Manual
Wireless-N USB Adapter UB812EN Manual Table of Contents CHAPTER 1 INTRODUCTION ............................................................................................. 1 Package Contents .............................................................................................................. 1 Features .............................................................................................................................. 1 LED..................................................................................................................................... 1 Operation ........................................................................................................................... 2 CHAPTER 2 INITIAL INSTALLATION .............................................................................. 3 Requirements..................................................................................................................... 3 Procedure ........................................................................................................................... 3 CHAPTER 3 USING THE WINDOWS UTILITY................................................................ 7 Overview ............................................................................................................................ 7 System Tray Icon............................................................................................................... 7 General Screen................................................................................................................... 8 Adapter Settings ................................................................................................................ 9 Profile Screen................................................................................................................... 10 Available Network Screen .............................................................................................. 16 Status Screen.................................................................................................................... 18 Statistics Screen ............................................................................................................... 20 WPS Screen...................................................................................................................... 21 APPENDIX A SPECIFICATIONS ....................................................................................... 22 Wireless USB Adapter .................................................................................................... 22 APPENDIX B ABOUT WIRELESS LANS.......................................................................... 23 Modes ............................................................................................................................... 23 BSS/ESS............................................................................................................................ 23 Channels........................................................................................................................... 24 WEP & WPA-PSK .......................................................................................................... 24 WPA2-PSK ...................................................................................................................... 24 Wireless LAN Configuration.......................................................................................... 25 P/N: 956YR100A0 Copyright © 2009. All Rights Reserved. Document Version: 1.0 All trademarks and trade names are the properties of their respective owners. Chapter 1 Introduction This Chapter provides an overview of the Wireless USB Adapter's features and capabilities. Congratulations on the purchase of your new Wireless USB Adapter. The Wireless USB Adapter provides a wireless network interface for your Notebook or PC. Package Contents The following items should be included: • The Wireless USB Adapter Unit • Quick Start Guide • CD-ROM containing the on-line manual. If any of the above items are damaged or missing, please contact your dealer immediately. Features • Compatible with IEEE 802.11b, 802.11g and 802.11n • Data transmission rate is up to 300Mbps • Supports Turbo Mode which can enhance the data transmission rate within the specific wireless network • Supports 64/128-bit WEP, WEP (802.1x), WPA-PSK, WPA2-PSK, WPA (TKIP/ AES with IEEE802.1x) and WPA2 (TKIP/ AES with IEEE 802.1x) functions for high level security • Supports CCX (Cisco Compatible Extensions) for the radio monitoring and fast roaming • Automatic fallback which increases the data security and reliability • Supports USB 2.0 interface LED Wireless USB Adapter The Wireless USB Adapter has a single Link/Activity LED. Link/Act LED (Blue) • On - Associated with the network. • Off - Not associated with the network. • Blinking - Data being transferred. Wireless USB Adapter User Guide Operation You should install the supplied software on the CD-ROM before inserting the Wireless USB Adapter. If you have any form of the wireless utility beforehand, please uninstall it. Chapter 2 Initial Installation This Chapter covers the software installation of the Wireless USB Adapter. Requirements • Windows 2000/XP/Vista. • Available USB port. • CD-ROM drive. • IEEE802.11b, IEEE802.11g and IEEE802.11n wireless LAN Procedure You should install the supplied software BEFORE inserting the Wireless USB Adapter. 