Loopcomm Technology LP-7615 11n PCI Adaptor User Manual

Loopcomm Technology,.Inc. 11n PCI Adaptor

User manual

© 2010802.11n Wireless PCI AdapterUSER MANUAL  1.0.0
-2-Table of ContentsChapter I              Introduction  4................................................................................................................................... 41. Welcome................................................................................................................................... 42. Product Feature................................................................................................................................... 43. Contents of Package................................................................................................................................... 44. Before you beginChapter II              Designing Your PCI Adapter  5Chapter III              Installation  5................................................................................................................................... 51. Install Your PCI Adapter................................................................................................................................... 62. Install Driver and UtilityChapter IV              Utility Config  11................................................................................................................................... 111. WZC......................................................................................................................................................... 111.1 Ralink Wireless Utility (RaUI) or Windows Zero Configuration (WZC) ......................................................................................................................................................... 121.2 Use WZC to configure wireless NIC ................................................................................................................................... 182. RaUI......................................................................................................................................................... 182.1 Start .................................................................................................................................................. 182.1. Start RaUI ......................................................................................................................................................... 242.2 Profile .................................................................................................................................................. 242.2. Profile .................................................................................................................................................. 262.2. Add/Edit Profile .................................................................................................................................................. 272.2. Example to Add Profile in Profile ......................................................................................................................................................... 312.3 Network .................................................................................................................................................. 312.3. Network .................................................................................................................................................. 382.3. Example on Adding Profile in Network ......................................................................................................................................................... 422.4 Advanced .................................................................................................................................................. 422.4. Advanced ......................................................................................................................................................... 432.5 Statistics .................................................................................................................................................. 432.5. Statistics ......................................................................................................................................................... 452.6 WMM .................................................................................................................................................. 452.6. WMM .................................................................................................................................................. 462.6. Example to Configure to Enable DLS (Direct Link Setup) .................................................................................................................................................. 512.6. Example to Configure to Enable Wi-Fi Multi-Media .................................................................................................................................................. 522.6. Example to Configure to Enable WMM - Power Save ......................................................................................................................................................... 532.7 WPS .................................................................................................................................................. 532.7. WPS .................................................................................................................................................. 562.7. WPS Information on AP .................................................................................................................................................. 572.7. Example to Add to Registrar Using PIN Method .................................................................................................................................................. 632.7. Example to Add to Registrar Using PBC Method .................................................................................................................................................. 682.7. Example to Configure a Network/AP Using PIN or PBC Method ......................................................................................................................................................... 702.8 About .................................................................................................................................................. 702.8. About ......................................................................................................................................................... 712.9 Link Status
-3-.................................................................................................................................................. 712.9. Link Status ................................................................................................................................... 733. Security......................................................................................................................................................... 733.1 Auth. \ Encry. Setting - WEP/TKIP/AES ......................................................................................................................................................... 733.2 802.1x Setting ......................................................................................................................................................... 763.3 Example to Reconnect 802.1x Authenticated Connection after 802.1x Authenticated connection Is Failed in Profile ......................................................................................................................................................... 803.4 Example to Configure Connection with WEP on ......................................................................................................................................................... 833.5 Example to Configure Connection with WPA-PSK ......................................................................................................................................................... 873.6 Example to Configure Connection with WPA Chapter V              Trouble Shooting  103
-4-1 Introduction1.1 WelcomePCI Adapter connects you with IEEE802.11n(Draft 2.0) networks at receiving rate up to an incredible150Mbps! By using the reflection signal, 802.11n technology increases the range and reduces “dead spots” in the wireless coverage area. Unlike ordinarywireless networking of 802.11b/g standards that are confused by wireless reflections, 802.11n canactually use these reflections to increase four times transmission range of 802.11g products.Besides, when both ends of the wireless link are 802.11n products,The PCI can utilizetwice radio band to increase three times transmission speed of ordinary 802.11g standard products,and can comply with backwards 802.11b/802.11g standards.Soft AP supported by PCI Adapter can help you establish wireless LAN networking with lowest cost.Besides, WPS (PBC and PIN) encryption method can free you from remembering the long passwords.Complete WMM function makes your voice and video more smooth.1.2 Product Feature•Complies with IEEE 802.11n (Draft 2.0), IEEE 802.11g, IEEE 802.11b standards•Provides 32-bit PCI interface•Provides 150Mbps receiving rate and 150Mbps sending rate•Supports 20MHz/40MHz frequency width•Auto-detects and changes the network transmission rate•Provides two work modes: Infrastructure and Ad-Hoc                                           •Supports Soft AP to establish your wireless LAN networking with lowest cost•Supports 64/128-bit WEP, WPA, WPA2 encryption methods and 802.1x security authenticationstandard•Supports WPS (PBC and PIN) encryption method to free you from remembering long passwords•Supports WMM to make your voice and video more smooth•Supports Windows® 2000, XP 32/64, Vista 32/64, Win 7 32/641.3 Contents of Package•One PCI Adapter•One Installation CD w/User Manual•One dipole antennasContact your local authorized reseller or the store purchased from for any items damaged and/ormissing.1.4 Before you begin•You must have the following:•A desktop PC with an available 32-bit PCI slot•Minimum 300MHz processor and 32MB memory•Windows 2000, XP, 2003, Vista,Win7•A CD-ROM Drive•PCI controller properly installed and working in the desktop PC•802.11n or 802.11b/g Access Point (for infrastructure Mode) or another 802.11n or 802.11b/gwireless adapter (for Ad-Hoc; Peer-to-Peer networking mode.)
Designing Your PCI Adapter-5-2 Designing Your PCI AdapterPCI Adapter supports up to 150Mbps connections. It is fully compliant with the specificationsdefined in 802.11n (Draft 2.0) standard.The status LED indicators of PCI Card are described in the following.•Lnk/Act ON (Green): Indicates a valid connection.•Lnk/Act Flashing: Indicates the Adapter is transmitting or receiving data.3 Installation3.1 Install Your PCI Adapter•Open your PC case and locate an available PCI on the motherboard.•Slide PCI Adapter into the PCI slot. Make sure that all of its pins are touching the slot's contacts.You may have to apply a bit of pressure to slide PCI Adapter all the way in. after it is firmly inplace, secure its fastening tab to your PC's chassis with a mounting screw. Then close your PC.•Attach the external antennas to PCI Adapter's antenna port.•Power on the PC.Note:Select Cancel when “Found New Hardware” window appears.
-6-3.2 Install Driver and UtilityNOTE: Snap-shot screens of the following installation procedure are based on Windows XP.Installation procedures will be similar for other windows operating systems.1. Insert Installation CD to your CD-ROM drive. And click Driver Installation. The wizard will runand install all necessary files to your computer automatically.2. Click Next to accept the Agreement. Or click Cancel to cancel the installation.
Installation-7-3. Click Next.
-8-4. Select Ralink Configuration Tool or Microsoft Zero Configuration Tool then click Next.a. It’s recommended to select Ralink Configuration Tool, which provides fully access to allfunction of PCI Adapter.b. If you prefer to use the wireless configuration tool provided by Windows XP or Vista, pleaseselect Microsoft Zero Configuration Tool.
Installation-9-
-10-5. Click Finish to complete the software installation.
