GemTek Technology C921217G 802.11g Wireless LAN PC Card User Manual

Gemtek Technology Co., Ltd. 802.11g Wireless LAN PC Card

Contents

User Manual

WL-611GS
Users Guide
802.11g Wireless LAN PC Card
FCC Statement
This equipment has been tested and found to comply with the
limits for a Class B digital device, pursuant to Part 15 of the FCC
Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate
radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful
interference to radio communications. However, there is no
guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try
to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and
receiver.
Connect the equipment into an outlet on a circuit different
from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician
for help.
FCC Caution: Any changes or modifications not expressly
approved by the party responsible for compliance could void the
user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation
is subject to the following two conditions: (1) This device may
not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause
undesired operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set
forth for an uncontrolled environment.
This device complies with FCC RF Exposure limits set forth for
an uncontrolled environment, under 47 CFR 2.1093 paragraph
(d)(2).
This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
Gemtek Technology Co., Ltd declares that WL-611GS (FCC ID:
MXF-C921217G) is limited in CH1~CH11 by specified firmware
controlled in U.S.A.
EC DECLARATION OF CONFORMITY (EUROPE)
Gemtek Technology Co., Ltd. declares that the device conform
to the specifications listed below, following the provisions of the
European R&TTE directive 1999/5/EC, EMC directive
89/336/EEC, and Low Voltage directive 73/23/EEC:
For 2.4 GHz devices with 100 mW radios, the following
standards were applied:
ETS 300-826, 301 489-1 General EMC requirements for
Radio equipment.
EN 609 50 Safety
ETS 300-328-2 Technical requirements for Radio equipment.
Caution: This equipment is intended to be used in all EU and
EFTA countries. Outdoor use may be restricted to certain
frequencies and/or may require a license for operation.
Contact local Authority for procedure to follow.
Table of Contents
Introduction……………………………………………..1
A Look at the Hardware……………………………….2
Hardware Installation………………………………….3
Configuration……………………………………..…….4
Introduction
Augmenting the first ever 54Mbps transmission on the 2.4GHz
bandwidth, Gemtek is presenting to the WLAN community
another high-speed option that is backward compatible to the
well accepted 802.11b WLAN technology.
In order to supplement the compatibility between 802.11b and
802.1g, Complementary Code Keying (CCK) is implemented to
achieve the common bit transfer rate of 5Mbps. While
Orthogonal Frequency Division Multiplexing (OFDM) is adopted
by 802.11g for the high-speed transfer rate in a 2.4GHz range.
Gemtek’s WL-611GS fully utilizes the benefits of 802.11g
standard on the proven compatibility between two transfer
modes and the high speed bit transfer that is desirable for
multimedia application in Wireless environment.
Features
The WL-611GS has the following features:
Wireless security using WPA with TKIP encryption, 802.1X
with EAP-type Authentication
32 bit Cardbus Interface
Backward Compatible in a 802.11b environment
Plug & Play Installation
Seamless roaming from cell to cell and between 802.11b to
802.11g
A Look at the Hardware
Gemtek WL-611GS 802.11g Wireless LAN PC Card has two
Light Emitting Diodes (LEDs), or link lights. The following table
defines the behavior for the LED:
LED Activity / Status
Power The Power LED will light up when the device is
powered on.
Link Link LED Indicates the activity of the wireless
network traffic.
Hardware Installation
Thank you for purchasing the WL-611GS. The following
instructions will walk you through installation of the PC card.
Step 1 Insert the supplied CD-ROM into the CD-ROM drive.
The software automatically starts the Installation Wizard
program.
Step 2 Follow the prompts to set up your adapter card.
Step 3 Locate an empty CardBus slot on your notebook
computer. The power is now turned on. The PWR LED on the
front panel will illuminate.
Step 4 With the adapter card product-label and LEDs facing
up, insert the adapter card into the CardBus slot.
Step 5 Complete the installation instructions supplied on the
CD-ROM.
Configuration
If using Windows XP, you can use the Windows XP Wireless
Zero Configuration (WZC) utility to manage your wireless client
