Abocom Systems WUG2K7C User Manual

802.11b/g Mini Wireless LAN USB 2.0 Adapter
User’s Manual
REGULATORY STATEMENTS
This device is intended only for OEM integrators under the following conditions: 
1) The antenna must be installed such that 20 cm is maintained between the antenna and users. For laptop installations, the antenna must be  installed to ensure that the proper spacing is maintained in the event the users places the device in their lap during use (i.e. positioning of antennas  must be placed in the upper portion of the LCD panel only to ensure 20 cm will be maintained if the user places the device in their lap for use) and 
2) The transmitter module may not be co-located with any other transmitter or antenna.  As long as the 2 conditions above are met, further transmitter testing will not be required. However, the OEM integrator is still responsible for testing  their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral  requirements, etc.).  IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop configurations or co-location with another  transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances,  the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization. End Product Labeling This transmitter module is authorized only for use in devices where the antenna may be installed such that 20 cm may be maintained between the  antenna and users (for example access points, routers, wireless ASDL modems, certain laptop configurations, and similar equipment). The final end  product must be labeled in a visible area with the following: "Contains TX FCC ID: {INSERT FCC ID HERE}".   RF Exposure Manual Information That Must be Included The users manual for end users must include the following information in a prominent location "IMPORTANT NOTE: To comply with FCC RF  exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all  persons and must not be co-located or operating in conjunction with any other antenna or transmitter."  Additional Information That Must be Provided to OEM Integrators The end user should NOT be provided any instructions on how to remove or install the device.  
The United States Federal Communication Commission (FCC) and the Canadian Department of Communications have established certain rules governing the use of electronic equipment.
Part15, Class B
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
1) This device may not cause harmful interface, and
2) This device must accept any interface received, including interface that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
w Reorient or relocate the receiving antenna. w Increase the distance between the equipment and receiver. w Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected.
CAUTION:
1) To comply with FCC RF exposure compliance requirements, a separation
distance of at least 20 cm must be maintained between the antenna of this device and all persons.
2) This transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
Table of Contents
INTRODUCTION...................................................................................................1
FEATURES ..............................................................................................................1
Windows 2000/XP Installation ...............................................................................2
INSTALL THE SOFTWARE.........................................................................................2
INSTALL THE HARDWARE .......................................................................................6
Windows Vista Installation.....................................................................................7
INSTALL THE SOFTWARE.........................................................................................7
INSTALL THE HARDWARE .......................................................................................9
Verification................................................................................................9
IP Address ............................................................................................... 10
Utility Configuration for Windows 2000/XP.......................................................11
STATION MODE ....................................................................................................12
Profile......................................................................................................12
Network...................................................................................................20
Link Status...............................................................................................24
Advanced.................................................................................................26
Statistics...................................................................................................27
WMM / QoS............................................................................................28
WPS.........................................................................................................30
Radio On/Off...........................................................................................32
About....................................................................................................... 32
UTILITY MENU LIST..............................................................................................33
SOFT AP MODE.....................................................................................................34
Config......................................................................................................34
Access Control......................................................................................... 38
MAC Table..............................................................................................39
Event Log ................................................................................................40
Statistics...................................................................................................41
About....................................................................................................... 42
Utility Configuration for Windows Vista............................................................43
STATION MODE ....................................................................................................43
Profile......................................................................................................43
Network...................................................................................................49
Link Status...............................................................................................52
Statistics...................................................................................................54
WMM / QoS............................................................................................55
WPS.........................................................................................................57
Radio On/Off...........................................................................................59
About....................................................................................................... 59
UTILITY MENU LIST..............................................................................................60
SOFT AP MODE.....................................................................................................61
Config......................................................................................................61
Access Control......................................................................................... 64
MAC Table..............................................................................................65
Event Log ................................................................................................66
Statistics...................................................................................................67
About....................................................................................................... 68
UNINSTALLATION FOR WINDOWS 2000/XP...............................................69
UNINSTALLATION FOR WINDOWS VISTA.................................................72
INTRODUCTION
The 802.11b/g High Gain Wireless LAN USB Adapter is designed for a USB type A port of a laptop or desktop computer for creating a wireless workstation is USB 2.0 compliant, which connects to any available USB port on a notebook or desktop computer.
The 802.11b/g High Gain Wireless LAN USB Adapter complies with IEEE
802.11g standard that offers a data rate up to 54Mbps in a wireless LAN environment. It is backward compliant with IEEE 802.11b specification. The
high-speed wireless network card can plug into your notebook or desktop PC and accesses to the LAN or peer-to-peer networking easily without wires or cables. Whether you’re at your desk or in the boardroom, it allows you to share printers, files, and other network resources.
