LogiLink WLO147 User Manual

According to the European WEEE directive, el ectrical and electronic
components must be recycled or disposed apar t from each other.
Otherwise contaminative and hazardous sub stances can pollute our
environment.
You as a consumer are committed by law to di spose electrical and electronic
devices to the producer, the dealer, or pu blic collecting points at the end of the
devices lifetime for free. Particul ars are regulated in national right. The symbol
on the product, in the user's manual, or at t he packaging alludes to these
terms. With this kind of waste separation, application, and waste disposal of
used devices you achieve an important s hare to environmental protection.
Contents
Chapter I: Product Information ............................................................ 3
1-1 Introduction and safety information ....................................................... 3
1-2 Safety Information .................................................................................... 4
1-3 System Requirements .............................................................................. 5
1-4 Package Contents ..................................................................................... 6
1-5 Familiar with your new wireless network card ...................................... 7
CHAPTER II: DRIVER INSTALLATI ON AND CONFIGURATION ......... 8
2-1 Network Card Installation ........................................................................ 8
2-2 Connect to Wireless Access Point ....................................................... 13
2-2-1 Using Ralink Utility .......................................................... 15
2-2-1 Using Windows Zero Configuration .............................. 20
Chapter III: Ralink Wireless Utility ......................................................... 24
3-1 Profile ....................................................................................................... 24
3-2 Network .................................................................................................... 29
3-3 Advanced ................................................................................................. 33
3-4 Statistics .................................................................................................. 34
3-5 WMM ........................................................................................................ 37
3-5 WPS .......................................................................................................... 38
3-6-1 WPS Setup - PBC (Push-B utton Configuration) ................ 42
3-6-2 WPS Setup - PIN.................................................................... 46
3-7 Radio on/off ............................................................................................. 48
~ 1 ~
3-8 About ........................................................................................................ 49
CHAPTER IV: Soft-AP Function ......................................................... 50
4-1 Switch to AP Mode and Basic Configuration ...................................... 51
4-2 Security Settings .................................................................................... 56
4-3 802.1x Setting.......................................................................................... 63
4-4 Access Control ....................................................................................... 63
4-5 Connection table ..................................................................................... 65
4-6 Event Log ................................................................................................ 67
4-7 Statistics .................................................................................................. 68
CHAPTER II V: APPENDIX ................................................................. 69
5-1 Hardware Specification .......................................................................... 69
5-2 Troubleshooting ..................................................................................... 70
5-3 Glossary .................................................................................................. 72
5-4 FCC and Other Compliance Statements .............................................. 77
~ 2 ~
Chapter I: Product Information
1-1 Introduction and safety information
Thank you for purchasing this high-speed 802.11n/g/b wireless network card! Excepting common wireless standards 802.11b/g, this wireless network card is also 802.11 N compatible - data transfer rate is 300Mbps, and that’s six times faster than 802.11g wireless network! 802.11 N also provides wider wireless coverage, so you don’t have to worry if your computer is far from your wireless access point. This wireless network card also supports MIMO (Multi-In, Multi-Out) technology, which uses two different radio channels to enhance data transfer rate and wireless coverage.
With easy-to-install USB 2.0 interface - a very common expansion port of computers - plug this wireless network card into any empty USB port of your computer, just that simple!
Other features of this router including:
High-efficiency antenna, expands the scope of your wireless
network.
QoS function: control the bandwidth required for different
applications.
802.11n/g/b compatible.
Supports major encryption methods like WEP, WPA, and WPA2
encryption.
USB 2.0 interface - you can get it installed on your computer in
just few seconds!
Wireless access control - prevent unauthorized network access
to your network and computer.
~ 3 ~
1-2 Safety Information
In order to keep the safety of users and your properties, please follow the following safety instructions:
1. This USB wireless network card is designed for indoor use only. DO NOT expose this network card to direct sun light, rain, or snow.
2. DO NOT put this network card at or near hot or humid places, like kitchen or bathroom. Also, do not left this wireless network card in the car in summer.
