Samsung Electronics Co SWL-5300M Mini-PCI Card User Manual Book1
Samsung Electronics Co Ltd Mini-PCI Card Book1
Users Manuals
MagicLAN5 Utility SWL-2700M/5300M User’s Guide SAMSUNG 2.4/5GHZ Wireless LAN Networking Soultions Introduction The MagwcLans uumy ws a user—mode uumy designed to Wmn as well as display and dlagnasncs penalnmg (a a selected swumowssoom mlnlpcl card (wlreless adapter) See also - w - WM . Pmme Management ' Mm System Requirements - Laplopl PC containing: - 324m CardBus slot (or Desktop PC With F'C Card—POI adapler] - Mlm PCI . 32 MB memory orgreater - 300 MHz processoror mgher - Mlcrosofi Wmdows 200”, Windows Ml‘lennlum Edlllon, Windows 98 Second Edition, Windows XP Scan Available Networks Click the Refresh button on the ereless Networks tab to scan for available infrastructure and ad hoc networks Connecling to a differenl network . nghllght a network name and click the Configure button to connecl an available netwo rk ll no configurallon profile exlsls lor that network, the Prefile Management wrnrle w opens to the General tab. FlII m the profile name and clrck 0K to m configuration Qrofile for that network Profile Management Configure the wrreless neMork adapter (wlreless card) from me Wrreress Nemarks tab of me Magchan5 unmy - Add a Qrofile - Swwtch (c a dwflerent Qmfile - Edll a Qmfile - Remove a Qmfile The wireless nemm adapter wurks m either lnlrastructure mode (whlch uses an access porn) or ad he: made (a group ov stations pamclpahng m me wrreless LAN). Create or Modify a Configuration Profile To add a new configuration profile, cllck New On the ereless NeMOVKS lab To modwfy a conflgurallon pmme, selecl me conflguranan "om me Profile My and cllck me Modwfy button Profile Managemenl - Edthe General tab. . Edwl [he Securlg tab - Edwtlhe Advanced lab To configure a profile m; M or m (mfrastructure) mode. ed“ the Network Type field on the Advanced tab Remove a Configuration Profile 1, GO to the ereless NeMorks lab 2, Select the profile to remove from the list of configuration profiles 3 Click me Remove bullon Switching to a different configuration profile 1 To swwtch (a a drflerent profile, go 10 me erelsss Networks lab 1 Chck on me profile name m the Profile LISL 3, Chck me Acllvale button See also Scan Avawlable Networks. General Tab in me MagchanS unmy, access me General tab by clicking Configure, New or Modlly on the Wireless Nelworks lab Edlt me fields in me General tab In configure the configuration profile Make sure [0 also edit the Securit! and Advanced labs Profile Name Identifies the configurallon profile This name must be unique, Profile names are rial case sensitive. Network Names(SSID) The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters Configure a ssm See also 1 Configure a Profile for Ad Hat Mode - Configure a Profile forAccess Pulnl Inliastruclure Mode Ad Hoc Mode Profile Configuration To configure a profile m ad hoc mode‘ change the Network Type in mm. For ad hoc mode, modlfy Ihe semngs' . Network Name (on General Tab) - Transmit Power Level . 502 11!) Preamble (if usmg 30: 11h) . ereless Made When Starting an Ad Hm: Nelwork Make sure to also edlt the Genera‘ and Secunglahs Infrastmcture (Access Point) Mode Profile Configuration To configure a profile m rnlraslmcmre (access palm] mode, change me Network Type ln me Advanced tab For access palm mode, modlfy me semngs . Transmll Power Level 0 Power Save Mode . suz 1m Preamble m using 302 11b) 0 Wireless Mode Make sure to also edlt me wand mlabs Security Tab in me Magchan5 uuiiiy, access me Secuniy iab by clicking New or Modify on the Wireless Neiworks Lab Click the Secunly lab in the Profile Managemenlwmdow Edltlhe fields in the Secuniy tab of wireless Nelworks to configure lhe profile To define lne securiiy mode, selemne radlo builon oiine desired secumy mode Make sure to also edit me General and Advanced labs WPA Enables the use of WI-Fl Prolefled Access (WPA) Choosing WPA opens ine WPA-EAP drop»down menu The opnons lnclude’ - PEAP EAP-MSCHAPVZ PE “TA—PSK Enables WFA — PSK security. Click on the Configure lumen and fill m the WPA—PSK 302.