Features
¾ Complies with IEEE 802.11g standard for 2.4GHz Wireless LAN ¾ USB 2.0 compliant ¾ USB Plug & Play ¾ Interoperable with existing network infrastructure ¾ Secure information transmission ¾ Freedom to roam while staying connected ¾ Compatible with specialty wireless products and services ¾ Up to 54 Mbps data rate ¾ Antenna is built in the card with LED indication ¾ Low power consumption ¾ Easy to install and configure
. It
-
1 -
y
Windows 2000/XP Installation
Install the Software
Do not insert the wireless LAN adapter into your computer until the
procedures in “Driver& Utility Installation” have been performed.
1. Insert the included CD-ROM into the CD-ROM drive of your
computer.
2. When the Main Menu screen appears, click “Driver & Utilit
Installation” to start the software installation.
-
2 -
3. When the License Agreement screen appears, please read the
contents and select “I accept the terms of the license agreement “ then click Next to continue.
4. Select the check box to choose a Configuration Tool from the
listed two choices.
z Configuration Tool: Choose to use our configuration utility. z Microsoft Zero Configuration Tool: Choose to use Windows XP’s
built-in Zero Configuration Utility (ZCU).
Click Next to continue.
-
3 -
5. There are two modes for you to choose in this screen, either choose
Optimize for WiFi mode or Optimize for performance mode (Tx Burst mode). This mode selection screen is set for the default
mode shown in the utility screen; you can still change its mode later in the utility screen. Click Next to continue.
-
4 -
6. When you are prompted the following message, please click Install
to begin the installation.
-
5 -
7. When the following screen appears, click Finish to complete the
software installation.
Install the Hardware
Note: Insert the Wireless USB card when you finished your software installation.
Insert the USB Adapter into the USB Port of your computer. The system will automatically detect the new hardware.
-
6 -
Windows Vista Installation
Install the Software
Do not insert the wireless LAN adapter into your computer until the
procedures in “Driver& Utility Installation” have been performed.
1. Insert the included CD-ROM into the CD-ROM drive of your
computer.
2. When the Main Menu screen appears, click “Driver & Utility
Installation” to start the software installation.
3. When the License Agreement screen appears, please read the
contents and select “I accept the terms of the license agreement “ then click Next to continue.
-
7 -
4. When you are prompted the following message, please click Install
to begin the installation.
5. When the following screen appears, click Finish to complete the
software installation.
-
8 -
Install the Hardware
Note: Insert the Wireless USB card when you finished your software installation.
Insert the USB Adapter into the USB Port of your computer. The system will automatically detect the new hardware.
Verification
To verify if the device exists in your computer and is enabled, go to Start > Control Panel > System (> Hardware) > Device Manager. Expand the Network Adapters category. If the 802.11b/g Mini Wireless LAN USB 2.0 Adapter is listed here, it means that your device is properly installed and enabled.
-
9 -
IP Address
Note: When assigning IP Addresses to the computers on the network, remember to have the IP address for each computer set on the same subnet mask. If your Broadband Router use DHCP technology, however, it won’t be necessary for you to assign Static IP Address for your computer.
1. To configure a dynamic IP address (i.e. if your broadband Router has the DHCP
technology), check the Obtain an IP address automatically option.
2. To configure a fixed IP address (if you broadband Router is not DHCP
supported, or when you need to assign a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field, for example, enter 192.168.1.1 in the IP address field, and 255.255.255.0 for the Subnet mask.
-
10 -
Utility Configuration for Windows 2000/XP
After the Wireless adapter has been successfully installed, users can use the included Configuration Utility to set their preference.
Go to StartJ (All) ProgramsJIntelligent Wireless J Intelligent Wireless Utility
You can also open the Configuration Utility by double clicking the icon or right clicking to select Launch Config Utilities.
-
11 -
Station Mode
Profile
Profile can book keeping your favorite wireless setting among your home, office, and other public hot-spot. You may save multiple profiles, and activate the correct one at your preference. The Profile manager enables you to Add, Edit, Delete and Activate profiles.
Click this button to show the information of Status Section. Click this button to hide the information of Status Section.
Profile Tab
Profile Name
SSID
Network Type
Authentication Encryption Use 802.1x
You may enter a distinctive name of profile in this
column. The default is PROF# (# 1, #2, #3....)
The SSID is the unique name shared among all points in your wireless network.
Shows the network type of the device, including infrastructure and Ad-Hoc.
Shows the authentication mode. Shows the encryption type. Whether use 802.1x feature or not.
-
12 -
Tx Power
Channel Power Save
Mode RTS Threshold Fragment
Threshold Add
Transmit power, the amount of power used by a radio transceiver to send the signal out.
Shows the selected channel that is currently in use. (There are 14 channels available, depending on the country.)
Choose from CAM (Constantly Awake Mode) or Power Saving Mode.
Shows the RTS Threshold of the device. Shows the Fragment Threshold of the device. Click to add a profile from the drop-down screen.
System Configuration tab:
Profile Name: User can enter profile name, or use default
name defined by system. The default is PROF# (# 1, #2,
#3....).