3. This network card is small enough to put in a child’s mouth, and it could cause serious injury or could be fatal. If they throw the network card, the card will be damaged. PLEASE KEEP THIS NETWORK CARD OUT THE REACH OF CHILDREN!
4. This network card will become hot when being used for long time (This is normal and is not a malfunction). DO NOT put the network card on a paper, cloth, or other flammable objects after the network card has been used for a long time.
5. There’s no user-serviceable part inside the network card. If you found that the network card is not working properly, please contact your dealer of purchase and ask for help. DO NOT disassemble the network card by your self, warranty will be void.
6. If the network card falls into water, DO NOT USE IT AGAIN
BEFORE YOU SEND THE CARD TO THE DEALER OF PURCHASE FOR INSPECTION.
7. If you smell something strange or even see some smoke coming out from the network card, switch the computer off immediately, and call dealer of purchase for help.
~ 4 ~
1-3 System Requirements
An empty USB 2.0 port (May not work on USB 1.1 port, and
performance will be greatly reduced)
Windows 2000, 2003, XP, Vista or Windows 7 operating system
CD-ROM drive
At least 100MB of available disk space
~ 5 ~
1-4 Package Contents
Before you starting to use this wireless network card, please check if there’s anything missing in the package, and contact your dealer of purchase to claim for missing items:
5
3
2
1. W ireless N USB2.0 Adapter x 1
2. Protection Cap x 1
3. USB Cable x 1
4. Quick Installation Guide x 1
5. CD ROM (Driver + User Manual) x 1
~ 6 ~
4
1
1-5 Familiar with your new wireless network card
1. USB Connector
2. Connector Cap (To protect USB connector when not in use)
3. Link/Activity LED
2
LED Name Light
Link/ Activity
1
Status
On Linked to a wireless access point /
Description
Transferring data
3
Off No wireless activity
~ 7 ~
CHAPTER II: DRIVER INSTALLATION AND
CONFIGURATION
2-1 Network Card Installation
Please follow the following instructions to install your new wireless network card:
1. Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on. Never use force to insert the card, if you feel it’s stuck, flip the card over and try again.
~ 8 ~
2. The following message will appear on your computer, click ‘cancel’.
3. Please insert the AUTORUN CD into your CD-ROM drive. The CD should auto-start, displaying the following window. If it does not start, click on Start-Run and type in CD: \autorun.exe (where CD is the drive letter of your CD-ROM drive.) Click "Driver Installation".
~ 9 ~
4. You can choose the configuration tool used to configure the wireless network card here, or only install driver.
~ 10 ~
5. There are two configuration tool you can select here: Ralink Configuration Tool or Microsoft Zero Configuration Tool It’s recommended to select ‘Ralink Configuration Tool’, which provides fully access to all function of this wireless network card. If you prefer to use the wireless configuration tool provided by Windows XP or Vista, please select ‘Microsoft Zero Configuration Tool’, then click ‘Next’.
6. The following message will appear on your computer, click ‘install’.
~ 11 ~
7. Please wait while the install procedure is running. When you see this message, please click ‘Finish’ to complete the driver installation process.
A new icon will appear at lower-right corner of your computer desktop, you can put the mouse cursor on the icon, and the status of wireless card will be displayed as a popup balloon.
~ 12 ~
2-2 Ralink Utility and Windows Zero Configuration
Windows XP includes a wireless configuration utility named "Windows Zero configuration" (WZC) which provides basic configuration functions to the Ralink Wireless NIC. Ralink's utility (RaUI) additionally provides WPA functionality. To make it easier for the user to select the correct utility.
you can start config utility again by clicking ‘Ralink Wireless Utility’ icon from ‘Start’ -> ‘All Programs’ -> ‘Ralink Wireless’, as shown below.
