Sercomm UB801RV3 USB Wireless-G Adapter User Manual UB801Rv3

Sercomm Corporation USB Wireless-G Adapter UB801Rv3

manual

UB801R v3
USB Wireless-G Adapter
ii
User Guide
i
Table of Contents
CHAPTER 1 INTRODUCTION ............................................................................................. 1
Package Contents .............................................................................................................. 1
Features .............................................................................................................................. 1
LEDs ................................................................................................................................... 1
Operation ........................................................................................................................... 2
CHAPTER 2 INITIAL INSTALLATION .............................................................................. 3
Requirements ..................................................................................................................... 3
Procedure ........................................................................................................................... 3
CHAPTER 3 USING THE WINDOWS UTILITY ................................................................ 7
Overview ............................................................................................................................ 7
System Tray Icon ............................................................................................................... 7
Network Screen ................................................................................................................. 8
Link Status Screen .......................................................................................................... 11
Profile Screen ................................................................................................................... 12
Advanced Screen ............................................................................................................. 17
Statistics Screen ............................................................................................................... 19
WMM Screen ................................................................................................................... 21
WPS Screen ...................................................................................................................... 23
Radio on/off Screen ......................................................................................................... 25
About Screen .................................................................................................................... 26
APPENDIX A SPECIFICATIONS ....................................................................................... 27
Wireless USB Dongle....................................................................................................... 27
APPENDIX B ABOUT WIRELESS LANS .......................................................................... 28
Modes ............................................................................................................................... 28
BSS/ESS............................................................................................................................ 28
Channels ........................................................................................................................... 29
WEP & WPA-PSK .......................................................................................................... 29
WPA2-PSK ...................................................................................................................... 29
Wireless LAN Configuration .......................................................................................... 30
P/N: 956YMJ0030
Copyright © 2008. All Rights Reserved.
Document Version: 1.0 (2008)
All trademarks and trade names are the properties of their respective owners.
1
Chapter 1
Introduction
This Chapter provides an overview of the Wireless USB Dongle's features and
capabilities.
Congratulations on the purchase of your new Wireless USB Dongle. The Wireless USB
Dongle provides a wireless network interface for your Notebook or PC.
Package Contents
The following items should be included:
The Wireless USB Dongle Unit
Quick Start Guide
CD-ROM containing the on-line manual.
If any of the above items are damaged or missing, please contact your dealer immediately.
Features
Compatible with IEEE 802.11b and 802.11g 2.4GHz
Data transmission rate is up to 54Mbps
Supports Turbo Mode which can enhance the data transmission rate within the specific
wireless network
Supports WMM (Wi-Fi Multimedia) function (IEEE 802.11e QoS standard) and can meet
the requirement of the multi-media data bandwidth
Supports 64/128-bit WEP, WPA (TKIP with IEEE802.1x) and WPA2 (AES with IEEE
802.1x) functions for high level security
Supports CCS (Cisco Compatible Extensions) for the radio monitoring and fast roaming
Automatic fallback which increases the data security and reliability
Supports USB 2.0 interface
LED
Wireless USB Dongle
The Wireless USB Dongle has a single Link/Activity LED.
Link/Act LED
(Blue)
On - Associated with the network.
Off - Not associated with the network.
Blinking - Data being transferred.
1
USB Wireless-G Adapter User Guide
2
Operation
You should install the supplied software on the CD-ROM before inserting the Wireless
USB Dongle.
If you have any form of the wireless utility beforehand, please uninstall it.
3
Chapter 2
Initial Installation
This Chapter covers the software installation of the Wireless USB Dongle.
Requirements
Windows 2000/XP/Vista.
Available USB port.
CD-ROM drive.
IEEE802.11b and IEEE802.11g wireless LAN.
Procedure
You should install the supplied software BEFORE inserting the Wireless USB Dongle.
1. Insert the CD-ROM into the drive on your PC.
2. The installation program should start automatically. If it does not, run the Setup.exe
program.
Figure 1: Start Installation
3. On the License Agreement screen, select I accept the terms of the license agreement. Click
Next.
2
USB Wireless-G Adapter User Guide
4
Figure 2: License Agreement Screen
4. Choose Install driver and Allnet WLAN Utility to install both the driver and Allnet utility
software, or Install driver only.
