft AP mode, please select the Mode on the function list of the Utility to make the
Wireless USB Adapter act as a wireless AP.
- 55 -
Soft AP mode
General
General
SSID
Shows the network name of the AP.
BSSID
Shows the MAC address of the AP.
Association Table
This table shows the connected client here.
Config
Click the Config button to set up the Wireless Network Properties.
- 56 -
Network Name (SSID): User can change the network name of this access
point.
Channel: User can select the channel form the pull-down list.
Wireless network security
Network Authentication: There are several types of authentication
modes including Open System, Shared Key, WPA-PSK and WPA2-PSK.
Data encryption: For Open System and Shared Key authentication mode,
the selection of encryption type is WEP. For WPA-PSK, WPA2-PSK,
authentication mode, the encryption type supports both TKIP and AES.
When encryption is set to WEP…
ASCII: Only valid when using WEP encryption algorithm. When key
length is set to 64 bits user can enter 5 ASCII characters (case sensitive),
and 128 bits for 13 ASCII characters (case sensitive).
PASS PHRASE: Only valid when using WEP encryption algorithm.
When key length is set to 64 bits user can enter 10 Hexadecimal characters
(0~9, a~f) and 128 bits for 26 Hexadecimal characters (0~9, a~f).
Key index (advanced): Select 1~4 key index form the pull-down menu,
must match with the connected AP’s key index.
When encryption is set to WPA-PSK/ WPA2-PSK…
Network key: Enter network key at least 8 to 64 characters.
Confirm network key: Enter network key again to confirm.
- 57 -
Advanced
Advanced
Beacon Interval
The time between two beacons. (The system default is 100 ms.)
DTIM Period
The delivery traffic indication message (DTIM) is an element included in
some beacon frames. User can specify a value from 1 to 255 beacons.
Preamble
Select from the pull-down menu to change the Preamble type into Short
or Long.
Set Defaults
Click to use the system default value.
Apply
Click to apply the above settings.
- 58 -
Statistics
Statistics
Tx OK
Shows information of packets successfully sent.
Tx Error
Shows information of packets failed transmit after hitting retry
limit.
Rx OK
Shows information of packets received successfully.
Rx Packet Count
Shows information of packets received successfully.
Rx Retry
Shows information of packets failed transmit after hitting retry
limit.
Rx ICV Error
Shows information of packets received with ICV error.
Reset
Click to reset counters to zero.
- 59 -
ICS
This page displays setting Internet connection sharing (ICS). Select a sharing public network and click
Apply button to make a connection.
- 60 -
Chapter 5: Uninstall
For Windows 2000/XP
To remove the utility and driver, please refer to below steps. (When removing the utility, the driver will
be removed as well.)
1.
Go to Start àAll Programs àIntelligent Wireless Utilityà Uninstall –Intelligent.
- 61 -
2.
Click Yes to completely remove the selected application and all of its features.
3.
Then click Finish to complete uninstall.
- 62 -
For Windows Vista
To remove the utility and driver, please refer to below steps. (When removing the utility, the driver will
be removed as well.)
1.
Go to Start à Programs àIntelligent Wireless LAN Utilityà Uninstall –Intelligent.
2.
Click Yes to complete remove the selected application and all of its features.
- 63 -
3.
Finally, click Finish to complete uninstall.
- 64 -
For Windows 7
To remove the utility and driver, please refer to below steps. (When removing the utility, the driver will
be removed as well.)
1.
Go to Start à Programs àIntelligent Wireless Utilityà Uninstall –Intelligent.
- 65 -
2.
Click Yes to complete remove the selected application and all of its features.
3.
Finally, click Finish to complete uninstall.
- 66 -

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract, Print high-res
XMP Toolkit                     : 3.1-701
Create Date                     : 2010:08:13 14:18:15+08:00
Creator Tool                    : pdfFactory Pro www.ahasoft.com.tw/FinePrint
Modify Date                     : 2010:08:16 14:51:12+08:00
Metadata Date                   : 2010:08:16 14:51:12+08:00
Format                          : application/pdf
Creator                         : lydia
Title                           : WU5508_MNL_English__FOR認證only_.doc
Producer                        : pdfFactory Pro 3.10 (Windows XP Professional Chinese)
Document ID                     : uuid:601f3603-cd15-4de0-8dd5-e9dbbb92c4ba
Instance ID                     : uuid:8f980ca7-262a-46bb-9978-22f9ba7a4631
Page Count                      : 70
Author                          : lydia
EXIF Metadata provided by EXIF.tools
FCC ID Filing: MQ4WU5508

Navigation menu