Alpha Networks 2004050123-1 IEEE802.11g Wireless PCI Adapter User Manual dwl520d1 manual 100 061703

Alpha Networks Inc. IEEE802.11g Wireless PCI Adapter dwl520d1 manual 100 061703

Contents

User Manual Part 1

ManualD-Link AirPlus Xtreme G   DWL-G510High-Speed 802.11gBuilding Networks for PeopleTM Wireless PCI AdapterRev. B1
2ContentsPackage Contents ................................................................................3Introduction............................................................................................4Wireless Basics ....................................................................................6Getting Started ......................................................................................9Using the Configuration Utility ..............................................................12Networking Basics ..............................................................................26Troubleshooting...................................................................................39Technical Specifications ......................................................................44Contacting Technical Support ..............................................................46Warranty and Registration ...................................................................47
3Package ContentsSystem Requirements:Windows XP/2000/Me/98SE! A computer or laptop with an available 32-bit PCI slot!At least 32 MB of memory and a 300 MHz processor!An  802.11g or 802.11b Access Point (for Infrastructure mode), oranother 802.11g or 802.11b wireless adapter (for Ad-Hoc, Peer-to-Peer networking mode).!Contents of Package:D-Link AirPlus Xtreme G    DWL-G510High-Speed 2.4 GHz/802.11g Wireless PCI AdapterManual and Drivers on CDQuick Installation GuideIf any of the above items are missing, please contact your reseller.!!!TM
4IntroductionThe DWL-G510 has the newest, strongest, and most advanced security features availabletoday. When used with other 802.11 WPA (Wi-Fi Protected Access) and 802.1x compatibleproducts in a network with a RADIUS server, the security features include:WPA:  Wi-Fi Protected Access which authorizes and identifies users based on a secretkey that changes automatically at regular intervals. WPA uses TKIP (TemporalKey Integrity Protocol) to change the temporal key every 10,000 packets (apacket is a kind of message transmitted over a network.) This ensures muchgreater security than the standard WEP security.  (By contrast, the older WEPencryption required the keys to be changed manually.)802.1x:  Authentication which is a first line of defense against intrusion. In theauthentication process, the Authentication Server* verifies the identity of theclient attempting to connect to the network. Unfamiliar clients would be deniedaccess.For  home users that will not incorporate a RADIUS server in their network, the securityfor the DWL-G510, used in conjunction with other WPA-compatible 802.11 products, willstill be much stronger than ever before. Utilizing the Pre Shared Key mode of WPA,the DWL-G510 will obtain a new security key every time it connects to the 802.11network. You only need to input your encryption information once in the configurationmenu. No longer will you have to manually input a new WEP key frequently to ensuresecurity. With the DWL-G510, you will automatically receive a new key every time youconnect, vastly increasing the safety of your communication.* Not all servers can provide Authentication.The D-Link AirPlus Xtreme G     DWL-G510 Wireless PCI Adapter is an 802.11g high-performance, wireless adapter that supports high-speed wireless networking at home,at work or in public places.Unlike most network cards, the DWL-G510 provides data transfers at up to 54 Mbps.The 802.11g standard is backwards compatible with 802.11b products.TM
5Features & Benefits!Fully compliant with the 802.11b standard and interoperable with allexisting 802.11b-compliant  and 802.11g compliant devices!Operates in the 2.4GHz frequency range!Maximum reliability, throughput and connectivity with automatic data rateswitching!High Performance 32-bit PCI - The high capacity PCI interface utilized by theDWL-G510 ensures optimal performance in transmitting a wireless signal withinthe desktop computer. By utilizing a standard PCI 2.2 interface, the DWL-G510ensures a wide range of compatibility with motherboards used by PC manufac-turers! Quick and Easy Installation- The DWL-G510 installs quickly and easily into astandard PCI 2.2 slot in a desktop computer. By following the simple stepsoutlined in the Quick Installation Guide, you can connect to an available wire-less network in a matter of secondsStronger Security than ever before with WPA - Wi-Fi Protected Accessauthorizes and identifies users based on a secret key