U MEDIA Communications WCB360A 802.11g Wireless MIMO CardBus Card User Manual WCB 360A

U-MEDIA Communications, Inc. 802.11g Wireless MIMO CardBus Card WCB 360A

Users Manual

   802.11g Wireless MIMO CardBus Card      User's Guide  Version 1.0
 1Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help.  FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.  This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  IMPORTANT NOTE: FCC Radiation Exposure Statement: This device complies with FCC RF Exposure limits set forth for an uncontrolled environment, under 47 CFR 2.1093 paragraph (d)(2). This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.  U-MEDIA declares that WCB-360A,  ( FCC ID: SI5WCB360A ) is limited in CH1~CH11 for 2.4 GHz by specified firmware controlled in U.S.A.  The maximum average SAR (1g) is 0.375W/kg.This equipment has been tested for notebook lap-held configuration and complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. To maintain compliance with FCC RF exposure requirements, please do not use this device for other applications.
 2Table of Contents Federal Communications Commission Interference statement ………………..…………………. 1 Chapter 1 Getting Started ……………………………………………………………………………… 4 1.1 About Your 802.11g WLAN CardBus Card………………………..................................... .4 1.2 Card Hardware and Utility Installation………......................................................................... 4   1.3 Using the Utility to Configure Your Network........................................................................... 4 1.3.1 Network .............................................................................................................................. 6 1.3.2 Profile ................................................................................................................................. 7 1.3.3 Site Survey......................................................................................................................... 19 1.3.4 Options............................................................................................................................... 22 1.3.5 Version............................................................................................................................... 24  Chapter 2 - Configuring Wireless Security ................................................................................. 25 4.1 Configuring Security.............................................................................................................. 25 4.2 Configuring WEP .................................................................................................................. 25 4.3 Configuring WPA-P SK...........................................................................................................27 4.4 Configuring WPA............................................................................................................... ... 28 4.5 Configuring 802.1x ............................................................................................................ ... 28 4.5.1 Configuring 802.1x – EAP-MD5 ......................................................................................... 29 4.5.2 Configuring 802.1x – EAP-LEAP......................................................................................... 29 4.5.3 Configuring 802.1x – EAP-PEAP......................................................................................... 29 4.5.4 Configuring 802.1x – EAP-TLS ........................................................................................... 31 4.5.5 Configuring 802.1x – EAP-TTLS.......................................................................................... 33
 3Chapter 1 - Getting Started  This chapter introduces the Card and prepares you to use the Wireless Utility.  1.1 About Your 802.11g WLAN MIMO CardBus Card The Card is an IEEE 802.11g compliant wireless LAN adapter. With the Card, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Card. 9  Your Card can communicate with other IEEE 802.11g compliant wireless devices. 9  Automatic rate selection. 9  Standard data transmission rates up to 54 Mbps. 9  Proprietary Atheros transmission rates of 108 Mbps 9  Offers 64-bit, 128-bit and 152-bit WEP (Wired Equivalent Privacy) data encryption for network security. 9  Supports IEEE802.1x and WPA (Wi-Fi Protected Access). 9  Low CPU utilization allowing more computer system resources for other programs. 9  A built-in antenna. 9  Driver support for Windows XP/2000/ME/98SE  1.2 Card Hardware and Utility Installation Follow the instructions in the Quick Start Guide to install the Utility and make hardware connections.  1.3 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. For initial setup, please see the included Quick Start Guide. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar.
 4Double-clicking on the icon will display the following wireless utility window.    Each of the pages (Network, Profile, Site Survey, Options, Version) presented in the Wireless Utility are explained in the following sections.
 51.3.1 Network This page shows how the network is presently configured: network mode, information on the connected AP, TCP/IP, etc. This information cannot be modified in the Network screen.    The “Current Status” (lower) window shows the signal quality, signal strength, channel, etc. between the client and AP. It is always in view regardless of which page (Network, Profile, Search, Option, Version) is selected within the Wireless Utility.