Installation-11-4 Utility Config4.1 WZC4.1.1 Ralink Wireless Utility (RaUI) or Windows Zero Configuration (WZC)Windows  XP  includes  a  wireless  configuration  utility  named  "Windows  Zeroconfiguration"  (WZC)  which  provides   basic  configuration  functions  to  the  RalinkWireless NIC. Ralink's utility (RaUI) additionally provides WPA functionality. To makeit  easier for the user to select the correct utility. RaUI will let users make a selectionwhen it first runs after windows  XP boots. Double-clicking the icon will bring up the selection window and allow the user makea selection. Figure 1-1 RaUI.exe RaUI  can  co-exist  with  WZC.  When  coexisting  with  WZC,  RaUI  only  providesmonitoring  functions,  such  as  surveying  the  link  status,  network  status,  statisticcounters,  advanced  feature status,  WMM status and  WPS  status.  It  won't  interferewith WZC's  configuration or profile functions. It is shown as Figure 1-2.   Figure 1-2 Select WZC or RaUI If "Use RaConfig  as Configuration  utility"   is  selected, please  jump  to  Section 2 onrunning RaUI. If "Use Zero Configuration as Configuration utility" is selected, please continue. We will explain the difference between RaUI and WZC. Figure  1-3  shows  the  RaUIstatus when WZC is activated as the main control utility.
-12-Figure 1-3 RaUI status with WZC active When activating  WZC, there are several difference with the RaUI status, comparedto the RaUI status without WZC running.  The  profile  button  will  be gray.  Profile  functionality  is  removed  since  the  NIC   iscontrolled by WZC.  The connect and  add profile function will  be gray. Profile functionality is  removedsince the NIC  is controlled by WZC. Please read through this document for full details on the other functions provided byRaUI.4.1.2 Use WZC to configure wireless NIC If there  is no connection  or  it is  lost,  the  status prompt will  pop  up,  as shown  inFigure 1-4.
Utility Config-13-Figure 1-4 status prompt for no connection  Right-click the network connection icon in taskbar. Figure 1-5 Select WZC main status  Select  "View  Available  Wireless  Networks"  and  the  "Wireless  NetworkConnection" dialog box will  pop up,  as shown in Figure 1-6. Figure 1-6 Wireless Network Connection  Select  the  intended  access  point  and  click  "Connect".  Then  click  "ConnectAnyway" as shown as Figure 1-7.
-14-Figure 1-7 Select intended AP : AP1, then click "Connect"
Utility Config-15-Figure 1-8 Connect AP : AP1 successfully  If you want to modify information about the AP, click "Change advanced settings"as shown in Figure 1-9. Then select the  "Wireless Networks" tab shown  as Figure 1-10. Figure 1-9 Click "Change advanced settings"
-16-Figure 1-10 Choose the "Wireless Networks" tab  Click "Properties" as shown in Figure 1-11. Then click "OK" button.
Utility Config-17-Figure 1-11 AP's properties  After filling in the appropriate value, click "OK." The pop-up will indicate the status.as shown in Figure 1-12. Figure 1-12 Network connection status   Clicking the Ralink  icon  will  bring  up the  RaUI  main  window.  Users can  find thesurrounding APs  in  the  list. The  currently  connected  AP  will  be  shown  with  a  blueicon  beside  it,  as  shown  in  Figure  1-13.  Users  may  use  the  advanced  tab  toconfigure more advanced features provided by Ralink's wireless NIC. For details onconfiguring the advanced features, please check the Advance setting section.
-18-Figure 1-13 Show connection status by using WZC to initiate the connection 4.2 RaUI4.2.1 Start4.2.1.1 Start RaUIWhen  starting  RaUI,  the  system  will  connect  to  the   AP  with  best  signal  strengthwithout setting a profile or matching a profile setting. When starting RaUI,  it will issuea scan command to a wireless NIC. After two  seconds, the  AP  list  will  be  updatedwith the results  of  a  BSS list  scan.  The  AP  list  includes  most used  fields,  such  asSSID,  network  type,  channel  used,  wireless  mode,  security  status  and  the  signalpercentage.  The  arrow  icon  indicates  the  connected   BSS  or  IBSS  network.  Thedialog box is shown in Figure 2-1.
Utility Config-19-Figure 2-1-1 RaUI section introduction There  are  three  sections  to  the  RaUI  dialog  box.  These  sections  are  brieflydescribed as follow.  Button  Section:  Include  buttons  for  selecting  the  Profile   page,  Network   page,Advanced page, Statistics page, WMM page, WPS page, the  About button, RadioOn/Off button and Help. Figure 2-1-2 Button section Figure 2-1-3 Move to the left Figure 2-1-4 Move to the right
-20- Function  Section:  Appears  to  present  information  and  options  related  to  thebutton. Figure 2-1-5 Profile page Figure 2-1-6 Network page Figure 2-1-7 Advance page
Utility Config-21-Figure 2-1-8 Statistics page Figure 2-1-9 WMM page Figure 2-1-10 WPS page
-22-Figure 2-1-11 About page  Status  Section:  This  section  includes  information  about  the  link  status,authentication status, AP's information and configuration, and retrying the connectionwhen authentication is failed. Figure 2-1-12 Link Status Figure 2-1-13 Authentication Status
Utility Config-23-Figure 2-1-14 AP's Information Figure 2-1-15 Retry the connection Figure 2-1-16 Configuration When  starting  RaUI,  a  small  Ralink  icon  appears  in  the  notifications   area  of  thetaskbar, as shown in Figure 2-1-15. You can double click  it  to  maximize  the  dialogbox if you selected to close it earlier. You may also use the  mouse's  right  button  toclose RaUI utility.
-24-Figure 2-1-17 Ralink icon in system tray Additionally,  the  small  icon  will  change  color  to  reflect  current  wireless  networkconnection status. The status is shown as follows:  : Indicates the connected and signal strength is good. : Indicates the connected and signal strength is normal. : Indicates that  it is not yet connected. : Indicates that  a wireless NIC can not  be detected. : Indicates that the connection and signal strength is weak.4.2.2 Profile4.2.2.1 ProfileThe Profile List keeps a record of your favorite wireless settings at home, office, andother public hot-spots. You can save multiple profiles, and activate the correct one atyour preference. Figure 2-2-1 shows the basic profile section. Figure 2-2-1 Profile function Definition of each field:  Profile Name: Name of profile, preset to PROF* (* indicate 1, 2, 3...).  SSID:  The access point or Ad-hoc name.  Network Type: Indicates the networks type, including infrastructure and Ad-Hoc.  Authentication: Indicates the authentication mode used.
Utility Config-25- Encryption: Indicates the encryption Type used.  Use 802.1x: Shows if the 802.1x feature is used or not.  Cannel: Channel in use for Ad-Hoc mode.  Power Save Mode: Choose from CAM (Constantly Awake Mode) or PowerSaving Mode.  Tx Power: Transmitting power, the amount of power used by a radiotransceiver to send the signal out.  RTS Threshold: Users can adjust the RTS threshold number by sliding the baror keying in the value directly.  Fragment Threshold: The user can adjust the Fragment threshold number bysliding the bar or key in the value directly. Icons and buttons:  : Indicates if a connection made from the  currently activated profile.  : Indicates if the connection has failed on a currently activated profile.  :  Indicates the network type is infrastructure mode.  : Indicates the network type is in Ad-hoc mode.  : Indicates ifthe network is security-enabled.   : Click to add a new profile.   : Click to edit an existing profile.   : Deletes an existing profile.   : Activates the selected profile.   : Shows information of the related status section.   : Hides information of the related status section.
