Tecom Co WL5011S Wireless LAN Adapter User Manual WL5011manual new

Tecom Co Ltd Wireless LAN Adapter WL5011manual new

OEM Manual

1
WL 5011s
802.11g Wireless Network Adapter
Client Utility User Guide
10/2005
2
1. Introduction
WL5011s client utility is a clean, straightforward GUI (Graphic User Interface) tool,
which is designed for users to configure, manage and monitor userswireless network
with ease.
System requirement
Laptop/ PC containing:
32-bit Cardbus slot (or Desktop PC with PC Card-PCI adapter)
Mini PCI
32 MB memory or greater
300 MHz processor or higher
Operation Systems:
Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition,
Windows XP, or Windows NT 4.0 (with Service Pack 6)
3
2. Starting WL5011s Utility
Insert WL5011s and click the icon in the system tray (on the right-hand side of the
taskbar), the utility window will appear.
There are total 5 pages (Configure, Status, Network, Site Survey and About) provided
by this utility.
4
3. Configuration
Configure’ page allows you to make all the required settings in order to integrate the
adapter into an existing WLAN.
Profile: Your settings can be collected under one name, e.g. if you want to use your
computer in more than one WLAN network. Click ‘Saveand all the current
settings will be assigned to the profile name and saved. They will then be
available for future use and are ready to be called up. Click Deleteto remove
the selected profile. Click ‘Applyto use the selected profile.
SSID: All computers in the domain of a wireless LAN must have the same identity in
order to be recognized. If you click the Open arrow you can see a list with the
SSID of all networks which are within the range of the computer. Select the
SSID which you would like to connect up to.
Desired rate: Here you can select the transmission rate. Recommended: ‘Auto’.
Module Type: Here you can define the type of network: ‘Infrastructure’ (all
cable-linked and radio controlled computers within the network are
connected up to one another via an access point) or ‘Ad hoc (the
computers only communicate with one another via radio and have no
5
access to a cable-linked network).
Country: for Ad hoc networks only. Radio channel restrictions are different by
countries. Please select properly.
Note: For the US version this item is locked by factory setting and the select
function is disabled.
Channel: for Ad hoc networks only. You can set the radio channel which all computers
must use. The availability of channels depend on which country you have
selected in previous “Countryitem.
Note: For the US version only CH 1 to CH 11 is selectable by factory setting.
Security Type: Five network authentication types can be selected.
(1) WEP 64 bit (2) WEP 128 bit (3) WPA-PSK (4) WPA (5) 802.1x.
The detail describe as below.
WARNING
For security reason, enabling one of the security measurements is strongly recommended.
WEP is older and more commonly used in public wireless network. WPA provides stronger
protection than WEP but is more complicated to configure.
(1) WEP 64 bits & (2) WEP 128 bits:
WEP: The same key must be used for the radio module and the access point /router (in
the case of Infrastructure networks). In Ad hoc networks: All computers must
use the same key. 64 or 128 bit keys are supported.
Key Type: The type of WEP key.HEX’: 10 (64 bits) or 26 (128 bits)
Hexadecimal characters (0 - 9 and A - F). ‘ASCII: 5 (64 bits) or 13
(128 bits) characters.
Key Index: Select which key (Key 1 to Key 4) to use.
PassPhrase: Use this one for WEP key auto-generation. Check box and enter a
password sentence (max. 32 characters, highest safety level) into the
entry field (appears unreadable). The ‘Key Type’ fields will then be
deactivated. For 64 bit WEP key, four keys will be generated. Select the
key number from ‘Key Indexwhich is also being used by the access
6
point (Infrastructure networks) or the other computers (Ad hoc
networks). In case of 128 bit WEP key, only one key will be generated
and used.
WARNING
For security reasons there is no standard for the generation of a WEP key (i.e. there
are various algorithms for the generation of a key). Please do not use PassPhrase if
you are not sure that every device within the network shares the same algorithm.
7
(3) WPA-PSK (Wi-Fi Protected Access -- Pre-shared key):
Encryption :
«TKIP (Temporal Key Integrity Protocol): An enhanced wireless security protocol;
part of the IEEE 802.11i encryption standard for wireless LANs. WPA was developed
to improve the security provided by WEP. WPA employs the same encryption
mechanism, but uses the TKIP (Temporal Key Integrity Protocol) procedure to create
the code.
«AES (Advanced Encryption Standard): An additional replacement for WEP
encryption.
Enter the Pre-shared key should be a string of 8 to 63 ASCII characters.
8
(4) WPA & (5) 802.1x:
WPA provides for an additional authentication by means of a procedure described in
the IEEE 802.1x standard. In this case you do not use a keyword (pre-shared key) for
your wireless router. You should select the option 802.1x or WPA and then configure
your access to an authentication server. As an authentication server you can either use
the wireless router’s internal RADIUS server (e.g. tiny server) or an external
RADIUS server.
EAP (Extensible Authentication Protocol):
«PEAP (Protected Extensible Authentication Protocol): A version of EAP. EAP
ensures mutual authentication between a wireless client and a server that resides at the
network operations center.
«LEAP (Light Extensible Authentication Protocol): A version of EAP. EAP ensures
