Airgo Networks AGN1023PC0200 2.4GHz True MIMO PC Card User Manual

Airgo Networks Inc. 2.4GHz True MIMO PC Card

Contents

User manual

Airgo Networks, Inc.900 Arastradero Road Palo Alto, CA 94304P: 650-475-1900 F: 650-475-1708www.airgonetworks.comPart Number: 640-00069-00Published:  July 2004Installation and User GuideWireless LAN Client Adapter
Copyright © 2003 by Airgo Networks. All Rights Reserved.No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Airgo Networks unless such copying is expressly permitted by U.S. copyright law.
Overview 1Connecting the Wireless LAN Client Adapter 2Installing the Wireless LAN Client Adapter Driver and Client Utility 4Uninstalling the Client Utility and Drivers 8Overview of Wireless Networking 11Service Set Identifiers 12Wireless Bands and Channels 12Client Utility 12Accessing the Client Utility 14Navigating the User Interface 14Configuration Overview 20Scanning for Available Networks 20Working with Profiles 21Profile Window 23Wireless Security 24
Installation and User Guide: Wireless LAN Client Adapter 3Preface This guide explains how to install and configure the Wireless LAN Client Adapter, which provides PC laptop and desktop users with access to 802.11 access points. The guide is intended for business and consumer users who want to install and configure the Wireless LAN Client Adapter quickly and easily. It is also intended for users who are interested in advanced configuration and troubleshooting.The Wireless LAN Client Adapter products include the following device options:■PC Card adapter for use in laptop and notebook computers■PCI adapter for use in desktop system PCI expansion slots■Mini PCI adapter for use in laptop computer mini-PCI expansion slotsThe Client Utility, a software tool designed to provide basic configuration options for the device, is shipped with each unit along with the device drivers.Organization of this GuideThis guide consists of the following chapters:■Chapter 1, “InstallationOverview,” describes the features of the Wireless LAN Client Adapter and explains how to install it.■Chapter 2, “Introduction to the Client Utility,” provides an overview of the Client Utility.■Chapter 3, “Configuration,”describes the configuration settings of the Client Utility.■Appendix A,  “Individual Driver and Client Utility Installation Procedures,” explains how to install the driver and Client Utility as separate tasks.■Glossary defines terms that apply to wireless and networking technology in general and Airgo products.Conventions Used in this GuideThis guide uses the following conventions for instructions and information.Notes, Cautions, and WarningsNotes, cautions, and time-saving tips use the following conventions and symbols.Related DocumentationThe following documentation related to the Airgo Networks wireless networking product line is available via CD-ROM and also on the company website, http://www.airgonetworks.com.NOTE: Notes contain helpful suggestions or information that are important to the task at hand.CAUTION: Caution indicates that there is a risk of equipment damage or loss of data when certain actions are performed.WARNING: Warnings are intended to alert you to situations that could result in injury (such as exposure to electric current, for example).
Preface4 Installation and User Guide: Wireless LAN Client Adapter■Access Point Installation and Configuration Guide — Describes how to install and configure the Access Point.■NMS Pro Installation and Configuration Guide — Explains how to install and use the enterprise network management application.■Command Line Interface (CLI) Reference Manual — Provides a listing of all the commands available for the Access Point, usable through console access and command line interface; this manual is intended for advanced users and system administrators.
Installation and User Guide: Wireless LAN Client Adapter 11InstallationOverviewThis chapter explains how to install the Wireless LAN Client Adapter, adapter driver, and Client Utility. It includes the following topics:•Overview •Connecting the Wireless LAN Client Adapter•Installing the Wireless LAN Client Adapter Driver and Client Utility•Uninstalling the Client Utility and DriversOverviewThe Wireless LAN Client Adapter provides the communication link between your laptop or desktop PC and other devices in a wireless network. The adapter operates in the 2.4 GHz radio frequency band and can communicate with any device that meets the IEEE 802.11b or 802.11g wireless network standards. When used with Access Points as part of a wireless network installation, the Wireless LAN Client Adapter offers the following special features:•Enhanced Data Rates•Extended Range •Multi Mode and Multi-band Operation•Interference HandlingThe Client Utility, shipped with each Wireless LAN Client Adapter, includes tools for setting the basic configuration.Device TypesThe Wireless LAN Client Adapter is currently offered in three device types: • PC Card — Extended Type II PCMCIA CardBus (32-bit interface) for use in laptop and notebook computers• PCI Card — PCI adapter for use in desktop computer expansion slots• Mini PCI— Mini PCI adapter for use in laptop computer mini-PCI expansion slotsShipping Package ContentsThe Wireless LAN Client Adapter shipping package contains the following items:•Wireless LAN Client Adapter PC or PCI Card•CD containing the device driver and Client UtilitySystem RequirementsYour PC must meet the following minimum requirements:•Windows XP or Windows 2000•96 MB memory
1  InstallationOverview2 Installation and User Guide: Wireless LAN Client Adapter•CPU 1.0 GHz or greater•At least 10 MB disk capacity available for the driver and Client Utility software.•Type II or Type III cardbus slot for notebooks and laptopsConnecting the Wireless LAN Client AdapterTo install the PC card:•With the computer powered on or off, slide the PC card firmly into an available CardBus slot (Figure 1).Figure 1: PC Card InstallationTo safely remove the PC card while the computer is powered up:1Right-click the system tray icon entitled Safely Remove Hardware or Eject or Stop Hardware.The system prompts you to select the device to stop.2Select Airgo Networks Wireless LAN NIC, and click Stop.3Click OK when asked to confirm.4Press the CardBus eject button on the side of your computer to release the slot locking mechanism and slide the PC card out.LB48016
Connecting the Wireless LAN Client AdapterInstallation and User Guide: Wireless LAN Client Adapter 3To install the PCI card adapter (Figure 2):1Power down your PC.2Remove the cover that provides access to the PCI expansion slot.3Insert the PCI card into an available PCI slot.4Replace the cover.5Attach the antenna to the external connector on the PCI card.You are now ready to install the Wireless LAN Client Adapter driver software.Figure 2: PCI Card InstallationChecking Adapter ActivityThe LEDs on the PC card and PCI card indicate the state of current communications:• Solid green — The adapter is associated (connected) to the network.• Slow blinking green — The adapter is not associated to the network.• Fast blinking green — The adapter is transmitting or receiving data.