-26-4.2.2.2 Add/Edit ProfileThere are three methods to open the Profile Editor dialog box.  You can open it by clicking the "Add to Profile" button in the  Site Survey tab.  You can open it by clicking the "Add" button in the Profile tab.  You can open it by clicking the "Edit" button on the Profile tab.  Figure 2-2-2 Configuration  Profile Name: The user can chose any name for this profile, or use the defaultname defined by system.  SSID:  The  user  can  key  in  the  intended  SSID  name  or  select  one  of  theavailable APs from the drop-down list.  Power Save Mode: Choose CAM (Constantly Awake Mode) or Power SavingMode.  Network Type: There are two types,  infrastructure  and  802.11 Ad-hoc  mode.Under  Ad-hoc  mode,  user  can  also  choose  the  preamble  type.  The  availablepreamble  type  includes  auto  and  long.  In  addition,  the  channel  field  will   beavailable for setup in Ad-hoc mode.
Utility Config-27-  RTS Threshold: User can adjust the RTS threshold number by sliding the bar,or key in the value directly. The default value is 2347.  Fragment  Threshold:  User  can  adjust  the  Fragment  threshold  number  bysliding the bar or key in the value directly. The default value is 2346.  Channel: Only available for setting under Ad-hoc mode. Users can choose thechannel frequency to start their Ad-hoc network.  Authentication Type: There are   7 type  of  authentication  modes supported  byRaUI. They are  open, Shared, LEAP, WPA and WPA-PSK, WPA2  and  WPA2-PSK.  Encryption Type:  For open  and shared  authentication  mode,  the  selection  ofavailable encryption type are None and WEP. For WPA, WPA2, WPA-PSK andWPA2-PSK authentication mode, both TKIP and AES encryption is available.  802.1x Setting: This is introduced in the topic of "Section 3-2 : 802.1x Setting".   WPA Pre-shared Key: This  is the key shared between  the  AP  and  STA.  ForWPA-PSK and  WPA2-PSK authentication mode, this field must  be  filled with  akey between  8 and  32 characters in length.  WEP Key: Only valid when using WEP encryption algorithms. The key must beidentical to the  AP's key. There are several formats to enter the keys.   1.  Hexadecimal - 40bits : 10 Hex characters.   2.  Hexadecimal - 128bits : 26Hex characters.   3.  ASCII - 40bits : 5 ASCII characters.   4.  ASCII - 128bits : 13 ASCII characters.4.2.2.3 Example to Add Profile in Profile Click "Add" below the  Profile List.
-28-  The "Add Profile" will appear.
Utility Config-29-  Specify a Profile Name. Select an AP from the SSID drop-down list. The  AP  listfrom the last Network.
-30-  Now the profile which the user set appears in the profile list. Click "Activate".
Utility Config-31-4.2.3 Network4.2.3.1 NetworkThe system will display the information of local APs from the last scan result as partof the  Network section.  The  Listed  information  includes  the  SSID,  BSSID,  Signal,Channel, Encryption algorithm, Authentication and Network type  as shown in Figure2-3-1-1.
-32-Figure 2-3-1-1 Network function Definition of each field :  SSID: Name of  BSS or IBSS network.  Network Type: Network  type  in  use,  Infrastructure  for  BSS,  Ad-Hoc  for IBSSnetwork.  Channel: Channel in use.  Wireless Mode: AP support wireless mode. It may support  802.11b,802.11g or 802.11n wireless mode.  Security-Enable:  Indicates  if  the  AP  provides  a  security-enabled  wirelessnetwork.  Signal: Receive signal strength of the specified network. Icons and buttons :  : Indicates that the connection is successful.  : Indicates the network type  is in infrastructure mode.  : Indicates the network type  is in Ad-hoc mode.  :  Indicatesthat the wireless network is security-enabled.    : Indicates 802.11b wireless mode.
Utility Config-33- : Indicates 802.11g wireless mode.  : Indicates 802.11n wireless mode.  :  Indicatesthat the  AP list is sorted by SSID, Channel or Signal.   : Button to connect to the selected network.   : Issues a rescan command to the wireless NIC to updateinformation on the surrounding wireless network.   : Adds the selected AP to the Profile setting. It will bring up aprofile page and save the user's setting to a new profile.   : Shows the Status Section.   : Hides the Status Section. Connected network :  When RaUI first runs, it will select the best  AP to connect to automatically.  If the user wants to use another AP, they can click "Connect" for the intendedAP to make a connection.  If the intended network uses encryption other than "Not Use," RaUI will bring upthe security   page and let the user input the appropriate information  to  make  theconnection. Please refer to the example on how to fill in the security information. When you double click an AP, you can see detailed information about that AP. The  detailed AP  information  is  divided  into  three  parts.  They  are  General,  WPS,CCX information and 802.11n (The 802.11n button only exists for APs supporting Nmode.) The introduction is as follows:  General information contains the  AP's SSID,  MAC address,  authentication  type,encryption  type,  channel,  network  type,  beacon  interval,  signal  strength  andsupported rates. It is shown in Figure 2-3-1-2.
-34-Figure 2-3-1-2 General information about the Access Point  WPS  information  contains  the  authentication  type,  encryption  type,  config.methods,  device  password  ID,  selected  registrar,  state,  version,   AP  setup  lockstatus, UUID-E and RF bands, as shown in Figure 2-3-1-3. The information  is furtherexplained as follows :  Authentication Type: There are three types of authentication modes supportedby RaConfig. They are open, Shared, WPA-PSK and WPA system.  Encryption Type:  For open and shared authentication mode, the choices of theencryption type are None and WEP.  For WPA,  WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and  AES.  Config Methods: Correspond to the methods the  AP supports  as an  Enrolleefor adding external Registrars, (a bitwise OR of values.) Value Hardware Interface0x0001 USBA (Flash Drive)0x0002 Ethernet0x0004 Label0x0008 Display
Utility Config-35-0x0010 External NFC Token0x0020 Integrated NFC Token0x0040 NFC Interface0x0080 Push Button0x0100 Keypad   Device Password ID: Indicates the method or identifies the  specific passwordthat  the  selected Registrar intends to  use.  The  AP  in   PBC   mode must  indicate0x0004 within the two-minute Walk Time. Value Description0x0000 Default (PIN)0x0001 User-specified0x0002 Rekey0x0003 Display0x0004 PushButton (PBC)0x0005 Registrar-specified0x0006-0x000F Reserved  Selected Registrar: Indicates  if the user has recently activated a Registrar toadd an Enrollee. The values are "TRUE" and  "FALSE".  State: The current configuration state of the AP. The values are "Unconfigured"  and "Configured".  Version: The specified WPS version.  AP Setup Locked: Indicates if the AP has entered a locked setup state.  UUID-E:  The  universally  unique  identifier  (UUID)  element  generated  by  theEnrollee. The value is 16 bytes.  RF Bands: Indicates all of the  RF bands available to the AP. A dual-band APmust provide it. The values are "2.4GHz"  and "5GHz".
-36-Figure 2-3-1-3 WPS Detailed information about the AP  CCX information contains the CCKM, Cmic and Ckip information. It is shown inFigure 2-3-1-4.
