D Link DWLG132B1 AirPlus Xtreme G DWL-G132 Wireless USB Adapter User Manual dwl120v F manual 102103

D Link Corporation AirPlus Xtreme G DWL-G132 Wireless USB Adapter dwl120v F manual 102103

Contents

Users Manual 1

ManualBuilding Networks for People 802.11g (2.4GHz) Wireless G USB 2.0 AdapterDWL-G132     D-Link AirPlus XTREME GTM
2ContentsPackage Contents ................................................................................3Introduction............................................................................................4Features and Benefits ...........................................................................6Wireless Basics ....................................................................................7Installation Considerations ....................................................................7Getting Started ......................................................................................9Using the Configuration Utility ..............................................................12Networking Basics ..............................................................................26Troubleshooting...................................................................................39Technical Specifications ......................................................................42Contacting Technical Support ..............................................................44Warranty and Registration ...................................................................45
3D-Link AirPlus Xtreme GTM DWL-G1322.4 GHz Wireless G USB 2.0  AdapterAt least 64MB of memory and a 500MHz processorProperly installed and working USB ControllerWindows XP/2000 A computer or laptop with an available USB 2.0 portManual on CD-ROMQuick Installation GuideCradleContents of Package:Package ContentsIf any of the above items are missing, please contact your reseller.System Requirements:
4IntroductionThe D-Link AirPlus Xtreme G  DWL-G132 Wireless G USB Adapter is an802.11b/802.11g high-performance,convenient Plug & Play USB 2.0 solution thatbrings wireless networking to your laptop or desktop PC.With a maximum wireless signal rate of up to 54Mbps (108Mbps* in Turbomode) you can connect to a wireless network at home, at the office or at anywireless hotspot. Now you can stay connected wherever you are and whereveryou go.The DWL-G132 is Wi-Fi compliant, meaning that it can connect and interoperatewith other 802.11b or 802.11g Wi-Fi-compliant wireless routers, access pointsand adapters. The DWL-G132 connects to any available USB port on a laptopor desktop Windows -based computer and also includes a USB cradle. Withthe optional USB cradle, the DWL-G132 can be positioned virtually anywhereat a workstation to achieve the best available wireless signal reception - whetherthat workstation is in your office, on your deck or patio, by the pool, at the localcoffee shop, or in an airport terminal while waiting to board your next flight.The adapter works with Microsoft Windows XP and Windows 2000 operatingsystems to ensure that you’ll be up and running on a wireless network in just amatter of seconds.Using its default settings, the DWL-G132 automatically connects to otherD-Link AirPlus Xtreme GTM wireless products as soon as it’s active.TM*Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual data throughput will vary. Network conditions and evironmental factors lower actual data throughput rate.The DWL-G132 has the newest, strongest and most advanced security featuresavailable today. When used with other 802.11 WPA (Wi-Fi Protected Access)and 802.1x compatible products in a network with a RADIUS server, the securityfeatures include:WPA:   Wi-Fi Protected Access which authorizes and identifies users basedon a secret key that changes automatically at regular intervals. WPAuses TKIP (Temporal Key Integrity Protocol) to change the temporalkey every 10,000 packets (a packet is a kind of message transmittedover a network.) This ensures much greater security than the standardWEP security. (By contrast, the previous WEP encryptionimplementations required the keys to be changed manually.)
5For  home users that will not incorporate a RADIUS server in their network, thesecurity for the DWL-G132, used in conjunction with other WPA-compatible802.11 products, will still be much stronger than ever before. Utilizing thePre-Shared Key mode of WPA, the DWL-G132 will obtain a new security keyevery time it connects to the 802.11 network. You only need to input yourencryption information once in the configuration menu. No longer will you haveto manually input a new WEP key frequently to ensure security. With theDWL-G132, you will automatically receive a new key every time you connect,vastly increasing the safety of your communication.Introduction (continued)802.1x: Authentication which is a first line of defense against intrusion. In theauthentication process, the Authentication Server  verifies the identity ofthe client attempting to connect to the network. Unfamiliar clients wouldbe denied access.