~ 13 ~
RaUI can co-exist with WZC. When coexisting with WZC, RaUI only provides monitoring functions, such as surveying the link status, network status, statistic counters, advanced feature status, WMM status and WPS status. It won't interfere with WZC's configuration or profile functions.
~ 14 ~
2-2-1 Using Ralink Utility
Please follow the following instructions to use Ralink configuration utility to connect to wireless access point.
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click ‘Launch Config Utilities’.
2. Configuration utility will scan for all wireless access points automatically. Scan results will be displayed here, please check if the wireless access point with the SSID (the name of wireless access point) you preferred is shown here. If the wireless access point you wish to connect does not show here, please click ‘Rescan’ to try again, until the one you preferred is displayed. You may have to click ‘Rescan’ for more than two times before you can see the access point you wish to use here sometimes.
~ 15 ~
3. Select the SSID of the AP to be connected, press the “connect”.
4. The Ralink Utility, will detect the pattern of security encryption
requires a password, and click “OK”
to complete the set.
~ 16 ~
5. The Ralink Utility connection is successful.
6. You can save multiple profiles, and activate the correct one at your preference. If you want to click new profile, then click ‘Add to Profile’ button.
Here are descriptions of every setup items: Profile Name: The user can chose any name for this profile, or use the default name defined by system. SSID: The user can key in the intended SSID name or select one of the available APs from the drop-down list.
~ 17 ~
7. Now click ‘Auth. \ Encry.’ tab, and set the encryption and authentication settings.
~ 18 ~
8. After you finish all settings, click ‘OK’ to save settings and exit. The profile you just created will be displayed:
~ 19 ~
2-2-2 Using Windows Zero Configuration
Windows XP and Vista has a built-in wireless network configuration utility, called as ‘Windows Zero Configuration’ (WZC). You can also use WZC to configure your wireless network parameter:
1. Right-click Ralink configuration utility icon and select ‘Use Zero Configuration as Configuration utility.
2. Click ‘Start’ button (should be located at the bottom-left corner of windows desktop), click ‘Control Panel’, then click ‘Network and Internet Connections’ in Control Panel.
~ 20 ~
3. Click ‘Connect to a network’ under ‘Network Connections’
4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘Ralink 802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’.
~ 21 ~
5. All wireless access points in proximity will be displayed here. If the access point you want to use is not displayed here, please try to move your computer closer to the access point, or you can click ‘Refresh network list’ to rescan access points. Click the access point you want to use if it’s shown, then click ‘Connect’.
6. If the access point is protected by encryption, you have to input its security key or passphrase here. It must match the encryption setting on the access point.
If the access point you selected does not use encryption, you’ll not be prompted for security key or passphrase.
~ 22 ~
7. If you can see ‘Connected’ message, the connection between your computer and wireless access point is successfully established.
~ 23 ~
Chapter III: Ralink Wireless Utility
3-1 Profile
The Profile List keeps a record of your favorite wireless settings at home, office, and other public hot-spots. You can save multiple profiles, and activate the correct one at your preference.
Definition of each field:
Profile Name: Name of profile, preset to PROF* (* indicate 1, 2,
3...).
SSID: The access point or Ad-hoc name.
Network Type: Indicates the networks type, including infrastructure and Ad-Hoc.
~ 24 ~
Authentication: Indicates the authentication mode used.
Encryption: Indicates the encryption Type used.
Use 802.1x: Shows if the 802.1x feature is used or not.
Tx Power: Transmitting power, the amount of power used by a radio transceiver to send the signal out.
Cannel: Channel in use for Ad-Hoc mode.
Power Save Mode: Choose from CAM (Constantly Awake Mode) or Power Saving Mode.
RTS Threshold: Users can adjust the RTS threshold number by sliding the bar or keying in the value directly.
Fragment Threshold: The user can adjust the Fragment threshold number by sliding the bar or key in the value directly.
Icons and buttons:
: Indicates if a connection made from the currently activated
profile.
: Indicates if the connection has failed on a currently activated
profile.
: Indicates the network type is infrastructure mode.
