Pro Nets Technology WM81RL1 WIRELESS MINI PCI User Manual WM81RL1
Pro-Nets Technology Corporation WIRELESS MINI PCI WM81RL1
Contents
- 1. Users Manual Part 1of4
- 2. Users Manual Part 2of4
- 3. Users Manual Part 3of4
- 4. Users Manual Part 4of4
Users Manual Part 3of4
3.1.9 Link Status Link Status displays the detail information current connacficn Status p eeiauime <7 mu “<4: ca ni eta inn » ilnklsup nxvrunnuuxi Channel p n < —>uawnz Miami“ a) new. main >>zdx mention p Nun: NMwalkTym » lrfllastmun remit lPAnntesx>>W11Dfim zi rinses: n to on»; xunim>>z§§zssz§§n inmmmnat Devan eatenav p w: no mi 7 Hr 7 More aw » n/a man 77 n/a untama p ii onnn oi p Ma Ma >> We XNR1>> nre itraeout » 7 41mm Status: Current connection status. lino connection, it will show Disconnected. Otherwise the SSlD and BSSID will show here. Extra info: Display Ilnk status in use. Channel: Display current channel in use. Authemlcatlon: Authentication modein use, Encryption: Encryption type in use. Network Type:Nelwnt1< type in use IF Address: IP address about current connection, Suh Mash: sub illast aboutcurrent connection. Default Gateway: Deeult gateway about current connection. unit Speed: Show current transmit rate and receive rate. Throughout: Display transmits and receive throughput in unit ofillbps. Link Quality: Display Connection quality oaseo on signal strength and Tx/Rx packet error "we. Signal strength 1: Receive signal strength i. user can choose to display as percentage or dEm format. slgnal strengm 2: Receive signal strength 2, user can choose to display as percentage or dEm format. signal strength 3: Receive signal strength a, user can choose to display as percentage or dEm format. Noise strength: Display noise signal strength. HT: Display current HT Status in use, oontaining EW, GI, tics, SNRu, ano SNR1 value. (Show the information onty for 8021 in wireless card) 3.1.10 Enable AP Mode Feature inWindows 2000 OS “1 VW’ldUVVS 2000 Operatroh System the local network won‘t be automatrcauy estabhshed whrle uSlrvg Wreless DCl adapters AD mode Please follow the below steps to enable lflterrvet Corvrvectlorv Shahrvg feature first before you Swltch WrelesS F’Cl adapter‘a AP mode step 1: After the Wreless PCl Adapter rs rrrsteued properly rh vwhdows 2000 Operetroh Syetem‘ go to Start 9 Setting: -) Control Panel -) Choose “Network and Dialajp Connections“ optron Rrght—Chck your local area oomhectrohtsum as ahotherLAN Card mthe same computer) and choose Propenles Edt WEN Famvtes Yank ndvanued Mp -v - El aseenr Emma“ am 95 x ma. naereelm QED -- __e ._| L@_ a a a new melee "New,“ m....,,, m We Conne ns 05359 — Slatg nmu n.“ [mnazknn 0m 5mm we LAN (armecharv Status Netwmkcahle uhphuwd srs innfiased m resterrerrer Adavtsv were me Unvflkles al the ssbcted mrvrettmrv Step 2: lrv Sharing tab enable Internet Connection Sharing for this connection and CHER “0K“ ewe sew heme Eamedmnshavmg allnwxalhzv cnmwlers anywv at 2155123?er lasecessexlerhal vsmumsslhmugh rm lmzmzt Ennnecnrm Shavmg Lucal helwmknpevalnn maybe mumehlanlymsmvled p we meme sweeten shame rm he weer”; step 3: Back m Network and Dial-up Connecfinn screen, right-click ‘Local Area connemlnn 2' (for 802.11" Wireless LAN card) and choose “Fmpemes‘ New.» and mm, “mum m an m Fuvnflms rm Advmd ran as.“ ' - qg‘fimm Ranldui gym; I7; x fll ESL] 555W“ my. New mum mmmk and map“, (nnmnmn (nnrflhun cunnecrjom 1mm“ urn-mum 2 mm mm: m; InNEmnezlm gem stem Emblnd snz lln uss melss mu (am Quwbysmc mm, a; an island (mam Step 4: Salad “Imemet Protocol (TCPIIPY and click “Properties“ You wwll $56 $2.11" ersIess PC‘ arhpter will be autunalically asswgnad an IP address as Access Point. Emu/d | - munusawmmmw m: y.