6Features and Benefits**3Environmental factors may adversely affect range.User-friendly configuration and diagnostic utilities.Supports Infrastructure networks via an access point andPeer-to-Peer communication in Ad-Hoc mode.Connects at up to 328 feet indoors3.1 year warranty.2Using a USB 1.1 port will adversely affect throughput.1Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual datathroughput will vary. Network conditions and environmental factors lower actual data throughput rate.Compact size for placement anywhere.Convenience of Plug & Play installation.Fully 802.11b/802.11g compatible.Powered by the USB port; no external power source is required.USB 2.0 standard2.Better Security with 802.1x and WPA - In addition to 64-,128-bit WEPencryption, you can also securely connect to a wireless network using802.1x for wireless authentication, as well as WPA (Wi-Fi ProtectedAccess) providing you a much higher level of security for your data andcommunication than has previously been available.Provides maximum wireless signal rate of up to 54Mbps(108Mbps1 in Turbo mode).Optimal wireless reception using its cradle (included). Position theDWL-G132 almost anywhere in your workspace to achieve the bestreception possible.
7Wireless BasicsWireless users can use the same applications they use on a wired network.Wireless adapter cards used on laptop and desktop systems support the sameprotocols as Ethernet adapter cards.D-Link wireless products are based on industry standards to provideeasy-to-use and compatible high-speed wireless connectivity within your home,business or public access wireless networks. D-Link wireless products willallow you access to the data you want, when and where you want it. You will beable to enjoy the freedom that wireless networking brings.A wireless local area network (WLAN) is a computer network that transmitsand receives data with radio signals instead of wires. WLANs are usedincreasingly in both home and office environments, and public areas such asairports, coffee shops and universities. Innovative ways to utilize WLANtechnology are helping people to work and communicate more efficiently.Increased mobility and the absence of cabling and other fixed infrastructurehave proven to be beneficial to many users.People use WLAN technology for many different purposes:Mobility - Productivity increases when people have access to data in anylocation within the operating range of the WLAN. Management decisions basedon real-time information can significantly improve worker efficiency.Low Implementation Costs - WLANs are easy to set up, manage, changeand relocate. Networks that frequently change can benefit from WLANs easeof implementation. WLANs can operate in locations where installation of wiringmay be impractical.Installation and Network Expansion - Installing a WLAN system can be fastand easy and can eliminate the need to pull cable through walls and ceilings.Wireless technology allows the network to go where wires cannot go - evenoutside the home or office.Inexpensive Solution - Wireless network devices are as competitively pricedas conventional Ethernet network devices.Scalability - WLANs can be configured in a variety of ways to meet the needsof specific applications and installations. Configurations are easily changedand range from Peer-to-Peer networks suitable for a small number of users tolarger Infrastructure networks to accommodate hundreds or thousands ofusers, depending on the number of wireless devices deployed.