 61.3.2 Profile This page is used to manage connections with Access Points. You can create different configuration profiles for connections with different APs and SSIDs.   The advantage of saving different profiles is the easiness of quickly changing connections without having to configure the PC with every single variable each time a connection change is made. Also, when configuring TCP/IP via the Wireless Utility you do not need to reboot the PC as when TCP/IP configuration is done via Windows' Control Panel.    Explanation of each button in this page is shown below. Add Clicking on this button enables you to create a new profile. The following steps show how this can be done.
 71) Click on [Add] and the following screen will appear.   2) On this screen you will insert some basic settings for your wireless network.  a. [Profile Name] Enter in a descriptive name for this profile.  b. [Network Mode] If connecting to an access point or wireless router, choose “Infrastructure” 3. If you are going to network one computer directly to another computer without an access point, then choose “Ad-Hoc”4.  c. [SSID] Select [Browse] The utility will perform a brief site survey and display the results to you. Click on the SSID5 of the access point you would like to connect to and   3 Infrastructure: You will need an access point to use the Wireless CardBus Card in Infrastructure mode. Because all communication will be done via the Access Point, the Access Point’s SSID must be used. 4 Ad-Hoc: In Ad-Hoc mode communication is made peer-to-peer between the client PCs and without the use of an Access Point. All PCs communicating in an Ad-Hoc should use the same SSID (whatever your choice is).
 8then click on [Add to Profile]. If the access point you choose has encryption enabled, a window will pop up reminding you to enter the encryption information on the next page. If your access point is not listed, close the [Site Survey] window, and type the name of the SSID into the [SSID] field.  d. Click [Next]. The following screen will appear.   This screen will vary in appearance depending on whether any encryption was detected with your access point. 3) Enter in the appropriate security information.   5SSID: The SSID is a group name used by users of a common wireless network. Only those devices using the same SSID are able to access each other. Also, you must use the same SSID as the Access Point you want to connect with. SSIDs are case sensitive so take care to make sure your capitalization matches.
 9a. Click [Next]. The following screen will appear.   4) On this screen you will configure the wireless modes supported by this profile.  a. Under [Frequency Band], put a check mark next to each wireless protocol you want this profile to support. If you are unsure of which protocol to choose, leave all checked.  b. For [802.11g Configuration] leave all settings at default unless instructed by your network administrator to change them.
 10c. Click [Next]. The following screen will appear.    5) Final Step a. Uncheck the box [Apply this profile now] if you do not want to activate this profile at this time. b. Click [Save] to complete the wizard and save the profile you have just created.  Remove To remove a profile from the “Profile List” select it and then click on [Remove].  Apply If you want to change the current profile with another profile from the “Profile List”, select the desired profile and click on [Apply]. The new profile will immediately become the current profile and you will be connected with its SSID.  Properties Selecting a profile from the “Profile List” and clicking on [Properties] will allow you to check and/or modify the properties of the selected profile. Clicking on [Properties] will take you to the following screen.
 11   Each page in [Properties] is explained below.
 12Basic Settings: In this page, you can verify the name of the current profile.    [Profile Name] Allows you to change the name of the current profile.  [Network Mode] Allows you to change between Infrastructure and Ad-Hoc networking modes.  [SSID] Allows you to change the SSID that this profile will associate with. Use the [Browse] button to perform a site survey and select the SSID from a list of available SSIDs. Keep in mind when manually entering an SSID that SSIDs are case sensitive.
 13Advanced Settings: This screen allows you to make changes to the default ways the card operates including advanced 802.11 settings. Unless you are an advanced user and have deep knowledge about each property on this page, it is recommended that you leave them at the default settings.
 14WLAN Security: This screen allows you to configure the security settings of your wireless LAN.    Security Mode 1) No Encryption All data sent between the AP and the client is left unencrypted and may be viewed by other wireless devices. 2) WEP Wired Equivalent Privacy – Encrypts all traffic sent between the AP and the client using a shared key. When using WEP encryption (available in 64, 128, or 152-bit), only those APs and PCs using the same WEP Key are allowed to communicate with each other. 3) WPA Wi-Fi Protected Access – Encrypts all traffic between the access point and the client using either TKIP or AES encryption. Depending on the authentication protocol selected, each client must authenticate using their own unique username, password, and security certificate.