“ wg-up mm;-augmdammtnawyvuvmmm-wvvmu muwmlw leuwm,ynunudh1fixwmzwwkudmnfihulmh Mm (he mum/new: w g m: Mum» cmm an M by m- vanmchan mm m “mun” Hawk) — smgwumwmm , , , ,, Mm wz W n 1 , 1—255 as 26 n Wm WM , flzluuhuulzwuy l— mam r gumwmmmmmaw Dncnvhnn— r Jim»uhsctcmdmmaumatt-flv TvanmuianCahhannacaL/lniamwmlnfi “mam m mwm pmwwmd nvwrkx cumunmmn 4, “Q Ma Mam-1 was mm m- ‘ mmx fiwxe mlacnnnzued hawk Wm M m, I7 r Smamnmn laxkhuvwhmcwnnzchi Auzmznns mg [— [anal —cm Step 5: In ms swam (ray, new you can switch 802.| m Wrewess POI Adiplerto AP Mode mm; step 6: Alter switch to AP made Rallnk ultreloss Utility will automatically pup-up The V‘flreless Default SSID is assigled as ‘SoflAP-ZC". lettu n rate ‘Aoc-ncwlu‘ neml formal santaq anal Mama. thaw/NW v MM mm 1 , »tmnw Hen-what r halamanaammlmacnx B/ n W n - “ E r Hmssw I7 AlWlenMHz sewn rx m nan-tn mm step 7: To make sure your Solt AP ts workan properly, you need to use another computer whim with lMteless LAN Feature to access SoMP—ZC AP ln the below example use another PC wllh Wteless feature In Msta Opetmon System Go to start -) cnmml Panel -) Choose “Network and snarlng centa' optlan -) Click “connect to a netwnrk' to search the Bvailabl e networks Netwmk ana Sharing Earner ilk/+Q WINNIE—M my; “mauled 5. momma memo man lull mo Step 8: Salact ms network ‘SnflAP-ZC' and click ‘Cnnnect"to establish the connection. 54 u a mnweclwun m "Awnvk u enhawmkamimnn (Ema: Step 9: Afier the computer ws successful connected ho SOMPQC, Network and Sharing Center screen M“ be snuwn as beluw. Cllck ‘ cw stutuy’tu see the detaul. 5 4' x . 15va . mkwwavn-v Network and Sharing Center My m. mummy “ N fl 9 Wm; Pi » m mm“; a “MP—TC mm mun Cunnrwzz A“, 1mm mm“ mm mm mew (swan 4199“; mm,“ mm Dwmnnm 3 gm,“ We, "Wham“ a w mm ., rm Wham“; a a, mum; o mammmm pmwmm . m Madnshznng a w ‘ mam mmmw ghowmllflfimfih lndlmduslumshunng Wm h m...“ 5hflwmtaMhiEmmanawakiu‘aersunzmrmmpntu Slim 10: In General tab, click ‘Detal .", and than you can see m9 current Network connection details. Iflhis computer is suceexlul Bonnet! to SoflAP—ZC Access Pomt‘ the DHCP server mll be assigned to same ‘P addess. mm [mm 9m mm Vane Cnnred‘mwrtw Dcmwun mwwnmmwm PM Add“. my! mm mp 5mm Ya Mum-hm wusam W m Mzk 755255 N. n muttered 1mm mamazmsanmm 1mm memo zmssn mm wuwws Saw-v Namosmnw En Vs mm m mm. mm gamma Manama mum. away vvaDNs Sew 3.2 For Window Vista Rahnk wreless unhty ts shown as heluw There are 5 Settings pages m thnk wreless nun-Mean.- s.w]am|w5c~mm|ms [mu] 55m ass") A a 5mm AM MT! 34m)“ nun—JFMEAD (Mme-n “mum-l mue- MAFSNHf Ullmnm Human! del_WL Marucrv Uvimum Human! qum WF-mws Uvimuvm Human! wstw nowwmsuz wwwsx Mailman MISO W—wms . Udmuwn Hm rwssm mmmsmm Uvam-n Hmmumm Prom. Page. Managetne meme Llnk Sums Page Dtsptay eurrenteennemen infnrmannn Site Survey Page Dtsptayme awaflatfle networks Statistic; Page. Dlsplayme packet euunters ms Conflgurxtlon Page Cenneet m WPs (w-Pt Prmeeteet Setup) eapahte AFs nos Page tt unvetves'vwm Enable“. “vwwM , Fewer Save Enabte- and DLS setup AboutFage Display Ralmk drrverand ulmly mfurrnauun 3.2.1 Prome Mme “Pt-mm yuu can View and manage the current usmg Avallable Poms) Yuu can Add, Delete, Edlt‘ nrActlvmthe current/Available F'Dmt(s) Msn ynu ean duphnate the AF nr set wrrem AP as Defautt mn- |l..ksm| Sewlsm|wrsmm|ms Pnfiel.