Figure 3: Setup Type Screen
5. Select either Allnet Configuration Tool or Microsoft Zero configuration Tool on the
following screen.
Initial Installation
5
Figure 4: Windows New Hardware Screen
6. On the following screen, click Install.
7. Click Finish to exit the Wizard.
8. Insert the Wireless USB Dongle firmly into USB port of the PC.
9. If the Wireless USB Dongle was installed properly, you will now have a new icon in your
system tray, as shown below.
Figure 5: System Tray Icon
USB Wireless-G Adapter User Guide
6
Wireless USB Dongle Icon Table
Connection to the Wireless USB Dongle is established. The length of
green color indicates the signal strength.
No connection to the Wireless USB Dongle.
The Wireless USB Dongle is unplugged.
10. You can double- click this icon to configure the Wireless interface. See the following
chapter for details.
7
Chapter 3
Using the Windows Utility
This Chapter provides Setup details for the AP mode of the Wireless USB
Dongle.
Overview
If using Windows, you can use the supplied utility to configure the Wireless interface.
To Use the supplied Windows utility for Configuration
Double-click the Wireless Utility icon in the desktop.
Click Start - Programs - Allnet-All0233 - Wireless Utility.
This Chapter assumes you are using the supplied Wireless utility.
System Tray Icon
If the Wireless Utility program is running, you can double-click the icon in the System Tray or
right-click the icon and select "Launch Config Utility" to open the application.
Status Information
The menu options available from the System Tray icon are:
Launch Config Utility - This will display the main screen of the Utility.
Use Zero Configuration as configuration Utility - Wireless Zero Configuration (WZC),
is a service of Microsoft Windows which dynamically selects a wireless network to con-
nect.
Exit - Terminate the connection to the Wireless USB Dongle.
Figure 6: Wireless USB Dongle menu
3
USB Wireless-G Adapter User Guide
8
Connecting to a Wireless Network
Double-click the Icon to open the Network screen, where you can select the Wireless network
you wish to join.
Network Screen
This screen is displayed when you double-click the system tray icon. You can also click the
Network tab in the screen.
When you open the utility program, it will scan all the channels to find all the access
points/stations within the accessible range and automatically connect to one of the wireless
devices which have the highest signal strength.
Figure 7: Network Screen
Data - Network Screen
SSID The SSID (up to 32 printable ASCII characters) is a unique name
identified in a WLAN.
Network Type It displays the Network type in use, Infrastructure for BSS, Ad-Hoc
for IBSS network.
Channel The channel used by the Wireless network.
Wireless Mode AP support wireless mode. It may support 802.11a, 802.11b or
802.11g wireless mode
Using the Windows Utility
9
Security-Enable Whether AP provides security-enabled wireless network.
Signal This is displayed as percentage (0 ~ 100%) of specified network.
Rescan Click this button to rescan for all Wireless networks.
Add to File Click this button to add the selected AP to Profile setting. It will bring
up profile page and save user's setting to a new profile.
Connect Click this button to connect the Wireless network.
Wireless Network Sequence (order)
You can click the radio buttons in the Sort by >> section (ex. SSID, Channel or Signal) to
arrange the Wireless network in the desired order.
To Connect to a Wireless Network
Click the name of the wireless network to which you want to connect, and then click
Connect.
Note that once you are connected to a Wireless network, the Network screen will identify the
current wireless network with a blue arrow icon, as shown below.
Figure 8: Network Screen – Connected
USB Wireless-G Adapter User Guide
10
Icons
It indicates network type is infrastructure mode.
It indicates network type is Ad-hoc mode.
802.11b wireless mode
802.11g wireless mode
802.11n wireless mode
It indicates security-enabled wireless network.
It shows the information of Link Status Section.
It hides the information of Link Status Section.
Using the Windows Utility
11
Link Status Screen
The Link Status section displays the detailed information of the current connection. Click
button to show the status screen.
Figure 10: Link Status
Data - Link Status
Link Information
Status It will indicate the current link status.
Extra Info It shows the link status.
Channel It displays the current channel in use.
Authentication It will indicate the current authentication mode in use.