Utility Config-37-Figure 2-3-1-4 CCX information about AP's detail information  802.11n information contains some related 802.11n information. It is shown inFigure 2-3-1-5.
-38-Figure 2-3-1-5 802.11n information4.2.3.2 Example on Adding Profile in Network Select the AP from the list on the Network tab
Utility Config-39-  Click "Add to Profile"
-40-  The System section will appear at the bottom of the Add Profile window. You canspecify your own profile name.
Utility Config-41-  Next, you will see the new profile in the profile list. Click "Activate"
-42-4.2.4 Advanced4.2.4.1 AdvancedFigure 2-4 shows the Advance functions of RaUI. Figure 2-4 Advance function
Utility Config-43-  Wireless mode: Select wireless mode. 2.4G, 5G and 2.4+5G are supported.  Wireless  Protection:  Users  can  choose  from  Auto,  On,  and  Off.  (This  is  notsupported by  802.11n adapters.)     Auto: STA will dynamically change as AP announcement.     On: The frames are always sent with protection.     Off: The frames are always sent without protection.  TX  Rate:  Manually  select the  transfer  rate. The  default setting   is auto.  (802.11nwireless cards  do not allow the user to select the TX Rate.)  Enable TX Burst: Ralink's proprietary frame burst mode.  Enable TCP Window Size:  Optimise  the  TCP window  size  to  allow  for  greaterthroughput.  Fast Roaming at-: enables fast roaming, which is set by the transmit power.  Select Your Country Region Code: There are eight countries to choose from in thecountry channel list.  Show  Authentication  Status   Dialog:  When  you  connect  to  an   AP  withauthentication, choose whether show the "Authentication  Status  Dialog" or  not.  TheAuthentication Status Dialog displays the processes during 802.1x authentication.  Enable CCX (Cisco Compatible Extensions): Choose whether  Cisco CompatibleExtensions are supported or not.     LEAP turn on CCKM.     Enable  Radio  Measurement:  can  measure  the  channel  every  0~2000milliseconds.  Apply the above changes. Icons and buttons:   : Show the Status Section information.   : Hide the Status Section information.4.2.5 Statistics4.2.5.1 StatisticsThe Statistics page displays detailed counter information based on 802.11 MIBcounters. This page translates that MIB counters into a format easier for the user to
-44-understand. Figure 2-5-1 shows the detailed page layout. Figure 2-5-1 Statistics function Transmit Statistics:   Frames Transmitted Successfully: Frames successfully sent.  Frames Fail To Receive ACK After All Retries: Frames failed transmit after hittingretry limit.  RTS Frames Successfully Receive CTS: Successfully receive CTS after sendingRTS frame.  RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS.  Frames Retransmitted Successfully: Successfully retransmitted frames numbers.  Reset counters to zero. Receive Statistics:
Utility Config-45-  Frames Received Successfully: The number of frames successfully received.  Frames Received With CRC Error: The number of frames received with a CRCerror.  Frames Dropped Due To Out-of-Resource: The number of frames dropped due toa resource issue.  Duplicate Frames Received: The number of duplicate frames received.  Reset all the counters to zero. Icons and buttons:   : Show the Status Section information.   : Hide the Status Section information.4.2.6 WMM4.2.6.1 WMMFigure 2-6-1 shows WMM function of RaUI. It involves "WMM Enable", "WMM -Power Save Enable" and DLS setup. The introduction indicates as follow :
-46- Figure 2-6-1 WMM function  WMM Enable : Enable Wi-Fi Multi-Media. The setting method follows Section 2-6-2. WMM - Power Save Enable : Enable WMM Power Save. The setting methodfollows Section 2-6-3. Direct Link Setup Enable : Enable DLS (Direct Link Setup). The setting methodfollows Section 2-6-4. Icons and buttons:     Show the information of Status Section.     Hide the information of Status Section.4.2.6.2 Example to Configure to Enable DLS (Direct Link Setup) Click the "Direct Link Setup Enable" checkbox
Utility Config-47-  Change  to  "Network"  function.  Add  an  AP  that  supports   DLS  features  to  theProfile. The result will look like the Profile Page in the figure below.  The DLS settings are explained as follows:  Fill in the blanks of Direct Link with MAC Address of STA. The STA must conform
-48-to these two conditions: 1. Connect with an AP that support DLS features. 2. Ensure that DLS is enabled.   The Timeout Value indicates the time in seconds before it disconnectsautomatically. The value is an integer. The integer must be between 0~65535. Azero value specifies that it stays connected. The default Timeout Value is 60seconds.   Click "Apply"
Utility Config-49- Describe "DLS Status" as follow :  After configuring the DLS successfully, the MAC address and Timeout Valueare displayed in the "DLS Status". In "DLS Status" on the opposite side, theusers local MAC address and Timeout Value are displayed.  Display the values of "DLS Status" to "Direct Link Setup" as follow : 1.  In "DLS Status" select a direct link STA what you want to show it's valuesin "Direct Link Setup".  2.  Double click. And the result will look like the below figure.
-50-  Disconnect Direct Link Setup as follow : 1.  Select a direct link STA.  2.  Click "Tear Down" button. The result will look like the below figure.
Utility Config-51-4.2.6.3 Example to Configure to Enable Wi-Fi Multi-MediaIf you want to use "WMM-Power Save" or  "Direct  Link" you must enable WMM. Thesetting method of enabling WMM indicates as follows:  Click "WMM Enable".   Change to  "Network" function.  And  add  a  AP  that supports  WMM  features to  aProfile. The result will look like the below figure in Profile page.
-52-4.2.6.4 Example to Configure to Enable WMM - Power Save  Click "WMM-Power Save Enable".    Please select which ACs you want to enable. The setting of enabling WMM-Power Save is successfully.
Utility Config-53- 4.2.7 WPS4.2.7.1 WPSFigure 2-7-1 illustrates the RaUI WPS functions.
-54-Figure 2-7-1 WPS function  WPS  Configuration: The  primary  goal  of  Wi-Fi  Protected  Setup  (Wi-Fi  SimpleConfiguration) is to simplify the security setup and  management  of   Wi-Fi  networks.Ralink STA supports the configuration and setup  using   a PIN  configuration  methodor a PBC configuration method through an internal or external Registrar.  WPS AP List: Displays the information of the surrounding APs with WPS IE fromthe last scan result. The detailed information includes the SSID, BSSID, Channel, ID(Device Password ID), Security-Enabled.  Rescan: Issues a rescan command to the wireless NIC to update information onthe surrounding wireless network.  Information:  Displays the information about WPS IE on the selected network. Thedetailed  list  includes  the  Authentication  Type,  Encryption  Type,  Config  Methods,Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-Eand RF Bands. Further details are available here: WPS Information on AP.  PIN  Code: The user  is required to enter an  8-digit PIN  Code into Registrar. Whenan STA is the Enrollee, you can click "Renew" to re-generate  a new PIN  Code.