that changes automati-cally at regular intervals, for example:!!TKIP (Temporal Key Integrity Protocol), in conjunction with a RADIUSserver, changes the temporal key every 10,000 packets, ensuring greatersecurityPre-Shared Key mode means that the home user, without a RADIUSserver, will obtain a new security key every time he or she connects tothe network, vastly improving the safety of communications on the net-work!Extra Protection - 802.1x Authentication in conjunction with the RADIUSserver verifies the identity of wireless clients wishing to gain access to theWLAN!Provides a measure of security for the information transmitted over awireless network with high data encryption at 64-, 128-, and 152-bit WEP!Supports Infrastructure networks via an access point and Peer-to-Peercommunication in Ad-Hoc mode!!User-friendly configuration and diagnostic utilitiesFive times faster - achieve data transfer speeds up to 54 Mbps; up to 5xfaster than conventional 802.11b networks, when used with other 802.11gdevices!!Provides a simple and inexpensive way to connect your desktop com-puter to a wireless network at home, at the office, or in public places
6Wireless BasicsD-Link wireless products are based on industry standards to provide easy-to-use andcompatible high-speed wireless connectivity within your home, business or public accesswireless networks. D-Link wireless products will allow you access to the data you want,when and where you want it. You will be able to enjoy the freedom that wireless networkingbrings.A Wireless Local Area Network (WLAN) is a computer network that transmits and receivesdata with radio signals instead of wires. WLANs are used increasingly in both home andoffice environments, and public areas such as airports, coffee shops and universities.Innovative ways to utilize WLAN technology are helping people to work and communicatemore efficiently. Increased mobility and the absence of cabling and other fixedinfrastructure have proven to be beneficial for many users.Wireless users can use the same applications they use on a wired network.  Wirelessadapter cards used on laptop and desktop systems support the same protocols asEthernet adapter cards.People use WLAN technology for many different purposes:Mobility - Productivity increases when people have access to data in any locationwithin the operating range of the WLAN.  Management decisions based on real-timeinformation can significantly improve worker efficiency.Low Implementation Costs – WLANs are easy to set up, manage, change andrelocate. Networks that frequently change can benefit from WLANs ease of implementation.WLANs can operate in locations where installation of wiring may be impractical.Installation and Network Expansion - Installing a WLAN system can be fastand easy and can eliminate the need to pull cable through walls and ceilings. Wirelesstechnology allows the network to go where wires cannot go - even outside the home oroffice.Scalability – WLANs can be configured in a variety of ways to meet the needs ofspecific applications and installations. Configurations are easily changed and rangefrom peer-to-peer networks suitable for a small number of users to larger infrastructurenetworks to accommodate hundreds or thousands of users, depending on the number ofwireless devices deployed.Inexpensive Solution - Wireless network devices are as competitively priced asconventional Ethernet network devices.
7Wireless Basics (continued)Standards-Based TechnologyThe  DWL-G510 Wireless PCI Adapter utilizes the new 802.11g standard.The IEEE 802.11g standard is an extension of the 802.11b standard. It increases thedata rate up to 54 Mbps within the 2.4GHz band, utilizing OFDM technology.This means that in most environments, within the specified range of this device, you willbe able to transfer large files quickly or even watch a movie in MPEG format over yournetwork without noticeable delays. This technology works by transmitting high-speeddigital data over a radio wave utilizing OFDM (Orthogonal Frequency Division Multiplexing)technology. OFDM works by splitting the radio signal into multiple smaller sub-signalsthat are then transmitted simultaneously at different frequencies to the receiver. OFDMreduces the amount of crosstalk (interference) in signal transmissions. The D-Link DWL-G510 will automatically sense the best possible connection speed to ensure the greatestspeed and range possible.802.11g offers the most advanced network security features available today, including:WPA , 802.1x, TKIP, AES and Pre-Shared Key mode. These security features areexplained in more detail in the Introduction and the Features section of this manual.The DWL-G510 is backwards compatible with 802.11b devices. This means that if youhave an existing 802.11b network, the devices in that network will be compatible with802.11g devices at speeds up to 11Mbps in the 2.4GHz range.The DWL-G510 is compatible with 802.11g and 802.11b wireless products, which include:D-Link Air DWL-650,D-Link AirPlus DWL-650+,D-Link AirPlus Xtreme G     DWL-G6502.4GHz Wireless Cardbus Adapter used with laptop computersD-Link Air DWL-520, D-Link AirPlus DWL-520+2.4GHz Wireless PCI cards used with desktop computersD-Link AirPlus DWL-900AP+, D-Link AirPlus Xtreme G     DWL-2000AP2.4GHz Wireless Access PointsD-Link AirPlus DI-614+, DI-714P+2.4GHz Wireless Routers!!!!TMTM