Encryption It shows the wireless security that the wireless network is using.
Network Type This will indicate "Infrastructure" or "Ad-hoc".
IP Address It shows the current IP address on the wireless interface.
Subnet Mask Subnet mask for the current IP address.
Default Gateway Gateway IP address associated with the current IP address.
HT It displays current HT status in use (802.11n wireless card
only).
Link Quality It displays connection quality based on signal strength and
TX/RX packet error rate.
Signal Strength (1~3) It receives signal strength (1~3), user can choose to display as
percentage or dBm format.
Noise Strength It displays noise signal strength.
Link Speed It will show current transmit rate and receive rate.
Throughout It displays transmits and receive throughput in unit of Mbps.
USB Wireless-G Adapter User Guide
12
Profile Screen
Click Add to Profile button on the Network tab, or you can choose Profile tab of the utility,
then click Add, the Add Profile window will pop up. Users can setup the general settings,
encryption and authentication settings and so on. If you want to do the general settings, please
follow the instructions below.
Figure 10: Profile Screen
Data - Profile Screen
System Config
Profile Name Enter or select a suitable name for this profile. Each profile must
have a unique name.
SSID If the desired wireless network is currently available, you can
select its SSID. Otherwise, type in the SSID of the desired wire-
less network.
Power Save Mode Select either CAM (Constantly Awake Mode) or PSM (Power
Saving Mode).
RTS Threshold Select a value within the range of 0 to 2347 bytes
Fragment Threshold Select the value from 256 to 2346 bytes. The default value is
2346.
Using the Windows Utility
13
Network Type Select the desired option:
Infrastructure - Select this to connect to an Access point.
Ad-Hoc - Select this if you are connecting directly to another
computer.
Tx Power Select the Tx (transmission) power according to the real envi-
ronment.
Preamble The preamble defines the length of the CRC (cyclic redundancy
check). Select either Auto or Long Preamble.
OK button Click this button to save the settings and close the page.
Cancel button The "Cancel" button will discard any data you have entered and
exit the page.
Auth./Encyp.
Authentication You MUST select the option to match the Wireless LAN you
wish to join. The available options are:
Open - Broadcast signals are not encrypted. This method can
be used only with no encryption or with WEP.
Shared - Broadcast signals are encrypted using WEP. This
method can only be used with WEP.
LEAP - Light Extensible Authentication Protocol is a pre-
EAP, Cisco-proprietary protocol. If selected, you have to en-
ter the identity, password and domain name of your
computer.
WPA - This version of WPA requires a Radius Server on
your LAN to provide the client authentication according to
the 802.1x standard. Data transmissions are encrypted using
the WPA standard.
WPA-PSK - PSK means "Pre-shared Key". You must enter
this Passphrase value; it is used for both authentication and
encryption.
WPA2 - This version of WPA2 requires a Radius Server on
your LAN to provide the client authentication according to
the 802.1x standard. Data transmissions are encrypted using
the WPA2 standard.
WPA2-PSK - This is a further development of WPA-PSK,
and offers even greater security. You must enter this Pass-
phrase value; it is used for both authentication and
encryption.
WPA None - If selected, you can only set encryption and
WPA-Preshared Key settings.
USB Wireless-G Adapter User Guide
14
Encryption The available options depend on the Authentication method
selected above. The possible options are:
None - No data encryption is used.
WEP - If selected, you must enter the WEP data shown
below. This WEP data must match the Access Point or other
Wireless stations.
AES, TKIP - These options are available with WPA-PSK,
WPA2-PSK, WPA and WPA2. Select the correct option.
Use 802.1x This setting only takes effect when using Open, Shared, WPA or
WPA2 mode. If enabled, click the 802.1x tab to configure the
related settings.
WPA Preshared Key For WPA-PSK and WPA2-PSK modes, you need to enter the
desired value (8~63 characters). Data is encrypted using a 256Bit
key derived from this key. Other Wireless Stations must use the
same key.
WEP Key (1~4) This setting is only available for Open or Shared mode.
There are 2 modes:
Hex - Only "A~F", "a~f", and "0~9" are allowed to be
entered.
ASCII - Numerical values, characters or signs are all al-
lowed to be entered.