“ Enables 802 1x secunly This Dpllon requires IT administraucn Choosmg 8021x opens me 802 lx EAP iype dropdown menu, The options include. _1 L5 LS . FEAF EAPVMSCHAPVZ ' LEAR :| WEP Key Enables the use of WEP keys that are defined on both the access Dorm (sum; WEP) and me slzllon. To define pre-shared encryption keys, choose the WEP Key radio button and click the Configure hullon io fill in me Define FreeShared Keys wlnduwv None No security (not recommended) Using TLS Security To use EAP—TLS secunly In the MagchanS Ullllty, access the Secuny (ah |n me Profile Management window 1. On the Secunly tab, choose the WPA radio buflon. OR On the Secunty Eb, choose the 302 1x radio button 2 Choose TLS from me dropdown menu Enabling TLS security: To use EAP-TLS secumy, the machine must a‘ready have the EAP-TLS cenlficales down‘oaded onto it, Check wwlh the IT manager 1 If EAP—TLS IS supponed, choose us from me ampmwn menu on me ngm, men cllck the Configure human. 2 Select me appropnale cemficale aumonly (mm the Ilst The server/domaln name and (he wogm name are filled |n amomancauy from (he cemficale mformauen Cllck 0K 3 Click OK 4 Acllvale the prone Using TTLS Security To use EAPVTTLS securlty In the MagchanS Ullllly, access me Securlly tab m the Profile Managemenl wmdow. 1 On the Secumy Iah, choose the WPA radlo bunon OR: On me Secuniy (ah. choose the 302 1x radio button 2 Choose TTLS from me drop-down menu Enabllnq 1'th seeumy: To use EAPVTTLS secun'y‘ llre maclnne rnusl already nave lne EAPVTTLS cerlrficales downloaded on“) ll Check wllh the IT manager 1 ll EAP—TTLS ls supponeo. choose TTLS from me dropoown menu on me rignl, lnen cllck me Configure when 2 Select me appmprlale cenlficale from the drop—down Ilsl and cllck OK 3. Specrly a user name lor EAF’ aulnenlrcalron. o Emer a EAP user name m lne User Name field to use a separale user name and password and starl lne EAP aumenncanon process 4 CIlckAdvanced and 0 Leave me server name field blank for me clrenl to accepl a cenlficale from any server wnn a cemficate slgned by me authomy lrsleu ln lne NEIwork Cemficale Aullronly drop-down Ilsl (recommended) 0 Enler me domaln name ol lne server from wlncn lne clienl wlII accept a cemfinale, a Change the logm name rl needed 5 Cllck OK 5 Enableme profile Using PEAP—MSCHAP V2 Security To use PEAP-MSCHAP V2 securlly In the MagchanE Utlllly, access the Senung tab In the Profile Management wlndow. 1, On the Secunly tab, choose the WPA radio button, OR On the Secunty lab, choose me 802.1xradlo buflcn. 2 Choose PEAP lEAP—MSCHAP V2) lrom the dropdown menu To use PEAP (EAP-MSCHAP V2) security, the server musl have PEAP certificates, and the sewer properties musl already be sel Check wrtn the IT manager 1 cllck the Configure bunon Select the approprlate cemficate from the drop-down ltst Specify a user name lor Inner FEAP lunnel authentication a Enter a PEAP user name ln lhe User Name field m use a separate user name and start the PEAP authentrcatron process. 4 Cllck Advanced and- e Leave lhe sewer name field blank var the them in accept a certmcate lrum any server wrtn a cerltficale stgned by lne aulhonly Ilsled m me Nelwark Cemllcaze Authonty drop-down lust. (recommended) a Enter the domaln name of the server from whlch [he clrenl W|II accept a cenlficale D The Ioglrl name used 'or PEAP Iunnel aulhenficatlon, llIIs In aulomalrcally as PEAPexxxxxxxxxxxx, where xxxxxxxxxxxx IS the computer's MAC address Change the logln name ll needed 5, Cllck OK 6 Enablethe profile Using LEAP Security To use secumy m the MagrcLans umuy, access the Secunu lab m m Proms Managemenl wmdow LEAP secumy requrres (hat all mfrastrucrure devices le.g. access points and servers) are configured for LEAP authenucanon Check wrm me IT manager To us. LEAP security on me Securlly tab, choose the 802 1x radio bunch Choose LEAP from me drop-down menu Chck the Configure human, Enter me user name and password Confirm me password Chck OK Enable me prome, wbwws Using WPA — PSK Security To use WPAVPSK secunty m the MagwcLanS unmy, access Ihe Win the Profile Management wmdow, On the Secunty Lab, choose me WPAVPSK radio