‘ PM“ Harm SSID Profilu Name: The Profiles Llsl displays all me prufllesand me relanve semngs acme pmflles lncludlng F'rnfile Name, ssm. and Channel em presel m PROF'('lm1ltzte 11,3, ) ssm: AP m Ali—hm: rlzrre Channol: Channel m usefurAd—Hul: made Authentleatlo n: Authenticannn mnde Encrypfion: Sammy zlgurlthmlrl use Nmork Typ . Network's lype. including lnfraslruclure and Ali-hm: I lndlcate cannemnn IS successful on currently amvaleu profile I lndlcate cunnecllun IS called an umemiy amlvate profile AdanaeselEdnB-mon: Cklck mese buttuns tu add/deleleledllthe selected pmfiles Aezivm amen: Cllck ”Activate" to connect me selected pruflle vwen a pmille ls afllvatsd‘ the zdapterwlll he lnltizHy connected to me profile 3.2.1.1 Add a profile M: Mam \ Slain-ad emu‘ wysww ms pm \ ewe u; Mn N“ ssm __E.'.Hfl-_"- By elthsr pushlng me “Add” bum-m nn Prams Page a the “Add to PM 2” human on sue Survey Page, n hung: up the profile semng sheet wmeh cmtmns Mo senmg pages - um um: nr page and “Anthem anon and sunny page Eshnjfl mnxweau m mu.- mWFw—vuf wen W 1 News mvsewu mwrzw 1 —w A , r [Configurationpage] Drone Name Name ortha prone sstD Narne ofthe oesrre network Network Type Netowork orthe oesrrea network ether rnrrastructure or thoc Infrastructure 7 Thts operatton mode requtres the presence or a wretess Access Pornt Au oornnrunrcatron rs done we the Access Pornt or Router Ad-Hoc — Setect thrs rnooe tfyou want to conned to another wrretess statron tn the VWeteSs LAN network wrthout through an Access Pumt or Router Tx—Power The desrred TX power tevet‘ the avartabte optrons are tows 75th 50% andAuto tryou wantto towerthe transrnt power orthe adapter for sawer the power or the System you can setect the tower percentages from the hst The tower power th cause the tower srgnat strength and the coverage range [Authentication and Security page] And mm. Mwmun anurdfizw | Mhamcmm rope wwwsx __|. Enuymxrl mr ar,r r m. r in; r we, fix wet-mm int, temper mil, vii L‘s retorvnn l vii - Authentication Type: The auiheritication of the desired nelwork. For infrastructure network. the available modes are Open, Shared. WPA, WPA-F‘SK, WPA}, and WPAZ-PSK. open: No authenticalion is needed among the wireless devices. shared: Onty Wireless device using a shared key (WEP Key identified) is allowed In connecting each other. setup the same key as the wireless device that the adapter inlends to connect. WPA: WPA provides a scheme oi mutual authentication using either IEEE WEAK/Extensible Authentication Protocol (EAF’) authentication or pre-shaied key (PSK) technology it provides a high level of assurance to enterprise, small business and home users that data will remain protected and ttat only authorized users may access their networks. For enterprises lhat have already deployed IEEE BUZJx authentication, WPA otters the advantage oi leveraging existing authentication databases and infrastnicture WPA-PSK - it is a special mode designed for home and small business users who do not have access to network authentication sewers. in this mode, known as Pre-Shared key, the user manually enters the starting password in their access point or gateway. as well as in each wireless station in the network. WPA-PSK lakes over aulomallcally thin that point, keeping unauthorized users lhat don't have the matching passwom from Joining the network. while encrypting the data |meling oelween authorized devices. prz e lee Wm, pr2 supports IEEE em 1xIEAP authentication or PSK technology lt atso includes a new advanced encryption mechanism using the Advanced Encryption standard (AES) A55 is required to the corporate user or government users The different between WF'A and WPAz is that WPA2 provides data encryption via the AES ln contrast WPA uses Temporal Key lrrtegnty Fruluwl (TKiP) WF'AZ-PSK e WPAZAPSK is also tor home and small business The difference between WPAVPSK and WPAzePsK is that WPAZVPSK provides data encryption via the AES ln contrast, WPAVPSK uses Temporal Key lntegrity Prmulznl (rKlP) - Encryption: The encryption of the desired