8Installation ConsiderationsThe DWL-G132 lets you access your network using a wireless connectionfrom virtually anywhere within its operating range. Keep in mind, however, thatthe number, thickness and location of walls, ceilings, or other objects that thewireless signals must pass through, may limit the range. Typical ranges varydepending on the types of materials and background RF (radio frequency) noisein your home or business. The key to maximizing wireless range is to followthese basic guidelines:Keep your product away (at least 3-6 feet or 1-2 meters) from electricaldevices or appliances that generate RF noise.4Keep the number of walls and ceilings between the DWL-G132 andother network devices  to a minimum - each wall or ceiling can reduceyour DWL-G132’s range from 3-90 feet (1-30 meters.) Position yourdevices so that the number of walls or ceilings is minimized.1Be aware of the direct line between network devices. A wall that is 1.5feet thick (.5 meters), at a 45-degree angle appears to be almost 3 feet(1 meter) thick. At a 2-degree angle it looks over 42 feet (14 meters)thick!  Position devices so that the signal will travel straight through awall or ceiling (instead of at an angle) for better reception.2Building materials can impede the wireless signal - a solid metal dooror aluminum  studs may have a negative effect on range. Try to positionwireless devices and computers with wireless adapters so that thesignal passes  through drywall or open doorways and not other materials.3Wireless Basics (continued)
9A wireless router - D-Link AirPlus Xtreme GTM DI-624A laptop computer with a D-Link AirPlus Xtreme GTM DWL-G132A desktop computer with a D-Link AirPlus Xtreme GTM DWL-G132A cable modem - D-Link DCM-201 With its default settings, the DWL-G132 will connect with otherD-Link AirPlus Xtreme GTM products, right out of the box.Getting StartedThere are basically two modes of networking:Infrastructure – using an access point or router, such as the DI-624.Ad-Hoc – directly connecting to another computer, for Peer-to-Peercommunication, using wireless network adapters on each computer,such as two or more DWL-G132 Wireless Network USB adapters.On the following pages we will show you an example of an InfrastructureNetwork and an Ad-Hoc Network.An Infrastructure network contains an access point or router. TheInfrastructure network example shown on the following page contains thefollowing D-Link network devices (your existing network may be comprised ofother devices):
10You will need broadband Internet access (a cable or DSL-subscriberline into your home or office).Consult with your cable or DSL provider for proper installation of themodem.Connect the cable or DSL modem to your broadband router.(See the Quick Installation Guide included with your router.)Install the D-Link AirPlus Xtreme G  DWL-G132 Wireless USB 2.0adapter into an available USB port on your desktop computer.(See the Quick Installation Guide included with the DWL-G132.)Getting Started (continued)For a typical wireless setup at home (as shown above), please do the following:55555Setting up a Wireless Infrastructure Network111112222233333Install the D-Link AirPlus Xtreme G  DWL-G132 wireless USB 2.0adapter into an available USB port on your laptop computer.(See the Quick Installation Guide included with the DWL-G132.)44444TMDWL-G132DWL-G132TM
11Getting Started (continued)Setting up a Wireless Ad-Hoc NetworkWhen assigning IP addresses to the computers on the network, pleaseremember that the IP address for each computer must be in the sameIP address range as all the computers in the network, and the subnetmask must be exactly the same for all the computers in the network.For example: If the first computer is assigned an IP address of 192.168.0.2with a subnet mask of 255.255.255.0, then the second computer can beassigned an IP address of 192.168.0.3 with a subnet mask of 255.255.255.0,etc.IMPORTANT: If computers or other devices are assigned the same IPaddress, one or more of the devices may not be visible on the network.IP AddressInstall the D-Link AirPlus Xtreme GTM DWL-G132 Wireless USB 2.0adapter into the desktop computer. (See the Quick Installation Guideincluded with the product.)Set the wireless configuration for the adapters to Ad-Hoc mode, setthe adapters to the same channel, and assign an IP address to eachcomputer on the Ad-Hoc network.Install the D-Link AirPlus Xtreme GTM DWL-G132 Wireless USB 2.0adapter into the laptop computer. (See the Quick Installation Guideincluded with the product.)DWL-G132Wireless G USB 2.0 Adapter
12Select the Wireless Networks tab.Uncheck the box in the properties windowthat enables windows configuration.D-Link AirPlus Xtreme GTM DWL-G132 uses the Configuration Utility asthe management software. The utility provides the user an easy interface tochange any settings related to the wireless adapter. After you have completedthe installation of the DWL-G132 (refer to the Quick Installation Guide thatcame with your purchase) whenever you start the computer, the ConfigurationUtility starts automatically and the system tray icon is loaded in the toolbar(see illustration below.*) Clicking on the utility icon will start the ConfigurationUtility. Another way to start the Configuration Utility is to click onStart>Programs>D-Link AirPlus Xtreme G >D-Link AirPlus Xtreme G Utility.Using the Configuration UtilityIf you are using Windows XP, you can use either the Zero Configuration Utilityor the D-Link Configuration Utility.If the icon does not display in the taskbar, then click onthis icon on your desktop to open.To use the D-Link Configuration Utility with XP, right-clickon the wireless network icon in the taskbar in the lowerright-hand corner of your computer screen.In the window that appears, selectView Available Wireless Networksand click the Advanced button. Thescreen at right will appear.After you have done this, you can then use the D-LinkConfiguration Utility with XP by clicking on the D-LinkConfiguration Utility icon. *Configuration Utility iconin the system tray
13Using the Configuration Utility (continued)Link InfoSSID:The Service Set Identifier is the name assigned to the wireless network. Thefactory SSID setting is default.Status:Displays the MAC address of the access point or router to which theDWL-G132 is associated.Frequency:802.11b indicates that the DWL-G132 is communicating in the 2.4GHz band.Wireless Mode:Either Infrastructure or Ad-Hoc will be displayed here. (Please see the GettingStarted section in this manual for an explanation of these two modes.)