: Indicates the network type is in Ad-hoc mode.
~ 25 ~
: Indicates if the network is security-enabled.
: Shows information of the related status section.
: Hides information of the related status section.
: Click to add a new profile.
: Click to edit an existing profile.
: Deletes an existing profile.
: Activates the selected profile.
Add/Edit Profile:
There are three methods to open the Profile Editor dialog box.
1. You can open it by clicking the "Add to Profile" button in the Network tab.
2. You can open it by clicking the "Add" button in the Profile tab.
3. You can open it by clicking the "Edit" button on the Profile tab.
~ 26 ~
Profile Name: The user can chose any name for this profile, or use the default name defined by system.
SSID: The user can key in the intended SSID name or select one of the available APs from the drop-down list.
Power Save Mode: Choose CAM (Constantly Awake Mode) or Power Saving Mode.
Network Type: There are two types, infrastructure and 802.11 Ad-hoc mode. Under Ad-hoc mode, user can also choose the preamble type. The available preamble type includes auto and long. In addition, the channel field will be available for setup in Ad-hoc mode.
RTS Threshold: User can adjust the RTS threshold number by sliding the bar, or key in the value directly. The default value is
2347.
Fragment Threshold: User can adjust the Fragment threshold number by sliding the bar or key in the value directly. The default value is 2346.
Channel: Only available for setting under Ad-hoc mode. Users can choose the channel frequency to start their Ad-hoc network.
~ 27 ~
Authentication Type: There are 7 type of authentication modes supported by RaUI. They are open, Shared, LEAP, WPA and WPA-PSK, WPA2 and WPA2-PSK.
Encryption Type: For open and shared authentication mode, the selection of available encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, both TKIP and AES encryption is available.
802.1x Setting: 802.1x is used for authentication of the "WPA" and
"WPA2" certificate by the server.
Pre-shared Key: This is the key shared between the AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with a key between 8 and 32 characters in length.
WEP Key: Only valid when using WEP encryption algorithms. The key must be identical to the AP's key. There are several formats to enter the keys.
1. Hexadecimal - 40bits : 10 Hex characters.
2. Hexadecimal - 128bits : 26 Hex characters.
3. ASCII - 40bits : 5 ASCII characters.
4. ASCII - 128bits : 13 ASCII characters.
~ 28 ~
3-2 Network
The system will display the information of local APs from the last scan result as part of the Network section. The Listed information includes the SSID, BSSID, Signal, Channel, Encryption algorithm, Authentication and Network type.
Definition of each field :
SSID: Name of BSS or IBSS network.
Network Type: Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network.
Channel: Channel in use.
Wireless Mode: AP support wireless mode. It may support 802.11a,
802.11b, 802.11g or 802.11n wireless mode.
Security-Enable: Indicates if the AP provides a security-enabled wireless network.
Signal: Receive signal strength of the specified network.
~ 29 ~
Icons and buttons :
: Indicates that the connection is successful.
: Indicates the network type is in infrastructure mode.
: Indicates the network type is in Ad-hoc mode.
: Indicates that the wireless network is security-enabled.
: Indicates 802.11a wireless mode.
: Indicates 802.11b wireless mode.
: Indicates 802.11g wireless mode.
: Indicates 802.11n wireless mode.
: Indicates that the AP list is sorted by SSID, Channel or Signal.
update information on the surrounding wireless network.
: Button to connect to the selected network.
: Issues a rescan command to the wireless NIC to
~ 30 ~
bring up a profile page and save the user's setting to a new profile.
: Adds the selected AP to the Profile setting. It will
: Shows the Status Section.
: Hides the Status Section.
~ 31 ~
3-3. Advanced
Wireless mode: Select wireless mode. 2.4G, 5G and 2.4+5G are supported.
Wireless Protection: Users can choose from Auto, On, and Off. (This is not supported by 802.11n adapters.)
Auto: STA will dynamically change as AP announcement.
On: The frames are always sent with protection.