tau-ton Cllck on the Configure button rm m the WPA Passphrase Cllck OK. auNA WEP Keys To use the WEP keys: 1. cuck the Define WEP Keys radro button on the Secung tab 2 Cllck on Configure 3. Fill In the fields in (he Define Pre—Shared Keys dialog box Key Entry Detennrnes the entry method for an encryptron key‘ hexadeclmal (M, A— F). orAscn text (all keyboard characters except spaces). Encryption Selects the delaull enerypnon keys used Only allows the selectron tor 5 Keys shared Frrst. Second. Thutl. or Fourth key whose correspondmg held has been completed. WEP Keys (1. Defines a set of shared ehcryptton keys for network configuralmn securlty 4) At least one Shared Key field must be populated to enable secunty usrrrg a shared key. Clrek on the radlo button to set the key as the delault eneryptron key WEP Key Defines the stze tor each encryptron key. The optrons include. Six. u 64~ bit(enter10 dlglls for hexadecrmal, 5 ASCII characters) a 129. tut (enter 26 drgrts tor hexadecrmal, 13 rlrgrts torAscu) c. tszeort (enter 32 argrts hexadeclmal, ts dlglts for ASCII) 4. Click OK tor the changes to take ellect Advanced Tab ln the Magchan5 Utrlrty, access the Advanced tab by cllcklng New or Modlfy on the ereless Networks tab, then cllcklng the Advanced tab ln Profile Management. Edrt the fields ln the Advanced tab oaneless Nelwarks to configure the profile Make sure to also edll the m and Mtaos Transmit Power Seleds the lransmll power level for 80211blg or 802.113. Actual Level transmrt power may be Ilmlted by regulatory domaln or hardware Ilmltatlons Power Save Speclfy' Mode Maxlmum mode causes the access pornt to buffer mcommg messages for the wlreless adapter The adapter up penodrcalty polls the access pomt to see rl any messages are wartlng Normal uses maximum when relnevlllg a large number of packets then swttches back to power save mode afier letnevlng the packets ell turns power saylng olf. thus powenng up the wtreless adapter contmuously for a short message response lrme Network Yype Speclfies the netwerlt as erther rnrrastructure (access pornt mode) or ad hoc. H02.11b Preamble Speclfles the preamble setung m 902 llb The default settmg ls Short 8. Long [access pornt mode), whlch allows both short and long headers In the 802 "b lrames The adapter can only use short radro headers rl the access pornt suppons and uses them. Set to Long Only to oyernde allowlng shon frames Wireless Mode Specllles SGHz 54 Mbps, 24 GHz 54 Mbps, 24 GHz tt Mbps‘ or Super AIG operatrbn m an access pornt network The wlreless adapter must match the wlreless mode of the access palm lt assoctates to w eless Mode Specllles SGHz 54 Mbps‘ 5st 103 Mbps, or 2 4 GHz 54/11 Mbps to when starting an sran an ad noc nerwork rl no mercnrng nerwark name ls found afier Ad Hal: Network scannlng all avallable modes ans mode also allows selecllon Dune channel me wrreless adapter uses The channels avaflable depend on me regulatory domaln ll [he adaplerlmds no other ad no: adaplers, mls selecllon specmes me which channel mm the adapler s'ans the ad hm: network with, The wlreless adapter must match the wireless mode and channel a! the chants ll assoclates to TCP/IP Configuration Configuring tho TCPiIP Adduss for the n-twork dav l: 1 Alter configuring the wtreless network adapter propemes, open the Control Panel and open Newvork and Dialrup Connections. 2 Find the Local Area Connecnan assoctated with the wireless network adapter Right- click that connectron, and click Propemes. 3 Select lnternet Protocol (TCF‘IIP) and cllck Propemes 4. Click the radio bunon Use the following IP address, then enter an IF address and Subnet mask Assigning an IP address and Snbnet mask allows slallans to operate In W tmtrastructure mode) or in Mend to have internet access Default gateway and [ms server tntormatron is also required IP configuratron rnlormatron (DHCP to assign the IP address, gateway and DNS server IP addresses) ts usually obtatned lrorn the corporate IT siafl. Click OK to finish Appendix A— Regulatory Information CAUTION Changes or modifications not expressly approved by the manufacturer responslble