1. Insert the CD-ROM into the drive on your PC. 2. The installation program should start automatically. If it does not, run the Setup.exe program. 3. Select the desired setup language on the screen. Figure 1: Start Installation 4. On the following screen, click "Next" to start the installation. Wireless USB Adapter User Guide Figure 2: Wireless LAN Driver and Utility Screen 5. Step though the procedure. Figure 3: Installation Program 6. Click "Continue Anyway" on the screen above. Figure 4: Information Screen 7. After the installation is complete, select Yes, I want to restart my computer now and then click "Finish". Initial Installation Figure 5: Finish Screen 8. 9. Insert the Wireless USB Adapter firmly into USB port of the PC. The Windows "New Hardware" wizard will then start. • Select Install the software automatically to allow it to complete the installation of the Windows driver • If using Windows XP, you may see a warning screen like the example below. If you do see this screen, just click "Continue Anyway" Figure 6: Windows XP Warning 10. If the Wireless USB Adapter was installed properly, you will now have a new icon in your system tray, as shown below. Figure 7: System Tray Icon Wireless USB Adapter User Guide Wireless USB Adapter Icon Table Connection to the Wireless USB Adapter is established. The length of green color indicates the signal strength. No connection to the Wireless USB Adapter. The Wireless USB Adapter is unplugged. 11. You can click this icon to configure the Wireless interface. See the following chapter for details. Chapter 3 Using the Windows Utility This Chapter provides Setup details for the AP mode of the Wireless USB Adapter. Overview If using Windows, you can use the supplied utility to configure the Wireless interface. To Use the supplied Windows utility for Configuration • Double-click the Wireless Utility icon in the desktop. • Click Start - Programs - Sercomm - UB812EN - UB812EN Wireless LAN Utility. This Chapter assumes you are using the supplied Wireless utility. System Tray Icon If the Wireless Utility program is running, you can click the icon in the System Tray or rightclick the icon and select "Open Config Utility" to open the application. Status Information The menu options available from the System Tray icon are: • Open Config Utility - This will display the main screen of the Utility. • About - Displays the information of company and version. • Hide - This will remove the tray icon from the task bar. • QUIT- Terminate the connection to the Wireless USB Adapter. Figure 8: Wireless USB Adapter menu Wireless USB Adapter User Guide General Screen This screen is displayed when you click the system tray icon. You can also click the General tab in the screen. When you open the utility program, it will scan all the channels to find all the access points/stations within the accessible range and automatically connect to one of the wireless devices which have the highest signal strength. Figure 9: Network Screen Data - Network Screen Status Displays the current status of the Wireless LAN Adapter. Speed It shows the current Transmission (Tx) rate and Receiving (Rx) rate. Type This will indicate "Infrastructure" or "Ad-hoc". Encryption It shows the wireless security that the wireless network is using. SSID The SSID (up to 32 printable ASCII characters) is a unique name identified in a WLAN. Signal Strength This is displayed as percentage (0 ~ 100%) of specified network. Link Quality It displays connection quality based on signal strength and TX/RX packet error rate. MAC Address This is the MAC address of the Access Point (or Wireless station, if the network is an Ad-hoc network). IP Address It shows the current IP address on the wireless interface. Using the Windows Utility Subnet Mask Subnet mask for the current IP address. Gateway Gateway IP address associated with the current IP address. Renew IP button Click this button to renew the IP address. Adapter Settings You can configure the adapter settings in this section. Figure 10: Adapter Settings Data - Adapter Settings Show Tray Icon Enable this if you want the icon displayed in the task bar. Disable Adapter Enable this to Terminate the connection to the Wireless USB Adapter. Radio Off You can turn the radio signal on/off by clicking this check box. Close Button Click this button to exit the program. Wireless USB Adapter User Guide Profile Screen Click Profile tab of the utility, then you will see the following screen. If you want to do the general settings, please follow the instructions below. Figure 10: Profile Screen Data - Profile Screen Available Profile(s) Profile Name It will indicate the current name for this profile. SSID If displays the SSID for the profile above. To add a profile 1. 2. 3. On the Profile tab, click Add button. Complete and verify the settings on this screen are correct. Click OK. To delete a profile 1. 