Z Com XN750V1 IEEE802.11N Wireless USB Adaptor User Manual XN 750 20090716

Z Com Inc IEEE802.11N Wireless USB Adaptor XN 750 20090716

User Manual

         IEEE802.11N             Wireless USB Adaptor  User’s Manual                                                                             V1.1 July 2009
   Contents Chapter 1 Welcome to the Wireless USB Adaptor User’s Manual.............7 Chapter 2 About your Wireless USB Adaptor..............................................8 What is Wireless USB Adaptor!....................................................................8 Features and Benefits ..................................................................................8 Applications..................................................................................................8 System requirements ...................................................................................9 Chapter 3 Inside the Box.............................................................................10 Chapter 4 Starting Up ..................................................................................11 For Windows XP users............................................................................... 11 Note.1 for Windows XP users.................................................................20 Note.2 for Windows XP users.................................................................21 Note.3 for Windows XP users.................................................................22 For Windows Vista users............................................................................23 Note.1 for Windows Vista users..............................................................29 Note.2 for Windows Vista users..............................................................30 Note.1 for Windows 2000 users..............................................................38 Chapter 5 Utility Overview ..........................................................................39 Connection: ................................................................................................39 Profiles: ......................................................................................................40 Power Save Mode: .................................................................................44 Wireless Mode:.......................................................................................44 Adhoc Channel: ......................................................................................44 Preamble Mode: .....................................................................................44 Turbo Mode: ...........................................................................................44 RTS Threshold:.......................................................................................44 Fragment Threshold: ..............................................................................44 Security Settings ........................................................................................52 Data Encryption with WEP......................................................................52 Authentication with WEP: Open System authentication and Shared Key authentication .........................................................................................53 IEEE 802.1X ...........................................................................................54 EAP Authentication .................................................................................54 WPA (2)...................................................................................................54 WPA ....................................................................................................54 WPA-PSK............................................................................................55 WPA2 ..................................................................................................56
   WPA2-PSK..........................................................................................57 Encryption Mode.....................................................................................58 IEEE 802.1X Authentication....................................................................58 EAP Type................................................................................................59 Link Test: ....................................................................................................65 Site Survey:................................................................................................66 Join:........................................................................................................66 Rescan: ..................................................................................................66 Advanced scan: ......................................................................................66 About:.........................................................................................................67 Chapter 6 Troubleshooting .........................................................................68 Chapter 7 Warranty......................................................................................69
   Figures Figure 1 Setup Icon in Windows XP.........................................................................................11 Figure 2 Setup in Windows XP-Initial Screen ........................................................................11 Figure 3 Setup in Windows XP-Select Driver Files............................................................... 12 Figure 4 Setup in Windows XP-Select Destination Folder.................................................... 12 Figure 5 Setup in Windows XP-Select Program Folder........................................................ 13 Figure 6 Setup in Windows XP-Add Shortcuts ..................................................................... 13 Figure 7 Setup in Windows XP-Installation Processing........................................................ 14 Figure 8 Setup in Windows XP-Installation Completed ........................................................ 15 Figure 9 Wireless LAN Utility Icon in Windows XP.................................................................. 15 Figure 10 Found New Hardware Wizard-Step 1 ................................................................... 16 Figure 11 Found New Hardware Wizard-Step 2 ................................................................... 16 Figure 12 Hardware Installation Note...................................................................................... 17 Figure 13 Found New Hardware Wizard-Step 3 ................................................................... 17 Figure 14 Wireless Configuration Utility-Connection ............................................................ 18 Figure 15 Wireless Configuration Utility-Site Survey ............................................................ 18 Figure 16 Enjoy the Internet ....................................................................................................19 Figure 17 Wireless Configuration Utility-Console ................................................................. 20 Figure 18 Wireless Configuration Utility-Warning Sign......................................................... 20 Figure 19 Wireless Zero Configuration Icon............................................................................ 20 Figure 20 Wireless Network Connection List .......................................................................... 21 Figure 21 Wireless LAN Utility Icon in Windows XP................................................................ 21 Figure 22 Wireless Configuration Utility-Console ................................................................. 22 Figure 23 Wireless Configuration Utility-Warning Sign......................................................... 22 Figure 24 Setup Icon in Windows Vista................................................................................... 23 Figure 25 Setup in Windows Vista-Initial Screen.................................................................. 23 Figure 26 Setup in Windows Vista-Select Driver Files.......................................................... 24 Figure 27 Setup in Windows Vista-Select Destination Folder............................................... 24 Figure 28 Setup in Windows Vista-Select Program Folder................................................... 25 Figure 29 Setup in Windows Vista-Add Shortcuts ................................................................ 25 Figure 30 Setup in Windows Vista-Installation Processing................................................... 26 Figure 31 Windows Security.................................................................................................... 26 Figure 32 Setup in Windows Vista-Installation Completed ................................................... 27 Figure 33 Successful Driver Installation Sign.......................................................................... 27 Figure 34 Wireless Configuration Utility-Connection ............................................................ 28 Figure 35 Wireless Configuration Utility-Site Survey ............................................................ 28 Figure 36 Enjoy the Internet ....................................................................................................29