 15To learn more about WPA please see Chapter 2. 4) WPA-PSK WPA-PSK is a compromise between WPA and WEP. Like WEP, it uses a pre-shared key that every user of the network must have in order to be able to send and receive data. Like WPA, it uses either TKIP or AES, which improve greatly over the encryption found in WEP. We recommend you use WPA or WPA-PSK whenever possible.  Frequency Band: This screen lets you define which 802.11 wireless standards to try to connect to. It also lets you change some 802.11g behaviors.
 16Chipset Features: This screen allows you to configure advanced features built into the wireless chipset.    [Tx Power Level] Allows you to adjust the output power of your radio. Reducing output power can reduce power usage of your laptop and will limit the distance that your wireless signal will reach. [Antenna Diversity] Defines whether to use both internal antennas. Antenna Diversity usually provides a higher quality connection. [Super G] Support for Atheros 108Mbps Super G mode. [XR] Support for Atheros Extended Range technology. [Frame Burst] Allows for faster speeds while maintaining compatibility with other 802.11 devices which may be on your network.
 17TCP/IP: This allows you to change your TCP/IP settings.   [Use IP Changer] By putting a checkmark in the box, you will overwrite your existing WLAN TCP/IP configuration and use the IP Changer software built-into the Wirelss Utility. This allows you to configure TCP/IP settings for each profile.
 181.3.3 Site Survey This page shows a list of SSIDs in your vicinity. Information regarding each SSID is also shown: SSID, mode, signal strength, channel, BSSID (MAC address), data rate, and WEP/WPA status.    Refresh [Refresh] will scan the vicinity for a certain amount of time and display the scan results. Strong Scan [Strong Scan] will continuously scan the vicinity every 2.5 seconds until you click on [Stop], which appears in place of [Strong Scan] when scanning.
 19  Selecting a network from the [Available Networks] list will enable the [Detail Info], [Connect] and [Add to profile] buttons.  Detail Info [Detail info] will display the following screen showing the selected device's configuration information. An alternative to clicking on [Detail info] is double-clicking on the SSID of choice.
 21  Connect [Connect] will immediately connect you with the selected network. Add to profile [Add to profile] will have the same effect as clicking on [Add] in the [Profile] page
 221.3.4 Options In this page you can configure the behavior of the Wireless utility.    Launch at windows startup Selecting this option will automatically start the Wireless Utility program whenever you start Windows. Auto DH CP renewal Automatically renews the DHCP information after changing profiles. Auto-Pro file Selection Allows you to define the behavior of the auto-profile selection algorithm. Click [Settings] to   configure. See following screen shot for options.
 23
 241.3.5 Version Software and Hardware information of the current client device.     802.11g / 802.11b
 25Chapter 2 - Configuring Wireless Security This chapter covers the configuration of security options in the Wireless Utility.  2.1 Configuring Security You can configure your security settings at any time. Simply select the profile you wish to edit under the [Profile] tab, select [Properties] and then choose [WLAN Security]. You are also presented with the option to configure security during the profile creation process. Whether changing the security settings of an existing profile or creating a new profile, the steps to configure your security settings remain the same.  2.2 Configuring WEP
 261. Select [WEP] under [Security Mode] 2. Put a check mark next to [Using Static WEP] 3. Click [Config]. You will then see the screen below.  4. [WEP Method] Select the correct encryption level to match your access point. Either 64, 128, or 152-bit. The encryption level set her must match the encryption level used by your access point.  a. [Authentication] You can choose between Auto, Open System, and Shared. Please see section 2.5 for more information on the different types of authentication. For most installations choosing “Auto” is the best choice. b. Enter the WEP key exactly as you did in your access point.  There are three ways of generating a WEP Key: Make key using PassPhrase: a WEP Key is automatically generated as you type in any PassPhrase of your choice. Use this feature when you have used a PassPhrase to generate your WEP key on your access point.  Manual Input (ASCII): You generate your own WEP Key using ASCII characters (5 characters for 64-bit, 13 characters for 128-bit, 16 characters for 152-bit)
 27Manual Input (Hexadecimal): You generate your own WEP Key using hexadecimal characters (10 characters for 64-bit, 26 characters for 128-bit, 32 characters for 152-bit).  5. Click [OK] to save your settings and return to the previous screen. 6. If you want to use 802.1x authentication with WEP, you will need to configure your 802.1x settings. Please see section 4.5 for details on configuring 802.1x.  2.3 Configuring WPA-PSK  1. Select [WPA-PSK] under [Security Mode]. 2. Select [Encryption method]. You can choose between TKIP or AES. Most access points use TKIP for WPA-PSK. 3. Under [PSK Pass Phrase] enter the same pass phrase used to configure WPA-PSK on your access point.