14Using the Configuration Utility (continued)Tx Rate:The default setting is Auto; Tx Rate settings are automatically determined fora maximum wireless signal rate of up to 54Mbps (108Mbps* in Turbo mode).Channel:The default setting is Auto. The channel selection is automatically determinedby the DWL-G132.Signal Quality:Displays the signal strength and the link quality of the DWL-G132’s wirelessconnection to the access point or router.Packet Count:Displays the statistics of the data packets that are transmitted and received.Encryption:You can see if WEP (Wired Equivalent Privacy) is Enabled or Disabled here.Rescan Button:Rescans for the strongest signal with the current SSID and associates withthat access point or router.Connection Info:When the DWL-G132 is connected to a wireless network, Connected will bedisplayed in this field.*Maximum wireless signal rate derived from 802.11g specifications. Actual data throughputwill vary. Network conditions and environmental factors lower actual data throughput rate.
15ConfigurationUsing the Configuration Utility (continued)Wireless Mode:SSID:Data Encryption:Service Set Identifier is a name that identifies a wireless network. Access pointsand wireless devices attempting to connect to a specific WLAN (Wireless LocalArea Network) must use the same SSID. The default setting is default.Click on the pull-down menu; select from the following options:Infrastructure - connecting to the WLAN using an access point. (This isthe default setting).Ad-Hoc – wireless mode used when connecting directly to a computerequipped with a wireless adapter in a Peer-to-Peer environment.Select Enabled or Disabled.
16Using the Configuration Utility (continued)Authentication:Keys 1-4:When you select WEP encryption, you will enter up to four WEP keys in thefields provided, using either Hexadecimal or ASCII format. From the keys youhave entered, select the default key by clicking on the button next to it.Choose one of the following modes:Open Authentication – the DWL-G132is visible to all devices on the network.Shared Authentication – allowscommunication only with other deviceswith identical WEP settings.WPA –  Wi-Fi protected access improvesupon WEP security. In conjunction witha RADIUS server and EAP (extensibleauthentication protocol), WPA ensuresthat only authenticated users access thenetwork.Click Apply to save changes.Authentication Config:When you enable IEEE 802.1X click on Authentication Config.The Advanced Security Settings screen will appear. See the following pagesfor more information.IP SettingsHexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code forrepresenting English letters as numbers from 0-127.IEEE 802.1X:Select Enabled or Disabled. 802.1x requires that a RADIUS server be includedin your network in order to authenticate users.Key Length:Select the key length and either ASCII (e.g., a word) or hexadecimal format.WPA-PSK –  provides user authentication without a RADIUS server inthe network. PSK (Pre-Shared Key) provides authentication through useof a  passphrase that is shared by the devices on the network. This is themost secure encryption available without a RADIUS server.IP Settings:When you click IP Settings in the Configuration window, the pop-up screenabove will appear. Configure the IP Settings in this window.
