Abocom WU5214 User Manual

802.11 b/g/n
Mini Wireless LAN
USB 2.0 Adapter
User’s Manual
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
z Reorient or relocate the receiving antenna.
z Increase the separation between the equipment and receiver.
z Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
z Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate this equipment.
Country Code Statement
For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible.
To maintain compliance with FCC RF exposure requirements, use only belt-clips, holsters or similar accessories that do not contain metallic components in its assembly. The use of accessories that do not satisfy these requirements may not comply with FCC RF exposure requirements, and should be avoided.
CAUTION:
Any changes or modifications not expressly approved by the grantee of this device could void the user’s authority to operate the equipment.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
Federal Communication Commission (FCC) Radiation Exposure Statement
This EUT is compliance with SAR for general population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65 Supplement C. This equipment should be installed and operated with minimum distance 2.5cm between the radiator & your body.
CE Statement:
Hereby, AboCom, declares that this device is in compliance with the essential requirement and other relevant provisions of the R&TTE Driective 1999/5/EC.
Table of Contents
CHAPTER 1: INTRODUCTION .....................................................1
FEATURES ..............................................................................................1
CHAPTER 2: INSTALLATION.......................................................1
FOR WINDOWS 2000/XP .........................................................2
INSTALL THE SOFTWARE..........................................................................2
INSTALL THE HARDWARE .........................................................................4
FOR WINDOWS VISTA.............................................................6
INSTALL THE SOFTWARE..........................................................................6
INSTALL THE HARDWARE .........................................................................8
VERIFICATION .........................................................................................5
NETWORK CONNECTION.......................................................9
IP ADDRESS ...........................................................................................9
CHAPTER 3: UTILITY CONFIGURATION....................................9
FOR WINDOWS 2000/XP.......................................................10
STATION MODE.....................................................................................11
Profile...............................................................................................................................11
Network............................................................................................................................17
Link Status.......................................................................................................................19
Advanced.........................................................................................................................21
Statistics...........................................................................................................................22
WMM / QoS.....................................................................................................................23
WPS .................................................................................................................................24
Radio On/Off...................................................................................................................27
About................................................................................................................................28
UTILITY MENU LIST ...............................................................................28
SOFT AP MODE.....................................................................................29
Config...............................................................................................................................29
Access Control................................................................................................................31
MAC Table.......................................................................................................................32
Event Log.........................................................................................................................33
Statistics...........................................................................................................................34
About................................................................................................................................35
FOR WINDOWS VISTA...........................................................36
STATION MODE.....................................................................................37
Profile...............................................................................................................................37
Network............................................................................................................................42
Link Status.......................................................................................................................45
Advanced.........................................................................................................................46
Statistics...........................................................................................................................47
WMM / QoS.....................................................................................................................49
WPS .................................................................................................................................50
Radio On/Off...................................................................................................................53
About................................................................................................................................53
UTILITY MENU LIST ...............................................................................54
SOFT AP MODE.....................................................................................55
Config...............................................................................................................................55
Access Control................................................................................................................57
MAC Table.......................................................................................................................58
Event Log.........................................................................................................................59
Statistics...........................................................................................................................60
About................................................................................................................................61
CHAPTER 4: UNINSTALLATION ...............................................62
FOR WINDOWS 2000/XP.......................................................62
FOR WINDOWS VISTA..........................................................64
Chapter 1: Introduction
The WU5214 (Wireless LAN USB Adapter ) is an IEEE802.11b/g/n USB adapter that connects your notebook to a wireless local area network. The WU5214 fully complies with IEEE 802.11n draft 3.0 and IEEE 802.11 b/g standards, delivers reliable, cost-effective, feature rich wireless connectivity at high throughput from an extended distance.
The WU5214 is a very small adapter that can connect notebook, handheld or desktop computer equipped with USB interface for wireless network applications. It allows you to take full advantage of your notebook’s mobility with access to real-time information and online services anytime and anywhere.