2. On the Profile tab, select the profile that you want to delete. Click Remove. To edit a profile 1. 2. On the Profile tab, select the profile that you want to edit. Click Edit button. 10 Using the Windows Utility 3. 4. Change the profile settings as necessary. Click OK. To duplicate a profile 1. 2. 3. On the Profile tab, select the profile that you want to duplicate. Click Duplicate. Enter the name for the profile. To enable a profile 1. 2. In the list of available profiles, click the profile that you want to enable. Click Set Default. 11 Wireless USB Adapter User Guide Add Profile Click Add button in the Profile screen, the following Add Profile window will pop up. Users can setup the general settings, encryption and authentication settings and so on. Figure 11: Add Profile Screen Data - Add Profile Screen Wireless Network Properties Profile Name Enter or select a suitable name for this profile. Each profile must have a unique name. Network Name (SSID) Type in the SSID of the desired wireless network. This is a computer-tocomputer network… Enable this if you are connecting directly to another computer. Channel Select the Channel you wish to use on your Wireless LAN. 12 Using the Windows Utility Wireless Network Security Network Authentication Data Encryption Passphrase You MUST select the option to match the Wireless LAN you wish to join. The available options are: • Open System - Broadcast signals are not encrypted. This method can be used only with no encryption or with WEP. • Shared Key - Broadcast signals are encrypted using WEP. This method can only be used with WEP. • WPA-PSK - PSK means "Pre-shared Key". You must enter this Passphrase value; it is used for both authentication and encryption. • WPA2-PSK - This is a further development of WPA-PSK, and offers even greater security. You must enter this Passphrase value; it is used for both authentication and encryption. • WPA 802.1x - This version of WPA requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA standard. • WPA2 802.1x - This version of WPA2 requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WPA2 standard. • WEP 802.1x - This version of WEP requires a Radius Server on your LAN to provide the client authentication according to the 802.1x standard. Data transmissions are encrypted using the WEP standard. The available options depend on the Authentication method selected above. The possible options are: • Disabled - No data encryption is used. • WEP - If selected, you must enter the WEP data shown below. This WEP data must match the Access Point or other Wireless stations. • AES, TKIP - These options are available with WPA-PSK, WPA2-PSK, WPA 802.1x and WPA2 802.1x. Select the correct option. For WEP modes, you need to enter the desired value (8~63 characters). Data is encrypted using a 256Bit key derived from this key. Other Wireless Stations must use the same key. Select the desired option, and ensure the Wireless Stations use the same setting. • 64 Bit - data is encrypted, using the default key, before being transmitted. You must enter at least the default key. For 64 Bit Encryption, the key size is 10 chars in HEX (0~9 and A~F). • 128 Bit - data is encrypted, using the default key, before being transmitted. You must enter at least the default key. For 128 Bit Encryption, the key size is 26 chars in HEX (0~9 and A~F). 13 Wireless USB Adapter User Guide ASCII Numerical values, characters or signs are all allowed to be entered. Key Index (1~4) This setting is only available for Open System or Shared Key mode. Network key For WPA-PSK and WPA2-PSK modes, you need to enter the desired value (8~63 characters). Data is encrypted using a 256Bit key derived from this key. Other Wireless Stations must use the same key. Confirm network key Re-enter the value in this field. 802.1x EAP Method There are 5 methods in the drop-down list. • GTC - Generic Token Card. It was created by Cisco. It carries a text challenge from the authentication server, and a reply which is assumed to be generated by a security token. GTC does not protect the authentication data in any way. • TLS - Transport Layer Security. Provides for certificatebased and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point. • LEAP - Lightweight Extensible Authentication Protocol. It is a proprietary protocol from Cisco Systems developed to address the security weaknesses common in WEP. • TTLS - Tunneled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates. • PEAP - Protect Extensible Authentication Protocol. PEAP transport securely authentication data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN. Tunnel Select the desired option from the drop-down list. Provision Mode Select the desired mode from the drop-down list. Username Enter the user name into the field. Identity Enter the data in the field. Domain Type the domain name you want into the field provided. Password Enter the password for the tunnel. Certificate Click the checkbox to enable certificate authority server function. Select the desired option from the list. PAC Select the desired option from the list. 14 Using the Windows Utility Auto Select PAC Click the checkbox to select the PAC automatically. 