Off: The frames are always sent without protection.
TX Rate: Manually select the transfer rate. The default setting is auto. (802.11n wireless cards do not allow the user to select the TX Rate.)
~ 32 ~
Enable TX Burst: Ralink's proprietary frame burst mode.
Enable TCP Window Size: Optimise the TCP window size to allow for greater throughput.
Fast Roaming at-: enables fast roaming, which is set by the transmit power.
Select Your Country Region Code: There are eight countries to choose from in the country channel list. (11A ListBox only shows for 5G adapter.)
Show Authentication Status Dialog: When you connect to an AP with authentication, choose whether show the "Authentication Status Dialog" or not. The Authentication Status Dialog displays the processes during 802.1x authentication.
~ 33 ~
3-4. Statistics
The Statistics page displays detailed counter information based on
802.11 MIB counters. This page translates that MIB counters into a
format easier for the user to understand.
Transmit Statistics:
Frames Transmitted Successfully: Frames successfully sent.
Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting retry limit.
RTS Frames Successfully Receive CTS: Successfully receive CTS after sending RT S frame.
RTS Frames Fail To Receive CTS: Failed to receive CTS after sending RTS.
~ 34 ~
Frames Retransmitted Successfully: Successfully retransmitted frames numbers.
Reset counters to zero.
Receive Statistics:
Frames Received Successfully: The number of frames successfully received.
Frames Received With CRC Error: The number of frames received with a CRC error.
Frames Dropped Due To Out-of-Resource: The number of frames dropped due to a resource issue.
~ 35 ~
Duplicate Frames Received: The number of duplicate frames received.
Reset all the counters to zero.
~ 36 ~
3-5. WMM
The WMM involves "WMM Enable", "WMM - Power Save Enable" and DLS setup. The introduction indicates as follow :
Direct Link Setup Enable : Enable DLS (Direct Link Setup).
WMM Enable : Enable Wi-Fi Multi-Media.
WMM - Power Save Enable : Enable WMM Power Save.
~ 37 ~
3-6. WPS
WPS Configuration: The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. Ralink STA supports the configuration and setup using a PIN configuration method or a PBC configuration method through an internal or external Registrar.
WPS AP List: Displays the information of the surrounding APs with WPS IE from the last scan result. The detailed information includes the SSID, BSSID, Channel, ID (Device Password ID), Security-Enabled.
Rescan: Issues a rescan command to the wireless NIC to update information on the surrounding wireless network.
~ 38 ~
Information: Displays the information about WPS IE on the selected network. The detailed list includes the Authentication Type, Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands.
PIN Code: The user is required to enter an 8-digit PIN Code into Registrar. When an STA is the Enrollee, you can click "Renew" to re-generate a new PIN Code.
Config Mode: The station serving as an Enrollee or an external Registrar.
Table of Credentials: Displays all credentials obtained by the Registrar. The detailed list includes information about the SSID, MAC Address, Authentication and Encryption Type. If STA is the Enrollee, the credentials are created immediately with each WPS success. If STA is the Registrar, RaUI creates a new credential with WPA2-PSK/AES/64Hex-Key and doesn't change this until switching to STA Registrar.
Control items for credentials.
1. Detail: Command to obtain Information about Security and the Key in the credential.
2. Connect: Command to connect to the selected network inside credentials. The active selected credential is as like as the active selected Profile.
3. Rotate: Command to rotate to connect to the next network inside credentials.
4. Disconnect: Stops the WPS action and disconnects the active link. It then selects the most recent profile on the Profile Page of RaUI. If there are no profiles, the driver will select any non-security AP.
~ 39 ~
5. Export Profile: Exports all credentials to a Profile.
6. Delete: Deletes an existing credential. And then selects the next credential. If there is not another credential, the driver will select any non-security AP.
PIN: Start to add to Registrar using PIN configuration method. If STA Registrar, remember that enter PIN Code read from your Enrollee before starting PIN.