 282.4 Configuring WPA  1. Select [WPA-PSK] under [Security Mode]. 2. Select [Encryption method]. You can choose between TKIP or AES. Most access points use TKIP for WPA. 3. See section 4.5 for configuring 802.1x for WPA.  2.5 Configuring 802.1x 1. Choose the EAP method under [Authentication protocol]. 2. Depending on the EAP method chosen the options under [User Information] will change.  2.5.1 Configuring 802.1x – EAP-MD5 1. EAP-MD5 is only a choice when use WEP. MD5 is not allowed for WPA. 2. Enter in unique User ID and Password under [User Information]
 292.5.2 Configuring 802.1x – EAP-LEAP  1. Enter in unique User ID and Password under [User Information]  2.5.3 Configuring 802.1x – EAP-PEAP 1. Click [Config] under [Authentication protocol] 2. Select inner PEAP protocol. You choices are [MS-CHAP v2] or [TLS]. 3. Click [OK] to finish and return to the previous screen. 4. Enter in unique User ID and Password under [User Information]. 5. If using a user6 or server certificate click [Config certificate]. The following window appears:   6 You must first have a wired connection to a network and obtain the certificate(s) from a certificate authority (CA). Consult your network administrator for more information.
 30  [Use user certificate]: Put a check in the box to activate user certificate. Then select certificate from the pull down menu. [Validate server certificate]: Put a check in the box to activate server certificate. Then select the certificate authority from the pull down menu. [Server name]: Name of server used for 802.1x authentication. [Server name should match exactly]: Check this box to force server name to match exactly the same in the certificate.  6. Click [OK] to finish and return to the previous screen.
 312.5.4 Configuring 802.1x – EAP-TLS   1. Enter in unique User ID and Password under [User Information]. 2. TLS requires you to configure both a server and user7 certificate. 3. Click [Config certificate]. The following window appears:   7 You must first have a wired connection to a network and obtain the certificate(s) from a certificate authority (CA). Consult your network administrator for more information.
 32  [Use user certificate]: Put a check in the box to activate user certificate. Then select certificate from the pull down menu. [Validate server certificate]: Put a check in the box to activate server certificate. Then select the certificate authority from the pull down menu. [Server name]: Name of server used for 802.1x authentication. [Server name should match exactly]: Check this box to force server name to match exactly the name in the certificate.  4. Make selections and then click [OK] to finish and return to the previous screen.
 332.5.5 Configuring 802.1x – EAP-TTLS   1. Enter in unique User ID and Password under [User Information]. 2. Select inner TTLS protocol. You can choose between [PAP], [CHAP], [MS-CHAP], [MS-CHAPv2], or [MD5-Challenge]. 3. Click [OK] to finish and return to the previous screen. 4. Click [Config certificate]. The following window appears:
 34  [Use user certificate]: Put a check in the box to activate user certificate. Then select certificate from the pull down menu. [Validate server certificate]: Put a check in the box to activate server certificate. Then select the certificate authority from the pull down menu. [Server name]: Name of server used for 802.1x authentication. [Server name should match exactly]: Check this box to force server name to match exactly the name in the certificate.  5. Make selections and then click [OK] to finish and return to the previous screen. Server certificate must be configured for TTLS to work.

Navigation menu