8Installation ConsiderationsThe D-Link AirPlus Xtreme G    DWL-G510  lets you access your network using awireless connection from virtually anywhere within its operating range. Keep in mind,however, that the number, thickness and location of walls, ceilings, or other objects thatthe wireless signals must pass through, may limit the range. Typical ranges vary dependingon the types of materials and background RF (radio frequency) noise in your home orbusiness. The key to maximizing wireless range is to follow these basic guidelines:Keep your product away (at least 3-6 feet or 1-2 meters) from electricaldevices or appliances that generate RF noise.4Keep the number of walls and ceilings between the DWL-G510 and other networkdevices  to a minimum - each wall or ceiling can reduce your DWL-G510’srange from 3-90 feet (1-30 meters.) Position your devices so that the number ofwalls or ceilings is minimized.1Be aware of the direct line between network devices. A wall that is 1.5 feet thick(.5 meters), at a 45-degree angle appears to be almost 3 feet (1 meter) thick. Ata 2-degree angle it looks over 42 feet (14 meters) thick!  Position devices sothat the signal will travel straight through a wall or ceiling (instead of at anangle) for better reception.2Building materials can impede the wireless signal - a solid metal door or aluminumstuds may have a negative effect on range. Try to position wireless devices andcomputers with wireless adapters so that the signal passes  through drywall oropen doorways and not other materials.3Wireless Basics (continued)TM
9LEDsLED stands forLight-EmittingDiode.Getting Started With its default settings, the DWL-G510, when activated, will connectwith other D-Link AirPlus Xtreme G     products, right out of the box.Power:  Solid green light indicates connection to the networkNetwork:   Blinking green light indicates activity on the networkThere are basically two modes of networking:Infrastructure – using an Access Point or Router, such asthe DI-624Ad-Hoc – directly connecting to another computer, for peer-to-peer communication, using wireless network adapters oneach computer, such as two or more DWL-G510 wirelessnetwork adaptersOn the following pages we will show you an example of an Infrastructure Networkand an Ad-Hoc Network.An Infrastructure network contains an Access Point or Router. The InfrastructureNetwork example shown on the following page contains the following D-Link networkdevices (your existing network may be comprised of other devices):!!TMA wireless Router - D-Link AirPlus Xtreme G    DI-624A desktop computer with a wireless adapter -D-Link AirPlus Xtreme G    DWL-G510, D-Link Air DWL-520,or D-Link AirPlus DWL-520+(D-Link Air devices have speeds up to 11Mbps)A Cable modem - D-Link DCM-201!!!TMTM
10Please remember that D-Link AirPlus Xtreme G     wireless devices are pre-configured to connect together, right out of the box, with their default settings.Getting Started (continued)For a typical wireless setup at home (as shown above), please do the following:Setting up a Wireless Infrastructure Network4213657You will need broadband Internet access (a Cable or DSL-subscriber line intoyour home or office).Consult with your Cable or DSL provider for proper installation of the modem.Connect the Cable or DSL modem to your broadband router (see the QuickInstallation Guide included with your router.)Install the D-Link AirPlus Xtreme G     DWL-G510  Wireless PCI Adapter into anavailable PCI slot on your desktop computer. (See the Quick Installation Guideincluded with the DWL-G510.)Install the D-Link AirPlus Xtreme G     DWL-G650 Wireless PC Card Adapterinto a laptop computer.(See the Quick Installation Guide included with the DWL-G650.)If you wish, you may connect a computer that is equipped with an Ethernetnetwork adapter (such as a DFE-530TX+) to the router also.A RADIUS Server is optional. Connect a RADIUS Server to your network to useall the features of WPA. (Without a RADIUS Server you can still use the WPAPre-Shared Key mode.) RADIUS Authentication can also be provided by anotherservice provider over the Internet and remote to your network site.TMTMTM