PBC: Start to add to AP using PBC configuration method.
After the user clicks PIN or PBC, please do not rescan within two-minutes of the connection. If you want to abort this setup within the interval, restart PIN/PBC or click "Disconnect" to stop WPS action.
WPS associate IE: Sends the association request with WPS IE during the WPS setup. It is optional for STA.
WPS probe IE: Sends the probe request with WPS IE during WPS setup. It is optional for STA.
Progress Bar: Displays the rate of progress from Start to Connected.
Status Bar: Displays the current WPS Status.
Automatically select the AP: Starts to add to AP by using to select the AP automatically in PIN method.
~ 40 ~
WPS Configuration
Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes wireless network setup become very simple. If you have WPS-enabled wireless access point, and you want to establish a secure connection to it, you don’t have to configure the wireless access point and setup data encryption. All you have to do is go to the WPS setup page of this wireless card, click a button, and then press a specific button on the wireless access point you wish to establish a secure connection - just three simple steps!
For older wireless access points, it’s possible to perform a firmware upgrade to become a WPS-enabled access point. Since they may not have a hardware button to press for WPS setup, you can use an alternative WPS setup method – input the pin code. Every WPS-compatible wireless network card comes with a unique WPS pin code; you can just input the code to wireless access point, and the wireless access point and wireless network card will do the rest for you.
This wireless network card is compatible with WPS. To use this function, the wireless access point you wish to connect to must support WPS function too. Now, please follow the following instructions to establish secure connection between WPS-enabled wireless access point and your wireless network card:
~ 41 ~
3-6-1 WPS Setup - PBC (Push-Button Configuration)
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click ‘Launch Config Utilities’.
2. Click ‘WPS’ tab, and the following settings will appear:
~ 42 ~
3. Set ‘Config Mode’ to ‘Enrollee’, and then push the ‘WPS’ button on your wireless access point (the button used to activate WPS standby mode may have another name), or use other way to start WPS standby mode as the instruction given by your wireless access point’s user manual.
4. Before you start to establish the wireless connection by using WPS, you can click ‘Rescan’ button to search for WPS-enabled access points near you, to make sure the WPS function of your access point is activated.
All access points with WPS function enabled will be displayed. Please make sure the access point you wish to connect is displayed. If not, please click ‘Rescan’ few more times. You can also click ‘Information’ button to see the detailed information about selected access point.
~ 43 ~
5. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s manufacturer), then click ‘PBC’ button in wireless configuration utility to start to establish wireless connection by WPS. Please be patient (This may require several seconds to one minute to complete). When you see ‘WPS status is connected successfully’ message, means the connection between your wireless network card and access point is successfully connected by WPS, and the information about access point you connected to will be displayed.
Sometime WPS may fail, and you can click ‘PBC’ button few more times to try again. When an access point is connected, you can click ‘Disconnect’ to disconnect your wireless network card from a connected access point, or select another WPS-enabled wireless access point, then click ‘Connect’ to establish connection to selected access point, if there are more than one WPS-enabled
~ 44 ~
access point found. You can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection.
If you want to delete a found access point from the list, select it and click ‘Delete’ button.
~ 45 ~
3-6-2 WPS Setup - PIN
If the wireless access point you wish to connect supports PIN, please follow the following instructions to establish connection to it:
1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click ‘Launch Config Utilities’.
2. Click ‘WPS’ tab, and the following settings will appear:
~ 46 ~
The PIN number of your wireless network card is an eight-digit number located at the upper-right position of configuration utility. Remember it, and input the number to your wireless access point
as the WPS PIN code (Please refer to the user manual of your wireless access point for instructions about how to do this).
Note: The PIN code of every wireless network card is
DIFFERENT. Please don’t use the sample code shown here.
3. Click ‘PIN’ button now, and wait for few seconds to one minute. If a wireless access point with correct PIN code is found, you’ll be connected to that access point:
You may have to click ‘PIN’ for few more times to try again. If you still can not connect to access point by this way, please make sure the PIN code you provided to access point is correct.