Utility Config-55-  Config Mode: The station serving  as an Enrollee or an external Registrar.  Table of Credentials: Displays all credentials obtained by the Registrar. Thedetailed list includes information about the SSID, MAC Address, Authentication andEncryption Type. If STA is the Enrollee, the credentials are created immediately witheach WPS success. If STA is the Registrar, RaUI creates a new credential withWPA2-PSK/AES/64Hex-Key and doesn't change this until switching to STARegistrar.  Control items for credentials. 1. Detail: Command to obtain Information about Security and the Key in thecredential. 2. Connect: Command to  connect to  the  selected  network   inside  credentials.  Theactive selected credential is as like as the active selected Profile. 3. Rotate: Command to rotate to connect to the next network inside credentials. 4. Disconnect:  Stops the  WPS action and disconnects the active link. It then selectsthe most recent profile on the Profile Page of RaUI. If there are no profiles, the driverwill select any non-security AP. 5. Export Profile: Exports all credentials to a Profile. 6. Delete: Deletes an existing credential. And then selects the next credential. If thereis not another credential, the driver will select any non-security AP.  PIN: Start to add to Registrar using PIN configuration method. If STA Registrar,remember that enter PIN Code read from your Enrollee before starting PIN.  PBC: Start to add to AP using PBC configuration method. After the user clicks PIN or PBC, please do not rescan within two-minutes of theconnection. If you want to abort this setup within the interval, restart PIN/PBC or click"Disconnect" to stop WPS action.  WPS associate IE: Sends the association request with WPS IE during the WPSsetup. It is optional for STA.  WPS probe IE: Sends the probe request with WPS IE during WPS setup. It isoptional for STA.  Progress Bar: Displays the rate of progress from Start to Connected.  Status Bar: Displays the current WPS Status.  Automatically select the AP: Starts to add to AP by using to select the APautomatically in PIN method.
-56-**There are examples in  section 2-7-3(PIN Enrollee Setup), section 2-7-4(PBCEnrollee Setup) and section 2-7-5(Registrar Configures and AP)** Icons and buttons:   : Show the information of Status Section.   : Hide the information of Status Section.4.2.7.2 WPS Information on APThe  WPS  information  (shown  below)  includes  the  authentication  type,  encryptiontype,  config  methods,  device  password  ID,  selected  registrar,  state,  version,   APsetup locked, UUID-E and RF bands.   Authentication  Type:  There  are  three  authentication  modes  supported  byRaConfig. They are open, Shared,  WPA-PSK and WPA system.  Encryption  Type:   For  open  and  shared  authentication  mode,  the  selection  ofencryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK
Utility Config-57-authentication mode, the encryption type supports both TKIP and AES.  Config Methods: Correspond to the methods the  AP supports  as an  Enrollee  foradding external Registrars. (a bitwise OR of values) Value Hardware Interface0x0001 USBA (Flash Drive)0x0002 Ethernet0x0004 Label0x0008 Display0x0010 External NFC Token0x0020 Integrated NFC Token0x0040 NFC Interface0x0080 Push Button0x0100 Keypad   Device Password ID: Indicates the method or identifies the  specific password thatthe  selected  Registrar  intends  to  use.  APs  in   PBC  mode  must  indicate  0x0004within two-minute Walk Time. Value Description0x0000 Default (PIN)0x0001 User-specified0x0002 Rekey0x0003 Display0x0004 PushButton (PBC)0x0005 Registrar-specified0x0006-0x000F Reserved  Selected Registrar: Indicates  if the user has recently activated a Registrar to addan Enrollee. The values are "TRUE" and  "FALSE".  State: The current configuration state on AP. The values are "Unconfigured"  and"Configured".  Version: WPS specified version.  AP Setup Locked: Indicates if the AP has entered a setup locked state.  UUID-E:  The  universally  unique  identifier  (UUID)  element  generated  by  theEnrollee. This is a 16 byte value.  RF Bands: Indicates all the RF bands available on the AP. A dual-band AP mustprovide it. The values are "2.4GHz"  and "5GHz".4.2.7.3 Example to Add to Registrar Using PIN MethodThe user obtains a device password (PIN Code) from the STA and enters thepassword into the Registrar. Both the Enrollee and the Registrar use PIN Configmethod for the configuration setup. The following image outlines the process.
-58-  Select "Enrollee" from the Config Mode drop-down list.   Click "Rescan" to update available WPS APs.
Utility Config-59-  Select an AP (SSID/BSSID) that STA will join to.   Click "PIN" to enter the PIN  Enter the PIN Code of the STA into the Registrar when prompted by the Registrar.
-60- Allow of an exchange between Step 4 and Step 5. If you use Microsoft Window Connection Now as an External Registrar, you muststart PIN connection at STA first. After that, search out your WPS Device name andMAC address at Microsoft Registrar. Add a new device and enter PIN Code of STAat Microsoft Registrar when prompted.  The result should appear as the image below.   Configure one or more credentials
Utility Config-61-  Then connect successfully. The result appear as the following image.   Click "Detail"
-62-  You will look like the below figure.  If Credential#1 is reliable and present, the system will connect with Credential#1. Ifnot, the system will automatically rotate to the next existing credential. The user can also click "Rotate" to rotate to the next credential usable credential. Describe "WPS Status Bar" - "PIN - xxx" as follow:  Acceptable PIN Configurations: Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated toWPS AP ~> Sending EAPOL-Start ~> Sending EAP-Rsp (ID) ~> Receive EAP-Req(Start) ~> Sending M1 ~> Received M2 ~> (Received M2D ~> Sending EAP-Rsp(ACK)) ~> Sending M3 ~> Received M4 ~> Sending M5 ~> Received M6 ~>Sending M7 ~> Received M8 ~> Sending EAP-Rsp(Done) ~> Configured ~> WPSstatus is disconnected ~> WPS status is connected successfully-SSID  WPS configuration doesn't complete after a two-minute connection: WPS EAP process failed.
Utility Config-63- When errors occur within two minutes of connecting, the WPS status bar mightreport "WPS Eap process failed". Error messages might be: 1. Receive EAP with wrong NONCE. 2. Receive EAP without integrity. 3. Error PIN Code. 4. An inappropriate EAP-FAIL received.4.2.7.4 Example to Add to Registrar Using PBC MethodThe  PBC method requires the user to press a PBC button on both the Enrollee andthe Registrar within a two-minute  interval  called  the  Walk  Time. If there  is  only  oneRegistrar in  PBC mode, the  PBC mode selected is obtained from ID 0x0004, and isfound after  a complete scan.  The  Enrollee can then  immediately  begin  running  theRegistration Protocol. If the Enrollee discovers more than  one  Registrar in  PBC  mode,  it MUST  abort  itsconnection attempt at this scan and continue searching until the two-minute timeout. *Before you press  PBC on STA and candidate AP. Make  sure  all APs  aren't   PBCmode or  APs using  PBC  mode have left their Walk Time.   Select "Enrollee" from the Config Mode drop-down list.
-64-  Click PBC to start the PBC connection.  Push the PBC on AP.  *Allow time for an exchange between Step 2 and Step 3.  The progress bar as shown in the figure below indicates that scanning progress.