11Getting Started (continued)Setting up a Wireless Ad Hoc NetworkInstall the DWL-G510 into the desktop computer.(See the Quick Installation Guide included with the product forinstallation instructions.)Install the DWL-G650 Wireless PC Card Adapter  into a laptop computer.(See the Quick Installation Guide included with the product.)Set the wireless configuration for the adapters to Ad-Hoc mode, set theadapters to the same channel, and assign an IP Address to eachcomputer on the Ad-Hoc network. (See Box below).IP AddressDesktopWhen assigning IP Addresses to the computers on the network, please rememberthat the IP Address for each computer must be in the same IP Address rangeas all the computers in the network, and the subnet mask must be exactly thesame for all the computers in the network.For example:  If the first computer is assigned an IP Address of 192.168.0.2 with aSubnet Mask of 255.255.255.0, then the second computer can be assigned an IPAddress of 192.168.0.3 with a Subnet Mask of 255.255.255.0, etc.IMPORTANT: If computers or other devices are assigned the same IP Address,one or more of the devices may not be visible on the network.D-Link AirPlus Xtreme GDWL-G650TMD-Link AirPlus Xtreme GDWL-G510TM
12Select the Wireless Networks tab.Uncheck the box in the properties windowthat enables windows configuration.D-Link AirPlus Xtreme G   DWL-G510 uses the Configuration Utility as themanagement software. The utility provides the user an easy interface to change anysettings related to the wireless adapter. After you have completed the installation of theDWL-G510 (refer to the Quick Installation Guide that came with your purchase) wheneveryou start the computer, the Configuration Utility starts automatically and the systemtray icon is loaded in the toolbar (see illustration below*.)  Clicking on the utility icon willstart the Configuration Utility. Another way to start the Configuration Utility is toclick on Start>Programs>D-Link AirPlus Xtreme G>D-Link AirPlus Xtreme G Utility.Using the Configuration UtilityIf you are using Windows XP, you can use either the Zero Configuration Utility or theD-Link Configuration Utility.If the icon does not display in the taskbar, then click onthis icon on your desktop to open.To use the D-Link Configuration Utility with XP, right-clickon the Wireless network icon in the taskbar in the lowerright-hand corner of your computer screen.In the window that appears, select ViewAvailable Wireless Networks and clickthe Advanced button. The screen at rightwill appear.After you have done this, you can then use the D-LinkConfiguration Utility with XP by clicking on the D-LinkConfiguration Utility icon. *Configuration Utility iconin the system trayTM
13Link InfoUsing the Configuration Utility (continued)After clicking on the Configuration Utility icon, the Link Info screen will display thesettings for the DWL-G510:SSID:The Service Set Identifier is the nameassigned to the wireless network.The factory SSID setting is default.Tx Rate:Tx Rate settings are automatically determined for an optimal speed up to a maximumof 54Mbps.Status:Displays the MAC Address of theAccess Point or Router to which theDWL-G510 is associatedChannel:The channel selection is automatically determined by the DWL-G510.Signal Strength:Packet Count:Displays the statistics of the data packets that are transmitted and received.Frequency:802.11g indicates that the DWL-G510 is communicating in the2.4GHz band.Encryption:You can see if WEP (Wired Equivalent Privacy) is Enabled or Disabled here.Wireless Mode:Either Infrastructure or Ad-Hoc will be displayed here. (Please see the GettingStarted section in this manual for an explanation of these two modes.)Rescan Button:Rescans for the strongest signal in your environment and associates with that AccessPoint or Router.Displays the Link Quality for the DWL-G510 wireless connection to the Access Point.The Signal Strength represents the wireless signal between the Access Point and theDWL-G510. The percentage coincides with the graphical bar.D-Link AirPlus Xtreme G UtilityD-Link AirPlus Xtreme G Utility
14Using the Configuration Utility (continued)Wireless Mode:Authentication:Data Encryption:Click on the pull-down menu; select from the following options:Choose one of the following modes:Select Enabled or Disabled.Open Authentication – the DWL-G510 is visible to all devices on the networkShared Authentication – allows communication only with other devices withidentical WEP settingsWPA – Wi-Fi Protected Access which authorizes and identifies users based on asecret key that changes automatically at a regular interval. (A RADIUS Server isrequired for this mode.)WPA-PSK - WPA Pre-Shared Key mode ensures that the DWL-G510 will obtain anew security key every time it connects to the 802.11 network. (A RADIUS Serveris not required for this mode.)SSID:Service Set Identifier is a name that identifies a