   Figure 37 Wireless Zero Configuration Icon............................................................................ 29 Figure 38 Wireless Network Connection List .......................................................................... 30 Figure 39 Setup Icon in Windows 2000................................................................................... 31 Figure 40 Setup in Windows 2000-Initial Screen.................................................................. 31 Figure 41 Setup in Windows 2000-Select Driver Files ......................................................... 32 Figure 42 Setup in Windows 2000-Select Destination Folder .............................................. 32 Figure 43 Setup in Windows 2000-Select Program Folder................................................... 33 Figure 44 Setup in Windows 2000-Add Shortcuts ................................................................ 33 Figure 45 Setup in Windows 2000-Installation Processing................................................... 34 Figure 46 Setup in Windows 2000-Installation Completed ................................................... 34 Figure 47 Digital Signature Not Fount Sign............................................................................. 35 Figure 48 Wireless Configuration Utility Icon .......................................................................... 35 Figure 49 Wireless Configuration Utility-Console ................................................................. 36 Figure 50 Wireless Configuration Utility-Site Survey ............................................................ 36 Figure 51 Enjoy the Internet ....................................................................................................37 Figure 52 Wireless Configuration Utility-Connection ............................................................ 39 Figure 53 More Status Information .......................................................................................... 40 Figure 54 Wireless Configuration Utility-Profiles................................................................... 41 Figure 55 Adding a Profile ....................................................................................................... 41 Figure 56 Security Settings .....................................................................................................42 Figure 57 TCP/IP Settings.......................................................................................................43 Figure 58 Advanced Settings................................................................................................... 43 Figure 59 Confirm Information................................................................................................. 45 Figure 60 Wireless Configuration Utility-Profiles................................................................... 45 Figure 61 Wi-Fi Protected Setup ............................................................................................. 46 Figure 62 WPS Setup-Initial Screen ..................................................................................... 47 Figure 63 WPS Setup-Select a Mode................................................................................... 48 Figure 64 WPS Setup-Select a Mode................................................................................... 48 Figure 65 WPS Setup-Select an AP ..................................................................................... 49 Figure 66 WPS Setup-Select a Mode................................................................................... 49 Figure 67 WPS Setup-Select a Mode................................................................................... 50 Figure 68 WPS Setup-Select an AP ..................................................................................... 50 Figure 69 WPS Setup-Searching for WPS Network ............................................................. 51 Figure 70 WPS Setup-Successfully Connected.................................................................... 51 Figure 71 Security Settings .....................................................................................................52 Figure 72 Security Settings .....................................................................................................53 Figure 73 Security Settings .....................................................................................................55 Figure 74 Security Settings .....................................................................................................56
   Figure 75 Security Settings .....................................................................................................57 Figure 76 Security Settings .....................................................................................................58 Figure 77 Security Settings .....................................................................................................59 Figure 78 Certificate ................................................................................................................ 60 Figure 79 Certificate-PEAP................................................................................................... 61 Figure 80 Certificate-TLS...................................................................................................... 62 Figure 81 Certificate-TTLS.................................................................................................... 63 Figure 82 Certificate-SIM ...................................................................................................... 64 Figure 83 Wireless Configuration Utility-Link Test ................................................................ 65 Figure 84 Wireless Configuration Utility-Site Survey ............................................................ 66 Figure 85 Wireless Configuration Utility-About ..................................................................... 67
Federal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reason-able protection against harmful interference in a residential installation.  This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:-  Reorient or relocate the receiving antenna.-  Increase the separation between the equipment and receiver.-  Connect the equipment into an outlet on a circuit different from that  to which the receiver is connected.-  Consult the dealer or an experienced radio/TV technician for help.This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.FCC Caution: Any changes or modifications not expressly approved by the party respon-sible for compliance could void the user's authority to operate this equipment.IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.IMPORTANT NOTE:FCC Radiation Exposure Statement:This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.Federal Communication Commission (FCC) Radiation Exposure Statement This EUT is compliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C. This equipment should be installed and operated with minimum distance 0.5 cm between the radiator & your body.
  Chapter 1 Welcome to the Wireless USB Adaptor User’s Manual                    Page 7 Chapter 1 Welcome to the Wireless USB Adaptor User’s Manual Welcome to the Wireless USB Adaptor User’s Manual Congratulations on your purchase of the Wireless USB Adaptor. The User’s Manual will assist you to get the full picture of it. We’ve arranged this user’s manual in a way that contains both getting started with Wireless USB Adaptor as well as everything about it. First of all, the manual starts from the introduction of Wireless USB Adaptor like features, benefits, etc. Then, it goes as hypothetically the first time you open the box and will walk you through the features we think that you may want to know or use right away when you plug Wireless USB Adaptor into your PC/laptop. Afterwards, the user’s manual offers the basic/advanced information about the “Wireless Configuration Utility” which can make the best of Wireless USB Adaptor, configure your wireless network and even monitor the status of Wireless USB Adaptor. Enjoy the journey and your Wireless USB Adaptor for a richly wireless life!