SSID: The SSID is the unique name shared among all points in your wireless network. The name must be identical for all devices and points attempting to connect to the same network. User can use pull-down menu to select from available APs.
-
13 -
Power Save Mode:
CAM (Constantly Awake Mode): When this mode is
selected, the power supply will be normally provided even when there is no throughput.
PSM (Power Saving Mode): When this mode is
selected, this device will stay in power saving mode even when there is high volume of throughput.
Network Type: There are two types, Infrastructure and Ad hoc modes. Under Ad hoc mode, user can also choose the preamble type, the available preamble type includes Auto and Long. In addition to that, the channel field will be available for setup in Ad-hoc mode.
The Infrastructure is intended for the connection
between wireless network cards and an Access Point. With the wireless adapter, you can connect wireless LAN to a wired global network via an Access Point.
The Ad hoc lets you set a small wireless workgroup
easily and quickly. Equipped with the wireless adapter, you can share files and printers between each PC and laptop.
Tx Power: Select the Tx power percentage from the pull-down list including Auto, 100%, 75%, 50%, 25%,
10% and Lowest. Preamble: A preamble is a signal used in wireless
environment to synchronize the transmitting timing including Synchronization and Start frame delimiter. Select from the pull-down menu to change the Preamble type into Auto or Long.
RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value directly. The default value is 2347. RTS/CTS Threshold is a mechanism implemented to prevent the “Hidden Node” problem. If the “Hidden Node” problem is an issue, users have to specify the packet size. The RTS/CTS mechanism will be activated if the data size exceeds the value you set.
This value should remain at its default setting of 2347. Should you encounter inconsistent data flow, only minor
-
14 -
modifications of this value are recommended.
Fragment Threshold: User can adjust the Fragment threshold number by sliding the bar or key in the value directly. The default value is 2346. The mechanism of Fragmentation Threshold is used to improve the efficiency when high traffic flows along in the wireless network. If your Wireless LAN Adapter often transmits large files in wireless network, you can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346.
Authentication and Encryption tab:
Authentication Type: There are seven type of
authentication modes including Open, Shared, Leap, WPA, WPA-PSK, WPA2 and WPA2-PSK.
Open: If your access point/wireless router is using
"Open” authentication, then the wireless adapter will need to be set to the same authentication type.
-
15 -
Shared: Shared Key is when both the sender and the
recipient share a secret key.
LEAP: Light Extensible Authentication Protocol. It is
an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication (only with CCX mode enabled.)
WPA-PSK: WPA-PSK offers two encryption methods,
TKIP and AES. Select the type of algorithm, TKIP or AES and then enter a WPA Shared Key of 8-63 characters in the WPA Pre-shared Key field.
Encryption Type: For Open and Shared authentication mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 lengths.
WEP Key: Only valid when using WEP encryption algorithm. The key must match with the AP’s key. There are several formats to enter the keys.
Hexadecimal (40bits): 10 Hex characters.
Hexadecimal (128bits): 32Hex characters.
ASCII (40bits): 5 ASCII characters.
ASCII (128bits): 13 ASCII characters.
Show Password: Check this box to show the password
you entered.
802.1x Setting: When user use radius server to authenticate client certificate for WPA authentication mode.
-
16 -
802.1x tab:
EAP Method:
PEAP: Protect Extensible Authentication Protocol.
PEAP transport securely authentication data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN.
TLS / Smart Card: Transport Layer Security.
Provides for certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.
TTLS: Tunneled Transport Layer Security. This
security method provides for certificate-based, mutual authentication of the client and network through an
-
17 -
encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.
EAP-FAST: Flexible Authentication via Secure
Tunneling. It was developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically. Manual provisioning is delivery to the client via disk or a secured network distribution method. Automatic provisioning is an in-band, over the air, distribution. For tunnel authentication, only support "Generic Token Card" authentication now.
MD5-Challenge: Message Digest Challenge.
Challenge is an EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network.
Tunnel Authentication:
Protocol: Tunnel protocol, List information including
EAP-MSCHAP v2, EAP-TLS/Smart card, and Generic Token Card.
Tunnel Ide ntity: Identity for tunnel.
Tunne l P a ssword: Password for tunnel.
Session Resumption: User can click the box to enable or disable this function.
ID\PASSWORD tab:
-
18 -
ID/ PASSWORD: Identity and password for server.
Authentication ID / Password: Identity, password
and domain name for server. Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain name can be keyed in blank space.
Tunnel ID / Password: Identity and Password for
server.
Show Password: Check this box to show the password
you entered.
OK: Click to save settings and exit this page. Cancel: Click to call off the settings and exit.
Client Certification tab:
Client Certification: Client certificate for server
authentication. Use Client certificate: Choose to enable server authentication.
OK: Click to save settings and exit this page. Cancel: Click to call off the settings and exit.
Server Certification tab:
-
19 -
Loading...
+ 55 hidden pages