Dieses Handbuch wurde auf Recycling-Papier gedruckt.
This manual has been printed on recycled paper.
Ce manuel est imprimé sur du papier recyclé.
Este manual ha sido impreso sobre papel reciclado.
Questo manuale è stato stampato su carta da riciclaggio.
Denna handbok är tryckt på recyclingpapper.
Dit handboek werd op recycling-papier gedrukt.
Herausgegeben von/Published by
Fujitsu Siemens Computers GmbH
Bestell-Nr./Order No.: A26391-K133-Z131-1-7619
Ausgabe/Edition 3
Printed in the Federal Republic of Germany
AG 0704 07/04
Wireless LAN (general)
Wireless LAN
User Guide
Installation of Odyssey
Using Odyssey Client
Index
July 2004 edition
Microsoft, MS, MS-DOS, W indows, and Windows NT are registered trademarks of Microsoft
Corporation.
Odyssey is a registered trademark of Funk Software.
All other trademarks referenced are trademarks or registered trademarks of their respective
owners, whose protected rights are acknowledged.
Copyright Fujitsu Siemens Computers GmbH 2004
All rights, including rights of translation, reproduction by printing, copying or similar methods,
in part or in whole, are reserved.
Offenders will be liable for damages.
All rights, including rights created by patent grant or registration of a utility model or design,
are reserved.
Delivery subject to availability. Right of technical modification reserved.
This manual was produced by
cognitas. Gesellschaft für Technik-Dokumentation mbH
www.cognitas.de
Contents
Wireless LAN (general)....................................................................................................................1
Wireless network as per IEEE 802.11 standard.................................................................................1
Ad hoc mode .............................................................................................................................2
Declaration of Conformity ............................................................................................................ 57
Index .............................................................................................................................................. 59
A26391-K133-Z131-1-7619, edition 3
Wireless LAN (general)
A wireless network card is integrated in your device. This User Guide describes how to make the
settings for your wireless LAN.
Notational conventions
The meanings of the symbols and fonts used in this manual are as follows:
Pay particular attention to texts marked with this symbol. Failure to observe this warning
endangers your life, destroys the system, or may lead to loss of data. Failure to follow the
!
instructions may lead to loss of data, invalidate your warranty, destroy the device, or
endanger your life.
Indicates important information which is required to use the system properly.
i
► Text which follows this symbol describes activities that must be performed in the order shown.
Text in this typeface indicates screen outputs.
Text in italics indicates programme names, commands or menu items.
"Quotation marks" indicate names of chapters, disks and other media and terms that are being
emphasised.
Wireless network as per IEEE 802.11 standard
The integrated network card operates in accordance with the IEEE 802.11 standard. Frequencies
from the ISM frequency bands are used as a communication medium (ISM, Industrial, Scientific,
Medical). The wireless network card may be operated without registration and free of charge. The
IEEE 802.11 standard provides several options for using the ISM frequency bands:
IEEE 802.11a 5.0 GHz band 54 Mbit/s
IEEE 802.11b 2.4 GHz band 11 Mbit/s
IEEE 802.11g 2.4 GHz band 54 Mbit/s
The wireless networks operating in accordance with 802.11 can easily be connected to existing
Ethernet networks. With the exception of a few additional parameters, wireless network cards that
operate in accordance with 802.11 are one system with a normal Ethernet card. This means that
you can use all protocols via a 802.11 wireless network just as with a cable-connected Ethernet (IP,
IPX, NetBIOS,...). The only difference is that you need not lay cables between the computers. The
number of all wireless LAN stations that can reach each other directly is generally referred to as a
cell. The IEEE standard offers two operating modes - the ad hoc mode (peer-to-peer) and the
infrastructure mode.
In addition to describing modulation and data framing, this standard includes an authentication and
encryption method called Wired Equivalent Privacy (WEP). Many corporations are deploying
wireless 802.11 networks. 802.11 networks are beginning to appear in hotels, airports, and other
"hotspots" as a means of internet access.
A26391-K133-Z131-1-7619, edition 3 1
Wireless LAN (general)
Ad hoc mode
A wireless LAN in the ad hoc mode, also called peer-to-peer mode, consists of a single closed cell.
Ad hoc wireless networks result when a workgroup comes together with its systems and would like
to interconnect these for data exchange. Any number of systems can be added to this type of
network and can leave it again.