  Chapter 2 About your                                    Page 8 Chapter 2 About your Wireless USB Adaptor What is Wireless USB Adaptor! The IEEE 802.11n Wireless LAN USB Adapter is a standard USB adapter that fits into every standard USB 2.0 and 1.1 ports of a PC/laptop. By complying with the IEEE 802.11n draft 2.0, Wireless USB Adaptor is able to support the transmission rate up to 150Mbps, giving itself the speed equivalent with Ethernet to access corporate network or the Internet wirelessly. When Wireless USB Adaptor is installed, it is able to communicate with every IEEE 802.11b/g/n compliant devices. Features and Benefits z Enable your PC/laptop to enjoy the wireless connection to the Internet. z Free of cable and embracing the mobility. z Support IEEE 802.11b/g/n solution in 2.4GHz frequency band. z Automatic rate selection   z Easy setup and user friendly configuration.   z With built-in antenna. z Security supported: WEP, WPA, WPA2. z OS supported: Windows 2000, Windows XP and Windows Vista. Applications Wireless USB Adaptor offers a fast, reliable, cost-effective solution for wireless client to access to the network with applications (not limited to) as below:   z Remote access to corporate network information - E-mail, file transfer and terminal emulation. z Difficult-to-wire environments - Historical or old buildings, asbestos installations, and open area where wiring is difficult to deploy. z Frequently-changing environments - For retailers, manufacturers and those who frequently change the workplace and locations.  z Temporary LANs for special projects or peak time
  Chapter 2 About your                                Page 9 - Trade shows, exhibitions and construction sites where a temporary network will be practical.   - Retailers, airline and shipping companies need additional workstations during peak period.   - Auditors require workgroups at customer sites. z Access to database for mobile workers - Doctors, nurses, retailers, accessing their database while being mobile in the hospital, retail store or office campus. z SOHO (Small Office and Home Office) users - SOHO users need easy and quick installation of a small computer network. z High security connection - The secure wireless network needs to be installed quickly and full of flexibility. System requirements Before installing Wireless USB Adaptor, please make sure your system complies with the following conditions: z A minimum of 10MB available hard disk space. z A minimum of 32 MB RAM z A computer equipped with a USB port, and socket services compliant with revision 1.1 or 2.0 of USB specification. z A CD-ROM drive. z OS with Windows Vista/XP/2000.
  Chapter 3 Inside the Box                                                    Page 10 Chapter 3 Inside the Box  You should find the following items inside the box. z IEEE 802.11n Wireless LAN USB Adapter                     ……x 1                       z Product CD (Driver, Utility and Manual are inside)……………………...x1
  Chapter 4 Starting Up                                                       Page 11 Chapter 4 Starting Up For Windows XP users 1.  Insert the product CD into the CD-ROM on your computer. Locate setup.exe in the CD and then double-click it.  Figure 1 Setup Icon in Windows XP 2. Click Next to continue the installation of IEEE 802.11n Wireless LAN Utility. This utility will help configuring your wireless network and monitoring the status of Wireless USB Adaptor after it is done.     Figure 2 Setup in Windows XP-Initial Screen 3. Click Next to install the driver.
  Chapter 4 Starting Up                                                     Page 12  Figure 3 Setup in Windows XP-Select Driver Files 4. Click Next to install the utility into the designated folder; or click Browse to choose your preferred folder.    Figure 4 Setup in Windows XP-Select Destination Folder
  Chapter 4 Starting Up                                                     Page 13 5. Click Next to continue.  Figure 5 Setup in Windows XP-Select Program Folder 6.  Select the item you like to add the shortcut to it. Then Click Next.   Figure 6 Setup in Windows XP-Add Shortcuts
  Chapter 4 Starting Up                                                     Page 14 7.  Installation is successfully processing. (Click Cancel to stop it.)  Figure 7 Setup in Windows XP-Installation Processing 8.  Installation is successfully done. Click Finish and you will find the IEEE 802.11n Wireless LAN Utility on the desktop.
  Chapter 4 Starting Up                                                     Page 15  Figure 8 Setup in Windows XP-Installation Completed 9.  IEEE 802.11n Wireless LAN Utility is now on the desktop.  Figure 9 Wireless LAN Utility Icon in Windows XP 10.  Plug Wireless USB Adaptor to your PC through the USB port, and the following Wizard window will show up to guide you for the rest of the processes. Select Yes, this time
  Chapter 4 Starting Up                                                     Page 16 only to allow Windows to search the driver for Wireless USB Adaptor automatically. Then, click Next to go on.  Figure 10 Found New Hardware Wizard-Step 1 11. Select Install the software automatically (Recommended), and click Next to continue.  Figure 11 Found New Hardware Wizard-Step 2
  Chapter 4 Starting Up                                                     Page 17 12.  If the sign of “Windows Logo testing” shows up, please click Continue Anyway.  Figure 12 Hardware Installation Note 13.  Wireless USB Adaptor is now successfully activated and ready for you. Click Finish to close the wizard.  Figure 13 Found New Hardware Wizard-Step 3 14.  The “Wireless Configuration Utility” will show up automatically when the previous step has finished.
  Chapter 4 Starting Up                                                     Page 18  Figure 14 Wireless Configuration Utility-Connection 15. Click Site Survey in the left column, and you will see all the currently available access points in the right page. Choose the one you are allowed to use by single-clicking it, and then click Join. (Password required, if needed)  Figure 15 Wireless Configuration Utility-Site Survey 16.  Open your web browser and enjoy the Internet now!
