The United States Federal Communication Commission (FCC) and the
Canadian Department of Communications have established certain rules
governing the use of electronic equipment.
Part15, Class B
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interference,
and (2) this device must accept any interference received, including
interference that may cause undesired operation.
For product available in the USA/Canada market, only channel 1~11 can be
operated. Selection of other channels is not possible.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the
following measures:
● Reorient or relocate the receiving antenna.
● Increase the separation between the equipment and receiver.
● Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
● Consult the dealer or an experienced radio/TV technician for help.
CAUTION:
Any changes or modifications not expressly approved by the grantee of this
device could void the user’s authority to operate the equipment.
This transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
Federal Communication Commission (FCC) Radiation
Exposure Statement
This EUT is compliance with SAR for general population/uncontrolled
exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance
with the measurement methods and procedures specified in OET Bulletin 65
Supplement C.
CE Statement:
Hereby, AboCom, declares that this device is in compliance with the
essential requirement and other relevant provisions of the R&TTE
Driective 1999/5/EC.
The 802.11n USB Wireless LAN Card is designed for a USB type A port of a
laptop or desktop computer for creating a wireless workstation
compliant, which connects to any available USB port on a notebook or desktop
computer.
The 802.11n USB Wireless LAN Card complies with IEEE 802.11n standard
that offers a data rate up to 100Mbps in a wireless LAN environment. It is
backward compliant with IEEE 802.11n specification. The
network card can plug into your notebook or desktop PC and accesses to
the LAN or peer-to-peer networking easily without wires or cables.
Whether you’re at your desk or in the boardroom, it allows you to share
printers, files, and other network resources.
Features
¾ Complies with IEEE 802.11n standard for 2.4GHz and 5GHz Wireless
LAN.
¾ USB 2.0 compliant.
¾ USB Plug & Play.
¾ Interoperable with existing network infrastructure.
¾ Secure information transmission.
¾ Freedom to roam while staying connected.
¾ Compatible with specialty wireless products and services.
¾ Up to 100Mbps data rate.
¾ Antenna is built in the card with LED indication.
¾ Low power consumption.
¾ Easy to install and configure.
¾ Rotatable connector design.
. It is USB 2.0
high-speed wireless
-
1 -
LED Indicators
There are three kinds of LED indicators including Power, Link and Signal Strength,
see the following LED table:
Red Bad
Orange Poor
Yellow Good
Blue Very good
Blue Excellent
Orange Link / Activity
Blue Power
-
2 -
SOFTWARE INSTALLATION
Install the Driver & Utility
Caution!
Do not insert the wireless card into your computer until the InstallShield
Wizard finish installing.
1. Exit all Windows programs. Insert the included CD-ROM into your
computer. The CD-ROM will run automatically.
2. When the License Agreement screen appears, please read the
contents and select “I accept the terms of the license agreement
“ then click Next to continue.
-
3 -
3. Select the check box to choose a Configuration Tool from the listed
two choices.
z Configuration Tool: Choose to use our configuration utility.
z Microsoft Zero Configuration Tool: Choose to use Windows XP’s
built-in Zero Configuration Utility (ZCU).
Click Next to continue.
4. There are two modes for you to choose in this screen, either choose
WiFi mode or performance mode (TxBurst mode). This mode
selection screen is set for the default mode shown in the utility screen,
you can still change its mode later in the utility screen. Click Next to
continue.
-
4 -
5. When you are prompted the following message, please click Install
to begin the installation.
-
5 -
6. When the following screen appears, click Finish to complete the
software installation.
-
6 -
HARDWARE INSTALLATION
Note: Insert the Wireless USB card when you finished your software
installation.
Windows 2000/ XP
Locate your USB host and insert the USB Adapter. The system will
automatically detect the new hardware.
Verification
To verify if the device exists in your computer and is enabled, go to Start >
Control Panel > System (> Hardware) > Device Manager. Expand the
Network Adapters category. If the 802.11n USB Wireless LAN Card is listed
here, it means that your device is properly installed and enabled.
-
7 -
NETWORK CONNECTION
Once the device driver is well installed, a network setting described in the
following should be also established.