Using the Windows Utility
15
802.1x
EAP Method There are 5 methods in the drop-down list.
PEAP - Protect Extensible Authentication Protocol. PEAP
transport securely authentication data by using tunneling be-
tween PEAP clients and an authentication server. PEAP can
authenticate wireless LAN clients using only server-side cer-
tificates, thus simplifying the implementation and
administration of a secure wireless LAN.
TLS-Smart Card - Transport Layer Security. Provides for
certificate-based and mutual authentication of the client and
the network. It relies on client-side and server-side certifi-
cates to perform authentication and can be used to
dynamically generate user-based and session-based WEP
keys to secure subsequent communications between the
WLAN client and the access point.
TTLS - Tunneled Transport Layer Security. This security
method provides for certificate-based, mutual authentication
of the client and network through an encrypted channel. Un-
like EAP-TLS, EAP-TTLS requires only server-side
certificates.
EAP-FAST - Flexible Authentication via Secure Tunneling.
It was developed by Cisco. Instead of using a certificate, mu-
tual authentication is achieved by means of a PAC (Protected
Access Credential) which can be managed dynamically by
the authentication server. The PAC can be provisioned (dis-
tributed one time) to the client either manually or
automatically. Manual provisioning is delivery to the client
via disk or a secured network distribution method. Automatic
provisioning is an in-band, over the air, distribution.
MD5-Challenge - Message Digest Challenge. Challenge is
an EAP authentication type that provides base-level EAP
support. It provides for only one-way authentication - there is
no mutual authentication of wireless client and the network.
Tunnel Authentica-
tion Select the desired option from the drop-down list.
Session Resumption After reconnecting the signal which broke up, you can enable the
session resumption to reduce the transferring packet to accelerate
the speed.
Authentication ID /
Password Enter the required data into the fields.
Tunnel ID / Password Enter the ID and Password for the tunnel.
Use Client certificate Click the checkbox to enable certificate authority server function.
Use certificate chain When the EAP authentication type such as TLS, TTLS or PEAP
is selected and required a certification to tell the client what
server credentials to accept from the authentication server in
order to verify the server, you have to enable this function and
enter the required data in the related fields.
USB Wireless-G Adapter User Guide
16
To add a profile
1. On the Profile tab, click Add button.
2. Complete and verify the settings on this screen are correct.
3. Click OK.
To delete a profile
1. On the Profile tab, select the profile that you want to delete.
2. Click Delete.
To edit a profile
1. On the Profile tab, select the profile that you want to edit.
2. Click Edit button.
3. Change the profile settings as necessary.
4. Click OK.
To enable a profile
1. In the list of available profiles, click the profile that you want to enable.
2. Click Activate.
Using the Windows Utility
17
Advanced Screen
Click Advanced tab of the utility, you can configure the detailed settings in this page.
Figure 9: Advanced Screen
Data - Advanced Screen
Advanced
Wireless Mode Select the desired wireless mode.
Enable Tx Burst Tx Burst enables the adapter to deliver better throughput during a
period of time but the function only takes effect when connecting
with the AP which also supports Tx Burst.
Enable TCP
Window Size The TCP Window is the amount of data which a sender can send
on a particular connection before it gets an acknowledgement back
from the receiver that it has gotten some of it. When the router or
AP which the adapter is connecting to has set up the TCP Window,
you can enable the parameter to meet the data size for the router or
AP connection. The larger TCP Window the better performance.
Fast Roaming at.. When you want to fast roaming to the network nearby without
intercepting the wireless connection especially the adapter is
applied to the multimedia application or a voice call, you can
enable this function.
USB Wireless-G Adapter User Guide
18
Show Authentica-
tion Status Dialog When connecting to an AP with authentication, if enabling this
function, it will display dialogs about 802.1x authentication during
the process.
Select Your Coun-
try Region Code There are 8 kinds of Country Region Codes to choose from.
Enable CCX (Cisco
Compatible
eXtensions)
CCX (Cisco Compatible Extensions) is developed by Cisco for the
radio monitoring and fast roaming.
