Aztech WL572USB User Manual

WL572USB
High Speed Wireless-N
USB 2.0 Adapter
User Manual
No part of this document may be reproduced, republished, or retransmitted in any form or by any means whatsoever, whether electronically or mechanically, including, but not limited to, by way of photocopying, recording, information recording, or through retrieval systems without the express written permission. We reserve the right to revise this document at any time without the obligation to notify any person and/or entity. All other company or product names mentioned are used for identification purposes only and may be trademarks of their respective owners.
LIMITATION OF LIABILITY AND DAMAGES
THE PRODUCT AND THE SOFTWARES WITHIN ARE PROVIDED "AS IS," BASIS. THE MANUFACTURER AND
MANUFACTURER’S RESELLERS (COLLECTIVELY REFERRED TO AS “THE SELLERS”) DISCLAIM ALL
WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY WARRANTIES ARISING FROM COURSE OF DEALING, COURSE OF PERFORMANCE, OR USAGE OF TRADE. IN NO EVENT WILL THE SELLERS BE LIABLE FOR DAMAGES OR LOSS, INCLUDING BUT NOT LIMITED TO DIRECT, INDIRECT, SPECIAL WILLFUL, PUNITIVE, INCIDENTAL, EXEMPLARY, OR CONSEQUENTIAL, DAMAGES, DAMAGES FOR LOSS OF BUSINESS PROFITS, OR DAMAGES FOR LOSS OF BUSINESS OF ANY CUSTOMER OR ANY THIRD PARTY ARISING OUT OF THE USE OR THE INABILITY TO USE THE PRODUCT OR THE SOFTWARES, INCLUDING BUT NOT LIMITED TO THOSE RESULTING FROM DEFECTS IN THE PRODUCT OR SOFTWARE OR DOCUMENTATION, OR LOSS OR INACCURACY OF DATA OF ANY KIND, WHETHER BASED ON CONTRACT, TORT OR ANY OTHER LEGAL THEORY, EVEN IF THE PARTIES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THE PRODUCT OR ITS SOFTWARE IS ASSUMED BY CUSTOMER. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO THE PARTIES. IN NO EVENT WILL THE SELLERS’ TOTAL CUMULATIVE LIABILITY OF EACH AND EVERY KIND IN RELATION TO THE PRODUCT OR ITS SOFTWARE EXCEED THE AMOUNT PAID BY CUSTOMER FOR THE PRODUCT.
Page 2 of 34
User Manual
Contents
Getting Started .......................................................................................................................... 5
Check Package Contents ........................................................................................................... 6
Device Overview ........................................................................................................ 6
Remove or Disable Conflicts ..................................................................................................... 6
Internet Sharing, Proxy, and Security Applications ................................................... 7
Configuring Internet Properties ................................................................................ 7
Removing Temporary Internet Files .......................................................................... 7
Software Installation ................................................................................................................. 8
Hardware Installation ............................................................................................................. 14
Connect to a Network ............................................................................................................. 15
Connecting to non-Secured Wireless AP ................................................................ 15
Connecting to WEP-Secured Wireless AP ............................................................... 16
Connecting to WPA-PSK-Secured Wireless AP ........................................................ 17
About WL572USB Utility ......................................................................................................... 18
Available Network Page .......................................................................................................... 19
Link Information Page ............................................................................................................. 20
Throughput .............................................................................................................. 21
Statistics .................................................................................................................. 21
Transmit Statistics ................................................................................................... 22
Received Statistics ................................................................................................... 22
Profile Settings Page ............................................................................................................... 23
Add/Edit Profile ....................................................................................................... 24
EAP Method............................................................................................................. 27
Session Resumption: ............................................................................................... 27
Tunnel Authentication: ........................................................................................... 27
Tunnel ID / PASSWORD: .......................................................................................... 27
Client Certification: ................................................................................................. 28
Server Certification: ................................................................................................ 28
WPS ......................................................................................................................... 28
Advanced Page ........................................................................................................................ 32
About Page .............................................................................................................................. 33
Page 3 of 34
User Manual
About the Product
WL572USB provides wireless connectivity to desktop or notebook computers. The device
performs the function of a radio broadcaster and receiver to communicate with a wireless
network. This gives the computer connected with WL572USB the capability to communicate
with other devices and use the Internet service available in the wireless network.