In Windows 2000/ XP
1. (In Windows 2000)
Go to Start Æ Settings Æ Control Panel Æ Network and Dial-up
Connections Æ Local Area Connection Æ Properties.
(In Windows XP)
Go to Start Æ Control Panel Æ Network and Internet Connections Æ
Network Connection Æ Wireless Network Connection Æ Properties.
-
8 -
2. Make sure that all the required components are installed.
3. If any components are missing, click on the Install… button to
select the Client/Service/Protocol required. After selecting the
component you need, click Add… to add it in.
4. For making your computer visible on the network, make sure you
have installed File and Printer Sharing for Microsoft Networks.
-
9 -
IP Address
Note: When assigning IP Addresses to the computers on the network, remember
to have the IP address for each computer set on the same subnet mask. If your
Broadband Router use DHCP technology, however, it won’t be necessary for you
to assign Static IP Address for your computer.
1. To configure a dynamic IP address (i.e. if your broadband Router has the DHCP
technology), check the Obtain an IP Address Automatically option.
2. To configure a fixed IP address (if you broadband Router is not DHCP
supported, or when you need to assign a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field; for
example, enter 192.168.1.1 in the IP address field, and 255.255.255.0 for the
Subnet Mask.
-
10 -
CONFIGURATION UTILITY
After the Wireless adapter has been successfully installed, users can use the
included Configuration Utility to set their preference.
Go to StartJ (All) ProgramJ Intelligent WirelessJ Intelligent Wireless Utility.
You can also open the Configuration Utility by double clicking the icon or right
clicking to select Launch Config Utilities.
-
11 -
Intelligent Wireless Utility
Profile
Profile can book keeping your favorite wireless setting among your home, office,
and other public hot-spot. You may save multiple profiles, and activate the correct
one at your preference. The Profile manager enables you to Add, Edit, Delete and
Activate profiles.
Click this button to show the information of Status Section.
Click this button to hide the information of Status Section.
Profile Tab
Profile Name
SSID
Network Type
Authentication
You may enter a distinctive name of profile in this
column. The default is PROF# (# 1, #2, #3....)
The SSID is the unique name shared among all points in
your wireless network.
Shows the network type of the device, including
infrastructure and Ad-Hoc.
Shows the authentication mode.
-
12 -
Encryption
Use 802.1x
Channel
Power Save
Mode
Tx Power
RTS Threshold
Fragment
Threshold
Add
Shows the encryption type.
Whether or not use 802.1x feature.
Shows the selected channel that is currently in use. (There
are 14 channels available, depending on the country.)
Choose from CAM (Constantly Awake Mode) or Power
Saving Mode.
Transmit power, the amount of power used by a radio
transceiver to send the signal out.
Shows the RTS Threshold of the device.
Shows the Fragment Threshold of the device.
Click to add a profile from the drop-down screen.
System Configuration tab:
Profile Name: User can enter profile name, or use default
name defined by system. The default is PROF# (# 1, #2,
#3....).
SSID: The SSID is the unique name shared among all
points in your wireless network. The name must be
-
13 -
identical for all devices and points attempting to connect
to the same network. User can use pull-down menu to
select from available APs.
Power Save Mode:
•CAM (Constantly Awake Mode): When this mode is
selected, the power supply will be normally provided
even when there is no throughput.
•PSM (Power Saving Mode): When this mode is
selected, this device will stay in power saving mode
even when there is high volume of throughput.
Network Type: There are two types, infrastructure and
Ad-hoc modes. Under Ad-hoc mode, user can also
choose the preamble type, the available preamble type
includes Auto and Long. In addition to that, the channel
field will be available for setup in Ad-hoc mode.
• The infrastructure is intended for the connection
between wireless network cards and an Access Point.
With the wireless adapter, you can connect wireless
LAN to a wired global network via an Access Point.
• The Ad-hoc lets you set a small wireless workgroup
easily and quickly. Equipped with the wireless
adapter, you can share files and printers between each
PC and laptop.
Tx Power: Select the Tx power percentage from the
pull-down list including Auto, 100%, 75%, 50%, 25%,
10% and Lowest.