Features
¾ 1T1R Mode with 150Mbps PHY Rate for both. ¾ Complies with IEEE 802.11n draft 3.0 and IEEE 802.11 b/g standards. ¾ Supports WEP 64/128 bits, WPA, WPA2. ¾ Supports WMM and WMM-PS. ¾ Supports WPS configuration. ¾ Supports USB 2.0/1.1 interface. ¾ Portable and mini-size design. ¾ Compatible with Microsoft Windows 2000, XP, and Vista operating systems.
Chapter 2:
1 -
-
Installation
For Windows 2000/XP
Install the Software
Note: Do not insert the Wireless LAN USB Adapter into the computer until the InstallShield Wizard finished installing.
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically.
2. When the License Agreement screen appears, please read the contents and select “I accept the
terms of the license agreement “ then click Next to continue.
3. Select the check box to choose a Configuration Tool from the listed two choices.
z Configuration Tool: Choose to use the configuration utility.
2 -
-
z Microsoft Zero Configuration Tool: Choose to use Windows XP’s built-in Zero
Configuration Utility (ZCU).
Click Next to continue.
5. When prompt to the following message, please click Install to beg in the installation.
6. When the following screen appears, click Finish to complete the software installation.
3 -
-
Install the Hardware
Note: Insert the Wireless LAN USB Adapter when finished software installation.
Insert the Wireless LAN USB Adapter into the USB Port of the computer. The system will automatically detect the new hardware.
4 -
-
Verification
To verify if the device is active in the computer. Go to Start > Setting > Control Panel > System > Hardware > Device Manager. Expand the Network Adapters category. If the 802.11n/b/g Mini Wireless LAN USB2.0 Adapter is listed here, it means that the device is properly installed and enabled.
5 -
-
For Windows Vista
Install the Software
Note: Do not insert the Wireless LAN USB Adapter into the computer until the InstallShield Wizard finished installing.
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically.
2. When the License Agreement screen appears, please read the contents and select “I accept the
terms of the license agreement “ then click Next to continue.
6 -
-
3. When prompt to the following message, please click Install to begin the installation.
4. When the following screen appears, click Finish to complete the software installation.
7 -
-
Install the Hardware
Note:
Insert the Wireless LAN USB Adapter when finished software installation.
Insert the Wireless LAN USB Adapter into the USB Port of the computer. The system will automatically detect the new hardware.
Verification
To verify if the device is active in the computer. Go to Start > Setting > Control Panel > System > Hardware > Device Manager. Expand the Network Adapters category. If the 802.11n/b/g Mini Wireless LAN USB2.0 Adapter is listed here, it means that the device is properly installed and enabled.
8 -
-
Network Connection
IP Address
Note: When assigning IP address(es) to computers on the network, remember to have IP address for each computer set on the same subnet mask. If the Broadband Router has been enabled DHCP server function, it won’t be necessary to assign static IP address for PC.
1. To configure a dynamic IP address (i.e. if the broadband Router is enabled the DHCP server), check
the Obtain an IP address automatically option.
2. To configure a fixed IP address (if DHCP server is not enabled in Broadband Router, or when PC
needs to be assigned a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field; for example, enter 192.168.1.1 in the IP address field,
255.255.255.0 for the Subnet Mask, and 192.168.1.254 for the default gateway.
9 -
-
Chapter 3: Utility Configuration
For Windows 2000/XP
After the Wireless LAN USB Adapter has been successfully installed, users can use the included Configuration Utility to set the preference.
Go to StartJ (All) ProgramJ Intelligent WirelessJ Intelligent Wireless Utility.
Users can also open the Configuration Utility by double clicking or right clicking the icon in the tray to select Launch Config Utility.
10 -
-
Station Mode
IMPORTANT NOTICE:
Under screen resolution 800 x 600 pixels, if users click the triangle
button at the right down corner of the utility windows to expand the
station linking information that will NOT be displayed completely.
Profile
Profile can let users book keeping the favorite wireless setting among home, office, and other public hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile manager enables users to Add, Edit, Delete, and Activate profiles.