WL572USB is capable of connecting with wireless networks that utilize the Wireless N
protocol. This device also supports connection to other wireless network standards like
Wireless G or Wireless B. WL572USB is easy to setup - install the necessary driver software,
connect it to an available USB slot, and then connect to a wireless network. The device
comes with Windows-based software called WL572USB Utility that can be used to connect
to wireless networks and create profiles which remembers the configuration details for a
wireless network.
Note: Wireless connection speed is not correlated to Internet access speed. Internet access speed from
popular broadband DSL or cable Internet services normally provides up to 3 Mbps connection, which can be
easily handled even by the slower Wireless B protocol.
Page 4 of 34
User Manual
Remove/Disable
Conflicts
Check Package
Contents
Software Installation
Connect to a
Network
Hardware Installation
Getting Started
Setting up the device is easy. The flowchart below provides an outline of the steps needed
to complete the installation. Brief descriptions appear beside each step. Detailed
instructions are provided in the subsequent pages.
Page 5 of 34
User Manual
1. Check Package Contents
Make sure that you have the following items. If any of the items is damaged or missing,
please contact your dealer immediately.
WL572USB Easy Start Guide Resource CD – contains WL572USB Utility installer and User Manual
Note: You may also download the Utility installer and User Manual by visiting this link: http://www.aztech.com/support/
Device Overview
2. Remove or Disable Conflicts
To make sure the device installation moves on smoothly, you need to remove or disable
conflicts that may interfere the installation. Probable conflicts may include:
Internet sharing applications Proxy software Security software Internet properties Temporary Internet files
Page 6 of 34
User Manual
Internet Sharing Applications
Proxy Software
Security Software
Microsoft Internet Sharing
WinGate
Symantec
WinProxy
Zone Alarm
Internet Sharing, Proxy, and Security Applications
Internet sharing, proxy software, and firewall applications may interfere with the
installation. These should be removed or disabled before start the installation.
If you have any of the following or similar applications installed on your computer, remove
or disable them according to the manufacturer’s instructions.
Configuring Internet Properties
To set the Internet Properties:
1. Click the Start button, and then click Run. This opens the Run dialog box.
2. Type control inetcpl.cpl and then click OK. This opens Internet Properties.
3. Click Connections tab.
4. In Dial-up and Virtual Private Network settings, check Never dial a connection.
5. To close Internet Properties, click OK.
Removing Temporary Internet Files
Temporary Internet files are files from Web sites that are stored in your computer. Delete
these files to clean the cache and remove footprints left by the Web pages you visited.
To remove temporary Internet files:
1. Click the Start button and then click Run. This opens the Run dialog box.
2. Type control and then click OK. This opens Control Panel.
3. Double-click Internet Options. This opens Internet Options.
4. In the Temporary Internet Files pane, click Delete Cookies.
5. Click Delete Files.
6. To close Internet Properties, click OK.
Page 7 of 34
User Manual
3. Software Installation
Here are the instructions on how to install the driver software for Windows 2000, XP, Vista,
7 and 8.
Note: Do not connect the device until the Utility is completely installed.
To install the driver software:
1. Insert the Resource CD to the CD-ROM. This opens the WL572USB Utility Setup. If
the Utility does not open automatically, click the Start button and then click Run.
Enter d:\setup.exe where d is the CD-ROM drive.
2. Wizard will now move to next step for license agreement, check the option ‘I accept
the terms of the license agreement’.
Page 8 of 34
User Manual
3. Click Next.
4. Select either of the options available:
a. Install driver and Ralink WLAN Utility, this will install driver for the adaptor, and
the wireless utility.
b. Install driver only, this will install only the driver for the adaptor.