Preamble: A preamble is a signal used in wireless
environment to synchronize the transmitting timing
including Synchronization and Start frame delimiter.
Select from the pull-down menu to change the Preamble
type into Auto or Long. RTS Threshold: User can adjust the RTS threshold
number by sliding the bar or key in the value directly. The
default value is 2347. RTS/CTS Threshold is a mechanism
implemented to prevent the “Hidden Node” problem. If
the “Hidden Node” problem is an issue, users have to
specify the packet size. The RTS/CTS mechanism will be
-
14 -
activated if the data size exceeds the value you set.
This value should remain at its default setting of 2347.
Should you encounter inconsistent data flow, only minor
modifications of this value are recommended.
Fragment Threshold: User can adjust the Fragment
threshold number by sliding the bar or key in the value
directly. The default value is 2346. The mechanism of
Fragmentation Threshold is used to improve the efficiency
when high traffic flows along in the wireless network. If
your Wireless LAN Adapter often transmits large files in
wireless network, you can enter new Fragment Threshold
value to split the packet. The value can be set from 256
to 2346.
Authentication and Security tab:
Authentication Type: There are seven type of
authentication modes including Open, Shared, Leap,
WPA, WPA-PSK, WPA2 and WPA2-PSK.
-
15 -
•Open: If your access point/wireless router is using
"Open” authentication, then the wireless adapter will
need to be set to the same authentication type.
•Shared: Shared Key is when both the sender and the
recipient share a secret key.
•LEAP: Light Extensible Authentication Protocol. It is
an EAP authentication type used primarily in Cisco
Aironet WLANs. It encrypts data transmissions using
dynamically generated WEP keys, and supports mutual
authentication (only with CCX mode enabled.)
•WPA-PSK: WPA-PSK offers two encryption methods,
TKIP and AES. Select the type of algorithm, TKIP or
AES and then enter a WPA Shared Key of 8-63
characters in the WPA Pre-shared Key field.
Encryption Type: For open and shared authentication
mode, the selection of encryption type are None and WEP.
For WPA, WPA2, WPA-PSK and WPA2-PSK
authentication mode, the encryption type supports both
TKIP and AES.
WPA Pre-shared Key: This is the shared secret between
AP and STA. For WPA-PSK and WPA2-PSK
authentication mode, this field must be filled with
character longer than 8 and less than 32 length.
WEP Key: Only valid when using WEP encryption
algorithm. The key must match with the AP’s key. There
are several formats to enter the keys.
• Hexadecimal (40bits): 10 Hex characters.
• Hexadecimal (128bits): 32Hex characters.
• ASCII (40bits): 5 ASCII characters.
• ASCII (128bits): 13 ASCII characters.
Show Password: Check this box to show the password
you entered.
-
16 -
802.1x Setting: When user use radius server to
authenticate client certificate for WPA authentication
mode.
PEAP transport securely authentication data by using
tunneling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients
using only server-side certificates, thus simplifying the
implementation and administration of a secure
wireless LAN.
•TLS / Smart Card: Transport Layer Security.
Provides for certificate-based and mutual
authentication of the client and the network. It relies
on client-side and server-side certificates to perform
-
17 -
authentication and can be used to dynamically
generate user-based and session-based WEP keys to
secure subsequent communications between the
WLAN client and the access point.
•TTLS: Tunneled Transport Layer Security. This
security method provides for certificate-based, mutual
authentication of the client and network through an
encrypted channel. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
•EAP-FAST: Flexible Authentication via Secure
Tunneling. It was developed by Cisco. Instead of
using a certificate, mutual authentication is achieved
by means of a PAC (Protected Access Credential)
which can be managed dynamically by the
authentication server. The PAC can be provisioned
(distributed one time) to the client either manually or
automatically. Manual provisioning is delivery to the
client via disk or a secured network distribution
method. Automatic provisioning is an in-band, over
the air, distribution. For tunnel authentication, only
support "Generic Token Card" authentication now.
•MD5-Challenge: Message Digest Challenge.
Challenge is an EAP authentication type that provides
base-level EAP support. It provides for only one-way
authentication - there is no mutual authentication of
wireless client and the network.