  Chapter 4 Starting Up                                                     Page 19  Figure 16 Enjoy the Internet
  Chapter 4 Starting Up                                                       Page 20 Note.1 for Windows XP users If you prefer to use the built-in “Wireless Zero Configuration” of Windows XP to connect to a wireless network, please follow the steps below.  1.  When the “Wireless Configuration Utility” shows up as the previous step. 14 did, please click Console at the top left side, and select Use Windows to Config Adapters.  Figure 17 Wireless Configuration Utility-Console 2. Click OK.  Figure 18 Wireless Configuration Utility-Warning Sign 3.  Click the icon “Wireless Zero Configuration” at the bottom right desktop.   Figure 19 Wireless Zero Configuration Icon 4.  A window will show up as below, and all the currently available access points are listed in
  Chapter 4 Starting Up                                                     Page 21 the right side. Choose the one you are allowed to use by single-clicking it, and then click Connect. (Password required, if needed)  Figure 20 Wireless Network Connection List Note.2 for Windows XP users If you would like to switch back from “Wireless Zero Configuration” to “Wireless Configuration Utility”, please follow the steps below. 1.  Locate the icon “IEEE 802.11n Wireless LAN Utility” on the desktop, and double-click it.  Figure 21 Wireless LAN Utility Icon in Windows XP 2.  When the “Wireless Configuration Utility” shows up, please click Console at the top left side, and unselect Use Windows to Config Adapters.
  Chapter 4 Starting Up                                                     Page 22  Figure 22 Wireless Configuration Utility-Console 3. Click OK. And the “Wireless Configuration Utility” is again ready for you.  Figure 23 Wireless Configuration Utility-Warning Sign Note.3 for Windows XP users “Wireless Configuration Utility”, which comes with Wireless USB Adaptor, provides you with more tools to configure and monitor it. Tools like “Link Test” or “Profiles” allow you to test the connection of your network or even create your own list for common used places (access points/routers) for convenience. In addition, the WiFi Protected Setup (WPS) function is able to be easily activated by using “Wireless Configuration Utility”.   For more information about “Wireless Configuration Utility”, please refer to the chapter 5 of this manual.
  Chapter 4 Starting Up                                                       Page 23 For Windows Vista users 1.  Insert the product CD into the CD-ROM on your computer. Locate setup.exe in the CD and then double-click it.  Figure 24 Setup Icon in Windows Vista 2. Click Next to continue the installation of IEEE 802.11n Wireless LAN Utility. This utility will help configuring your wireless network and monitoring the status of Wireless USB Adaptor after it is done.  Figure 25 Setup in Windows Vista-Initial Screen 3. Click Next to install the driver.
  Chapter 4 Starting Up                                                     Page 24  Figure 26 Setup in Windows Vista-Select Driver Files 4. Click Next to install the utility into the designated folder; or click Browse to choose your preferred folder.    Figure 27 Setup in Windows Vista-Select Destination Folder
  Chapter 4 Starting Up                                                     Page 25 5. Click Next to continue.  Figure 28 Setup in Windows Vista-Select Program Folder 6.  Select the item you like to add the shortcut to it. Then Click Next.   Figure 29 Setup in Windows Vista-Add Shortcuts 7.  Installation is successfully processing. (Click Cancel to stop it.)
  Chapter 4 Starting Up                                                     Page 26  Figure 30 Setup in Windows Vista-Installation Processing 8.  A sign of “Windows can’t verify the publisher of this driver software” will show up. Please click Install this driver software anyway to go on.  Figure 31 Windows Security 9.  Installation is successfully done. Click Finish to close the window.
  Chapter 4 Starting Up                                                     Page 27  Figure 32 Setup in Windows Vista-Installation Completed 10.  Plug Wireless USB Adaptor to your PC through the USB port, and after a few seconds, the successful installation dialogue will pop up as below.    Figure 33 Successful Driver Installation Sign 11.  The “Wireless Configuration Utility” will show up automatically when the previous step has finished.
  Chapter 4 Starting Up                                                     Page 28  Figure 34 Wireless Configuration Utility-Connection 12. Click Site Survey in the left column, and you will see all the currently available access points in the right page. Choose the one you are allowed to use by single-clicking it, and then click Join. (Password required, if needed)  Figure 35 Wireless Configuration Utility-Site Survey 13.  Open your web browser and enjoy the Internet now!
  Chapter 4 Starting Up                                                     Page 29  Figure 36 Enjoy the Internet Note.1 for Windows Vista users If you prefer to use the built-in “Wireless Zero Configuration” of Windows Vista to connect to a wireless network, please follow the steps below. 1.  Click the icon in the red circle as below on the side bar of the desktop, and a small window will pop up. Click Connect or disconnect….    Figure 37 Wireless Zero Configuration Icon 2.  A window will show up as below, and all the currently available access points are listed in the right side. Choose the one you are allowed to use and then double click it to connect to it. (Password required, if needed)
  Chapter 4 Starting Up                                                     Page 30  Figure 38 Wireless Network Connection List Note.2 for Windows Vista users “Wireless Configuration Utility”, which comes with Wireless USB Adaptor, provides you with more tools to configure and monitor it. Tools like “Link Test” or “Profiles” allow you to test the connection of your network or even create your own list for common used places (access points/routers) for convenience. In addition, the WiFi Protected Setup (WPS) function is able to be easily activated by using “Wireless Configuration Utility”.   For more information about “Wireless Configuration Utility”, please refer to the chapter 5 of this manual.
  Chapter 4 Starting Up                                                       Page 31 For Windows 2000 users 1.  Insert the product CD into the CD-ROM on your computer. Locate setup.exe in the CD and then double-click it.  Figure 39 Setup Icon in Windows 2000 2. Click Next to continue the installation of IEEE 802.11n Wireless LAN Utility. This utility will help configuring your wireless network and monitoring the status of Wireless USB Adaptor after it is done.  Figure 40 Setup in Windows 2000-Initial Screen 3. Click Next to install the driver.