Utility Config-65-  When one AP is found, join it.   Check WPS Information on the available WPS APs
-66- Configure and receive one or more credential(s).   Then connect successfully. The result will be displayed as it is in the figure below.  Describe "WPS Status Bar" -  "PBC - xxx" as follow :  A successful PBC Configuration : Start PBC connection ~> Scanning AP ~> Begin associating to WPS AP ~>Associated to WPS AP ~> Sending EAPOL-Start ~> Sending EAP-Rsp (ID) ~>Receive EAP-Rsp (Start) ~> Sending M1 ~> Received M2 ~> Sending M3 ~>Received M4 ~> Sending M5 ~> Received M6 ~> Sending M7 ~> Received M8 ~>Sending EAP-Rsp (Done) ~> Configured ~> WPS status is disconnected ~> WPSstatus is connected successfully-SSID  No PBC AP available : Scanning AP ~> No PBC AP available ~> Scanning AP ~> No PBC AP available
Utility Config-67-~>...  Too Many PBC AP available : Scanning AP ~> Too Many PBC AP available ~> Scanning AP ~> Too Many PBCAP available ~>...  WPS configuration doesn't complete after two-minute connection: WPS Eap process failed.  When Errors occur within two-minutes of establishing a connection, the WPSstatus bar might report "WPS Eap process failed". Error messages might be: 1. Receive EAP with wrong NONCE. 2. Receive EAP without integrity. 3. An inappropriate EAP-FAIL received. Describe "Multiple PBC session overlaps" as follow :  Dual bands: AP1 is a G-Band AP using PBC mode. (ID = 0x0004) AP2 is a A-Band AP using PBC mode. (ID = 0x0004) They have the same UUID-E. STA would regard these two APs as a dual-radio AP and select one band toconnect.  Different UUID-E : AP1 is a G-Band AP using PBC mode. (ID = 0x0004) AP2 is a G-Band AP using PBC mode. (ID = 0x0004) They have the different UUID-E. STA would regard these two APs as two different APs and wait until only one PBCAP is available.
-68-4.2.7.5 Example to Configure a Network/AP Using PIN or PBC Method  Select Registrar from the Config Mode drop-down list.   Enter the details of the credential and change configurations (SSID,Authentication, Encryption and Key) manually if needed.
Utility Config-69-  If the PIN configuration is setup, enter the PIN  sent from the Enrollee.   Start PIN or PBC. The following procedures are as similar as section 2-7-3 (PINEnrollee Setup) or section 2-7-4(PBC Enrollee Setup),  If your AP Enrollee has been configured before the WPS process, the credentialyou set in advance will be updated to the AP itself. Otherwise, after a successfulregistration, the AP Enrollee will be re-configured with the new parameters, and theSTA Registrar will connect to the AP Enrollee with these new parameters.
-70- Describe "WPS Status Bar" - "PIN - xxx" as follow : A successful PIN Configuration : Start PIN connection - SSID ~> Begin associating to WPS AP ~> Associated toWPS AP ~> Sending EAPOL-Start ~> Sending EAP-Rsp (ID) ~> Receive M1 ~>Sending M2 ~> Receive M3 ~> Sending M4 ~> Receive M5 ~> Sending M6 ~>Receive M7 ~> Sending M8 ~> Receive EAP Rsp (Done) ~> Sending EAP Rsp(ACK) ~> Configured ~> WPS status is disconnected ~> WPS status is connectedsuccessfully-SSID Describe "WPS Status Bar" -  "PBC - xxx" as follow : A  successful PBC Configuration : Start PBC connection ~> Scanning AP ~> Begin associating to WPS AP ~>Associated to WPS AP ~> Sending EAPOL-Start ~> Sending EAP-Rsp (ID) ~>Receive M1 ~> Sending M2 ~> Receive M3 ~> Sending M4 ~> Receive M5 ~>Sending M6 ~> Receive M7 ~> Sending M8 ~> Receive EAP Rsp (Done) ~>Sending EAP Rsp (ACK) ~> Configured ~> WPS status is disconnected ~> WPSstatus is connected successfully-SSID4.2.8 About4.2.8.1 AboutClick "About" displays the wireless card and driver version information as shown inFigure 2-8.
Utility Config-71-Figure 2-8 About function  Connect to Ralink's website : Ralink Technology, Corp.  Display Configuration Utility, Driver, and EEPROM version information.  Display Wireless NIC MAC address. Icons and buttons:   : Show the information of Status Section.   : Hide the information of Status Section.4.2.9 Link Status4.2.9.1 Link StatusThe link status page displays detailed information about the current connection asshown in Figure 2-9. Figure 2-9 Link Status function
-72- Status : Current connection status. If no connection, if will show Disconnected.Otherwise, the SSID and BSSID will show here.  Extra Info : Display link status in use.  Channel : Display current channel in use.  Authentication : Authentication mode in use.  Encryption : Encryption type in use.  Network Type : Network type in use.  IP Address : IP address about current connection.  Sub Mask : Sub mask about current connection.  Default Gateway :  Default gateway about current connection.  Link Speed : Show current transmit rate and receive rate.  Throughout : Display transmits and receive throughput in unit of Mbps.  Link Quality : Display connection quality based on signal strength and TX/RXpacket error rate.  Signal Strength 1 : Receive signal strength 1, user can choose to display aspercentage or dBm format.  Signal Strength 2 : Receive signal strength 2, user can choose to display aspercentage or dBm format.  Signal Strength 3 : Receive signal strength 3, user can choose to display aspercentage or dBm format.  Noise Strength : Display noise signal strength.  HT : Display current HT status in use, containing BW, GI,  MCS, SNR0, and SNR1value. (Show the information only for 802.11n wireless card.)
Utility Config-73-4.3 Security4.3.1 Auth. \ Encry. Setting - WEP/TKIP/AESFigure 3-1 Auth.\Encry. Settings  Authentication Type: There are  7 authentication  modes supported by  RaUI. Theyare open, Shared, LEAP, WPA and WPA-PSK, WPA2 and WPA2-PSK.  Encryption  Type:   For  open  and  shared  authentication  mode,  the  availableencryption types are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSKauthentication mode, the encryption type supports both TKIP and AES.   8021X: This  is introduced in the  topic of Section 3-2.   WPA  Pre-shared  Key:  This   is  the  shared  key  between  the   AP  and  STA.  Ifoperating  in  WPA-PSK  and  WPA2-PSK  authentication  mode,  this  field  must  befilled with a key between 8 and 32 characters in length.  WEP Key: Only valid when using  WEP encryption algorithm. The key must matchthe  AP's key. There are several formats to enter the keys.     Hexadecimal - 40bits: 10 Hex characters.     Hexadecimal -  128bits: 32Hex characters.     ASCII - 40bits: 5 ASCII characters.     ASCII -  128bits:  13 ASCII characters. **Powered by Meetinghouse.4.3.2 802.1x Setting802.1x is used for authentication of the "WPA" and "WPA2" certificate by the server.