Tunnel Authentication:
• Protocol: Tunnel protocol, List information including
EAP-MSCHAP v2, EAP-TLS/Smart card, and
Generic Token Card.
• Tunnel Identity: Identity for tunnel.
• Tunnel Pa ssword: Password for tunnel.
Session Resumption: User can click the box to enable or
disable this function.
-
18 -
ID\PASSWORD tab:
ID/ PASSWORD: Identity and password for server.
•Authentication ID / Password: Identity, password
and domain name for server. Only "EAP-FAST" and
"LEAP" authentication can key in domain name.
Domain name can be keyed in blank space.
•Tunnel ID / Password: Identity and Password for
server.
Show Password: Check this box to show the password
you entered.
OK: Click to save settings and exit this page.
Cancel: Click to call off the settings and exit.
Client Certification tab:
Client Certification: Client Certicate for server
authentication.
Use Client certification: Choose to enable server
authentication.
OK: Click to save settings and exit this page.
Cancel: Click call off the settings and exit.
-
19 -
Delete
Edit
Activate
Server Certification tab:
Use Certificate chain: Choose use server that issuer of
certificates.
Allow intimidate certificates: It must be in the server
certificate chain between the server certificate and the
server specified in the certificate issuer must be field.
Server name: Enter an authentication sever root.
Server name must match exactly: Click to enable or
disable this function.
Domain name must end in specified name: Click to
enable or disable this function.
OK: Click to save settings and exit this page.
Cancel: Click call off the settings and exit.
Click to delete an existing profile.
Click to edit a profile.
Click to make a connection between devices.
Network
The Network page displays the information of surrounding APs from last scan
result. The tab lists the information including SSID, Network type, Channel,
Wireless mode, Security-Enabled and Signal.
-
20 -
Network Tab
Sorted by
Show dBm
SSID
Network Type
Channel
Wireless mode
Encryption
Signal
Rescan
Connect
Add to Profile
Indicate that AP list are sorted by SSID, Channel or Signal.
Check the box to show the dBm of the AP list.
Shows the name of BSS network.
Network type in use, Infrastructure for BSS, Ad-Hoc for
IBSS network.
Shows the currently used channel.
AP support wireless mode. It may support 802.11a,
802.11b, 802.11g or 802.11n wireless mode.
Shows the encryption type currently in use. Valid value
includes WEP, TKIP, AES, and Not Use.
Shows the receiving signal strength of specified network.
Click to refresh the AP list.
Select an item on the list and then click to make a
connection.
Select an item on the list and then click to add it into the
profile list.
-
21 -
AP information
When you double click on the intended AP, you can see AP's detail information
that divides into three parts. They are General, WPS, CCX information. The
introduction is as following:
General
General information contain AP's SSID, MAC address,
Authentication Type, Encryption Type, Channel, Network
Type, Beacon Interval, Signal Strength and Supported
Rates.
Close: Click this button to exit the information screen.
WPS
WPS information contains Authentication Type, Encryption
Type, Config Methods, Device Password ID, Selected
Registrar, State, Version, AP Setup Locked, UUID-E and
RF Bands.
Authentication Type: There are four types of
authentication modes supported by RaConfig. They are
open, Shared, WPA-PSK and WPA system.
Encryption Type: For open and shared authentication
mode, the selection of encryption type are None and WEP.
-
22 -
CXX
For WPA, WPA2, WPA-PSK and WPA2-PSK
authentication mode, the encryption type supports both
TKIP and AES.
Config Methods: Correspond to the methods the AP
supports as an Enrollee for adding external Registrars.
Device Password ID: Indicate the method or identifies the
specific password that the selected Registrar intends to use.
Selected Registrar: Indicate if the user has recently
activated a Registrar to add an Enrollee. The values are
"TRUE" and "FALSE".
State: The current configuration state on AP. The values
are "Unconfigured" and "Configured".
Version: WPS specified version.
AP Setup Locked: Indicate if AP has entered a setup
locked state.
UUID-E: The universally unique identifier (UUID) element
generated by the Enrollee. There is a value. It is 16 bytes.