  Chapter 4 Starting Up                                                     Page 32  Figure 41 Setup in Windows 2000-Select Driver Files 4. Click Next to install the utility into the designated folder; or click Browse to choose your preferred folder.  Figure 42 Setup in Windows 2000-Select Destination Folder 5. Click Next to continue.
  Chapter 4 Starting Up                                                     Page 33  Figure 43 Setup in Windows 2000-Select Program Folder 6.  Select the item you like to add the shortcut to it. Then Click Next.   Figure 44 Setup in Windows 2000-Add Shortcuts 7.  Installation is successfully processing. (Click Cancel to stop it.)
  Chapter 4 Starting Up                                                     Page 34  Figure 45 Setup in Windows 2000-Installation Processing 8.  Installation is successfully done. Click Finish to close the window.  Figure 46 Setup in Windows 2000-Installation Completed 9.  Plug Wireless USB Adaptor to your PC through the USB port. If the sign of “Digital Signature Not Found” shows up, please click Yes.
  Chapter 4 Starting Up                                                     Page 35  Figure 47 Digital Signature Not Fount Sign 10.  Wireless USB Adaptor is successfully installed once the icon below is listed in the side bar of the desktop. Click the icon.  Figure 48 Wireless Configuration Utility Icon 11.  Wireless Configuration Utility will show up. This utility can help configuring your wireless network and monitoring the status of Wireless USB Adaptor.
  Chapter 4 Starting Up                                                     Page 36  Figure 49 Wireless Configuration Utility-Console 12. Click Site Survey in the left column, and you will see all the currently available access points in the right page. Choose the one you are allowed to use by single-clicking it, and then click Join. (Password required, if needed)  Figure 50 Wireless Configuration Utility-Site Survey 13.  Open your web browser and enjoy the Internet now!
  Chapter 4 Starting Up                                                     Page 37  Figure 51 Enjoy the Internet
  Chapter 4 Starting Up                                                       Page 38 Note.1 for Windows 2000 users “Wireless Configuration Utility”, which comes with Wireless USB Adaptor, provides you with more tools to configure and monitor it. Tools like “Link Test” or “Profiles” allow you to test the connection of your network or even create your own list for common used places (access points/routers) for convenience. In addition, the WiFi Protected Setup (WPS) function is able to be easily activated by using “Wireless Configuration Utility”.   For more information about “Wireless Configuration Utility”, please refer to the chapter 5 of this manual.
  Chapter 5 Utility Overview                                                    Page 39 Chapter 5 Utility Overview This chapter introduces the functions of the utility and how you can take advantage of it. After going through this chapter, you will be able to optimize your wireless network. Connection:  Here shows the status of your current wireless network which is built by the Wireless USB Adaptor and the access point it connects to.    Figure 52 Wireless Configuration Utility-Connection Status: Shows the MAC address and the network type of the access point or router you connected to.  Network(SSID): Service set identifier, or SSID, is a friendly name that identifies a particular IEEE 802.11 wireless LAN. The SSID can be up to 32 characters long. By the SSID, you are able to know exactly which network you are in.  Channel: Shows the RF channel you are using.  Elapsed Time: Shows the duration of your current connection.
  Chapter 5 Utility Overview                                                 Page 40 Auth Mode: Shows the authentication way of your current connection to an access point or router.  Encryption Mode: Shows the encryption way of your current connection to an access point or router.  Signal Strength: The longer the bar is, the stronger the signal you get from access point or router. This item shows the connection strength.  By clicking More Detail at the bottom right, you can get more information as below.  Figure 53 More Status Information Profiles: To create a list of your most common used network, you can add new access points, edit the current access points, or even delete any access point which you will never use again in the future. You can arrange your own Profiles for your convenience anytime.
  Chapter 5 Utility Overview                                                 Page 41  Figure 54 Wireless Configuration Utility-Profiles To add a new network to the Profiles List:   1. Click Add.  2.  Fill out the Profile Name, Network (SSID), and choose the Network Type. Then, click Next.  Figure 55 Adding a Profile 3.  Select Security if required. Then click Next. (Detailed security settings will be brought
  Chapter 5 Utility Overview                                                 Page 42 up on Page.49.)  Figure 56 Security Settings 4.  Select Change current IP setting if needed. Then click Next. The default is “Obtain an IP address automatically”, or you can select “Specify IP address” and fill in the related information below to use the static IP address.
  Chapter 5 Utility Overview                                                 Page 43  Figure 57 TCP/IP Settings 5.  Do advanced settings if you want. Then click Next.  Figure 58 Advanced Settings
  Chapter 5 Utility Overview                                                 Page 44 Power Save Mode: z CAM = Constantly Awake Mode.   z MAX = Maximum Power Save. z Fast: = Fast Power Save. Power-saving ability CAM < Fast < MAX Wireless Mode:   The wireless Mode supports three options 802.11b, 802.11b/g, and 802.11b/g/n. Adhoc Channel:   Selects bands and channels for device to device (ad hoc) networks. * This item will be available while network type is set to be Adhoc. Preamble Mode: Select it between Auto, long or short. The default is Auto. Turbo Mode: Turn it on to increase the throughput; however, this mode is supported only if the access point / router you connected to also supports this mode.   RTS Threshold: The Request-To-Send threshold specifies the packet size of an RTS transmission. This helps control traffic flow through an access point, especially one with many clients.   * If you are not familiar with this parameter, please leave it as the default. Fragment Threshold: If you experience a high packet error rate, try to slightly increase your Fragmentation Threshold. Default is set to the maximum of 2346. Setting the Fragmentation Threshold too low may result in very poor performance.