1  InstallationOverview4 Installation and User Guide: Wireless LAN Client AdapterInstalling the Wireless LAN Client Adapter Driver and Client UtilityFollow the steps in this section to install the software needed to support your Wireless LAN Client Adapter. The software includes:•Wireless LAN Client Adapter driver•Client UtilityInstallation Steps1If you are using the PCI card, make sure that it is physically installed (page 3). If you are using the PC card, slide it into the CardBus slot on your computer.2Power up your computer.3Insert the Wireless LAN Client Adapter distribution CD.The CD menu opens.4Currently, both the Network Card Drivers and Client Utility are selected and this selection cannot be modified. Click Install Software and the Installation Wizard opens. NOTE: Before installing the Wireless LAN Client Adapter or any other wireless adapter, you must make sure that your system has the latest Microsoft patches to support wireless networking. You can find information and patches at http://www.microsoft.com/hardware/broadbandnetworking/10_concept_wireless_security.mspx.NOTE: If the Microsoft Found New Hardware Wizard opens, click Cancel to close the wizard.
Installing the Wireless LAN Client Adapter Driver and Client UtilityInstallation and User Guide: Wireless LAN Client Adapter 55Click Next.The License agreement window opens. 6Review the license agreement, and then click Ye s .
1  InstallationOverview6 Installation and User Guide: Wireless LAN Client Adapter7Click OK. 1You may see a warning regarding Windows logo testing. 8Click Continue Anyway.The installation wizard installs the adapter driver. The next screen indicates that the installation was successful and prompts you to continue with Client Utility installation. 9Click Next.1If your PC Card adapter is not yet physically installed, the installation, the wizard prompts you to do so.
Installing the Wireless LAN Client Adapter Driver and Client UtilityInstallation and User Guide: Wireless LAN Client Adapter 7The wizard prompts you to choose an installation location.10 Click Next to accept the default location, or click Browse to select a different location before clicking Next.The wizard completes the installation.11 Click Finish to complete the installation and start the Client Utility.The installation is now complete. If you encounter any difficulties, refer to “Confirming the Installation” on page 33 for additional information.
1  InstallationOverview8 Installation and User Guide: Wireless LAN Client AdapterUninstalling the Client Utility and DriversThis section explains how to remove the Client Utility software from your system, which may be necessary if you are upgrading to a newer version of the utility. Follow these steps to uninstall the Client Utility software and adapter driver:1From the Start menu, choose Programs > Airgo Networks > Uninstall Airgo Networks Software.The Uninstall Wizard prompts you to choose the type of maintenance to perform.2Select Remove and click Next.The wizard prompts you to confirm.3Click OK to continue.When the uninstall process is complete, the wizard presents a Finish window. NOTE: Use the Windows System control panel if you need to uninstall only the Wireless LAN Client Adapter driver.
Uninstalling the Client Utility and DriversInstallation and User Guide: Wireless LAN Client Adapter 94Click Finish. The Uninstall process is now complete.
1  InstallationOverview10 Installation and User Guide: Wireless LAN Client Adapter
Installation and User Guide: Wireless LAN Client Adapter 112Introduction to the Client UtilityThe chapter provides an overview of wireless networking and explains how to access the Client Utility to configure your Wireless LAN Client Adapter. It includes the following topics:•Overview of Wireless Networking•Client Utility•Navigating the User InterfaceOverview of Wireless NetworkingThe Wireless LAN Client Adapter connects your PC to a wireless local area network (wireless LAN) by way of radio signals. An access point is the device that forwards data from the wired network to your PC by way of radio signals and connects you with other wireless users. The IEEE 802.11 standard identifies two types of wireless networking modes:•In an infrastructure network, an access point links the wireless LAN to a wired network. By attaching to an existing network infrastructure, you can gain access to other resources on the wired network, other wireless LANs, or the Internet. This is the mode to use when setting up a home network or accessing an office network (Figure 3).•In an ad-hoc wireless network, you establish communications between your PC and a small number of other wireless users without using an access point (Figure 4). Figure 3: Infrastructure NetworkNOTE: The Wireless LAN Client Adapter installed on your PC can communicate with any access point that supports the industry standard IEEE 802.11 wireless communications protocol. It is recommended that you use the Wireless LAN Client Adapter with Access Points in order to take advantage of their advanced range, high data rates, and other features.Wired networkA0017
2  Introduction to the Client Utility12 Installation and User Guide: Wireless LAN Client AdapterFigure 4: Ad-Hoc NetworkService Set IdentifiersThe Service Set Identifier (SSID) is a name that uniquely identifies a wireless local area network. Each device in the wireless network must have the same SSID configured in order to participate in the network. The SSID can be up to 32 alphanumeric characters in length and is also known as the wireless network name. The 802.11 standard specifies two types of network service sets identified by SSID:• Basic Service Set (BSS) — collection of wireless devices operating with an access point in infrastructure mode (Basic Service Set - BSS) or without an access point in ad-hoc mode (Independent Basic Service Set - IBSS).• Extended Service Set (ESS) — collection of BSSs with wireless devices that can roam from one BSS to another while staying connected to wireless network resources.Wireless Bands and ChannelsWireless Bands and ChannelsThe IEEE 802.11 b/g specification addresses wireless devices that operate in the 2.4 GHz radio frequency band. Within the band (range of radio frequencies) individual channels carry a separate radio signal. Automatic and manual band and channel selection are provided, along with monitoring and analysis capabilities to assess the status of radio coverage and signal quality.Client UtilityIf you followed the installation instructions in Chapter 1, the Client Utility is already installed on your PC. The Client Utility enables you to perform all these functions:•Obtain a view of your wireless network, including the type of network, the access point with which you are associated, and information about the radio signals currently being transmitted and received.•Scan and connect to wireless networks within radio range of your PC.•Create or select a profile, which stores the specifics of the network connection, security selections, and power level for your Wireless LAN Client Adapter. The Client Utility supports multiple profiles, enabling you to connect to different networks, whether at home, at work, or at wireless hotspot locations.Using the Client Utility With Windows XPTo use the profile features of the Client Utility on Windows XP, you must specify that Windows XP will not be managing the wireless adapter.A0018
Client UtilityInstallation and User Guide: Wireless LAN Client Adapter 13To specify that Windows will not be managing the wireless adapter:1Right-click the wireless icon on the system tray. 2Select View Available Wireless Networks.The window shows the list of available networks.3Click Advanced to open the Wireless Network Connection Properties window, Wireless Networks tab.