Page 9 of 34
User Manual
5. Click Next.
6. If you selected the first option, please select either one of the options available:
a. Ralink Configuration Tool
b. Microsoft Zero Configuration Tool
Page 10 of 34
User Manual
7. Click Next.
8. Click Install, required driver/utility is now being installed into the PC.
Page 11 of 34
User Manual
9. Click Finish to exit the wizard, installation is now complete.
Page 12 of 34
User Manual
Page 13 of 34
User Manual
4. Hardware Installation
1. After installing the software, you may now proceed to hardware installation by
inserting the WL572USB to any USB port of your computer.
2. When your device is detected, a new icon appears in the System tray . Double-
click this icon to open WL572USB Utility.
Page 14 of 34
User Manual
5. Connect to a Network
A. Connecting to an Access Point via the WPS button
1. Or use the WPS button to connect to your Access Point.
2. Press the WPS of your Access Point then press the WPS button of the Aztech
WL572USB for 5 seconds to start the pairing.
3. The WL572USB LED will start to blink during pairing. To confirm the connection, the
Wireless Network Connection on your computer will change to .
Note: Your Access Point should have the WPS feature for your WL572USB to connect using the WPS button.
WL572USB WPS button should be pressed within 2mins after pressing the WPS button of your Access Point.
B. Connecting to an Access Point using the WL572USB Utility
1. Install the Resource CD on the computer where you are connecting the Aztech
WL572USB.
2. Launch the Aztech WL572USB utility and connect to your existing Access Point.
Connecting to non-Secured Wireless AP
1. Click Available Network icon then select the AP desired.
2. Click Connect button to connect to the desired AP.
Page 15 of 34
User Manual
Connecting to WEP-Secured Wireless AP
1. Select an AP with WEP encryption and click "Connect".
2. The Authentication and Encryption window will appear as below.
3. Select the Default Key and Key format set on the AP then enter the WEP key on the
required field. Click Next to connect to the desired AP.
Page 16 of 34
Connecting to WPA-PSK-Secured Wireless AP
1. Select an AP with WPA-PSK encryption and click Connect.
User Manual
2. The Authentication and Encryption window will appear as below. Select WPA-PSK as
the Authentication Type then select TKIP or AES encryption on the drop down box
and click Next.
3. Enter the WPA Pre-shared Key on the required field. Click Next to connect to the
desired AP.
Page 17 of 34
User Manual
About WL572USB Utility
WL572USB Utility is a software application used in tandem with the device to connect to a
wireless network and to configure the device settings. WL572USB Utility can be installed on
computers running Windows 2000, XP, Vista, 7 and 8.
After installing the adaptor, the adaptor’s tray icon will appear in your system tray. It
appears at the right hand side bottom of the screen. The icon will change color to reflect
current wireless network connection status. The status is shown as follows:
: Indicates the connected and signal strength is good.
: Indicates the connected and signal strength is normal.
: Indicates that it is not yet connected.
: Indicates that a wireless NIC cannot be detected.
: Indicates that the connection and signal strength is weak.
Buttons for the Available Network, Link Information, Profile Settings, Advanced, About
button, Help and Radio On/Off button.
Page 18 of 34
Below are the icons embedded on the wireless utility.
Indicates if a connection made from the currently activated profile
Indicates if the connection has failed on a currently activated profile
Indicates the network type is infrastructure mode
Indicates the network type is in Ad-hoc mode
Indicates if the network is security-enabled
Click to add a new profile
Click to edit an existing profile
Deletes an existing profile
Import an existing profile
Export an existing profile
Activates the selected profile
Activates the selected profile
Next Button
Back Button
Cancel Button
User Manual
1. Available Network Page
The system will display the information of local APs from the last scan result as part of the
Network section. The Listed information includes the SSID, BSSID, Signal, Channel,
Encryption algorithm, Authentication and Network type as shown below.
Page 19 of 34
User Manual
1. SSID: Name of BSS or IBSS network.
2. Network Type: Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network.
3. Channel: Channel in use.
4. Wireless Mode: AP support wireless mode. It may support 802.11a, 802.11b,
802.11g or 802.11n wireless mode.