network. _, For Open and Shared authentications, the available encryption modes are None and wait 77 For WPA, WPAVPSK‘ WPAQ and WPAZvPSK authentications, the available modes are TKIP and AES. None — Dlsable the Encryption mode WEP e Enabled the WEF‘ Data Encryption When the item is selected‘ you have to continue semng the WEP Key Length a the key lndex TKIF — TKiP (Temporal Key integrity Protocol) changes the temporal key every 10000 packets (a packet is a kind of message transmitted over a network) This insures much greater security than the standard WEF' security AES — AES has been developed to ensure the highest degree or security and authenticity tor digital information and it is the most advanced solution deltned by IEEE 802 iii for the security in the Wireless network Note All devices in the network should use the same encryption method to ensure the communication. - WPA Preshared Key: The WPAvPSK key can be trom s tn 6A characters and can he letters ur numbers This same key must he used on all of the wireless stations in the network WEP Key(Key1-Key4): The WEP keys are used to encrypt data transmttted in the wireless network There are two types of key length 64m & flza—bfi Select the detaulteneryption key term keyt to key4 by selected the radio outton Fill the text box by following the rule below 54-bit — input 10'digit Hex values (in the ‘A-F‘: “a4, and “0.9" range) or findigil ASCII characters (including tin-1“ and tin-s") as the encryption keys For example ‘01234565ef‘ Dr ”tesfl" 128-bit e lnput 26-digit Hex values (in the ‘A—F". “a-f, and “0-9“ hangs) or 13~digi| Asctl characters (including “3-1“ and tin-s") as the encryption keys For example '012345578901234557uahoder or “administmlm” 3.2.1.2 Edit a profile Selecting an exiting profile then clicking the “Eat" button on Prufile Page brings up the profile settlng street filled with the profile lnformatlon for user modification r.e»~a.lfi or ~ M:|lmsmuglsreswrv|s=lmlwyswmn|ms “ml emu, 3.2.1.3 Delete a profile Seleetrrrg on exlllrlg plume ttrerr cllcklng the “Delete’ outtorr on Profile Pogeto deleteslhe profile Ml: perm. l s.. em.” on." madam“ the lam l wromu; 3.11.4 Active a profile Selecfing an ailing prullle then clicking the “Antlve'bulmn on Profile Page acfivam me profile. M|mam|msm|smlmsmm|ms “ml was 3.2.2 Link status ln tnrs secnen, yuu can lrrmedlakely mnnltnrme current cunnecteu Ilrlk status 54:11 as LlnkSpeed‘ Throughput Llnk Quality, Signal Strenglh‘ anse Level ete m wan|mw|am|msmm|ms Maul 51m wuust mulmsmz muufirxmllml 96>th Txlubml 540 mom) 54“ Tx «en-l "0 tar (mu) 7 3 Goad 1m lllllllllllllll lllllllll 6044 um rdh mm 9367 lm r WIIIIIIIIIII-IIIIIIIIII u»- m IIIIIIII smack n/u SNRI n/l sun": Curran! chnEctlun Slams H nu Ennnecllunl ll WIN shwv Dlsmnnefled Dtherwlse. the SSlD and ESS‘D will shflw here Extra Info: Displaylhe lrnk status and eurrent enannel m use Channo . Dlsplaytne number eftne radlu cnannel and the frequency used furlhe netwumng Llnk Speed (Mbps): Dlsplay tne n'ansmisslnn anu renepnnn rate nf tne nelwnrk The rmxlmum transmrssun rate rs 54Mbps Throughput (Kbitiluc): Display transmrts and reserves tnruug nuut lfl um! of K bltslsec Llnlt Quality: Display eunneetrun uuallty based en slgnal strength and max packet errur rate dEm: w ynu want tu knuwthe srgnal 5179an m tne unlt uf darn selecttlne eneck bux Slgnal Strength: Recelve srgnal strength user ean enuese tu display as percentage er earn furrnat Signal smngtm: Receive slgnal s1renglh 2, user can ctruuse tu ulsplay as percentage ur dEm fnrmzt Nels. Level: Dtsplay the noise slgnal strength HT: Dlsplay mnentl-l'r slatus ln use mmalnlng aw, ol, MOS, sums and SNFM value (Show me