mutual authentication between a wireless client and a server that resides at the
network operations center.
«TLS (Transport Layer Security): The successor to Secure Sockets Layer (SSL)
protocol for ensuring privacy and data integrity between two communicating
applications.
Internal RADIUS server (e.g. tiny server):
Server in the wireless router which checks the access data of the participants. This
controls the logging in of users by means of User Name and Password.
Security Type: can select WPA (Encryption:TKIP or AES) or 802.1x
options.
EAP should select PEAP option.
Certificate should select None option.
Tunnel should select MS-CHAPv2 option.
The account information (User Name and Password) must be the same as your
wireless routers setting.
Note: The selections of Security Type (network authentication) and Encryption must be
the same as wireless routers configuration.
9
External RADIUS server:
The router forwards the access data to an external server
(Recommend server: Windows 2000 Servers external RADIUS server).
Security Type: can select WPA (Encryption:TKIP or AES) or 802.1x
options.
EAP should select TLS option.
Certificate should select a certificate which has received from external RADIUS
server.
(The test client must install certificate gotten from external RADIUS server first
and then you can see and select this certificate ).
Note: The selections of Security Type (network authentication) and Encryption must be
the same as wireless routers configuration.
10
Apply: By clicking "Apply" the settings you have made will be adopted by the adapter
and displayed on the "Status" tab.
Refresh: The settings will be applied to the default settings of the selected, active
profile.
Radio On/Off: The radio of the adapter can be switched on or off. If it is switched off,
the computer can no longer be reached within the network.
Cancel: Closes the utility window, but does not terminate the radio traffic.
11
4. Status
The current connection status of the adapter is displayed here. This page is read only.
BSSID: The MAC address of the access point.
SSID: The identity of the network device. A connection is only possible when the
devices in the network have the same SSID.
Channel: The radio channel which is being used.
Rate: The current speed of transmission within the network.
Throughput: The traffic within the network in the form of the incoming (Receiving)
and outgoing (Sending) data packets.
Signal and Noise: Show you the stability the network and the strength of the signal.
12
5. Network
This page displays the IP related information of the. The network administrator can use
this information to check the computer and its allocation within the network and, if
necessary, coordinate.
IP Address Release: Release IP address of the adapter obtained from DHCP server.
IP Address Renew: Re-acquire IP address of the adapter from DHCP server.
These two buttons will be gray-out if fixed IP setting of the adapter is used.
13
6. Site Survey
This page shows you all of the radio networks which are within range of your computer.
No configuration will be accepted here.
SSID: The network name of access points/routers which are within the radio
range of the computer. It is possible, however, that the SSID of the respective
access point or router has been suppressed. If there is a closed lock beside the
SSID, it means that the access point is encrypted.
BSSID: The MAC address of this access point.
Channel: The radio channel which is being used.
Signal: The strength of the radio signal.
Module Type: the type of network: ‘Infrastructureor ‘Ad hoc’.
Refresh: Re-do site survey. By clicking this button you can update the displayed
information.
Double-click one of the displayed ‘SSID, the adapter will try to associate to the
selected access point and the ‘Statuspage will appear. If the access point is encrypted,
you will be prompted accordingly and ‘Configurepage will appear.
14
7. About
All driver related information is provided in this page: ‘Driver Version’,
Application Version’, and ‘Driver Date’. This information could be important if you
need to contact the customer technical support.
15
FCC statements
Notice: Changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate the equipment.
This device generates and radiates radio-frequency energy. In order to comply with FCC
radiofrequency radiation exposure guidelines for an uncontrolled environment, this equipment
has to be installed and operated while maintaining a minimum body to antenna distance of
20cm. The antenna(s) used for this transmitter must not be co-located or operated in
conjunction with any other antenna or transmitter.
This product does not contain any user serviceable components. Any unauthorized product
changes or modifications will invalidate warranty and all applicable regulatory certifications
and approvals.
This equipment has been tested and found to comply with the limits for a Class B Digital
Device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instruction may cause harmful interference to radio
communication. However, there is no guarantee that interference will not occur in a particular
installation.
If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
-- Reorient or relocate the receiving antenna.
-- Increase the separation between the equipment and receiver.
-- Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
-- Consult the dealer or an experienced radio / TV technician for help.
FCC OEM Labeling instructions:
OEM should add following label:
Contains FCC ID: D6XWL5011S
Above should be clearly visible on products where WL5011s modules are installed.

Navigation menu