2  Introduction to the Client Utility14 Installation and User Guide: Wireless LAN Client Adapter4Clear the checkbox entitled Use Windows to configure my wireless network settings.5Click OK.You can now use the Client Utility to manage your wireless connections.Accessing the Client UtilityIf you followed the instructions in Chapter 1, the Client Utility is installed on your PC. To start the Client Utility:•Choose Start > Programs > Airgo Networks > Client Utility.The Client Utility application icon will appear in the system tray.Using the Tray IconWhen you start the Client Utility, a small signal icon becomes visible in the system tray on the Windows toolbar (Figure 5). The color of the icon reflects the quality of the wireless connection: green for good, yellow for intermittent connection, red if there is no active connection, and a red X if the Wireless LAN Client Adapter radio is turned off. The tray icon provides access to the Client Utility menu. Figure 5: Client Utility System Tray IconTo open the Client Utility window from the tray icon:•Right-click and select Launch Client Utility or double-click on the icon.To exit the Client Utility:•Right-click and select Exit.To access the help system:•Right-click and select Help.Disabling and Re-Enabling the Wireless LAN Client AdapterYou can easily enable or disable the Wireless LAN Client Adapter radio from the Client Utility. To enable the radio:1Right-click the Client Utility icon in the system tray.2Select Radio On.To disable the radio:1Right-click the Client Utility icon in the system tray.2Select Radio Off.Navigating the User InterfaceThis section explains how to use the compact and expanded views of the Client Utility.Application icon
Navigating the User InterfaceInstallation and User Guide: Wireless LAN Client Adapter 15Using the Compact ViewThe compact view displays summary information about current communications between your PC and the access point. When you start the Client Utility, the compact view opens in text mode (Figure 6). Figure 6: Client Utility Compact View, Text ModeThe Signal icon on the left changes color according to current received signal strength: green if signal strength is good, yellow if it is of lower quality, and red if there is no active signal. The Received Signal Strength bar chart displays a history of this information for the past 60 seconds. Text mode lists the network profile currently in use, the name of the access point to which your Wireless LAN Client Adapter is connected, and the name of the wireless network. It also gives a text description of the current received signal strength: excellent, acceptable, or blank if there is no signal. The compact view also has a graphical mode, which opens when you click the Display Mode icon (Figure 7).Figure 7: Client Utility Compact View, Graphical ModeUse the graphical mode at any time to obtain a snapshot of the signal strength to your Wireless LAN Client Adapter. The More arrow opens the expanded view. When the expanded view is open, the arrow is labeled Less. Click Less to return to the compact view.Signal  Connection InformationDisplay mode More arrowiconSignal  Received Signal Strength chartDisplay mode More arrowicon
2  Introduction to the Client Utility16 Installation and User Guide: Wireless LAN Client AdapterUsing the Expanded ViewClick More to open the Client Utility to the expanded view (Figure 8). Figure 8: Client Utility, Expanded ViewThe upper section of the expanded view lists all the networks and network profiles available to your PC. The following information and options are available:Item   DescriptionStatus icon An icon is displayed if a profile has been saved for the entry or if the Wireless LAN Client Adapter is currently connected to that network:Profile is savedYou are currently connected to this networkA horizontal line separates the profiles at the top of the list (above the line) from the identified networks that do not have profiles defined (below the line). Profile Name of the profile, if a profile is definedSSID Name of the networkBSSID MAC address of the access point if Show BSSID is checked, or automatic if show BSSID is not checked.Signal quality Quality of the radio signal established with the access point, as a percentage
Navigating the User InterfaceInstallation and User Guide: Wireless LAN Client Adapter 17Use the horizontal scroll bar to view all the columns. You can resize each column by selecting and moving the column header dividers. Two checkboxes above the Network List influence the display and behavior of the network connections:Figure 9 The next figure shows a Network List with the Show BSSID checkbox selected.The access points for the SSID are listed below, along with the BSSID.Figure 9: Network List with Show BSSID SelectedThe Scan, Save, Create, Edit, and Delete buttons below the Network List are used to detect available access points and work with profiles.The remaining areas in the Expanded View display read-only information about the current connection and settings. The Connection section displays the following information:•The current connection rate for data transmitted between your PC and the access point, in megabits per second. When there is no active data transmission, it shows the rate at which beacons are transmitted.•The radio channel and band used for communications.•The number of transmitted and received bytes of data since the wireless connection was initiated.The Security section shows the authentication and data encryption currently used; and the Power section shows the level of power at which the Wireless LAN Client Adapter is operating.Chapter 3 explains how to scan and connect to a network and how to create and save profiles containing configuration information.Encryption Type of data encryption enabled for this access point or profileNetwork Infrastructure or ad-hocOption DescriptionShow BSSID  If this checkbox is selected, the Network List includes an entry for each access point in a given SSID by MAC address.Allow Roaming  If this checkbox is selected, you can move from one access point to another without changing the active network selection.Item  (continued) Description
2  Introduction to the Client Utility18 Installation and User Guide: Wireless LAN Client AdapterBackground Operation and ExitingWhile the Client Utility is running, its icon is always displayed on the Windows system tray. To close the Client Utility window while keeping it operating in the background, click X in the upper right corner of the utility window. To exit the utility, right-click the system tray icon, and select Exit.