So that several ad hoc wireless networks do not interfere with each other in radio traffic, there is a
unique network name, the SSID (Service Set Identifier). The SSID is used for addressing so that a
data packet can always be assigned to a certain cell.
If you want to join an existing cell, you require the network name (SSID), which you enter in the
settings for the network card. The network card then searches for a wireless network with this SSID
during start-up. When the network card has found a wireless network, it connects to it and you can
communicate with the systems in this wireless network. If two cells are very close together, the radio
channels of these networks should be 4 to 5 channels apart. This applies to 802.11b and 802.11g.
Infrastructure mode
In the infrastructure mode, a base station, referred to as an access point, exists in addition to the
mobile stations. In the infrastructure mode the access point assumes the function of a "guard". In
contrast to the adhoc mode, each system must log on to the AccessPoint before it is allowed to
exchange data in the cell.
Another task of the access point is the connection of the cells with a cable-connected Ethernet. As
due to the logon requirement, the access point knows at all times exactly which stations are on the
radio side, it can decide exactly which data must be sent to it and which don't. This process is also
referred to as bridging.
To increase the range of a wireless network, several access points with the same SSID can be
used.
When a system enters the wireless net, it searches among the reachable access points for the one
with the strongest signal and logs on there. Two systems logged on to different access points
communicate with each other in this way, even when they are not within direct radio reach. If a
system also continuously monitors the radio situation after the logon, it can detect how the signals
from an access point become weaker and those of another become stronger, and can then log on to
the stronger one without the user noticing. This procedure is referred to as roaming.
Operating system requirements
Windows 2000 and Windows XP
2 A26391-K133-Z131-1-7619, edition 3
Wireless LAN (general)
Wireless network names (SSID)
Each wireless network has a name. You can select the wireless network you want to connect to, by
specifying its name. Network names allow different wireless networks in the same vicinity to coexist
without intruding on each other. For example, the company next door to yours may also use wireless
networking, and you want to make sure that your PC connects to your company’s network, and not
the other’s, even though your PC is within range of their access points. (How to prevent intruders
from connecting to your company’s network is the subject of the security discussion, below.) A
network name is simply a text sequence up to 32 characters long, such as "Bayonne Office", or
"Acme-Marketronics", or "BE45789", for example. A network name is case-sensitive, so you have to
be careful if you type it in. You always have the option to scan for available networks. This allows
you select the network from a list, preventing any network naming errors. The 802.11 standard
refers to network names as "Service Set Identifier", or SSID for short.
802.11 network security
With the advent of wireless networking, security becomes a critical concern to a far greater extent
than it had been previously, for the simple reason that it is easy for an attacker to eavesdrop on
such connections. With wired networking, most organisations can rely on physical security to protect
their networks. An attacker would have to get inside a company’s offices to be able to plug in to the
LAN and observe network traffic.
All it takes to observe wireless network traffic is a PC with a wireless card and a comfortable spot in
the parking lot outside or in the office next door. The following are some of the things that are
required to make a wireless network safe:
●A user must be authenticated by the network before he or she is allowed access, to make the
network safe from intruders.
●The network must be authenticated by the user before the user allows his or her PC to connect
to the network. This is to prevent a wireless device posing as a legitimate network from gaining
access to the user’s PC.
●The mutual authentication between user and network must be cryptographically protected.
This insures that you are connecting to the network you want, and not some phony one.
●The wireless connection between a PC and access point must be encrypted, so
eavesdroppers cannot access data that is supposed to be private.
There are two basic mechanisms for providing this type of secure encryption over a wireless
network:
●Preconfigured secrets, called WEP keys. These keep unauthorised users off the wireless
network and encrypt the data of legitimate users.
●Authentication using a protocol called 802.1X. This uses a variety of underlying authentication
protocols to control network access. The strongest of these protocols can provide mutual
authentication of user and network, and can dynamically create keys to encrypt wireless data.
A26391-K133-Z131-1-7619, edition 3 3
Wireless LAN (general)
Wired-Equivalent Privacy (WEP) with preconfigured keys
With preconfigured WEP (Wired-Equivalent Privacy), both the client PC and access point are
assigned the same secret key. This key is used to encrypt all the data between the PC and access
point. In addition, the W EP key can be used to authenticate the client PC to the access point.