5. Security-Enable: Indicates if the AP provides a security-enabled wireless network.
6. Signal: Receive signal strength of the specified network.
2. Link Information Page
The link status page displays detailed information about the current connection.
Page 20 of 34
User Manual
1. Status: Current connection status. If no connection, if will show Disconnected.
Otherwise, the SSID and BSSID will show here.
2. Extra Info: Display link status in use.
3. Channel: Display current channel in use.
4. Authentication: Authentication mode in use.
5. Encryption: Encryption type in use.
6. Network Type: Network type in use.
Throughput
The throughput page displays detailed information about the current connection
1. Link Speed: Show current transmit rate and receive rate.
2. Throughput: Display transmits and receive throughput in unit of Mbps.
3. Link Quality: Display connection quality based on signal strength and TX/RX packet
error rate.
4. Signal Strength 1: Receive signal strength 1, user can choose to display as percentage or
dBm format.
Statistics
The Statistics page displays detailed counter information based on 802.11 MIB counters.
This page translates that MIB counters into a format easier for the user to understand.
Page 21 of 34
User Manual
Transmit Statistics
1. Frames Transmitted Successfully: Frames successfully sent.
2. Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting
retry limit.
3. RTS Frames Successfully Receive CTS: Successfully receive CTS after sending RTS
frame.
4. RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS.
5. Frames Retransmitted Successfully: Successfully retransmitted frames numbers.
6. Reset counters to zero.
Received Statistics
Page 22 of 34
User Manual
1. Frames Received Successfully: The number of frames successfully received.
2. Frames Received With CRC Error: The number of frames received with a CRC error.
3. Frames Dropped Due To Out-of-Resource: The number of frames dropped due to a
resource issue.
4. Duplicate Frames Received: The number of duplicate frames received.
5. Reset all the counters to zero.
3. Profile Settings Page
The Profile List keeps a record of your favorite wireless settings at home, office, and other
public hot-spots. You can save multiple profiles and activate the correct one at your
preference. Picture below shows the basic profile section.
1. Profile Name: Name of profile, preset to PROF* (* indicate 1, 2, 3...).
2. SSID: The access point or Ad-hoc name.
3. Network Type: Indicates the networks type, including infrastructure and Ad-Hoc.
4. Authentication: Indicates the authentication mode used.
5. Encryption: Indicates the encryption Type used.
6. Use 802.1x: Shows if the 802.1x feature is used or not.
7. Channel: Channel in use for Ad-Hoc mode.
Page 23 of 34
User Manual
8. Power Save Mode: Choose from CAM (Constantly Awake Mode) or Power Saving
Mode.
9. Tx Power: Transmitting power, the amount of power used by a radio transceiver to
send the signal out.
10. RTS Threshold: Users can adjust the RTS threshold number by sliding the bar or
keying in the value directly.
11. Fragment Threshold: The user can adjust the Fragment threshold number by sliding
the bar or key in the value directly.
Add/Edit Profile
There are three methods to open the Profile Editor dialog box.
1. You can open it by clicking the "Add to Profile" button in the Site Survey tab.
2. You can open it by clicking the "Add" button in the Profile tab.
3. You can open it by clicking the "Edit" button on the Profile tab.
Add a new Profile
1. Profile Name: The user can chose any name for this profile or use the default name
defined by system.
2. SSID: The user can key in the intended SSID name or select one of the available APs
from the drop-down list.
Page 24 of 34
User Manual
3. Network Type: There are two types, infrastructure and 802.11 Ad-hoc modes. Under
Ad-hoc mode, user can also choose the preamble type. The available preamble type
includes auto and long. In addition, the channel field will be available for setup in Ad-
hoc mode.
Note: Ad Hoc mode may not be available to Windows 8.
4. Authentication Type: There are 9 types of authentication modes supported by RaUI.
They are open, WPA, WPA-PSK, WPA2, WPA2-PSK, 802.1X, CCKM, WAPI-PSK and
WAPI-CA.
5. Encryption Type: For Open authentication mode, the selection of available
encryption type are None and WEP. For Shared and 802.1x authentication mode, the
selection of available encryption is WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK
authentication mode, both TKIP and AES encryption is available. For WAPI-PSK and
WAPI-CA authentication mode, only SMS4 encryption is available.