Installation and User Guide: Wireless LAN Client Adapter 193ConfigurationConfiguration OverviewThis chapter explains how to scan for and connect to wireless networks and how to set up a profile to store network configuration information. It includes the following topics:•Configuration Overview•Scanning for Available Networks•Working with Profiles•Profile Window•Wireless Security
3  Configuration Overview20 Installation and User Guide: Wireless LAN Client AdapterConfiguration OverviewFigure 10 shows the Client Utility in Expanded View. Figure 10: Client Utility, Expanded ViewThe Client Utility uses profiles to store information describing how your Wireless LAN Client Adapter connects to the wireless network. Each profile contains information about the type of network connection, security settings, and power settings.To make it easy for you to connect to wireless networks at home, office, or wireless hotspot locations, Client Utility provides the ability to create multiple profiles, each containing information about a different network or a different set of configuration values. When you move from one location to another, your Wireless LAN Client Adapter automatically detects which network is currently available and applies the correct profile. The Network List includes all the saved profiles and newly identified networks.If you travel to an area with a network not previously encountered or configured, your Wireless LAN Client Adapter attempts to connect to it. If successful, you can save the detected settings in your list of available profiles.The remainder of this chapter describes how to scan and connect to wireless networks, and how create and work with profiles.Scanning for Available NetworksUpon boot-up, the Wireless LAN Client Adapter scans for all access points within radio range and attempts to connect to one of them based on previously scanned profiles. It associates with the first
Working with ProfilesInstallation and User Guide: Wireless LAN Client Adapter 21access point it finds for which it can establish radio communications. Association normally happens automatically; however, it is recommended that you start the Client Utility once you are connected. This enables you to verify the configuration and confirm that the access point to which you are connected is a trusted component of your network.Whenever you open the Client Utility, the system performs an automatic scan. You can also scan for networks at any time, upon demand.To scan for available networks:1Choose Start > Programs > Airgo Networks > Client Utility. This displays the application icon in the system tray.2Click More to open the Expanded View.3Click Scan. A scanning box opens (Figure 11) to show that the scan is taking place. When the scan is complete, the Network List area (Figure 10) displays all the discovered networks.Figure 11: Scanning IconThe results of the scan are presented near the top of the expanded Client Utility window (Figure 10). If a profile already exists for the discovered SSID, it appears in the network list with its name in the Profile column with a disk icon to the left. If a profile does not exist, the Profile column is blank.Working with ProfilesThis section provides instructions on the tasks used in managing profiles:To create a new profile:1Click Create to open the Profile window. 2Enter a new name in the Profile Name field.3Enter the SSID of the network. For more information, see “Service Set Identifiers” on page 12.4Drag the sliding bar to select an output power level.5Select a security level and details. For more information, see “Security Settings” on page 24.6Click Save. The Profile window closes and the newly created profile appears in the Network List in the Client Utility window.To make an existing profile active (use the profile to control wireless communications from your PC):1Double-click on the entry in the Network List.2Click Save & Activate.
3  Configuration Overview22 Installation and User Guide: Wireless LAN Client AdapterYou can edit any profile in the list, including the active one. If you edit and save the active profile, the system temporarily drops the network connection while implementing the changes. When the configuration change is complete, the network connection is restored.To edit a profile:1Highlight the profile name and click Edit. If the profile is active, the system requests confirmation that you want to continue. Click OK to open the profile window. See “Profile Window” on page 23 for detailed information on the settings in the Profile window.2Confirm the network type and SSID.3Move the sliding power setting bar to the desired output power level.4Select the level of security (Low or No).5If low security is selected, choose the encryption and authentication options to match those of the access point or access points to which you are associating.6Click Save. To delete a profile:1Highlight the profile name and click Delete.Click OK when prompted to confirm.