RF Bands: Indicate all RF bands available on the AP. A
dual-band AP must provide it. The values are "2.4GHz" and
"5GHz".
Close: Click this button to exit the information screen.
CCX information contains CCKM, Cmic and Ckip
information.
Close: Click this button to exit the information screen.
-
23 -
Link Status
Click the triangle button at the right corner of the windows to expand the link
status. The link status page displays the detail information of current connection.
Click this button to show the information of Status Section.
Click this button to hide the information of Status Section.
-
24 -
Link Status Tab
Status
Shows the current connection status. If there is no
connection existing, it will show Disconnected.
Extra Info
Channel
Authentication
Encryption
Network Type
IP Address
Sub Mask
Default Gateway
Link Quality
Signal Strength
1 and 2
Noise Strength
Transmit
Receive
Link Speed
Throughput
Shows the link status.
Shows the current channel in use.
Authentication mode used within the network,
including Unknown, WPA-PSK, WPA2-PSK, WPA
and WPA2.
Shows the encryption type currently in use. Valid
value includes WEP, TKIP, AES, and Not Use.
Network type in use, Infrastructure for BSS, Ad-Hoc
for IBSS network.
Shows the IP address information.
Shows the Sub Mask information.
Shows the default gateway information.
Shows the connection quality based on signal strength
and TX/RX packet error rate.
Shows the Receiving signal strength, you can choose
to display as percentage or dBm format.
Shows the noise signal strength.
Shows the current Link Speed and Throughput of the
transmit rate.
Shows the current Link Speed and Throughput of
receive rate.
Shows the current transmitting rate and receiving rate.
Shows the transmitting and receiving throughput in the
unit of K bits/sec.
-
25 -
Advanced
This Advanced page provides advanced and detailed settings for your wireless
network.
Advanced Tab
Wireless mode
Enable Tx Burst
Enable TCP
Window Size
Fast Roaming at
Show
Authentication
Status Dialog
Select Your
Country Region
Code
Select wireless mode. There are 802.11b/g/n mixed,
802.11b only and 802.11b/g mixed modes are supported.
Default mode is 802.11b/g/n mixed.
Check to enable the burst mode.
Check to increase the transmission quality.
Check to set the roaming interval, fast to roaming, setup
by transmits power.
When you connect AP with authentication, choose
whether show "Authentication Status Dialog" or not.
Authentication Status Dialog displays the process about
802.1x authentications.
Select your country region code from the pull-down
menu.
-
26 -
Enable CCX
(Cisco Compatible
extensions)
Apply
Check to enable the CCX function.
• Turn on CCKM
• Enable Radio Measurements: Check to enable the
Radio measurement function.
• Non-Serving Measurements limit: User can set channel
measurement every 0~2000 milliseconds. Default is set
to 250 milliseconds.
Click to apply above settings.
Statistics
The Statistics screen displays the statistics on your current network settings.
Transmit
Frames Transmitted Successfully
Frames Retransmitted
Successfully
Shows information of frames successfully
sent.
Shows information of frames successfully
sent with one or more reties.
-
27 -
Frames Fail To Receive ACK
After All Retries
Shows information of frames failed
transmit after hitting retry limit.
RTS Frames Successfully Receive
CTS
RTS Frames Fail To Receive
CTS
Reset Counter
Receive Statistics
Frames Received Successfully
Shows information of successfully receive
CTS after sending RTS frame
Shows information of failed to receive CTS
after sending RTS.
Click this button to reset counters to zero.
Shows information of frames Received
Successfully.
Frames Received With CRC
Error
Frames Dropped Due To
Out-of-Resource
Shows information of frames received with
CRC error.
Shows information of frames dropped due
to resource issue.
-
28 -
Duplicate Frames Received
Reset Counter
Shows information of duplicate received
frames.
Click this button to reset counters to zero.
WMM / QoS
The WMM page shows the Wi-Fi Multi-Media power save function and Direct
Link Setup that ensure your wireless network quality.
WMM Enable
WMM- Power Save Enable
Direct Link Setup Enable
MAC Address
Check the box to enable Wi-Fi Multi-Media
function.