for compliance could void the user‘s authority to operate the eqmpment WARNING This devlce complies wtth pari 15 ol the FCC Rules. Operation is subject to the tollowmg two conditions- (1) This devlce may not cause harmful interlerence, and (2) this device must accept any interference received. including interference that may cause undesired operalion iNFORMATiON T0 USER This equipment has been tested and lound to comply with ltie limii ol a Class B digital devlce‘ pursuant to Part 15 ol the FCC Rules These limits are designed to plovlde reasonable protectlcn agalnst harmlul interrerence in a residential installation This equlpment generates, uses and can radiate radio lreguency energy and, it not installed and used in accordance with the instructions, may cause tiarmlul interterence to radlo communications Howeven there is no guarantee that lnterlerence will not occur in a panicular installauon, it thls equipment does cause harmful interlerence lo radio or television receptlon. whlch can be detemllned by turning the equipment or and on, the user is encouraged to try to correct the lnterlerence tiy one at more or the followmg measures 1 Reonent l Relocate the receiving antenna 2 lncrease the separation between the equlpmentand receiver 3 Connect the equipment into an outlet on a circuit difference train that to which the receiver is connected 4 Consult the dealeroran experienced radiorrv technician tor help This device is intended only for OEM lntegmtors under the following conditions: 1) The antenna must be installed such that 20 cm is malntained between the antenna and users for all lnstallahons, and 2) The transmitter module may not be colocated With any other transmitter or antenna, and 3) The Module is approved using the FCC ‘unlicensed modular transmitter approval’ method Therefore the module must only be used with the originally approved antennas, As long as the 3 condlnons above are met. further transmrttertestlng w||| not be required, However, the OEM integrator is still responsible for testing their endeproduct for any additional oomplranee requirements required With this module installed (for example, digital device emissions. PC peripheral requirements, etc.) IMPORTANT NOTE: In the event that any at these conditions can not be met (for example certain configurations, colocation With another transmitter, or use of a different antenna), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final produa, In these circumstances, the OEM integrator Will be responsible for reevaluating the end product (including the transmitter) and obtaining a separate FCC authorization. Suggested End Product Labeling This transmitter module is authorized only for use in devices where the antenna may be installed such that 20 cm may be maintained between the antenna and users (for example access points, routers, Wireless ASDL modems. and similar equipment), The final end product must be labeled in a Visible area with the tollowrng. "Contains TX FCC ID. (INSERT FCC ID HERE)". RF Exposure Statements That Must be Included in me Final Devices Users Manual The users manual (or end users must include the iollcrwrng information in a prominent location "IMPORTANT NOTE: To comply wrlh FCC RF exposure compliance requirements, the antenna used for this transmitter must be installed to provrde a separation distance of at least 20 cm from all persons and must not be co—located or operating in conjunction With any other antenna or transmitter" Addiu'onal Minn-nation That Must be Provided to DEM Integrators The end user should NOT be provided any instmctions on how to remove or install the modular TX devrce.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Page Count : 23 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:1bcc127d-cf5c-4438-b52d-e87e1d4d8748 Producer : Acrobat Distiller 6.0 (Windows) Modify Date : 2005:08:16 19:02:05+09:00 Create Date : 2005:08:16 19:02:05+09:00 Creator Tool : PScript5.dll Version 5.2 Document ID : uuid:d913aed7-f71b-4291-a2c6-633d5c117077 Format : application/pdf Title : Book1 Creator :EXIF Metadata provided by EXIF.toolsAuthor :