Unless the PC can prove it knows the WEP key, it is not allowed onto the network.
●If the access point requires a WEP key for authentication, you must carry out the assignment
to the access point in the Shared mode. The association mode is set in the network properties.
●If the access point does not require a WEP key for authentication, this is referred to as the
"open" mode. The association mode is set in the network properties.
●If the access point requires a WEP encryption for WPA instead of TKIP for the authentication,
all required WEP keys are generated from an ASCII passphrase, which you configure for your
access point and for Odyssey Client.
See the following topics:
●"Specifying association mode", for directions for selecting an association mode in Odyssey
Client
●"Specifying an appropriate encryption method for your association mode", for directions for
selecting WEP encryption when using shared mode
● "Preconfigured keys (WEP)", to use static WEP keys with Odyssey Client
● "Pre-shared keys (WPA)", to configure W EP encryption in W PA mode
Wi-Fi Protected Access (WPA) and TKIP encryption
As an enhancement to the 802.11 wireless standard, Wi-Fi Protected Access (WPA) encompasses
a number of security enhancements over Wired-Equivalent Privacy. These enhancements include
the following:
●Improved data encryption via TKIP (temporal key integrity protocol). TKIP provides stronger
encryption than WEP, by dynamically updating the encryption keys every 10,000 packets.
●802.1X authentication with EAP. If the hardware of the access points in your network requires
that you carry out the authentication via the extended WPA mode, you can configure Odyssey
Client so that the authentication is carried out in the W PA mode. If the hardware is configured
for TKIP encryption, you can configure Odyssey Client for this enhanced data encryption
method as well. In addition to conforming to 802.1X specifications for dynamic key generation
(available with the strongest authentication methods), W PA allows for pre-shared keys to be
generated for TKIP (or WEP) encryption from a passphrase. If you configure a passphrase for
key generation in your access points, you must configure the same passphrase in Odyssey
Client.
4 A26391-K133-Z131-1-7619, edition 3
Wireless LAN (general)
See the following topics:
● "Specifying association mode", to use W PA mode with Odyssey Client
● "Specifying an appropriate encryption method for your association mode", to use TKIP
encryption in WPA mode
●"Pre-shared keys (WPA)" to configure a static passphrase
802.1X standard
The IEEE 802.1X protocol provides authenticated access to a LAN. This standard applies to
wireless as well as wired networks. In a wireless network, the 802.1X authentication occurs after the
802.11 association is implemented. Wired networks use the 802.1X standard without any 802.11
association.
The WEP protocol using preconfigured keys has various shortcomings, both in terms of ease of
administration, as well as security. To alleviate these problems, the IEEE introduced another
standard, 802.1X. 802.1X provides better security than preconfigured WEP keys, and is easier to
deploy, particularly on large networks.
Using preconfigured WEP keys, it is the wireless client PC that is authenticated to the network. W ith
802.1X, it is the user that is authenticated to the network with the user credentials, which may be a
password, a certificate, or a token card. The authentication is not performed by the access point, but
rather by a central server. If this server uses the RADIUS protocol, it is called a RADIUS server.
With 802.1X, a user can log in to the network from any PC, and many access points can share a
single RADIUS server to perform the authentication. This makes it much easier for the network
administrator to control access to the network.
See the following topics for details:
● Extensible Authentication Protocol (EAP)
● Session resumption
● Reauthentication
Extensible Authentication Protocol (EAP)
802.1X uses the protocol called EAP (Extensible Authentication Protocol), to perform authentication.
EAP is not an authentication mechanism per se, but is a common framework for transporting actual
authentication protocols. The advantage of EAP is that the basic EAP mechanism does not have to
be altered as new authentication protocols are developed.
A26391-K133-Z131-1-7619, edition 3 5
Wireless LAN (general)
Important notes
Safety notes
Most of the safety information is contained in the "Getting Started" manual of your device. Some of
the most important information is outlined below.
●Switch off the radio components (Bluetooth or wireless LAN) on the device when you are in a
hospital, an operating room or near a medical electronics system. The transmitted radio waves
can impair the operation of the medical devices.
●The "EasyGuide" manual provided with your device describes how to deactivate the radio
component.
●Keep the device at least 20 cm from a pacemaker, as otherwise the proper operation of the
pacemaker may be impaired by radio waves.