Turn on CCKM: During normal operation, LEAP-enabled
client devices mutually authenticate with a new access point by
performing a complete LEAP authentication, including com-
munication with the main RADIUS server. When you
configure your wireless LAN for fast re-association, however,
LEAP-enabled client devices roam from one access point to
another without involving the main server. Using Cisco Cen-
tralized Key Management (CCKM), an access point configured
to provide Wireless Domain Services (WDS) takes the place of
the RADIUS server and authenticates the client so quickly that
there is no perceptible delay in voice or other time-sensitive
applications.
Enable Radio Measurement: When this parameter is enabled,
the Cisco AP can run the radio monitoring through the asso-
ciated CCX-compliant clients to continuously monitor the
WLAN radio environment and discover any new Aps that are
transmitting beacons.
Apply Click this button to save the changes you made.
Using the Windows Utility
19
Statistics Screen
Click Statistics tab of the utility, the page will display the transmitted and received results.
Figure 10: Statistics Screen
Data - Statistics Screen
Transmit
Frames Transmitted
Successfully Frames successfully sent.
Frames Retransmit-
ted successfully Frames successfully sent with one or more reties.
Frames Fail To
Receive ACK After
All Retries
Frames failed to transmit after hitting retry limit.
RTS Frames Suc-
cessfully Receive
CTS
Successfully receive CTS (Clear To Send) after sending RTS
(Request To Send) frame.
RTS Frames Fail To
Receive CTS Failed to receive CTS (Request To Send) after sending RTS (Clear
To Send).
USB Wireless-G Adapter User Guide
20
Receive
Frames Receive
Successfully Frames received successfully.
Frames Receive
With CRC Error Frames received with CRC error.
Frames Dropped
Due To Out-of-
Resource
Frames dropped due to resource problem.
Duplicate Frames
Received Frames received more than twice.
Reset Counter Click the button to reset counters to zero.
Using the Windows Utility
21
WMM Screen
Click WMM tab of the utility, and you will see the following screen:
Figure 11: WMM Screen
Data - WMM Screen
WMM Enable WMM is short for Wi-Fi Multimedia. It is a standard created to
define quality of service (QoS) in Wi-Fi networks. It is a precursor
to the upcoming IEEE802.11e WLAN QoS draft standard, which is
meant to improve audio, video and voice applications transmitted
over Wi-Fi. WMM adds prioritized capabilities to Wi-Fi networks
and optimizes their performance when multiple concurring applica-
tions, each with different latency and throughput requirements,
compete for network resources. Click the check box and then click
"Apply" button to apply this function to the system.
WMM - Power Save
Enable Click the check box, and select the desired type of power saving
mode.
Direct Link Setup
Enable Enable the check box and you may start to set MAC Address,
Timeout Value and check the DLS Status. Click "Apply" and this
setting will be applied to the system.
USB Wireless-G Adapter User Guide
22
MAC Address Enter the remote system which you want to connect with. When
you want to enable this function, you have to make sure that your
wireless network supports WMM function and then enter the MAC
address of the adapter which wants to connect with the remote
system.
Timeout Value The utility performs time-outs so that the program does not sit idle
waiting for input that may never come. Set a value to apply to the
system with WMM.
Apply Click this button to save the changes you made.
Tear Down Click this button will disconnect the selected Direct Link Setup.
Using the Windows Utility
23
WPS Screen
WPS (Wi-Fi Protected Setup) can simplify the process of connecting any device to the wire-
less network by using the push button configuration (PBC) on the Wireless Access Point, or
entering a PIN code.
You will use the WPS screen when you try to connect the wireless network with the WPS
function.
Figure 12: WPS Screen
Data - WPS Screen
WPS
WPS AP List It displays the information of surrounding APs with WPS IE from
last scan result. List information includes SSID, BSSID, Channel,
ID (Device Password ID) and Security-Enabled.
Rescan Click this button to update information on surrounding wireless
network.
Information Display the information about WPS on the selected network. List
information includes Authentication Type, Encryption Type,
Config Methods, Device Password ID, Selected Registrar, State,
Version, AP Setup Locked, UUID-E and RF Bands.
USB Wireless-G Adapter User Guide
24
PIN Code Enter the PIN code displayed in the following field to the WPS
screen of the access point. When STA is Enrollee, you can use
"Renew" button to re-generate new PIN Code.