Profile WindowInstallation and User Guide: Wireless LAN Client Adapter 23Profile WindowFigure 13 shows the Profile window, which opens when you double-click on an entry in the network list or highlight a listed profile and click Edit. This section provides an overview of the information in the Profile window.Profile NameThe top of the window contains an area for the name of the profile. When you create a profile, select a name that clearly identifies the network.1 The default profile name is the SSID.Figure 12: Profile WindowAdvanced SettingsThe Advanced button to the right of the Profile Name opens the Advanced Profile Settings window. (Figure 13). The settings in this window enable you to take advantage of the enhanced performance features of the Access Point. It is recommended to keep the default Auto settings, which provide compatibility with basic and enhanced data rates and network density.1The Profile Name field is grayed out when you edit an existing profile.Profile AMySSID
3  Configuration Overview24 Installation and User Guide: Wireless LAN Client AdapterFigure 13: Advanced Profile SettingsNetwork SettingsThe Network section shows the type of network (infrastructure or ad-hoc) and contains an area to enter the SSID (service set identifier), a name that uniquely identifies the network. •Select SSIDto connect to an existing wireless network, usually with an interface to a wired network, for Internet and email access, file sharing, and print and other services.•Select Connect to Ad Hoc Network to attach to a temporary wireless network that has been set up by another user.•Select Start Ad-Hoc Network to create a temporary wireless network without using an access pointAd-hoc networks are generally used to enable file and print sharing for short-term activities such as meetings or conferences. If you are creating a new ad-hoc network, use the default Auto-Channel option, unless it is necessary for you to use a specific radio channel. The auto-channel option automatically selects a channel to use for the ad-hoc network.Power SettingThe Power Settings area contains a sliding bar to select output power between the lowest and highest available levels. Higher settings enable the highest performance. Lower settings draw less power from your PC and are advisable when you want to conserve PC battery life or you know that you are within close range of an access point.Security SettingsThe Security Settings area includes choices for configuring a secure connection between your PC and access point. The next section, “Wireless Security,” provides background on wireless security options and gives guidelines for security settings in the enterprise, small office, and home environments.Wireless SecurityAlthough security is important in any network, the characteristics of wireless networks can make them vulnerable to attack. Unlike wired networks, which require a physical connection that can be secured with lock and key, wireless networks require only a radio signal for communication, and physical barriers do not provide protection. A concern since the introduction of the IEEE 802.11
Wireless SecurityInstallation and User Guide: Wireless LAN Client Adapter 25wireless communication standard, wireless security continues to evolve, as shortcomings of existing security solutions are uncovered and new solutions are adopted. [Company Name - Short] products provide a complete state-of-the-art security solution for 802.11 wireless networks, using the native wireless support in Windows 2000 and Windows XP where appropriate. Wireless security encompasses two major components: encryption and authentication. Encryption is the means by which data transferred across the wireless link are protected from eavesdropping. Authentication is the means by which the access point verifies the identity of your PC and your identity, and confirms that you have permission to use the network.EncryptionEncryption protects wireless data from being intercepted and deciphered during transmission, and thereby assures the security of your data. Several encryption options are supported:•AES (Advanced Encryption Standard) — excellent financial-grade security•TKIP (Temporal Key Integrity Protocol) — good security, as an upgrade to legacy systems•WEP (Wired Equivalent Privacy) — minimal protection security, acceptable only for non-critical data•Open or no encryption — no protection, use only for non-critical communications or with other security protection such as https or VPN/IPsec for corporate communicationsThe latest and most effective encryption methods are part of the WPA (Wi-Fi Protected Access) cipher suite and are recommended for all environments in which security is an important consideration, whether in the enterprise, small office or home. WPA provides much more complete protection against discovery of encryption keys than do the earlier WEP standards. WPA itself has already spawned two generations of encryption technology, with AES being the latest and most effective standard. TKIP is the encryption protocol that was first introduced with WPA, but it provides less complete protection than does AES.The original 802.11 wireless communication specification standard included WEP for wireless security. Although still widely used today, WEP security does not provide adequate protection against discovery of encryption keys, and may therefore be vulnerable to attack. Use WEP only in cases where the access point does not support higher level security and security is a consideration in your network design.The WEP algorithm requires an encryption key, which is a code used in the encrypting and decrypting of data. Although all WEP methods are vulnerable, 128-bit keys are somewhat more difficult to decrypt than 64-bit keys. WEP provides the option of entering a key in ASCII (text) or hexidecimal (numeric) format. ASCII keys are useful as a text passphrase, while hexidecimal keys provide more protection and support for other devices. Key generation can be manual or automatic, with automatically generated keys providing more protection.AuthenticationEffective authentication methods rely on manual distribution of shared or pre-shared authentication keys or automatic generation of keys by use of a RADIUS (Remote Authentication Dial-In User Service) server. A shared or pre-shared key is an authentication string entered at the access point and client PCs. Authentication takes place by matching the key stored in each PC with the key stored in the access point.
3  Configuration Overview26 Installation and User Guide: Wireless LAN Client AdapterAutomatic key-generation methods rely upon digital certificates, which contain encoded user and encryption information to verify the identity of a user and match it with a database of secure user records. A certificate authority is the network service that manages digital certificates and guarantees their integrity. The IEEE 802.1X standard specifies certificate-based authentication using EAP (Extensible Authentication Protocol). EAP, in turn, comes in numerous variations.Most enterprises manage remote access to the certificate authority using a RADIUS (Remote Authentication Dial-In User Service) server. In this arrangement, client PC users install RADIUS client software on their local PCs to provide RADIUS server access. Funk Software and Microsoft are the major suppliers of RADIUS client software.For home or small office networks, shared or pre-shared keys can provide adequate authentication without the burden of centralized management and control. A built-in RADIUS security portal is provided in the Access Point to extend the management and scalability features of centralized management to administrators in small-to-mid sized office environments.Client Utility Security Options The network list in the Client Utility Expanded View displays the security required for each SSID and profile. The Client Utility supports configuration of the WEP or Open security options. In the Profile window, you can select WEP or open security for the radio connection between your PC and the access point, and enter choices for encryption and authentication within the selected security framework. For instructions, see “Working with Profiles” on page 21.Windows XP users can connect to networks that support WPA security. To do so, it is necessary to use the Wireless Zero Config (WZC) capability native to Windows XP. When WZC is enabled, the profile features of the Client Utility are automatically disabled; however, it is still recommended to use the Client Utility to view and scan for networks.To use WZC to configure security settings, first confirm that the WZC service is enabled:1From the Start menu, choose Control Panel > Administrative Tools > Services.2Check whether the Status column displays “Started.” 3If Started is not the value in the Status column,aDouble-click the Wireless Zero Config entry to open the Wireless Zero Configuration Properties dialog box.bSelect Automatic from the Start-up Type pull-down list.cClick Start.dClick OK.