● The transmitted radio waves can cause an unpleasant humming in hearing aids.
● Switch off the device when you are in an aircraft or driving in a car.
● Do not let the device near flammable gases or into hazardous environments (e.g. paintshops)
with radio components switched on, as the transmitted radio waves can cause an explosion or
a fire.
The company Fujitsu Siemens Computers GmbH cannot be held responsible for radio or television
faults arising from unauthorised changes made to this device. Fujitsu Siemens is, furthermore, not
responsible for replacing and / or exchanging connector cables and devices which have not been
specified by Fujitsu Siemens Computers GmbH. The user is solely responsible for repairing faults
arising from such unauthorised changes made to a device and for replacing and/or exchanging
devices.
CE marking
This equipment complies with the requirements of Directive 1999/5/EC of the European Parliament
and Commission from 9 March, 1999 governing Radio and Telecommunications Equipment and
mutual recognition of conformity.
This device is approved for use in Belgium, Denmark, Germany, Finland, Greece, Great Britain,
Ireland, Italy, Luxembourg, the Netherlands, Austria, Portugal, Sweden, Switzerland, Spain, Iceland,
Liechtenstein and Norway. Contact the corresponding government office of the respective country
for current information on possible operating restrictions. If your country is not included in the list,
then please contact the corresponding supervisory authority as to whether the use of this product is
permitted in your country.
6 A26391-K133-Z131-1-7619, edition 3
Wireless LAN (general)
Restrictions
● France
– Limited frequency range: only the channels 10 to 13 (2457 MHz or 2472 MHz) may be
used in France. It is prohibited to use the device outdoors.
● Italy
– A ministerial permit is also required for use indoors. Please contact the seller concerning
the required procedure. It is prohibited to use the device outdoors.
● Netherlands
– A licence is required for use outdoors. Please contact the seller concerning the required
procedure.
Radio frequencies and security standards
The following information represents the status of January 2002. Current information is available
from the corresponding government office of your country (e.g. www.regtp.de).
IEEE standard 802.11a frequencies
Country Channel
36
5180
MHz
AustriaXXXX
BelgiumXXXXXXXX
DenmarkXXXX
FinlandXXXXXXXX
FranceXXXX
GermanyXXXX
Greece
Italy
IrelandXXXXXXXX
Luxembourg
NetherlandsXXXX
NorwayXXXX
PortugalXXXX
Spain
SwedenXXXX
SwitzerlandXXXX
Great BritainXXXXXXXX
Channel
40
5200
MHz
Channel
44
5220
MHz
Channel
48
5240
MHz
Channel
52
5260
MHz
Channel
56
5280
MHz
Channel
60
5300
MHz
Channel
64
5320
MHz
A26391-K133-Z131-1-7619, edition 3 7
Wireless LAN (general)
IEEE standard 802.11b (11 Mbits/s) / 802.11g (54 Mbits/s) frequencies
Wireless network cards and adapters are intended for operation in the ISM (Industrial, Scientific,
Medical) frequency range between 2.4 and 2.4835 GHz in accordance with the IEEE 802.11b
standard. As each of the 13 usable radio channels requires a bandwidth of 22 MHz due to the DSSS
(Direct Sequence Spread Spectrum) process, a maximum of three mutually independent channels
(e.g. 1, 6 and 11) are available. In the following tables you will find the channels permitted in your
country:
Channel No. /
MHz
1 / 2412 X X X
2 / 2417 X X X
3 / 2422 X X X
4 / 2427 X X X
5 / 2432 X X X
6 / 2437 X X X
7 / 2442 X X X
8 / 2447 X X X
9 / 2452 X X X
10 / 2457 X X X X
11 / 2462 X X X X
12 / 2467 X X
13 / 2472 X X
Europe,
R&TTE
France,
R&TTE
US
FCC
CA
RSS-210
8 A26391-K133-Z131-1-7619, edition 3
Installation of Odyssey
The installation software for Odyssey Client is located in the directory C:\Add on\Software.
Before you install, please note the following:
●Your wireless network adapter card and associated driver software should have already been
installed.
●Under Windows 2000 and Windows XP you must have administrator rights.
Installing Odyssey Client
To install Odyssey Client:
► Double-click on the file FSC-OdysseyClient.msi in the directory C:\Add on\Software.
The installation wizard is run to guide you through the installation process.