  Chapter 5 Utility Overview                                                    Page 45  6.  Click Finish to confirm the information.  Figure 59 Confirm Information 7.  The new network (TEST) has successfully been added to the Profiles List.   Figure 60 Wireless Configuration Utility-Profiles To delete a current network from the Profiles List:
  Chapter 5 Utility Overview                                                 Page 46 1.  Choose the network you would like to delete in the Profiles List. 2. Click Delete.   To edit a current network from the Profiles List: 1.  Choose the network you would like to edit in the Profiles List. 2. Click Edit. 3.  Follow the same steps in To add a new network to the Profiles List to edit the variables.  To activate a current network from the Profiles List: 1.  Choose the network you would like to activate in the Profiles List. 2. Click ActiVate.  To enable WPS: Wi-Fi Protected Setup (WPS) is a standard for easy and secure establishment of a wireless home network, defined by the Wi-Fi Alliance. The goal of the WPS is to simplify the process of connecting any home device to the wireless network.    WPS can be easily activated by pressing the WPS button on the body of Wireless USB Adaptor as well as the one on your access point / router. After both of them are pressed, wait about 2 minutes, and the successful message will show up as below.    Figure 61 Wi-Fi Protected Setup
  Chapter 5 Utility Overview                                                 Page 47 In addition, WPS could also be activated from Profiles List by the following steps.  1. Click WPS. 2. Choose Join a WLAN (Enrollee), and then click Next.  Figure 62 WPS Setup-Initial Screen The step.3 will have many scenarios. Please choose the one that suits your environment the most.   3.1 Choose “Push Button on AP (PBC)” and select “Automatically select the network”. Then click Next.
  Chapter 5 Utility Overview                                                 Page 48  Figure 63 WPS Setup-Select a Mode 3.2 If you would like to connect to a specified WPS-enabled AP, please choose “Push Button on AP (PBC)” and unselect “Automatically select the network”. Then click Next.   Figure 64 WPS Setup-Select a Mode A window will appear and show every currently available WPS-enabled AP on the list. Choose the one you prefer, and click Next.
  Chapter 5 Utility Overview                                                 Page 49  Figure 65 WPS Setup-Select an AP 3.3 Choose “Use Client PIN” and select “Automatically select the network”. When you choose “Use Client PIN”, a random series of numbers will come out. Remember to use these numbers as the PIN key in your access point / router before clicking Next. When your access point / router is done with the same PIN key, click Next to build the connection.  Figure 66 WPS Setup-Select a Mode 3.4 Choose “Use Client PIN” and unselect “Automatically select the network”. When you choose “Use Client PIN”, a random series of numbers will come out. Remember to use
  Chapter 5 Utility Overview                                                 Page 50 these numbers as the PIN key in your access point / router before clicking Next. When your access point / router is done with the same PIN key, click Next.  Figure 67 WPS Setup-Select a Mode A window will appear and show every currently available WPS-enabled AP on the list. Choose the one you designated, and click Next to build the connection.  Figure 68 WPS Setup-Select an AP 4.  When any of previous scenarios has been done, the processing message will be shown as below. It might take about 2 minutes to make the connection.
  Chapter 5 Utility Overview                                                 Page 51  Figure 69 WPS Setup-Searching for WPS Network 5.  WPS connection has been successfully built.  Figure 70 WPS Setup-Successfully Connected
  Chapter 5 Utility Overview                                                    Page 52 Security Settings Wireless LAN security is vital to your network to protect wireless communications against hacker entering your system and prevent unauthorized wireless station from accessing data transmitted over the network; the WLAN Utility offers a sophisticated security algorithm. Select Security. A privacy Configuration window will appear as below.  Figure 71 Security Settings If you do not enable any wireless security on your IEEE 802.11n Wireless LAN USB Adapter, the wireless communication is accessible by any wireless networking device that is in the coverage area. Data Encryption with WEP WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the wireless LAN adapter and the AP or other wireless station to keep network communication private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.