adapter. You have the second choice. Gemtek also provides
you the wireless configuration utility.
To enable the wireless connection:
Step 1 Click the icon to open the configuration utility window.
Step 2 The Wireless Network Properties window displays.
Your computer automatically connects to the network displayed
at the top of the Preferred networks list.
Step 3 In the Available networks list, highlight the network you
want to connect and click Configure.
Step 4 A Wireless Network Properties window will appear.
Step 5 Enter the Network name (SSID) of no more than 32
alphanumeric characters. This SSID is a network name that
identifies the wireless devices in the network. All workstations
and access points must use the same SSID to be able to
communicate with one another. The SSID is a 32-character field,
and the value is case sensitive.
Step 6 If the network requires Network Authentication, select
the type of authentication required. WPA might require further
Authentication options found on the Authentication tab. Match
the setting used by the network.
Step 7 Enter information for the new wireless network based
on the descriptions in the following:
Network Authentication
Select if your access point requires authentication. Match the
authentication used by the network.
Open: No authentication is used. Shared The Pre-Shared
Key (PSK) authentication method is used.
In enterprises, WPA will be used in conjunction with both
wireless router and authentication server. In Small Office/ Home
Office (SOHO) environment, where there are no authentication
servers, user can use pre-shared key (PSK) mode in place of the
authentication server.
WPA: Wi-Fi® Protected Access (WPA) authentication
(802.1X) is used with an EAP type.
WPA consists of three main elements: an Authentication Server
(typically a RADIUS server), WPA-enabled router or AP (called
"Authenticator"), and a WPA-enabled client (called "Supplicant").
WPA-PSK: WPA authentication (802.1X) is used with a
Pre-Shared Key, which enables you to enter a static
Network key.
Data Encryption
Select the type of security encryption algorithm used. The
available types of encryption are based on the type of the
authentication selected.
Disabled: No encryption.
WEP: Deselect Network Key is provided for me
automatically and enter the Key provided by the network.
Available only with Open and Shared Authentication.
TKIP: Available with WPA and WPA-PSK Authentication.
TKIP (Temporal Key Integrity Protocol) includes four algorithms:
MIC (message integrity check), to protect packets from
tampering; PPK (Per-Packet Key) hashing, to prevent weak key
attacks; extended IV (initialization vector), to reduce IV reuse
and the possibility that a hacker will collect sufficient packets to
crack the encryption; and a re-keying mechanism, to change the
temporal key dynamically. TKIP is the most commonly used
encryption method; however, if your wireless clients do not
support TKIP, the WX-5803 also supports AES (Advanced
Encryption Security) encryption. AES will replace 802.11's
RC4-based encryption under 802.11i specification.
Network key
Enter the security key for data encryption, when WEP or
WPA-PSK is selected. This can be entered in ASCII or
hexadecimal for WEP and in ASCII for WPA-PSK.
Key index
There are four Keys (1, 2, 3, 4) that can be selected for WEP.
The key index selected here must match the network key index.
The key is provided for me automatically
Select if the key is automatically provided. Most often, the key is
not automatically provided, so you have to un-check this box
and enter the network key. If using a RADIUS server, the key is
automatically provided.
This is a computer-to-computer (ad hoc) network
Select if the network you are creating or accessing is a
computer-to computer (ad hoc) network. If you are attempting to
connect to an infrastructure network, then do not select this
setting.
Step 8 After entering the information for this network, click OK.
The Wireless Network window is displayed and the new network
is listed in the Preferred networks area.
Step 9 Your computer is connected to the selected network
when you see a blue bubble on top of the icon for that network.
If the blue bubble does not appear, click Refresh. If it still does
not appear, double-check that the wireless settings match the
configuration of the wireless network.
Step 10 Click OK to save your changes.
Congratulation!
You have successfully setup your wireless connection.
Visit our website at
www.gemtek.com.tw

Navigation menu