17Using the Configuration Utility (continued)IP SettingsProxy SettingsCheck Apply with a profile proxy touse a proxy server in your network. Aproxy server increases the speed ofweb page retrieval and can also actas a filter to limit access to specificWeb sites.Using a Proxy ServerWhen this option is selected, the proxyserver will automatically adjust  to thesettings of the network.Automatically detect settings:Select this option and input the IPaddress of the proxy server to ensurethat the proxy server will be utilized.Use automatic configuration:To use a proxy server, select thisoption.Use a proxy server:Select this to allow direct access tolocal internal addresses withoutincluding the extra step of routing therequest through the proxy server.Bypass proxy server for localaddress:
18Using the Configuration Utility (continued)Proxy Settings (continued)To use the same proxy server for allprotocols, select this option and enterthe IP address for the proxy server inthe HTTP field. Other fields will beunavailable. Enter the port number forthe proxy server.Use the same proxy server forall protocols:HTTP, Secure, FTP, Gopher,Socks:if you are not using the same proxyserver for all protocols, enter the proxyserver address, either in IP addressor domain name format and itscorresponding port, for each of theseprotocols.HTTP: Hyper Text Transfer Protocolis used to transfer files from a Web server onto a browser for viewing.FTP: File Transfer Protocol. FTP is most commonly used to upload anddownload files on the Internet.Gopher: Gopher is an early Internet protocol that organizes files in astructured list for database searching.Secure: HTTPS protocol is based on SSL (Secure Sockets Layer) technology.It is a protocol for transmitting private documents over the Internet using aprivate key to encrypt data. URLs that begin with HTTPS often use the protocolto securely obtain confidential information such as credit card numbers.Socks: Socks is a proxy server that provides a simple firewall. SocksV5 offersauthentication.Exceptions: To allow specific IP addresses to bypass proxy servers, enter theIP addresses here. You can also enter “wildcards” to allow a category of websiteto bypass the proxy servers. For instance, if you enter www.*.com, the browserwill bypass the proxy servers for most Websites.
19Using the Configuration Utility (continued)AdvancedFrequency:Select 802.11b/g forcompatibility with both802.11b or 802.11gnetworks, or select 802.11bonly.Super G:Selecting Super G modeenables a maximumwireless signal rate of up to108Mbps.**Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual datathroughput will vary. Network conditions and environmental factors lower actual data throughput rate.XR Mode:Launch Utility on Startup:Power Mode:Disable -This default setting consumes the most power.Enable - This setting consumes the least power.Starting Ad Hoc Network:When using Ad Hoc mode, select the frequency here.Ad Hoc Channel:Select the Ad Hoc channel when in Ad Hoc mode. When communicating inAd Hoc mode, all devices must share the same channel.Profile IP Settings:Select Enable or Disable.Click Apply if you have made any changes.Enable or Disable rangeextension mode.  Enablingthis feature allows you toincrease the range of your communication without adding additional hardware.You can Enable or Disable the IP Settings portion of your profile  here. If youselect Disable you will need to configure the IP address information each timeyou connect to a network. If you select Enable you will maintain the same IPaddress information  each time you connect to a network.
20Using the Configuration Utility (continued)Fragmentation Threshold:This value should remain at its default setting of 2432. If you experience a highpacket error rate, you may slightly increase your Fragmentation Threshold withinthe value range of 256 to 2432. Setting the Fragmentation Threshold too lowmay result in poor performance.This value should remain at its default setting of 2432. If inconsistent data flowis a problem, only a minor modification should be made.RTS Threshold:Advanced (continued)
21Refresh:Click on Refresh to get themost updated list ofavailable networks.Using the Configuration Utility (continued)Site SurveyAvailable Network:The top section of the window displays the Available Networks. Scroll up anddown the list and highlight the network to which you wish to connect. Click onthe Connect button.Profile:In the lower half of the screen, you can manage the profiles that you havecreated for the wireless network at home, at the office and in public places.Scroll up and down and highlight the profile that you wish to configure. You canAdd or Remove a profile, or configure the Properties of the profile in order toconnect with an available network.Connect:Highlight a network profile; click Connect to connect to that network.Rescan:Click Rescan to rescan and connect to the strongest signal with the currentSSID.Configure:Highlight an existingnetwork and clickConfigure; theconfiguration window on thenext page will appear.Advanced:Highlight a network; clickAdvanced to and thescreen on the next pagewill appear.Add:Click Add and the screen on the next page will appear.Remove:Highlight a network profile; click Remove to remove a network from the profilelist.Properties:Highlight a network profile; click Properties and the screen on the next pagewill appear.