-74- Authentication type:  PEAP:  Protect  Extensible  Authentication  Protocol.  PEAP  transport  securelyauthenticates data by using  tunneling between  PEAP  clients  and  an  authenticationserver.  PEAP  can  authenticate  wireless  LAN  clients  using  only  server-sidecertificates,  thus  simplifying  the  implementation  and  administration  of  a  securewireless LAN.  TLS/Smart  Card:  Transport  Layer  Security.  Provides  for  certificate-based  andmutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generateuser-based  and  session-based  WEP  keys to  secure  subsequent  communicationsbetween the WLAN client and the  access point.  TTLS:  Tunneled  Transport  Layer  Security.  This  security  method  provides  forcertificate-based,  mutual  authentication  of  the  client  and  network  through  anencrypted  channel.  Unlike  EAP-TLS,  EAP-TTLS  requires  only  server-sidecertificates.  EAP-FAST: Flexible  Authentication  via  Secure  Tunneling.  It  was  developed  byCisco. Instead of using a certificate, mutual authentication  is achieved by means of aPAC  (Protected  Access  Credential)  which  can  be  managed  dynamically  by  theauthentication server. The  PAC can be supplied  (distributed  one  time)  to  the  clienteither manually  or  automatically.  Manually,  it  is  delivered to  the  client  via  disk  or  asecured  network  distribution  method.  Automatically,   it  is  supplied  as  an  in-band,over  the  air,  distribution.  For  tunnel  authentication,  only  support  "Generic  TokenCard" authentication.  LEAP:  Light  Extensible  Authentication  Protocol  is  an  EAP  authentication  typeused  primarily  by   Cisco  Aironet  WLANs.  It  encrypts  data  transmissions  usingdynamically generated WEP keys, and supports mutual authentication.  MD5-Challenge:  Message Digest Challenge. Challenge is an EAP authenticationtype  that  provides  base-level   EAP  support.  It  provides  for  only  one-wayauthentication - there is no mutual authentication of wireless client and the network. Session Resumption: The user can choose "Disable" and "Enable".
Utility Config-75-Tunnel Authentication:  Protocol:  Tunnel  protocol,  List  information  include  "EAP-MSCHAP  v2",  "EAP-TLS/Smart  card",  "Generic  Token  Card",  "CHAP",  "MS-CHAP",  "MS-CHAP-V2","PAP" and  "EAP-MD5".  Tunnel Identity: Identity for tunnel.  Tunnel Password: Password for tunnel. ID \ PASSWORD  Authentication ID/Password: The identity, password and domain name for server.Only   "EAP-FAST"  and   "LEAP"  authentication  can  key  in  domain  name.  Domainnames can be keyed in the blank space.  Tunnel ID/Password: Identity and Password for the server. Client Certification   Use Client certificate:  Client certificate for server authentication. EAP Fast
-76-  Allow  unauthenticated  provision  mode:  During  the   PAC  can  be  provisioned(distributed  one  time)  to  the  client  automatically.  It  only  supported  "Allowunauthenticated  provision  mode"  and  use   "EAP-MSCHAP  v2"  authentication  toauthenticate  now. It  causes  to  continue  with  the  establishment  of  the  inner  tunneleven though it is made with an unknown server.  Use  protected  authentication  credential:  Using  PAC,  the  certificate  can  beprovided to the client manually via disk or  a secured network distribution method. Server Certification    Certificate issuer: Select the server that issues the certificate.  Allow intermediate certificates: It must  be in the  server certificate  chain  betweenthe server certificate and the server specified in the "certificate issuer must be" field.  Server name: Enter an authentication sever root.4.3.3 Example to Reconnect 802.1x Authenticated Connection after 802.1xAuthenticated connection Is Failed in ProfileThere are  two situations where  a user  is able to reconnect an 802.1x authenticatedconnection and  authenticate  successfully  after an  802.1x  authenticated  connectionhas failed on the profile page. They are as follows: When keying in  an identity, password or domain name error:  Authentication  type  chooses   "PEAP",  key  identity  into  test.  Tunnel  Protocol  is"EAP-MSCHAP-v2,  the  tunnel  identity  and  tunnel  password  are  tested.  Thosesettings are the same  as our intended  AP's setting.
Utility Config-77-  Because of keying identity and password errors, the result will appear as in theimage below.   If you want to disconnect, click "Cancel" on the Authentication Failure dialog box. Ifyou want to reconnect, key the identity into wpatest2. The tunnel identity is wpatest2and the tunnel password  is test2. Those setting are the same  as our intended   AP'ssetting.              Click "OK". If it has connected successfully. The result will appear as the imagebelow.
-78-                          When a "Timeout" occurs;  Choose  "PEAP" as the Authentication type and key-in  "wpatest2"  as the identity .Tunnel  Protocol  is  "EAP-MSCHAP-v2,  and  the  tunnel  identity  is  "wpatest2".  Thetunnel  password   is  "test2".  These  settings  are  the  same   as  our  intended   AP'ssetting.
Utility Config-79-  When a "Timeout" occurs, The following dialog box will be displayed;               If  it has connected successfully, the  dialog box will appear as follows;
-80-4.3.4 Example to Configure Connection with WEP on Select an AP with WEP encryption and click "Connect".   The Auth.\Encry. function will appear as below;
Utility Config-81-  Enter 1234567890 in the Key#1 Hexadecimal field. This value is same as ourintended AP's setting.
-82-  Click "OK". The dialog box will appear as below;
Utility Config-83-4.3.5 Example to Configure Connection with WPA-PSK Select the AP with a WPA-PSK authentication mode and click "Connect".
-84-  Auth.\Encry. function appears.
Utility Config-85-  Select WPA-PSK as the Authentication Type. Select TKIP or AES encryption.Enter the WPA Pre-Shared Key as "12345678".
-86-  Click "OK". Be careful, if the WPA Pre-Shared Key entered is not correct,  youwon’t be able to exchange any data frames, even though the AP can be connected.
Utility Config-87-4.3.6 Example to Configure Connection with WPA Select an AP with WPA authentication mode and click "Connect".
-88-        The Auth.\Encry. function pop up.  (If AP setup security to Both (TKIP + AES),system defines is AES that security is severely.)
Utility Config-89-           Click "8021X" and the setting page will appear.
-90-        Authentication type and setting method : PEAP : 1.  Select   "PEAP"  as  the  Authentication  type  from  the  drop-down  list.  Key-in"wpatest2" for  the  identity.  "Select   "EAP-MSCHAP  v2"  from the  drop-down  list  fortunnel  authentication  and  key-in  the  tunnel  identity  as  "wpatest2"  and  the  tunnelpassword  as "test2". These settings are the same  as our intended  AP's setting.
Utility Config-91- 2. Click OK. The dialog box should appear as below.
-92-             *If you want to disconnect, please click cancel button in Authentication Statusfunction.*In Profile function, show "Profile Name" option only in adding AP to Profile function. 3. If  the connection is successful, the dialog will appear as below.
Utility Config-93-         TLS / Smart Card : 1. "Select TLS / Smart Card" from the Authentication type drop-down list. TLS onlyrequires the identification to be set as "wpatest2" for server authentication.
-94- 2. TLS must use client certification. Click "Client Certification" and select acertification for server authentication.
Utility Config-95-              3. Click "OK". The dialog box should appear as the image below.
-96-             *If you want to disconnect, please click "Cancel" on the Authentication Statusfunction page.*In Profile function, show "Profile Name" option only in adding AP to Profile function. 4. If it connected successfully, the result will appear as in the image below.
Utility Config-97- TTLS : 1. Select  TTLS  from the  Authentication  type  drop-down  list.  Key-in  the  identity   as"wpatest2".  Select  CHAP  for  tunnel  authentication,  and  key-in  the  identity   as"wpatest2"  and  tunnel  password  as  "test2".  These  settings  are  the  same   as  ourintended AP's setting.
-98- 2. Click "OK". The dialog box should appear as the image below.              *If you want to disconnect, please click "Cancel" on the Authentication Statusfunction page.*In Profile function, show "Profile Name" option only in adding AP to Profile function.
Utility Config-99-3. If the connection is successful, the dialog box will appear as the image below.  EAP-FAST : 1. Select EAP-FAST from the Authentication type drop-down list. Key-in the identityas "wpatest2" and a domain name into the blank field. Tunnel Protocol only supports"Generic Token Card" now. The tunnel identity is "wpatest2" and password is"test2". These setting are the same as our intended AP's setting.