► Click on Next to continue.
The licence conditions are shown.
► Click on the option I accept the terms in the license agreement to recognise the licence conditions
and click on Next to continue.
► Enter your user data and click on Next to continue.
► Select the Complete option in the Setup Type window to carry out the installation in the default
directory. Select the Custom option if you want to specify the installation directory yourself. This
option should only be used by experienced users. Click on Next to continue.
The installation wizard now has all information required to begin with the installation.
► Click on Back if you want to check or change your entries, and click on Install to start the
installation.
The installation is started. This can take a few minutes. When the installation is completed, the
InstallShield Wizard Completed window will appear. You can run the Odyssey Client immediately or
have the Readme file displayed first.
► Click on Finish to complete the installation.
On a computer with several user accounts, Odyssey Client is available following installation of all
users. However, the settings for control of the Odyssey Client operation are user-specific and must
be carried out for each user account individually.
Configure and Enable Wizard
When you install Odyssey Client for the first time, Configure and Enable Wizard automatically appears
following the installation to complete configuration of and activate Odyssey Client.
If you do not want to carry out the configuration at this time, you can do this later. Start the Odyssey
Client Manager under Start – Programs – Fujitsu Siemens Computers – Odyssey Client for Fujitsu Siemens
Computers – Odyssey Client Manager for Fujitsu Siemens Computers. Configure and Enable Odyssey
Wizard automatically starts up.
A26391-K133-Z131-1-7619, edition 3 9
Using Odyssey Client
Odyssey Client Manager Overview
Odyssey Client for Fujitsu Siemens Computers is the name of the Windows interface of the Odyssey
Client Manager with which you can control and configure your wireless LAN. This interface is
consistent for all Fujitsu Siemens Computers platforms on which you can run the product.
► Start the Odyssey Client Manager under Start – All Programs – Fujitsu Siemens Computers –
Odyssey Client for Fujitsu Siemens Computers – Odyssey Client Manager or double-click on the
Odyssey Client Manager icon in the task bar.
A26391-K133-Z131-1-7619, edition 3 11
Using Odyssey Client
Odyssey Client Manager display
For most network connections, Odyssey Client Manager consists of a number of windows that allow
you to control different aspects of its operation:
● In the Connection window you can control your network connection and view your current
connection status.
● Use the Profiles window to set information that is used when you authenticate, or log in, to the
network, such as your password or certificate.
● Use the Networks window to configure different wireless networks and how you want to connect
to them.
● Use the Trusted Servers window to set certificate and identity information about the servers that
may authenticate you when you connect, to ensure that you are logging in to the network that
you intend.
● The Adapters window lets you configure one or more network adapters (interface cards) for
wireless networks.
All of the windows are listed at the left of the Odyssey Client Manager display. Click the name of any
window to view or modify it.
If you or your administrator has configured more than one adapter for use with Odyssey, then you
can use the Adapter drop-down list in the Connection window to associate any of those adapter cards
with a network connection.
Once you select an adapter, the Adapter type field in the Connection window is updated to reflect the
type of wireless adapter you select.
Connecting to a network
When you connect to a network using a wireless adapter, you specify all the information required for
the connection using an Odyssey Client network definition. In the process, you must also enter the
authentication information you have previously defined in an Odyssey Client profile (see "Adding or
changing profile - "Profile Properties" window" in the "Defining profiles - "Profiles" window" section).
The Connect to network checkbox lets you connect and disconnect from the wireless network. If you
want to be connected to a wireless network, make sure this box is marked.
The drop-down list to the right of Connect to network lets you select a wireless network to connect to.
All networks you have already configured using the Networks window appear in this list.
The network names are shown in square brackets after the network description.
The following symbol is located before the name:
for networks
To connect to a network that you have already configured:
► Select the network you wish to establish the connection to from the selection menu.
► Mark Connect to network, if it is not already marked.
To disconnect from a network, unmark Connect to network.
Scanning for wireless networks
If you travel frequently, you may want to want to authenticate through locally available wireless
networks that you have not already configured. To connect to a wireless network that is not yet
configured, follow these steps:
► Click on Scan in the Connection window.
Odyssey Client surveys the air waves and displays a list of all wireless networks that are currently
reachable.
A26391-K133-Z131-1-7619, edition 3 13
Loading...
+ 47 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.