22Using the Configuration Utility (continued)Site Survey > AddIf you clicked on Add, youcan configure, in thiswindow, all the properties ofa profile that you wish to addto the network.In this window you canselect the type of networkconnection.Click OK to save thechanges.If you clicked onConfiguration orProperties you canconfigure, in this window, allthe properties of a profile thatalready exists in thenetwork.Click OK to save thechanges.AdvancedConfiguration, Add or PropertiesIf you select WPA in theAuthentication field, pleasesee detailed instructions forconfiguring WPA on thefollowing pages.
23Using the Configuration Utility (continued)Authentication > WPAAfter you click Authentication Config, the Advanced Security Settings screenwill appear. Please see the following page.Select the availablenetwork to which youwant to connect.ClickConfigure.Click AuthenticationConfig.Select WPA in theAuthentication field.
24Using the Configuration Utility (continued)Authentication > WPA > Advanced Security SettingsSelect the EAP typehere.Click Validate Serverif your authenticationserver requires it.Enter the User Name.Click  Add and thewindow on the followingpage will appear.Click OK to save thechanges.Leave the UserCertificate field blank.EAP Type: Extensible Authentication Protocols (EAP-TLS, LEAP, EAP-TTLS,PEAP) allow devices on the network to request authentication from theRADIUS server in the network. All the devices on the network must use thesame EAP type when using a RADIUS server for authentication.Validate Server: Some RADIUS servers require that the Validate Serverfield be selected. Check this field if your RADIUS server requires validation.User Certificate: A certificate authority (CA) issues User Certificates toverify that a public key belongs to a specific individual or company. This fieldis not required here and is left blank.User Name: Enter the user name (admin) here.
25Using the Configuration Utility (continued)Authentication > WPA > Advanced Security Settings > AddEnter the IP address ofthe RADIUS server inyour network.Click OK to save thechanges.After entering the information and clicking OK in the dialog  box above,the windowon the previous page will appear. Click OK to complete the WPA configuration.Authentication > WPA -PSKSuitable for the home user, WPA-PSK (WPA Pre-Shared Key) is a superiorform of security that does not require a RADIUS server in the network.To use WPA-PSK, enter a passphrase that is shared by all the devices on thenetwork.By using TKIP (Temporal Key Integrity Protocol), the security keys change atset intervals, creating a network that is more secure than one that utilizes WEPencryption alone.
26Using the Configuration Utility (continued)Authentication > WPA-PSKClickConfigure.Select WPA-PSK inthe Authenticationfield.Select the availablenetwork to which youwant to connect.WPA-PSK doesnot require aRADIUS Serverin the network.Click AuthenticationConfig.
27Using the Configuration Utility (continued)Authentication > WPA-PSK (continued)Enter the WPAPassphrase. All thedevices on thenetwork must sharethis samepassphrase in orderto communicate onthe network.AboutAdvanced Security SettingsThe About screengives you the MACaddress, UtilityVersion and the DriverVersion of theDWL-G132.Click OK.The configuration iscomplete.
28Using the Network Setup Wizard in Windows XPIn this section you will learn how to establish a network at home or work,using Microsoft Windows XP.Note:  Please refer to websites such as http://www.homenethelp.comand http://www.microsoft.com/windows2000  for information about networkingcomputers using Windows 2000/Me/98SE.Go to Start>Control Panel>Network Connections.Select Set up a home or small office network.Networking BasicsWhen this screen appears, click Next.

Navigation menu