15 Wireless USB Adapter User Guide Available Network Screen This screen is displayed when you click Available Network tab of the utility. When you open the utility program, it will scan all the channels to find all the access points/stations within the accessible range and automatically connect to one of the wireless devices which have the highest signal strength. Figure 12: Available Network Screen Data - Available Network Screen Available Network(s) SSID The SSID (up to 32 printable ASCII characters) is a unique name identified in a WLAN. Channel The channel used by the Wireless network. Encryption Data encryption used on the wireless network Network Authentication Data authentication methods used on the wireless network Signal This is displayed as percentage (0 ~ 100%) of specified network. Type It displays the Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network. BSSID This is the MAC address of the Access Point (or Wireless station, if the network is an Ad-hoc network). 16 Using the Windows Utility Supported Rates The Wireless rates supported by this Wireless network. Mode AP support wireless mode. It may support 802.11a, 802.11b or 802.11n wireless mode. Refresh Click this button to rescan for all Wireless networks. Add to Profile Click this button to add the selected AP to Profile setting. It will bring up profile page and save user's setting to a new profile. To Connect to a Wireless Network • Double Click the wireless network to which you want to connect • Select the wireless network to which you want to connect, and then click Add to Profile. Note that once you are connected to a Wireless network, the Available Network screen will identify the current wireless network with a red circle, as shown below. Figure 13: Available Network Screen - Connected 17 Wireless USB Adapter User Guide Status Screen The Status screen displays the detailed information of the current connection. Figure 10: Status Screen Data - Status Screen Status Manufacturer It shows the manufacturer of the device NDIS Driver Version It displays the current driver version of the NDIS. Short Radio Header It indicates the current status of the short radio header. Encryption It shows the wireless encryption that the wireless network is using. Authentication It will indicate the current authentication mode in use. Channel Set It displays the current channel set. MAC Address It shows the MAC address of the access point. Date Rate It will show current transmit rate and receive rate. Channel It displays the current channel in use. Status It will indicate the current link status. SSID It shows the SSID or network name of the selected wireless network. 18 Using the Windows Utility Channel It displays the current channel in use. Network Type This will indicate "Infrastructure" or "Ad-hoc". Power Save Mode It shows the current power save mode. Associated AP MAC It shows the MAC address of the associated access point. Up Time It displays the connection time. 19 Wireless USB Adapter User Guide Statistics Screen Click Statistics tab of the utility, the page will display the transmitted and received results. Figure 14: Statistics Screen Data - Statistics Screen Transmit Tx OK Frames successfully sent. Tx Error Frames failed to transmit. Receive RX OK Frames received successfully. Rx Packet Count Frames received with packet count. Rx Retry Frames successfully received with one or more reties. Rx ICV Error Frames received with ICV error. Reset Click the button to reset counters to zero. 20 Using the Windows Utility WPS Screen WPS (Wi-Fi Protected Setup) can simplify the process of connecting any device to the wireless network by using the push button configuration (PBC) on the Wireless Access Point, or entering a PIN code. You will use the WPS screen when you try to connect the wireless network with the WPS function. Figure 15: WPS Screen Data - WPS Screen Pin Input config (PIN) PIN Code Enter the PIN code displayed in the screen to the WPS screen of the access point. PIN Input config (PIN) Button Click this button to connect to the selected network. Push Button Push Button Start to add to AP using PBC configuration method. After clicking the Push Button Config (PBC), press the physical button or the visual button on the WPS screen of the access point. 21 Appendix A Specifications Wireless USB Adapter Standards: IEEE 802.11b, IEEE 802.11g, Draft 802.11n compliant Computer Slot Type: USB Chipset: RealtekRTL8191SU(MAC/BB/RF/PA) LED: 1 LED: Link/Active Tx: Rx: Date Rates: 802.11n: 20 MHz BW(LGI): 130, 117, 104, 78, 52, 39, 26, 13 40 MHz BW(LGI): 270, 243, 216, 162, 108, 81, 54, 27 20 MHz BW(SGI): 144, 130, 115.6, 86.7, 57.8, 43.3, 28.9, 14.4 40 MHz BW(SGI): 300, 270, 240, 180, 120, 90, 60, 30 802.11g: 54, 48, 36, 24, 18, 12, 9 and 6 Mbps 802.11b: 11, 5.5, 2 and 1 Mbps Operating Channels: 11 for North America, 13 for Europe and Japan Operating Frequency: 2.4 ~ 2.4835 GHz Modulation Technique: 802.11n: BPSK, QPSK, 16-QAM, 64-QAM 802.11g: OFDM 802.11b: CCK,QPSK,BPSK Media Access Protocol: CSMA/CA Operating Voltage: 5V +/- 5% Transmit Power: 802.11n: 13 +/- 1 dBm 802.11g: 13 +/- 1 dBm 802.11b: 17 +/- 1 dBm Security: WPA/WPA2; 128-bit TKIP/AES encryption, 40/64-, 128-bit WEP shared-key encryption 802.1x, and EAP-TLS, and PEAP authentication, WPS OS Requirements: Windows Vista/XP/2000 22 Appendix B About Wireless LANs This Appendix provides some background information about using Wireless LANs (WLANs). Modes Wireless LANs can work in either of two (2) modes: • Ad-hoc • Infrastructure Ad-hoc Mode Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN. Wireless Stations (e.g. notebook PCs with wireless cards) communicate directly with each other. Infrastructure Mode In Infrastructure Mode, one or more Access Points are used to connect Wireless Stations (e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN. The Wireless Stations can then access all LAN resources. Access Points can only function in "Infrastructure" mode, and can communicate only with Wireless Stations which are set to "Infrastructure" mode. BSS/ESS BSS A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). Using the same SSID is essential. Devices with different SSIDs are unable to communicate with each other. ESS A group of Wireless Stations, and multiple Access Points, all using the same ID (ESSID), form an Extended Service Set (ESS). Different Access Points within an ESS can use different Channels. In fact, to reduce interference, it is recommended that adjacent Access Points SHOULD use different channels. As Wireless Stations are physically moved through the area covered by an ESS, they will automatically change to the Access Point which has the least interference or best performance. This capability is called Roaming. (Access Points do not have or require Roaming capabilities.) 23 Wireless USB Adapter User Guide Channels The Wireless Channel sets the radio frequency used for communication. • Access Points use a fixed Channel. You can select the Channel used. This allows you to choose a Channel which provides the least interference and best performance. In the USA and Canada, 11 channels are available. If using multiple Access Points, it is better if adjacent Access Points use different Channels to reduce interference. • In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an Access Point. If more than one Access Point can be used, the one with the strongest signal is used. (This can only happen within an ESS.) • If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to use the same Channel. However, most Wireless stations will still scan all Channels to see if there is an existing "Ad-hoc" group they can join. WEP & WPA-PSK Both WEP and WPA-PSK are standards for encrypting data before it is transmitted. This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless unless the receiver can decrypt it. WPA-PSK is a later standard than WEP, and is more secure. WPA2-PSK This is a later version of WPA (WPA-PSK). The major change is the use of AES (Advanced Encryption System) for protecting data. AES is very secure, considered to be unbreakable. The PSK (Pre-shared Key) must be entered on each Wireless station. If WPA2-PSK is used, the Wireless Stations and the Access Point must have the same settings for each of the following: WPA2 PSK (Pre-shared Key) Enter the same value on every station and the AP. The PSK must be from 8 to 63 characters in length. The 256Bit key used for the actual encryption is derived from this key. Encryption The same encryption method must be used. The most common encryption method is TKIP. Another widelysupported method is AES. 24 Appendix B - About Wireless LANs Wireless LAN Configuration To allow Wireless Stations to use the Access Point, the Wireless Stations and the Access Point must use the same settings, as follows: Mode On client Wireless Stations, the mode must be set to "Infrastructure". (The Access Point is always in "Infrastructure" mode.) SSID (ESSID) Wireless Stations should use the same SSID (ESSID) as the Access Point they wish to connect to. Alternatively, the SSID can be set to "any" or null (blank) to allow connection to any Access Point. Security The Wireless Stations and the Access Point must use the same settings for Wireless security (Disabled, WEP, WPA-PSK, WPA2-PSK, WPA 8021.x, WPA2 802.1x, WEP 802.1x) • If Wireless security remains disabled on the Access Point, all stations must have wireless security disabled. • If Wireless security is enabled on the Access Point, each station must use the same settings. 25 Wireless USB Adapter User Guide FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communica-tions. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE To comply with RF exposure limits, user must not simultaneously operate wirelessproducts in adjacent USB-ports or cardbus slots. This device has been SAR-evaluated for use with Laptop/Notebook computers and meets the FCC RF exposure guidelines for an uncontrolled environment. 1.1W/kg. 26
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Extract, Print high-res XMP Toolkit : 3.1-702 About : uuid:4d1b006a-e5ec-48cb-a71b-44e353c465a5 Producer : Acrobat Distiller 6.0.1 (Windows) Create Date : 2009:07:14 13:50:18+08:00 Modify Date : 2009:08:07 16:18:01+02:00 Metadata Date : 2009:08:07 16:18:01+02:00 Document ID : uuid:25796ecf-3eb6-4034-b996-d0d607dda389 Instance ID : uuid:8467b114-72f1-4298-9444-365fc366e32b Format : application/pdf Title : untitled Has XFA : No Page Count : 30EXIF Metadata provided by EXIF.tools