Click this button to show the information of Status Section.
Click this button to hide the information of Status Section.
Profile Tab
Profile Name
SSID
Network Type
Authentication
Here shows a distinctive name of profile in this column. The default is
PROF# (#1, #2, #3....)
The SSID is the unique name shared among all wireless access points in the wireless network.
Shows the network type of the device, including Infrastructure and Ad-hoc.
Shows the authentication mode.
11 -
-
Encryption
Use 802.1x
Tx Power
Channel
Power Save Mode
RTS Threshold
Fragment Threshold
Add
Shows the encryption type.
Whether or not use 802.1x feature.
Transmit power, the amount of power used by a radio transceiver to send the signal out.
Shows the selected channel that is currently in use.
Choose from CAM (Constantly Awake Mode) or PSM (Power Saving Mode.)
Shows the RTS Threshold of the device.
Shows the Fragment Threshold of the device.
Click to add a profile from the drop-down screen.
System Configuration tab:
Profile Name: Users can enter profile name, or use default name defined
by system. The default is PROF# (#1, #2, #3....).
SSID: The SSID is the unique name shared among all wireless access
points in the wireless network. The name must be identical for all devices and wireless access points attempting to connect to the same network. Users can use pull-down menu to select from available access points.
Network Type: There are two types, Infrastructure and Ad-hoc modes. Under Ad-hoc mode users can also choose the preamble type, the available preamble type includes Auto and Long. In addition to that, the channel field will be available for setup in Ad-hoc mode.
The Infrastructure is intended for the connection between wireless
network cards and an access point. With the Wireless LAN USB Adapter, users can connect wireless LAN to a wired global network via an access point.
12 -
-
The Ad-hoc lets users set a small wireless workgroup easily and
quickly. Equipped with the Wireless LAN USB Adapter, users can share files and printers between each PC and laptop.
Tx Power: Transmit power, the amount of power used by a radio transceiver to send the signal out. Select the Tx power percentage from the pull-down list including Auto, 100%, 75%, 50%, 25%, 10% and
Lowest. Preamble: This function will show up when Ad-hoc network type be
selected. A preamble is a signal used in wireless environment to synchronize the transmitting timing including Synchronization and Start frame delimiter. Select from the pull-down menu to change the Preamble type into Auto or Long.
Power Save Mode:
CAM (Constantly Awake Mode): When this mode is selected, the
power supply will be normally provided even when there is no throughput. (Default power save mode is CAM.)
PSM (Power Saving Mode): When this mode is selected, this device
will stay in power saving mode even when there is high volume of throughput.
RTS Threshold: Users can adjust the RTS threshold numb er by sliding the bar or key in the value directly. (The default value is 2347.) RTS/CTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. If the “Hidden Node” problem is an issue, users have to specify the packet size. The RTS/CTS mechanism will be activated if the data size exceeds the values that have been set.
This value should remain at its default setting of 2347. Should users encounter inconsistent data flow, only minor modifications of this value are recommended.
Fragment Threshold: Users can adjust th e Fragment threshold number by sliding the bar or key in the value directly. (The default value is 2346.) The mechanism of Fragmentation Threshold is used to improve the efficiency when high traffic flows along in the wireless network. If the Wireless LAN USB Adapter often transmits large files in wireless network, users can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346.
Authentication and Security tab:
Authentication Type: There are several types of authentication modes including Open, Shared, Leap, WPA, WPA-PSK, WPA2 and WPA2-PSK.
Open: If the access point or wireless router is using "Open”
authentication, then the Wireless LAN USB Adapter will need to be set to the same authentication type.
13 -
-
Shared: Shared key is when both the sender and the recipient share a
secret key.
LEAP: Light Extensible Authentication Protocol. It is an EAP
authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication (only with CCX mode enabled.)
WPA/ WPA-PSK/ WPA2/ WPA2-PSK: WPA or WPA-PSK
authentications offer two encryption methods, TKIP and AES. For WPA-PSK, select the type of algorithm TKIP or AES and then enter a WPA Shared Key of 8-64 characters in the WPA Pre-shared Key field.