Wireless SecurityInstallation and User Guide: Wireless LAN Client Adapter 27Now use WZC to configure security settings:1Right-click the wireless icon on the system tray. 2Select View Available Wireless Networks. 3The window shows the list of available networks.4Select your network, and click Advanced to open the Wireless Network Connection Properties window, Wireless Networks tab.5Confirm that Use Windows to configure my wireless network settings is selected.
3  Configuration Overview28 Installation and User Guide: Wireless LAN Client Adapter6Select the network, and click Configure.7Confirm the authentication and encryption selections exactly match those of the access point to which you are connecting. Enter a network key, if required.8If you selected AES for data encryption, open the Authentication tab and select the EAP type appropriate to your network. 9Click OK as needed to close the WZC windows.
Installation and User Guide: Wireless LAN Client Adapter 29GlossaryThis glossary defines terms that apply to wireless and networking technology in general and [Company Name - Short] products in particular.802.1x Standard for port-based authentication in LANs. Identifies each users and allows connectivity based on policies in a centrally managed server.802.11 Refers to the set of WLAN standards developed by IEEE. The three commonly in use today are 802.11a, 802.11b, and 802.11g, sometimes referred to collectively as Dot11.Access Control List (ACL) A list of services used for security of programs and operating systems. Lists users and groups together with the access awarded for each.Access Point (AP) An inter-networking device that connects wired and wireless networks together. Also, an 802.11x capable device that may support one or more 802.11 network interfaces in it and co-ordinates clients stations in establishing an Extended Service Set 802.11 networkAdvanced Encryption Standard (AES) An encryption algorithm developed for use by U.S. Government agencies and now incorporated into encryption standards for commercial transactions.Client Utility (ACU) Application that executes on a client station and provides management and diagnostics functionality for the 802.11 network interfaces.Ad-Hoc network A group of nodes or systems communicating with each other without an intervening Access Point. Many wireless network cards support ad-hoc networking modes.Authentication Server A central resources that verifies the identity of prospective network users and grants access based on pre-defined policies.Authentication Zone A administrative grouping of resources for user authentication.Backhaul The process of getting data from a source and sending it for distribution over the main backbone network. Wireless backhaul refers to the process of delivering data from a node on the wireless network back to the wired network. Also referred to a WDS.x.
Glossary30 Installation and User Guide: Wireless LAN Client AdapterBasic Service Set (BSS) The set of all wireless client stations controlled by a single access point. The BSSID, or identifier, for the basis service set can be assigned or default to the MAC address of the access point.Bridge A connection between two (or more) LANs using the same protocol. Virtual bridges are used as a means of defining layer 2 domains for broadcast messages. Each virtual bridge uniquely defines a virtual local area network (VLAN).Class of Service (COS) A method of specifying and grouping applications into various QoS groups or categories.Differentiated Services Code Point (DSCP) A system of assigning Quality of Service “Class of Service” tags.Domain Name Service (DNS) A standard methodology for converting alphanumeric Internet domain names to IP addresses.Dynamic Host Configuration Protocol (DHCP) A communications protocol enabling IP address assignments to be managed both dynamically and centrally. With DHCP enabled on a node (a system, device, network card, or Access Point), when it boots or is connected to a network, an address is automatically assigned. Each assigned address is considered to be “leased” to a specific node; when the lease expires, a new IP can be requested and/or automatically reassigned. Without DHCP, IP addresses would need to be entered manually for each and every device on the network.Dynamic Frequency Selection (DFS) A method for selecting the least intrusive and noisy available frequency for operation, part of the 802.11 specification.Dynamic IP Address A TCP/IP network address assigned temporarily (or dynamically) by a central server, also known as a DHCP server. A node set to accept dynamic IPs is said to be a “DHCP client.”Extensible Authentication Protocol (EAP) Standard that specifies the method of communication between an authentication server and the client, or supplicant, requesting access to the network. EAP supports a variety of authentication methods.Extensible Authentication Protocol Over LAN (EAPOL) Protocol used for 802.1x authentication.EAP-TLS EAP using Transport Layer Security. EAP-based authentication method based on X.509 certificates, which provides mutual, secure authentication. Certificates must be maintained in the authentication server and supplicant.EAP-PEAP Protected EAP-based authentication method based on X.509 certificates. Uses a two-phase approach in which the server is first authenticated to the supplicant.
GlossaryInstallation and User Guide: Wireless LAN Client Adapter 31This establishes a secure channel over which the supplicant can be authenticated to the server.Extended Service Set (ESS) A set of multiple connected BSSs. From the perspective of network clients, the ESS functions as one wireless network, with clients able to roam between the BSSs within the ESS. ESSID Name or identifier of the ESS used in network configuration.hostname The unique, fully qualified name assigned to a network computer, providing an alternative to the IP address as a way to identify the computer for networking purposes.Hypertext Transfer Protocol (HTTP) Protocol governing the transfer of data on the World Wide Web between servers and browser (and browser enabled software applications).Hypertext Transfer Protocol over SSL (HTTPS) A variant of HTTP that uses SSL (Secure Sockets Layer) encryption to secure data transmissions. HTTPS uses port 443, as opposed to HTTP which uses port 80.Independent Basic Service Set (IBSS) A set of clients communicating with each other or a network via an Access Point.Internet Protocol (IP) The network layer protocol for routing packets through the Internet.IP address 32-bit number, usually presented as a period-separated (dotted decimal) list of three-digit numbers, which identifies an entity on the Internet according to the Internet Protocol standard. Local Area Network (LAN) A group of computers, servers, printers, and other devices connected to one another, with the ability to share data between them.Maskbits Number of bits in the subnet prefix for an IP address, (provides the same information as subnet mask). Each triplet of digits in an IP address consists of 8 bits. To specify the subnet in maskbits, count the number of bits in the prefix. To specify using a subnet mask, indicate the masked bits as an IP address. Example: subnet mask 255.255.255.0 is equivalent to 24 maskbits, which is the total number of bits in the 255.255.255 prefix.Media Access Control (MAC) Address A unique hardware-based equipment identifier, set during device manufacture. The MAC address uniquely identifies each node of a network. Access Points can be configured with MAC access lists, allowing only certain specific devices to connect with the LAN through them, or to allow certain MAC-identified network cards or devices access only to certain resources.