lnfnrrmtlnn only fnr BI]? Mn ereless card) 3. A site survey When you open the Conflgumtlnn Utllity,the system wlll scan all the channels to find all me access pulnls/stdnnns wtmn tne acmsslble range at yuur adapter and aummancally mnneette tne Wireless devlme wlth tne highest slgnal strengtn me tne “5th Survey", all the network nearby wlll he “sled You can change the cunnectlnn m anmher l’leMnrknradd fine of me netwurks nu yuur awn pnmle hsl Imam; scesney]mu|wpsmfigm|nas ssln [ 55le ] mm; 000640255133 DdaLIJIN mew wet-Ml W49CH§E lwunjw mommy“ MISO W4 Mus Mull wfl-JF-SA-sE-AD InmNukE WILE-BILENA "15le WW‘FEM Urlwlnvm Wm Uvimuvm wnPsK th'lum Uvimum Urimuwn 07mm ssm: Name of HES ef lass nelwnrk ass"): MAC address quF' Dr mneemly generated uf less Signal: Recewe slgnal strengtn at speclfied netwurk Channel: Channel In use Encrwnion: Encryptlurl algurlthmused wlthlrl tnan ass or lass Valle value lncludEsWEP‘ TKlF‘lAES. and NmUsE Authemleatlon: Authenncztlnn made used wthln than netwnrk, lncludlng Unknown WP/fle PS K. WPAZ- PSK, WPA and WFA2 Network 1ype: Nelworlr lype in use, lniraslruclure or M-Hoc. Rescan: issue an rescan command lo wireless NIC lo upoale iniormaliun on surrounding wireless nelworll. Re-snannlng: Clicking lhe reascarl humon lo perform lhe reascannlng aclion. Add to Profile: Add lhe selected AP tn Profile selling. ll will bring up profile page and save user's selling lo a new profile. [CamectA Network] (|) When Raeonlig first ran. it will seleel ihe best AP lo oonneel aulornalioally (2) If user wanls lo connecl lo olher AP. he can double-click rncuee on lhe intended AP lo rnake mnnsdicln. (a) lflhe iniended nelwork has encryption olher lhan “Not Use”. Raconfig will bring up ihe securiiy page and lel use inpullhe appropriaie inlerrnalicn lo rnakelhe cmnediun. E This icun in dieales lhe changes is successful (DExampIe 1: Open and Non-Encrypted step 1 - Choose ”Open" aulhenhcahun lype step 2 - Choose “N one’ encrypliun lype We“ Weesml mums“ . v r mm were l—Mre . wrrrme re [— were 57»er eel - new Step 3 -Allerlhe prcfile is saved. dick “Activate" builon on Profile Page in activile ihe profile. m—mnmw: mus Mams‘emy mmmsmmms |~m| , w. m Pm u“ WWW \ aw 0 Example 1: war-momma step 1 - choose “Open' or ‘shared" authenllcannn type Sta: 2— Choose ‘WEP" encryption type step 3—Emerme WEP KEY ‘wEPS‘BuEmvBm Psgkwinhammmimm‘m wepmshamvnm News: KcmZSHEXfiwmmurmMmd-mmam r 3m. Pmm step 4 -Arter the profile is saved, cltck the “Activata' button on Profile Page to active the profits. Pmelwstatm|5u5m=ytmmu|is&"figlmn\uas |M| Pm: me 0 Example 3: WPAJ’SK/WPAZ-FSK Sta: 1 — cnpose ‘WPA-FSK" ur ‘WPAZ-FSK" aulhenlicatinn type step 1 7 Choose ‘I'KIP" or ‘AES' enayplion type step s-Emertne pre-shared KEY MW" Wmmm| wPA—Psx 3 mp om,” r wr ryer r “M was «WW wr m twp” step 4 -Aner the profile is saved, click the “Aotivata' button on Profile Page to active the prome. Pme'wsmu|5u5m=y eat-iammmniofls |M| PM]: ha 0 Example 4:WPAIWFA2 Step 1 — cnoose ‘WPA" oi ‘WPAT‘ authentication type step 1- cnoose ‘I'KIP or ‘AES' encryption type MW" Wmmm| wvAMa-iK-y M m an,” r wr ryer r mi Arms «WW wr m Limp”
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No XMP Toolkit : 3.1-701 Modify Date : 2007:12:27 09:19:29+08:00 Create Date : 2007:12:27 09:19:21+08:00 Metadata Date : 2007:12:27 09:19:29+08:00 Creator Tool : PScript5.dll Version 5.2 Format : application/pdf Title : Microsoft Word - WM81RL1_ user manual.doc Creator : Maggie Document ID : uuid:478879c9-9d16-4d0b-b9c3-ad04b6c9ca9b Instance ID : uuid:a7c823d0-5461-4894-9c3d-41ee40666d65 Producer : Acrobat Distiller 7.0 (Windows) Page Count : 20 Author : MaggieEXIF Metadata provided by EXIF.tools