wireless network. Access Points andwireless devices attempting to connect to a specific WLAN (Wireless Local Area Network)must use the same SSID. The default setting is default.Infrastructure - connecting to the WLAN using an Access Point. (This is the defaultsetting).Ad-Hoc – wireless mode used when connecting directly to a computer equippedwith a wireless adapter in a peer-to-peer environment.After you have configuredthe network through theSite Survey section ofthe D-Link AirPlus Utility,you can make minoradjustments and checkon settings in thisConfiguration screen.ConfigurationFor a completeexplanation of theconfiguration of anetwork, please referto the Site Surveysection in thischapter.D-Link AirPlus Xtreme G Utility
15Using the Configuration Utility (continued)*Not all servers can provide AuthenticationWhen you click IP Settings in theConfiguration window, this pop-upscreen will appear. Configure the IPSettings in this window.IP SettingsClick Apply to save changes.Keys 1-4:Select the default keyHexadecimal digits consist of the numbers 0-9 and the letters A-FASCII (American Standard Code for Information Interchange) is a code forrepresenting English letters as numbers from 0-127Key Length:Select the key length and either ASCII or hexadecimal format.IEEE 802.1x:Authentication which is a first line of defense against intrusion. In the Authenticationprocess the Authentication Server* verifies the identity of the client attempting to con-nect to the network. Unfamiliar clients are denied access.
16Ad-Hoc Channel:All devices in the Ad-Hoc network must be set to the same channelClick Apply if you have made any changesData Packet Parameter:Set the Fragmentation Threshold and the RTS Threshold. Please see below.You can Enable or Disablethe IP Settings portion of yourprofile here. If you selectDisable you will need toconfigure the IP Addressinformation each time youconnect to a network. If youselect  Enable you willmaintain the same IP Addressinformation each time youconnect to a network.Power Mode:Disable -this default settingconsumes the most powerEnable - this settingconsumes the least power.Using the Configuration Utility (continued)This value should remain at its default setting of 2432. If inconsistent data flow is aproblem, only a minor modification should be made.RTS Threshold:Fragmentation Threshold:This value should remain at its default setting of 2432. If you experience a high packeterror rate, you may slightly increase your Fragmentation Threshold within the valuerange of 256 to 2432. Setting the Fragmentation Threshold too low may result in poorperformance.Select Enable or DisableLaunch Utility on Startup:Profile IP Settings:Starting Ad-Hoc Network:Select the Ad-Hoc NetworkFrequency:Select the FrequencyAdvancedD-Link AirPlus Xtreme G Utility
17Refresh:Click on Refresh to get themost updated list of availablenetworks.Available Network:The top section of the window displays the Available Networks. Scroll up and down thelist and highlight the network to which you wish to connect. Click on the Connect but-ton.Profile:In the lower half of the screen, you can manage the profiles that you have created for thewireless network at home, at the office and in public places. Scroll up and down andhighlight the profile that you wish to configure. You can Add or Remove a profile, orconfigure the Properties of the profile in order to connect with an available network.Connect:Highlight a network profile; click Connect to connect to that network.Rescan:Click Rescan to rescan and connect to the strongest signal.Configure:Highlight an existing networkand click Configure; theconfiguration window on thenext page will appear.Advanced:Highlight a network; clickAdvanced and the screen onthe next page will appear.Add:Click Add and the screen on the next page will appear.Remove:Highlight a network profile; click Remove to remove a network from the profile list.Properties:Highlight a network profile; click Properties and the screen on the next page will appear.Using the Configuration Utility (continued)Site SurveyD-Link AirPlus Xtreme G Utility
18Using the Configuration Utility (continued)Site Survey > AddIf you clicked on Add, you canconfigure, in this window, all theproperties of a profile that youwish to add to the network.In this window you can selectthe type of network connection.Click OK to save thechanges.If you clicked on Configurationor Properties you can config-ure, in this window, all the prop-erties of a profile that alreadyexists in the network.Click OK to save thechanges.AdvancedConfiguration, Add or PropertiesIf you choose to use the IEEE802.1x feature, please see thedetailed instructions on the fol-lowing pages.If you select WPA in theAuthentication field, pleasesee detailed instructions forconfiguring WPA on thefollowing pages.