Config Mode Our station role-playing as an Enrollee or an external Registrar.
Detail Information about Security and Key in the credential.
Connect Click this button to connect to the selected network inside creden-
tials.
Rotate Click this button to rotate to connect to the next network inside
credentials.
Disconnect Click this to stop WPS action and disconnect this active link. And
then select the last profile at the Profile Page of utility if exist. If
there is an empty profile page, the driver will select any non-
security AP.
Export Profile Export all credentials to Profile.
Delete Click to Delete an existing credential. And then select the next
credential if exist. If there is an empty credential, the driver will
select any non-security AP.
PIN Start to add to Registrar using PIN configuration method. If STA
Registrar, remember that enter PIN Code read from your Enrollee
before starting PIN.
PBC Start to add to AP using PBC configuration method.
WPS associate IE Send the association request with WPS IE during WPS setup. It is
optional for STA.
WPS Probe IE Send the probe request with WPS IE during WPS setup. It is
optional for STA.
Progress Bar Display rate of progress from Start to Connected status.
Status Bar Display currently WPS Status.
Using the Windows Utility
25
Radio on/off Screen
Yu can turn the radio signal on/off by clicking this button.
Figure 13: Radio on/off
The radio signal is on.
The radio signal is off.
USB Wireless-G Adapter User Guide
26
About Screen
This screen displays details of the traffic sent or received on the current Wireless network.
Figure 14: About Screen
This tab shows the following information:
RaConfig Version
Driver Version
EEPROM Version
Phy_ Address
Date
Firmware Version
27
Appendix A
Specifications
Wireless USB Dongle
Model: UB801Rv3
Standards: IEEE 802.11b, IEEE 802.11g
Computer Slot Type: USB
Chipset: Ralink RT2070(MAC/BB/RF)
Tx: 1
Rx: 1
Date Rates: 54, 48, 36, 24, 18, 12, 9, and 6 Mbps (802.11g)
11, 5.5, 2, 1 Mbps (802.11b)
Operating Channels: 11 for North America, 13 for Europe and Japan
Operating Frequency: 2.4 ~ 2.4835 GHz
Modulation Technique:
802.11g: OFDM
802.11b: CCK,QPSK,BPSK
Media Access Protocol: CSMA/CA
Operating Voltage: 5V +/- 5%
Transmit Power: 802.11g: 13.5 +/- 1 dBm
802.11b: 17 +/- 1 dBm
Security: WPA/WPA2; 128-bit TKIP/AES encryption, 40/64-, 128-bit
WEP shared-key encryption
802.1x, and EAP-TLS, and PEAP authentication
OS Requirements: Windows Vista/XP/2000
A
28
Appendix B
About Wireless LANs
This Appendix provides some background information about using Wireless
LANs (WLANs).
Modes
Wireless LANs can work in either of two (2) modes:
Ad-hoc
Infrastructure
Ad-hoc Mode
Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN. Wireless Sta-
tions (e.g. notebook PCs with wireless cards) communicate directly with each other.
Infrastructure Mode
In Infrastructure Mode, one or more Access Points are used to connect Wireless Stations
(e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN. The Wireless Stations
can then access all LAN resources.
Access Points can only function in "Infrastructure" mode,
and can communicate only with Wireless Stations which are
set to "Infrastructure" mode.
BSS/ESS
BSS
A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a
Basic Service Set (BSS).
Using the same SSID is essential. Devices with different SSIDs are unable to communicate
with each other.
ESS
A group of Wireless Stations, and multiple Access Points, all using the same ID (ESSID), form
an Extended Service Set (ESS).
Different Access Points within an ESS can use different Channels. In fact, to reduce interfe-
rence, it is recommended that adjacent Access Points SHOULD use different channels.
As Wireless Stations are physically moved through the area covered by an ESS, they will
automatically change to the Access Point which has the least interference or best performance.
This capability is called Roaming. (Access Points do not have or require Roaming capabilities.)
B
Appendix B - About Wireless LANs
29
Channels
The Wireless Channel sets the radio frequency used for communication.