Select which ACs you want to enable.
Check the box to enable Direct Link Setup.
The setting of DLS indicates as follow :
Fill in the blanks of Direct Link with MAC
Address of STA, and the STA must conform to
two conditions:
-
29 -
•Connecting with the same AP that supports
DLS feature.
Timeout Value
Apply
Tear Down
•DSL enabled.
Timeout Value represents that it disconnect
automatically after few seconds. The value is
integer that must be between 0~65535. It
represents that it always connects if the value is
zero. Default value of Timeout Value is 60
seconds.
Click this button to apply the settings.
Select a direct link STA, then click "Tear Down"
button to disconnect the STA.
WPS
The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to
simplify the security setup and management of Wi-Fi networks. The STA as an
Enrollee or external Registrar supports the configuration setup using PIN
(Personal Identification Number) configuration method or PBC (Push Button
Configuration) method through an internal or external Registrar.
-
30 -
WPS AP List
Rescan
Information
PIN Code
Config Mode
Display the information of surrounding APs with WPS IE
from last scan result. List information included SSID,
BSSID, Channel, ID (Device Password ID),
Security-Enabled.
Issue a rescan command to wireless NIC to update
information on surrounding wireless network.
Display the information about WPS IE on the selected
network. List information included Authentication Type,
Encryption Type, Config Methods, Device Password ID,
Selected Registrar, State, Version, AP Setup Locked,
UUID-E and RF Bands.
8-digit numbers. It is required to enter PIN Code into
Registrar using PIN method. When STA is Enrollee, you
can use "Renew" button to re-generate new PIN Code.
Our station role-playing as an Enrollee or an external
Registrar.
-
31 -
Detail
Information about Security and Key in the credential.
Connect
Rotate
Disconnect
Export Profile
Delete
PIN
PBC
WPS associate IE
Command to connect to the selected network inside
credentials. The active selected credential is as like as the
active selected Profile.
Command to rotate to connect to the next network inside
credentials.
Stop WPS action and disconnect this active link. And
then select the last profile at the Profile Page. If there is
an empty profile page, the driver will select any
non-security AP.
Export all credentials to Profile.
Delete an existing credential. And then select the next
credential if exist. If there is an empty credential, the
driver will select any non-security AP.
Start to add to Registrar using PIN (Personal
Identification Number) configuration method. If STA
Registrar, remember that enter PIN Code read from your
Enrollee before starting PIN.
Start to add to AP using PBC (Push Button
Configuration) method.
Send the association request with WPS IE during WPS
setup. It is optional for STA.
WPS probe IE
Progress Bar
Status Bar
Send the probe request with WPS IE during WPS setup.
It is optional for STA.
Display rate of progress from Start to Connected status.
Display currently WPS Status.
-
32 -
About
This page displays the information of the wireless card including, RaConfig
Version/ Date, Driver Version/ Date, EEPROM Version, Firmware Version and
Phy_Address.
-
33 -
UTILITY MENU LIST
To access the utility menu list, please right click the utility icon on the task bar.
z Launch Config Utilities: Select to open the utility screen.
z Use Zero Configuration as Configuration utility: Select to use the
Window XP built-in utility (Zero configuration utility).
zSwitch to AP Mode: Select to make your wireless USB adapter act as a
wireless AP.
z Exit: Select to close the utility program.
-
34 -
Soft AP mode
Config
Config
SSID
Channel
Wireless mode
Security Setting
AP name of user type. User also can click Use Mac
Address button to display it. System default is
SoftAP-23.
Manually force the AP using the channel. The
system default is CH 1.
Select wireless mode. 802.11b/g/n mixed, 802.11b
only and 802.11b/g mixed mode are supported.
System default is 802.11 b/g/n mixed.
Authentication mode and encryption algorithm used
within the AP. The system default is no
authentication and encryption.
-
35 -
Authentication Type: There are five type of
authentication modes including Open, Shared,
WPA-PSK, WPA2-PSK, and
WPA-PSK/WPA2-PSK.