  Chapter 5 Utility Overview                                                 Page 53  Figure 72 Security Settings The IEEE 802.11n Wireless LAN USB Adapter allows you to configure up to four 64-bit, or 128-bit WEP keys and only one key is used as the default key at one time. The Key index field allows you to specify the key index you desire to use for transmitting data on your wireless LAN. You can change the default key by clicking on the up or down arrow and make sure the default key is set up exactly the same on the Wireless LAN stations as they are on the wireless Access Point. z For 64bit encryption you may choose: Alphanumeric: entering 5 characters (case sensitive) ranging from “a-z”, “A-Z” “0-9” to special characters like “@”, “#”, “$” and so on as long as they are in the ASCII table. (e.g. My&12). Hexadecimal: entering 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (e.g. 11AA22BB33, shown as below). z For 128bit encryption you may choose: Alphanumeric: entering 5 characters (case sensitive) ranging from “a-z”, “A-Z” “0-9” to special characters like “@”, “#”, “$” and so on as long as they are in the ASCII table. (e.g. My#$%12345678). Hexadecimal: entering 26 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (e.g. 00112233445566778899AABBCC). Authentication with WEP: Open System authentication and Shared Key authentication z Open system mode is implemented for ease-of-use and when security is not an issue. It requires NO authentication, since it allows any device to join a network without performing any security check. The wireless station and the AP do not share a secret key. Thus the wireless stations can associate with any AP and listen to any data transmitted plaintext. z Shared key mode involves a shared secret key to authenticate the wireless station to the AP. It requires that the station and the access point use the same WEP key to
  Chapter 5 Utility Overview                                                 Page 54 authenticate. This basically means that WEP must be enabled and configured on both the AP and the other wireless stations with a same key. IEEE 802.1X The IEEE 802.1X standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Authentication can be done by using an external RADIUS server. EAP Authentication EAP (Extensible Authentication Protocol) is an authentication protocol which runs on the top of IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an Access Point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP that supports IEEE 802.1X. You must first have a wired connection to the network and obtain the certificate from a certificate authority (CA). A certificate can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. WPA (2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 is a wireless security standard that defines stronger encryption, authentication and key management than WPA. WPA WPA allows you to gain access to a more secured wireless network that requires mutual authentication between client and access point with a Radius authentication server or other authentication server on the network. WPA uses 802.1X and Extensible Authentication Protocol (EAP) for authentication. WPA offers Enterprise and individual needs to meet the different market segments. This product supports various EAP types (TLS and PEAP), which require different credential authentication. In order to access the wireless network, you must select EAP type your service provider supplied in the section of IEEE802.11X Authentication. Choose WPA2 if needed from Authentication Mode.
  Chapter 5 Utility Overview                                                 Page 55  Figure 73 Security Settings WPA-PSK  WPA-PSK offers a Personal mode of operation. In the Personal mode of operation, a pre-shared key is used for authentication. WPA-PSK allows you to gain access to a secured wireless network that the station and the access point use the same pre-shared key to authenticate. You must type a mixture of numbers and letters in the Pre-shared key section of this menu. You may input either 8-63 ASCII characters or 64 HEX characters. Choose WPA-PSK if needed from Authentication Mode.
  Chapter 5 Utility Overview                                                 Page 56  Figure 74 Security Settings WPA2 WPA2 provides a stronger encryption mechanism than WPA. WPA2 is the second generation of WPA security, providing personal and enterprise users with a high level of assurance that only authorized users can access to their wireless network. There is no difference between WPA and WPA2. The only difference is that WPA2 provides a stronger data encryption via the AES, contrast to WPA, which uses Temporal Key Integrity Protocol (TKIP). Choose WPA2 if needed from Authentication Mode.
  Chapter 5 Utility Overview                                                 Page 57  Figure 75 Security Settings WPA2-PSK  Like WPA, WPA2-Personal offers authentication via a pre-shared key. Pre-shared key is usually used for Personal authentication. Personal mode requires only an access point and client on the network. Similarly, you need to type a mixture of numbers and letters in the Pre-shared key section of this menu. You may input either 8-63 ASCII characters or 64 HEX characters. Choose WPA2-PSK if needed from Authentication Mode.
  Chapter 5 Utility Overview                                                 Page 58  Figure 76 Security Settings Encryption Mode WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1X. WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. The encryption mechanism used for WPA(2) and WPA(2)-PSK are the same. The only difference between them is that WPA(2)-PSK uses a simple common password, instead of user specific credentials. The common password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it’s still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. IEEE 802.1X Authentication WPA and WPA2 apply IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4 way handshake) and shortens the time required to connect to a network. Other WPA2 authentication features that are different from WPA include key caching and pre-authentication.
  Chapter 5 Utility Overview                                                 Page 59 EAP Type There are 4 types available in EAP including PEAP, TLS, TTLS, and SIM.    Figure 77 Security Settings Choose the one you prefer and click Next, and then you will be guided to a new window named “Certificate”.
  Chapter 5 Utility Overview                                                 Page 60  Figure 78 Certificate You have to fill out the required information before going to the next step. The following will show the process of each type. z PEAP
  Chapter 5 Utility Overview                                                 Page 61   Figure 79 Certificate-PEAP PEAP requires the use of Certificate Information and User Information. This utility will automatically identify Certificate Information and Login Information for users to configure PEAP easily. You only need to enter User Name and Password in the User information filed to authenticate. If you click the “Verify Certificate Authority” check box, you are able to choose one of User Certificate from the drop-down menu. Furthermore, you need to input User Name and Password in the User Name field on the screen.
  Chapter 5 Utility Overview                                                    Page 62 z TLS   Figure 80 Certificate-TLS TLS requires the entry of Certificate Information and Login Information for mutual authentication. This utility will auto-detect the Certificate Information for you to configure TLS easily. You only need to enter the Login Name in the Login information filed to authenticate. If you desire to use the Certificate Authority manually, you can click the check box next to “Verify Certificate Authority” and choose the usable selection in the User Certificate field using drop-down menu. User Certificate: select one of user certificates you have enrolled. TLS is used to create a secure tunnel through which authentication and encryption keys can be passed and require server and client side keys.
  Chapter 5 Utility Overview                                                    Page 63 z TTLS   Figure 81 Certificate-TTLS TTLS requires the mutual authentication between station and access points. You must present a User Name and Password in the User Information field that will be verified by TTLS-capable server. This mutual authentication ensures that only authorized users are allowed access to the network.