-100- 2. Click "OK". The dialog box should appear as the image below.
Utility Config-101- 3. If the connection is successful, the dialog box will appear as the image below.
-102- *If you want to disconnect, please click "Cancel" on the Authentication Statusfunction page.*In Profile function, show "Profile Name" option only in adding AP to Profile function.
Utility Config-103-5 Trouble ShootingThis chapter provides solutions to problems that may occur during the installation and operation ofPCI Adapter. Read the descriptions below to solve your problems.1.The PCI Adapter does not work properly.Reinsert PCI Adapter into your PC’s PCI slot. Right click on My Computer and select Properties.Select the device manager and click on the Network Adapter. You will find PCI Adapter if it isinstalled successfully. If you see the yellow exclamation mark, the resources are conflicting. Youwill see the status of PCI Adapter. If there is a yellow question mark, please check the following:Make sure that your PC has a free IRQ (Interrupt ReQuest, a hardware interrupt on a PC.) Makesure that you have inserted the right adapter and installed the proper driver. If PCI Adapter does notfunction after attempting the above steps, remove it and do the following: Uninstall the driver softwarefrom your PC. Restart your PC and repeat the hardware and software installation as specified in thisUser Guide. 2.I cannot communicate with the other computers linked via Ethernet in the Infrastructureconfiguration.Make sure that the PC to which PCI Adapter is associated is powered on. Make sure that PCIAdapter is configured on the same channel and with the same security options as with the othercomputers in the Infrastructure configuration.3.What should I do when the computer with PCI Adapter installed is unable to connect tothe wireless network and/or the Internet?Check that the LED indicators for the broadband modem are indicating normal activity. If not, theremay be a problem with the broadband connection. Check that the LED indicators on the wirelessrouter are functioning properly. If not, check that the AC power and Ethernet cables are firmlyconnected. Check that the IP address, subnet mask, gateway, and DNS settings are correctlyentered for the network. In Infrastructure mode, make sure the same Service Set Identifier (SSID) isspecified on the settings for the wireless clients and access points.  In Ad-Hoc mode, both wirelessclients will need to have the same SSID. Please note that it might be necessary to set up one clientto establish a BSS (Basic Service Set) and wait briefly before setting up other clients. This preventsseveral clients from trying to establish a BSS at the same time, which can result in multiple singularBSSs being established, rather than a single BSS with multiple clients associated to it.  Check thatthe Network Connection for the wireless client is configured properly.  If Security is enabled, makesure that the correct encryption keys are entered on both PCI Adapter and the access point.ˡ̂̇˼˶˸ʳˍʳ˧˻˸ʳ˶˻˴́˺˸̆ʳ̂̅ʳ̀̂˷˼˹˼˶˴̇˼̂́̆ʳ́̂̇ʳ˸̋̃̅˸̆̆˿̌ʳ˴̃̃̅̂̉˸˷ʳ˵̌ʳ̇˻˸ʳ̃˴̅̇̌ʳ̅˸̆̃̂́̆˼˵˿˸ʳʳʳʳ˹̂̅ʳ˶̂̀̃˿˼˴́˶˸ʳ˶̂̈˿˷ʳ̉̂˼˷ʳ̇˻˸ʳ̈̆˸̅ϗ̆ʳ˴̈̇˻̂̅˼̇̌ʳ̇̂ʳ̂̃˸̅˴̇˸ʳ̇˻˸ʳ˸̄̈˼̃̀˸́̇ʳʳ˜ˠˣˢ˥˧˔ˡ˧ʳˡˢ˧˘ˍʳ˧̂ʳ˶̂̀̃˿̌ʳ̊˼̇˻ʳ̇˻˸ʳ˙˖˖ʳ˥˙ʳ˸̋̃̂̆̈̅˸ʳ˶̂̀̃˿˼˴́˶˸ʳ̅˸̄̈˼̅˸̀˸́̇̆ʿʳ̇˻˸ʳ˴́̇˸́́˴ʻ̆ʼʳ̈̆˸˷ʳ˹̂̅ʳ̇˻˼̆ʳ̇̅˴́̆̀˼̇̇˸̅ʳ̀̈̆̇ʳ˵˸ʳ˼́̆̇˴˿˿˸˷ʳ̇̂ʳ̃̅̂̉˼˷˸ʳ˴ʳ̆˸̃˴̅˴̇˼̂́ʳ˷˼̆̇˴́˶˸ʳ̂˹ʳ˴̇ʳ˿˸˴̆̇ʳ˅˃ʳ˶̀ʳ˹̅̂̀ʳ˴˿˿ʳ̃˸̅̆̂́̆ʳ˴́˷ʳ̀̈̆̇ʳ́̂̇ʳ˵˸ʳ˶̂ˀ˿̂˶˴̇˸˷ʳ̂̅ʳ̂̃˸̅˴̇˼́˺ʳ˼́ʳ˶̂́˽̈́˶̇˼̂́ʳ̊˼̇˻ʳ˴́̌ʳ̂̇˻˸̅ʳ˴́̇˸́́˴ʳ̂̅ʳ̇̅˴́̆̀˼̇̇˸̅ˁʳˡ̂ʳ˶˻˴́˺˸ʳ̇̂ʳ̇˻˸ʳ˴́̇˸́́˴ʳ̂̅ʳ̇˻˸ʳ˷˸̉˼˶˸ʳ˼̆ʳ̃˸̅̀˼̇̇˸˷ˁʳ˔́̌ʳ˶˻˴́˺˸ʳ̇̂ʳ̇˻˸ʳ˴́̇˸́́˴ʳ̂̅ʳ̇˻˸ʳ˷˸̉˼˶˸ʳ˶̂̈˿˷ʳ̅˸̆̈˿̇ʳ˼́ʳ̇˻˸ʳ˷˸̉˼˶˸ʳ˸̋˶˸˸˷˼́˺ʳ̇˻˸ʳ˥˙ʳ˸̋̃̂̆̈̅˸ʳ̅˸̄̈˼̅˸̀˸́̇̆ʳ˴́˷ʳ̉̂˼˷ʳ̈̆˸̅ϗ̆ʳ˴̈̇˻̂̅˼̇̌ʳ̇̂ʳ̂̃˸̅˴̇˸ʳ̇˻˸ʳ˷˸̉˼˶˸ˁ
                   The Federal Communication Commission Radio Frequency Interference Statement includes the following paragraph:    The equipment has been tested and found to comply with the limits for a Class B Digital Device, pursuant to part 15 of the FCC Rules.    These limits are designed to provide reasonable protection against harmful interference in a residential installation.    This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instruction, may cause harmful interference to radio communication.    However, there is no grantee that interference will not occur in a particular installation.    If this equipment dose cause harmful interference to radio or television reception, which can be determined by   turning the equipment off and on , the user is encouraged to try to correct the   interference by one or more of the following measures:  --Reorient or relocate the receiving antenna. --Increase the separation between the equipment and receiver. --Connect the equipment into an outlet on a circuit different from that to which the     receiver is connected. --Consult the dealer or an experienced radio/TV technician for help.  The user should not modify or change this equipment without written approval Form Loopcomm Technology Inc. .Modification could void authority to use this equipment.

Navigation menu