Encryption Type: For open and shared
authentication mode, the selection of encryption
type are None and WEP. For WPA-PSK,
WPA2-PSK, and WPA-PSK/ WPA2-PSK
authentication mode, the encryption type supports
both TKIP and AES.
WPA Pre-shared Key: This is the shared secret
between AP and STA. For WPA-PSK and
WPA2-PSK and WPA-PSK/ WPA2-PSK
authentication mode, this field must be filled with
character longer than 8 and less than 32 lengths.
Group Rekey interval: Only valid when using
WPA-PSK, WPA2-PSK, and WPA-PSK/
WPA2-PSK authentication mode to renew key. User
can set to change by seconds or packets. Default is
600 seconds.
WEP Key: Only valid when using WEP encryption
algorithm. The key must match with the AP’s key.
-
36 -
Country Region
Code
Beacon (ms)
TX Power
Idle time(60-3600)(s)
No forwarding
among wireless
clients
Hide SSID
Allow BW 40MHz
Default
Apply
There are several formats to enter the keys.
• Hexadecimal (64bits): 10 Hex characters.
• Hexadecimal (128bits): 26 Hex characters.
• ASCII (64bits): 5 ASCII characters.
• ASCII (128bits): 13 ASCII characters.
Show Password: Check this box to show the
password you entered.
Eight countries to choose. Country channel list:
Classification Range
0: CH1 ~CH11
1: CH1 ~CH13
2: CH10 ~CH11
3: CH10 ~CH13
4: CH14
5: CH1~CH14
6: CH3 ~CH9
7: CH5 ~CH13
The time between two beacons. The system default
is 100 ms.
Manually force the AP transmits power from the
pull down list 100%, 75%, 50%, 25% and lowest.
The system default is 100%.
It represents that the AP will idle after few seconds.
The time must be set between 60~3600 seconds.
Default value of idle time is 300 seconds.
No beacon among wireless client, clients can share
information each other. The system default is no
forwarding.
Do not display AP name. System default no hide.
Click to disable this function. Default is enabling.
Use the system default value.
Click to apply the above settings.
-
37 -
Access Control
Access Control
Access Policy
Mac Address
Access List
Delete
Remove All
Apply
User chooses whether AP start the function or not.
System default is Disable.
Manually force the Mac address using the function. Click
Add and the MAC address will be listed in the Access
List pool.
Display all Mac Address that you have set.
Delete the Mac address that you have set.
Remove all Mac address in the Access List.
Apply the above changes.
-
38 -
MAC Table
MAC Table
MAC Address
AID
Power Saving Mode
Status
The station Mac address of current connection.
Raise value by current connection.
The station of current connect whether it have to
support.
The status of current connection.
-
39 -
Event Log
Event Log
Event Time
(yy/mm/dd-hh:mm:ss)
Records the event time.
Message
Records all the event messages.
-
40 -
Statistics
Transmit Statistics
Frames Transmitted
Successfully
Frames Fail To Receive ACK
After All Retries
RTS Frames Successfully
Receive CTS
RTS Frames Fail To Receive
CTS
Frames Transmitted
Successfully After Retry
Frames successfully sent.
Frames failed transmit after hitting retry
limit.
Successfully receive CTS after sending RTS
frame
Failed to receive CTS after sending RTS.
Frames successfully sent with one or more
reties.
-
41 -
Receive Statistics
Frames Received Successfully Frames Received Successfully
Frames Received With CRC
Error
Frames Dropped Due To
Out-of-Resource
Duplicate Frames Received Duplicate received frames.
Reset Counter Reset counters to zero.
Frames received with CRC error.
Frames dropped due to resource issue
About
This page displays the wireless card and driver version information.
-
42 -
UNINSTALLATION
In case you need to uninstall the Utility and driver, please refer to below steps.
(As you uninstall the utility, the driver will be uninstalled as well.)
1. Go to Start Æ Programs ÆIntelligent Wireless Æ Uninstall –
Wireless card.
-
43 -
2. Select Remove all button and click Next to start uninstalling.
3. Click Yes to complete remove the selected application and all of its
features.
-
44 -
4.Select “Yes, I want to restart my computer now” and then click
Finish to complete the uninstallation.
-
45 -
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.