  Chapter 5 Utility Overview                                                    Page 64 z SIM   Figure 82 Certificate-SIM SIM requires a valid PIN to the SIM card, which must match the PIN stored on the SIM. Please enter the PIN in the SIM Card ID field.  When the configuration takes effect, the EAP authentication process begins automatically, and the client adapter will use the saved PIN to access the SIM card. To verify authentication, double-click My Computer,  Control Panel, and Network Connections. The status appears to the right of your Wireless Network Connection. Click View and Refresh to obtain the current status. If the client adapter is authenticated, the status reads, "Authentication succeeded."
  Chapter 5 Utility Overview                                                    Page 65 Link Test: Link Test is provided to test the connection quality between Wireless USB Adaptor and access point / router you connected to. You may follow the steps below to test the connection quality.  Figure 83 Wireless Configuration Utility-Link Test 1.  Enter the IP address of the access point you connected to. 2.  Choose the numbers and size of the packet. 3. Select the Continuous Link test to test the connection quality until you stop it; or leave the Continuous Link test blank to test it only once. 4. Click Start to find out the result.    If Packets Received Ok equals to Packet Transmitted OK, the connection quality is great; however, if not, please go to Site Survey to choose other available access point / router in order to get better connection quality.
  Chapter 5 Utility Overview                                                    Page 66 Site Survey: Here shows all the currently available access points.    Figure 84 Wireless Configuration Utility-Site Survey Join: Choose the one you are allowed to use by single-clicking it, and then click Join to get into that network. (Password required, if needed) Rescan: Click Rescan to refresh the Site Survey list. Advanced scan: Click Advanced scan to get the detailed scan information.
  Chapter 5 Utility Overview                                                    Page 67 About: Here shows the detailed information about Wireless USB Adaptor and Wireless Configuration Utility themselves like versions, MAC address, etc.  Figure 85 Wireless Configuration Utility-About
  Chapter 6 Troubleshooting                                                    Page 68 Chapter 6 Troubleshooting Q1. Why can’t I go into the Internet after successfully following all the steps for installation?   Check the availability of the Internet for the access point or router you connected to by opening “Wireless Configuration Utility”, choosing Connection, and clicking More Detail. You will find IP Address there. If the IP Address is listed as 169.254.xxx.xxx or N/A, it represents the access point or router you connected to is useless. Please choose the access point or router you are notified or allowed to use again.  Q2. I am successfully going into the Internet, but the quality of surfing the Internet is unstable or bad. How could I solve it?         Open “Wireless Configuration Utility”. Click Connection to see the Signal Strength. If the Signal Strength is weak or unstable, please click Site Survey to choose another available access point or router for better connection.    Or click Link Test, fill up the IP address of the access point you connected to, and click Start to see the connection results. If the result is not good, please click Site Survey to choose another available access point or router for better connection.  Q3. How would I know if my Wireless USB Adaptor is properly working now?  Once Wireless USB Adaptor is plugged into the PC or laptop, the built-in 2 LEDs will light up dedicating statuses. Normally, the red LED will keep on lighting, and the other yellow LED will blink, if Wireless USB Adaptor is properly working.    The red LED ON/OFF: Power ON/OFF The yellow LED blinks: Data are transmitting/receiving.
  Chapter 7 Warranty                                                         Page 69 Chapter 7 Warranty This Warranty constitutes the sole and exclusive remedy of any buyer or reseller’s equipment and the sole and exclusive liability of the supplier in connection with the products and is in lieu of all other warranties, express, implied or statutory, including, but not limited to, any implied warranty of merchantability of fitness for a particular use and all other obligations or liabilities of the supplier.  In no even will the supplier or any other party or person be liable to your or anyone else for any damages, including lost profits, lost savings or other incidental or consequential damages, or inability to use the software provided on the software media even if the supplier or the other party person has been advised of the possibility of such damages.  The following are special terms applicable to your hardware warranty as well as services you may use during part of the warranty period. Your formal Warranty Statement, including the warranty applicable to our Wireless LAN products, appears in the Quick Installation Guide which accompanies your products.  Duration of Hardware Warranty: One Year Replacement, Repair or Refund Procedure for Hardware: 1.  This product is design based on the 802.11n draft 2.0 standards, do not guarantee the compatibility with the products that design by other vendors based on 802.11n draft or the products that design accroding to the 802.11n formal standard that announce in the future. 2.  The maximum performance defines based on 802.11g and 802.11n draft standard. The actual throughput will be different because of using environment and conditions, including network bandwidth, building materials, building structure, and wireless working range. These are possible to reduce the wireless performance. 3.  Don’t dismantle the housing of the device as your wish to avoid the product damage.  If your unit needs a repair or replacement, return it to your dealer/distributor in its original packaging.    When returning a defective product for Warranty, always include the following documents: z A copy of the invoice/proof of purchase.  z The RMA Report Form (To receive a Return Materials Authorization form (RMA), please contact the party from whom you purchased the product). Upon proof-of-purchase we shall, at its option, repair or replace the defective item at no cost to the buyer.
  Chapter 7 Warranty                                                      Page 70 This warranty is contingent upon proper use in the application for which the products are intended and does not cover products which have been modified without the reseller’s approval or which have been subjected to unusual physical or electrical demands or damaged in any way.

Navigation menu