Glossary32 Installation and User Guide: Wireless LAN Client AdapterMAC address authentication Method of authenticating clients by using the MAC address of the client station as opposed to the user.Network Address Translation (NAT) The translation of one IP address used within a network to another address used elsewhere. One frequent use of NAT is the translation of IPs used inside a company, versus the IP addresses visible to the outside world. This feature helps increase network security to a small degree, because when the address is translated, this provides an opportunity to authenticate the request and/or to match it to known, authorized types of requests. NAT is also used sometimes to map multiple nodes to a single outwardly visible IP address.Network Interface Card (NIC) Generic term for network interface hardware that includes wired and wireless LAN adapter cards, PC Cardbus PCMCIA cards, and USB-to-LAN adapters.Network Management System (NMS) Software application that controls a network of multiple access points and clients.Node Generic term for a network entity. Includes a access point, network adapter (wireless or wired), or network appliance (such as a print server or other non-computer device)Network Time Protocol (NTP)  NTP servers are used to synchronize clocks on computers and other devices. APs have the capability to connect automatically to NTP servers to set their own clocks on a regular basis.Ping Packet INternet Groper (ping) A utility which determines whether a specific IP address is accessible, and the amount of network time (measured in milliseconds) for response. Ping is used primarily to troubleshoot Internet connections.Policy-based Networking The management of a network with rules (or policies), governing the priority and availability of bandwidth and resources, based both on the type of data being transmitted, as well as the privileges assigned to a given user or group of users. This allows network administrators to control how the network is used, to help maximize efficiency.Power Over Ethernet (PoE) Power supplied to a device by way of the Ethernet network data cable instead of a electrical power cord.Preamble Type The preamble defines the length of the cyclic redundancy check (CRC) block for communication between the Access Point and a roaming network adapter. All nodes on a given network should use the same preamble type.Quality of Service (QoS) QoS is a term encompassing the management of network performance, based on the notion that transmission speed, signal integrity, and error rates can be managed,
GlossaryInstallation and User Guide: Wireless LAN Client Adapter 33measured, and improved. In a wireless network, QoS is commonly managed through the use of policies.Remote Authentication Dial-In User Service (RADIUS) A client/server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize service or system access. RADIUS permits maintenance of user profiles in a central repository that all remote servers can share. Radio Frequency (RF) The electromagnetic wave frequency radio used for communications applications.Roaming Analogous to the way cellular phone roaming works, roaming in the wireless networking environment is the ability to move from one AP coverage area to another without interruption in service or loss in connectivity.Rogue AP An access point that connects to the wireless network without authorization.Secure SHell (SSH) Also known as the Secure Socket Shell, SSH is a UNIX-based command line interface for secure access to remote systems. Both ends of communication are secured and authenticated using a digital certificate, and any passwords exchanged are encrypted.Service Set Identifier (SSID) The SSID is a unique identifier attached to all packets sent over a wireless network, identifying one or more wireless network adapters as “belonging” to a common group. Some Access Points can support multiple SSIDs, allowing for varying privileges and capabilities, based on user roles.Secure Sockets Layer (SSL) A common protocol for message transmission security on the Internet. Existing as a program layer between Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers, SSL is a standard feature in Internet Explorer, Netscape, and most web server products.Simple Mail Transfer Protocol (SMTP) Protocol used to transfer email messages between email servers.Simple Network Management Protocol (SNMP) An efficient protocol for network management and device monitoring.SNMP trap A process that filers SNMP messages and saves or drops them, depending upon how the system is configured.Spanning Tree Protocol (STP) A protocol that prevents bridging loops from forming due to incorrectly configured networks.Station (STA) An 802.11 capable device that supports only one 802.11 network interface, capable of establishing a Basic Service Set 802.11 network (i.e., peer-to-peer network)
Glossary34 Installation and User Guide: Wireless LAN Client AdapterStatic IP Address A permanent IP address assigned to a node in a TCP/IP network.Subnet Portion of a network, designated by a particular set of IP addresses. Provides a hierarchy for addressing in LANs. Also called subnetwork.Subnet Mask A TCP/IP addressing method for dividing IP-based networks into subgroups or subnets (compare with maskbits). Each triplet of digits in an IP address consists of 8 bits. To specify using a subnet mask, indicate the masked bits as an IP address. To specify the subnet in maskbits, count the number of bits in the prefix. Example: subnet mask 255.255.255.0 is equivalent to 24 maskbits, which is the total number of bits in the 255.255.255 prefix.Temporal Key Integrity Protocol (TKIP) Part of the IEEE 802.11i encryption standard. TKIP provides improvements to WEP encryption, including per-packet key mixing, message integrity check and a re-keying mechanism.Traffic Class Identifier (TCID) Part of the standard 802.11 frame header. The 3-bit TCID is used for mapping to class-of-service values.Transmission Control Protocol/Internet Protocol (TCP/IP) One of the most commonly used communication protocols in modern networking. Addresses used in TCP/IP usually consist of four triplets of digits, plus a subnet mask (for example, 192.168.25.3, subnet 255.255.255.0).Transport Layer Security (TLS) Protocol that provides privacy protection for applications that communicate with each other and their users on the Internet. TLS is a successor to the Secure Sockets Layer (SSL). Trunk In telecommunications, a communications channel between two switching systems. In a wireless network, a trunk is a wireless connection from one access point to another.Type of Service (ToS) Sometimes also called IP Precedence, ToS is a system of applying QoS methodologies, based on headers placed into transmitted IP packets.User Datagram Protocol (UDP) A connectionless protocol similar to TCP/IP, but without the same level of error-checking. UDP is commonly used when some small degree of errors and packet-loss can be tolerated without losing program integrity, such as for online games.Virtual LAN (VLAN) A local area network with a definition that addresses network nodes on some basis other than physical location or even whether the systems are wired together or operating using the same local equipment. VLANs are, on average, much easier to manage than a physically implemented LAN. In other words, moving a user from one VLAN to another is a simple change in software, whereas on a regular LAN, the computer or device would need to be connected physically to a different switch
GlossaryInstallation and User Guide: Wireless LAN Client Adapter 35or router to accomplish the same thing. Network management software of some sort is used to configure and manage the VLANs on a given network. Wi-Fi Protected Access (WPA) Security mode for wireless networks that improves on the authentication and encryption features of WEP.Wired Equivalent Privacy (WEP) Security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. Uses dynamically or manually assigned keys for encryption and authentication, as dictated by the capabilities of the client station. The WEP algorithms are vulnerable to compromise; therefore, WEP security is only recommended for legacy clients that do not support the newer generation security standards.Windows Internet Name Server (WINS) The Windows implementation of DNS, which maps IP addresses to computer names (NetBIOS names). This allows users to access resources by computer name instead of by IP address. Wi-Fi  A play on the term “HiFi,” Wi-Fi stands for Wireless Fidelity, which is a term for wireless networking technologies.Wireless Local Area Network (WLAN) An acronym for wireless local area network, employing radio frequencies to transmit data (usually encrypted for), much like LANs transmit data over wires and fiber optic cables.
Glossary36 Installation and User Guide: Wireless LAN Client Adapter
Installation and User Guide: Wireless LAN Client Adapter 37IndexNumerics128-bit WEP key   2540-bit WEP key   25802.11   11, 43802.1x   43Aaccess point (AP)   43ACL   43activating a profile   21ad-hoc network   11, 43Advanced Encryption Standard. See AESAES   25, 43allow roaming checkbox   17ASCII encoding of WEP key   25authentication   25server   43authentication string   25authentication zone   43automatic scan   21Bbackhaul   43bands   12basic configuration   19basic service set. See BSSbridge   44BSS   12, 44BSSID   16, 44checkbox   17Cchannels   12Client Utility   43compact view   14expanded view   15Client Utility functions   12compact view   14connect to ad-hoc network   24connecting the Wireless Client LAN Adapter   2COS   44creating a profile   21Ddeleting a profile   22device types   1DFS   44DHCP   44display mode   15DNS   44driver installationWindows 2000   31Windows XP   29DSCP   44dynamic IP address   44EEAP   44EAP-PEAP   44EAP-TLS   44editing a profile   22encryption   16, 25ESS   12, 45ESSID   45extended service set. See ESSFfeatures   1Funk Software   26Ggraphical mode   15Hhexidecimal encoding of WEP key   25high security   26home or small office   26hostname   45HTTP   45HTTPS   45IIBSS   12, 45icon in network list   16IEEE 802.11   11independent basic service set. See IBSSinfrastructure network   11infrastructure setting   24installation   1confirming   33verifying Windows 2000   38verifying Windows XP   33installing the driver and client utility   4installing the Wireless Client LAN Adapter driver   29introduction to the Client Utility   11IP   45IP address   45LLAN   45LEDs   3locationschanging   20MMAC address   45MAC address authentication   46maskbits   45Mini PCI adapter   1moving from location to location   20NNAT   46networkad-hoc   11infrastructure   11network listing   20network settingsprofile window   24NIC   46NMS   46no security   26node   46NTP   46Oopen security   26PPC card   1PCI card   1
Index38 Installation and User Guide: Wireless LAN Client Adapterping   46PoE   46policy-based networking   46power settings   24preamble type   46pre-shared key   25profile   16, 20profile name   23profile window   23network settings   24power settings   24security settings   24profilesactivating   21creating   21deleting   22editing   22QQoS   46RRADIUS   47RADIUS server   26Remote Authentication Dial-In User Service. See RADIUSRF   47roaming   17, 47rogue AP   47Sscanningfor available networks   20security   24authentication   24encryption   24security options   26security settings   24service set identifier. See SSIDshow BSSID checkbox   17signal icon   15signal pattern   15signal quality   16SMTP   47SNMP   47SNMP trap   47software patches   4SSH   47SSID   12, 16, 47SSL   47STA   47start ad-hoc network   24starting the Client Utility   14station   47status icon   16STP   47subnet   48subnet mask   48system requirements   1TTCID   48TCP/IP   48Temporal Key Integrity Protocol. See TKIPtext mode   15TKIP   25, 48TLS   48ToS   48tray icon   14trunk   48UUDP   48uninstalling the Client Utility   8using the tray icon   14VVLAN   48WWEP   25, 26, 49ASCII encoding   25hexidecimal encoding   25Wi-Fi   49Wi-Fi Protected Access. See WPAWindowsmanaging wireless adapter   12wireless software patches   4Wireless Zero Config (WZC)   12WINS   49wireless adapterand Windows   12wireless bands and channels   12Wireless Zero Config. See WZCWLAN   49WPA   25, 26, 49WZC   12using to configure security   26

Navigation menu