Access Points use a fixed Channel. You can select the Channel used. This allows you to
choose a Channel which provides the least interference and best performance. In the USA
and Canada, 11 channels are available. If using multiple Access Points, it is better if adja-
cent Access Points use different Channels to reduce interference.
In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an
Access Point. If more than one Access Point can be used, the one with the strongest signal
is used. (This can only happen within an ESS.)
If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the
same Channel. However, most Wireless stations will still scan all Channels to see if there
is an existing "Ad-hoc" group they can join.
WEP & WPA-PSK
Both WEP and WPA-PSK are standards for encrypting data before it is transmitted.
This is desirable because it is impossible to prevent snoopers from receiving any data which is
transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless
unless the receiver can decrypt it.
WPA-PSK is a later standard than WEP, and is more secure.
WPA2-PSK
This is a later version of WPA (WPA-PSK). The major change is the use of AES (Advanced
Encryption System) for protecting data. AES is very secure, considered to be unbreakable. The
PSK (Pre-shared Key) must be entered on each Wireless station.
If WPA2-PSK is used, the Wireless Stations and the Access Point must have the same
settings for each of the following:
WPA2 PSK
(Pre-shared Key) Enter the same value on every station and the AP. The PSK
must be from 8 to 63 characters in length. The 256Bit key
used for the actual encryption is derived from this key.
Encryption The same encryption method must be used. The most
common encryption method is TKIP. Another widely-
supported method is AES.
USB Wireless-G Adapter User Guide
30
Wireless LAN Configuration
To allow Wireless Stations to use the Access Point, the Wireless Stations and the Access Point
must use the same settings, as follows:
Mode On client Wireless Stations, the mode must be set to "Infrastructure".
(The Access Point is always in "Infrastructure" mode.)
SSID (ESSID) Wireless Stations should use the same SSID (ESSID) as the Access
Point they wish to connect to. Alternatively, the SSID can be set to "any"
or null (blank) to allow connection to any Access Point.
Security The Wireless Stations and the Access Point must use the same settings
for Wireless security (Disabled, WEP, WPA-PSK, WPA2-PSK, WPA,
WPA2)
If Wireless security remains disabled on the Access Point, all
stations must have wireless security disabled.
If Wireless security is enabled on the Access Point, each station
must use the same settings.
Appendix B - About Wireless LANs
31
Germering, October 2008
EC – Declaration of conformity
for
ALL0233 USB Wireless-G Adapter
This equipment conforms with the requirements of the Council
Directive
Applicable to R&TTE Directive 1999/5/EC (The Radio and
Telecommumications Terminal Equipment Directive)
and the mutual recognition of their conformity.
The safety advice in the documentation accompanying the products shall be obeyed.
The conformity to the above directive is indicated by the CE sign on the device.
The ALLNET ALL0233 Wireless USB Dongle conform to the European
Directives R&TTE 1999/5/EC, and EC Low Voltage Directive, 2006/95/EC.
This equipment meets the following conformance standards:
EN 301 489-1 V1.6.1 : (2005-09)
EN 301 489-17 V1.2.1 : (2002-08)
EN 300 328 V1.6.1 (2004-11)
AS/NZS CISPR 22 Class B and AS/NZS 4268 :2003
EN 300 328 V1.7.1 : (2006-10)
IEC 60950-1: 2001
EN 60950-1: 2001+A11 :2004
USB Wireless-G Adapter User Guide
32
FCC Statement
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not
installed and used in accordance with the instructions, may cause harmful interfer-
ence to radio communica-tions. However, there is no guarantee that interference will
not occur in a particular installation. If this equipment does cause harmful interference
to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one of the following
measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
IMPORTANT NOTE
To comply with RF exposure limits, user must not simultaneously operate wire-
lessproducts in adjacent USB-ports or cardbus slots.
This device has been SAR-evaluated for use with Laptop/Notebook computers and
meets the FCC RF exposure guidelines for an uncontrolled environment.
The maximum reported SAR value is 0.335W/kg (Body).
This equipment is intended to be operated in all countries.
This declaration is made by
ALLNET Computersysteme GmbH
Maistr. 2
82110 Germering
and can be downloaded from http://www.allnet.de/ce-certificates/ .

Navigation menu