Encryption Type: For Open and Shared authentication mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
WPA Pre-shared Key: This is the shared secret key between AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less than 64 lengths.
WEP Key: Only valid when using WEP encryption algorithm. The key must match with the AP’s key. There are four formats to enter the keys.
ASCII (64 bits): 5 ASCII characters (case sensitivity).
ASCII (128 bits): 13 ASCII characters (case sensitivity).
Hexadecimal (64 bits): 10 Hex characters (0~9, a~f).
Hexadecimal (128 bits): 26 Hex characters (0~9, a~f).
Show Password: Check this box to show the passwords that have been
entered.
802.1x Setting: When users use radius server to authenticate client certificate for WPA authentication mode (WPA authentication do not support EAP Method- MD5-Challenge ).
802.1x tab:
14 -
-
EAP Method:
PEAP: Protect Extensible Authentication Protocol. PEAP transport
securely authentication data by using tunnelling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN.
TLS / Smart Card: Transport Layer Security. Provides for
certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.
TTLS: Tunnelled Transport Layer Security. This security method
provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.
EAP-FAST: Flexible Authentication via Secure Tunnelling. It was
developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically. Manual provisioning is delivery to the client via disk or a secured network distribution method. Automatic provisioning is an in-band, over the air, distribution. For tunnel authentication, only support "Generic Tok en Card" authentication now.
MD5-Challenge: Message Digest Challenge. Challenge is an EAP
authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network. (Only Open and Shared authentication mode can use this function.)
Tunnel Authentication:
Protocol: Tunnel protocol, List information including
EAP-MSCHAP v2, EAP-TLS/ Smart Card, and Generic Token Card.
Tunnel Identity: Identity for tunnel.
Tunnel Password: Password for tunnel.
Session Resumption: Reconnect the signal while broken up, to reduce the packet and improve the transmitting speed. Users can click the box to enable or disable this function.
ID\PASSWORD tab:
-
15 -
ID/ PASSWORD: Identity and password for server.
Authentication ID / Password: Identity, password and domain name
for server. Only "EAP-FAST" EAP method and "LEAP" authentication can key in domain name. Domain name can be keyed in blank space.
Tunnel ID / Password: Identity and Password for server.
Show Password: Check this box to show the passwords that have been
entered.
OK: Click to save settings and exit this page. Cancel: Click to call off the settings and exit. Client Certification tab:
Use Client certificate: Choose to enable server authentication. OK: Click to save settings and exit this page. Cancel: Click to call off the settings and exit. Server Certification tab:
Use certificate chain: Choose use server that issuer of certificates. Allow intimidate certificates: It must be in the server certificate chain
between the server certificate and the server specified in the certificate issuer must be field.
Server name: Enter an authentication sever. Server name must match: Click to enable or disable this function. Domain name must end in specified name: Click to enable or disable
this function.
OK: Click to save settings and exit this page. Cancel: Click call off the settings and exit.
16 -
-
Delete
Edit
Activate
Click to delete an existing profile.
Click to edit a profile.
Click to make a connection between devices.
Network
The Network page displays the information of surrounding APs from last scan result. The tab lists the information including SSID, Network type, Channel, Wireless mode, Security-Enabled and Signal.
Network Tab
Sorted by
Show dBm
SSID
Network Type
Channel
Wireless mode
Encryption
Signal
Rescan
Indicate that AP list are sorted by SSID, Channel or Signal.
Check the box to show the dBm of the AP list.
Shows the name of BSS network.
Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network.
Shows the currently used channel.
AP support wireless mode. It may support 802.11b, 802.11g or 802.11n wireless mode.
Shows the encryption type currently in use. Valid value includes WEP, TKIP, AES, Not Use and WPS.
Shows the receiving signal strength of specified network.
Click to search and refresh the access point list.
-
17 -
Loading...
+ 48 hidden pages