19Using the Configuration Utility (continued)Site Survey > Configuration > 802.1xTo use 802.1x and to configure its settings, please do the following: IEEE 802.1x -Select Enabled.Click Authentication Config.Select the EAP Type youwant to use. Configure theinformation needed forauthenticating.Click OKTrusted CA List.Inner Authentication Protocol.For an explanation ofthe terms shown in thiswindow please see thefollowing pages.Advanced Security Settings
20Using the Configuration Utility (continued)802.1x > Advanced Security Settings > EAP TypesEAP Type Inner AuthenticationProtocol Information neededfor AuthenticatingEAP-TLSEAP-MSCHAPv2CertificateUser NameUser NamePasswordDomain NameLEAP User NamePasswordPAPTTLS IdentityUser NamePasswordCHAPTTLS IdentityUser NamePasswordMSCHAPTTLS IdentityUser NamePasswordDomain NameEAP-TTLSMSCHAPv2TTLS IdentityUser NamePasswordDomain Name
21Using the Configuration Utility (continued)802.1x > Advanced Security Settings > EAP Types (continued)802.1x > Advanced Security Settings > Definitions of TermsValidate Server Certificate:Check Validate Server Certificate to verify the identity of the authentication serverbased on its certificate when using EAP-TTLS, PEAP, and EAP-TLS. (This ischecked by default.)Certain protocols, such as EAP-TTLS, PEAP, and EAP-TLS, allow you to verify theidentity of the authentication server as the server verifies your identity. This is calledmutual authentication.You can select trusted authentication server certificates using the Add button at theTrusted CA List (at the bottom of the Advanced Security Settings page).EAP Type Inner AuthenticationProtocol Information neededfor AuthenticatingEAP-Generic Token cardEAP-MD5 User NamePasswordEAP-MSCHAPv2EAP-MD5 TTLS IdentityUser NamePasswordTTLS IdentityUser NamePasswordTTLS IdentityUser NamePasswordDomain NameUser NamePasswordEAP-TTLSPEAPEAP-Generic Token cardEAP-MSCHAPv2 User NamePasswordDomain Name
22Using the Configuration Utility (continued)Domain Name:Each server has a domain name that uniquely identifies it. That domain name is normallycontained in the Subject CN field of the server certificate. A server domain name endswith the name of a larger administrative domain, to which the server belongs.TTLS Identity:Tunneled Transport Layer Security satisfies a requirement for strong encryption andmutual authentication on Wireless networks. EAP-TTLS has a unique feature that otherprotocols do not offer. Because it sets up an encrypted tunnel for your credentials, it isalso able to pass your login name through that tunnel. That means that not only are yourcredentials secure from eavesdropping, but your identity is protected as well. Thus, withEAP-TTLS you have two identities: an inner one, and an outer one. The inner identity isyour actual user name. Your outer identity can be completely anonymous. Set yourouter identity in the TTLS Identity field.Trusted CA List:The Trusted CA List allows you to configure which authentication servers you trust forthe purpose of logging you in to the network.Click Add at the Trusted CA List at the bottom of the Advanced Security Settings page.Select the Trusted CA that you want to add and click OK.802.1x > Advanced Security Settings > Definitions of Terms (continued)Select the Trust CA:
23Using the Configuration Utility (continued)Authentication > WPA Click Configure.Select the availablenetwork to which youwant to connect.Select WPA in theAuthentication field.Click AuthenticationConfigAfter you click Authentication Config, the Advanced Security Settings screen will ap-pear. Complete the Advanced Security Settings configuration. Please see pages 19-22 ofthis manual to find out more about the Advanced Security Settings.D-Link AirPlus Xtreme G Utility
24Using the Configuration Utility (continued)Authentication > WPA-PSKWPA-PSK does notrequire a RADIUSServer in the network. Select WPA-PSK inthe Authenticationfield.Click AuthenticationConfigClick Configure.Select the availablenetwork to which youwant to connect.D-Link AirPlus Xtreme G Utility
25Using the Configuration Utility (continued)Authentication > WPA-PSK (continued) Enter the WPAPassphrase.Click OK.The configuration is done.Advanced Security Settings

Navigation menu