6. WEP Key: Only valid when using WEP encryption algorithms. The key must be
identical to the AP's key. There are several formats to enter the keys as listed below:
a. Hexadecimal - 40bits : 10 Hex characters. b. Hexadecimal - 128bits : 26Hex characters. c. ASCII - 40bits : 5 ASCII characters. d. ASCII - 128bits : 13 ASCII characters.
Page 25 of 34
User Manual
7. Pre-shared Key: This is the key shared between the AP and STA. For WPA-PSK and
WPA2-PSK authentication mode, this field must be filled with a key between 8 and
32 characters in length.
8. 802.1x Setting: is used for authentication of the "WPA" and "WPA2" certificate by
the server.
Page 26 of 34
User Manual
EAP Method
1. PEAP: Protect Extensible Authentication Protocol. PEAP transport securely
authenticates data by using tunneling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients using only server-side certificates,
thus simplifying the implementation and administration of a secure wireless LAN.
2. TLS/Smart Card: Transport Layer Security. Provides for certificate-based and mutual
authentication of the client and the network. It relies on client-side and server-side
certificates to perform authentication and can be used to dynamically generate user-
based and session-based WEP keys to secure subsequent communications between
the WLAN client and the access point.
3. LEAP: Light Extensible Authentication Protocol is an EAP authentication type that
encrypts data transmissions using dynamically generated WEP keys, and supports
mutual authentication.
Session Resumption:
User can choose to "Disable" and "Enable".
Tunnel Authentication:
Protocol: Tunnel protocol, List information include "EAP-MSCHAP v2", "EAP-TLS/Smart
card", "Generic Token Card".
Tunnel ID / PASSWORD:
1. Authentication ID/Password: The identity, password and domain name for server.
Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain names
can be keyed in the blank space.
2. Tunnel ID/Password: Identity and Password for the server.
Page 27 of 34
User Manual
Client Certification:
Server Certification:
1. Certificate issuer: Select the server that issues the certificate.
2. Allow intermediate certificates: It must be in the server certificate chain between
the server certificate and the server specified in the "certificate issuer must be" field.
3. Server name: Enter an authentication sever root.
WPS
The following shows the WPS functions.
Page 28 of 34
User Manual
1. WPS Configuration: The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple
Configuration) is to simplify the security setup and management of Wi-Fi networks.
Ralink supports the configuration and setup using a PIN configuration method or a
PBC configuration method through an internal or external Registrar.
2. WPS AP List: Displays the SSID of the surrounding APs with WPS IE from the last scan
result.
3. PIN: Start to add to Registrar using PIN configuration method. If STA Registrar,
remember that enter PIN Code read from your Enrollee before starting PIN.
4. PIN Code: The user is required to enter an 8-digit PIN Code into Registrar. When an
STA is the Enrollee, you can click or to re-new PIN Code, 8-digit or 4-digit.
5. PIN Entry Method: The station serving as an Enrollee or an external Registrar.
Page 29 of 34
User Manual
6. PBC: Start to add to AP using PBC configuration method.
Page 30 of 34
User Manual
7. Progress Bar: Displays the rate of progress from Start to Connected.
Page 31 of 34
User Manual
4. Advanced Page
The following shows the Advance functions of the utility.
1. User Certificate: Select wireless mode.
2. Issuer Certificate: There are eight countries to choose from in the country channel
list.
Page 32 of 34
5. About Page
User Manual
Page 33 of 34
User Manual
Safety Warnings
For your safety, be sure to read and follow all warning notices and instructions.
Do not open the device. Opening or removing the device can expose you to
dangerous voltage points or other risks. Only qualified service personnel can service
the device. Please contact your vendor for further information.
Do not use your device during a thunderstorm. There may be a risk of electric shock
brought about by lightning.
Do not expose your device to dust or corrosive liquids. Do not use this product near water sources. Do not obstruct the ventilation slots.
Page 34 of 34
Loading...