~ 47 ~
3-7. Radio on/off
Radio On: Click to turn the wireless radio ON.
Radio Off: Click to turn the wireless radio OFF.
~ 48 ~
3-8. About
The ‘About’ tab provides you the information about version numbers of configuration utility, firmware, and other important information about your wireless network card.
If you need assistance about network problem, you’ll need these values. You can also click ‘WWW.RALINKTECH.COM’ button to go to the web site of network card driver manufacturer and get more information about your wireless network card.
Please click ‘OK’ to close configuration utility.
~ 49 ~
CHAPTER IV: Soft-AP Function
Excepting become a wireless client of other wireless access points, this wireless card can act as a wireless service provider also! You can switch this wireless card’s operating mode to ‘AP’ mode to simulate the function of a real wireless access point by software, and all other computers and wireless devices can connect to your computer wirelessly, even share the internet connection you have!
Please follow the instructions in following chapters to use the AP function of your wireless card.
~ 50 ~
4-1 Switch to AP Mode and Basic Configuration
The operating mode of the wireless card is ‘Station Mode’ (becoming a client of other wireless access points) by default. If you want to switch to AP mode, please right-click Ralink utility icon, and select ‘Switch to AP Mode’.
After you select ‘Switch to AP Mode’, the Ralink utility icon will change:
Which indicated the wireless card is operating in AP mode now. If you want to switch the wireless card back to station mode (become a client of other wireless access points), click ‘Switch to Station Mode’.
A configuration window will appear after you switch the operation mode to ‘AP’ or click ‘Launch Config Utilities’ after you right-click the Ralink configuration utility, which asks you to assign an existing network card with internet connection:
~ 51 ~
If your computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’; if your computer does not have another network card with Internet connection, please click ‘Not enable ICS’.
After you click ‘Enable ICS’ or ‘Not enable ICS’, you’ll see the basic configuration menu of the AP function:
~ 52 ~
Here are descriptions of every setup items:
SSID Please input the SSID (the name used to this identify wireless access point) here. Up to 32 numerical
TX Rate Please select the data transfer rate here. The
characters can be accepted here, excepting space.
maximum TX rate you can select here depends on the wireless mode you’re using. It’s safe to select ‘Auto’ to let wireless card select a proper TX rate according to the strength and quality of radio signal. When the wireless mode is set to ‘802.11 B/G/N Mix’, TX Rate will be set to ‘Auto’ and cannot be changed.
~ 53 ~
Channel Please select the wireless channel you wish to
Wireless Mode Please select the wireless operating mode. You
Use Mac Click this button to use the MAC address of the Address wireless card as SSID. A prefix of ‘AP’ will be
Security Set the security options (wireless data Setting encryption).
Country Available options are 0-7, which will affect the Region Code available wireless channels you can use:
Wireless Wireless protection will prevent data collision
use. The number of channels available here will vary depends on the setting of ‘Country Region Code’.
can limit the type of wireless client to 802.11b or
802.11g only, or allow 802.11b/g, and
802.11b/g/n clients. It’s safe to select ‘802.11 B/G/N mix’ to allow all kinds of wireless client to connect to your computer, unless you want to limit the type of wireless client allowed to connect to your computer.
added.
0: FCC (US, Canada, and other countries uses FCC radio communication standards) 1: ETSI (Europe) 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISERAL (Channel 3 to 9) 7: ISERAL (Channel 5 to 13)
The operating frequency channel will be restricted to the country / region user located before importing.
~ 54 ~
Protection when there are both 802.11b and 802.11g
Beacon(ms) You can define the time interval that a beacon
Idle Time Select the idle time of your wireless network
No forwarding Check this box and wireless clients will not be among wireless able to share data with each other. clients
Hide SSID Check this box and the SSID will not be
Allow BW Check this box to allow BW 40MHz capability. 40 MHz
Default Click this button to restore all settings in this
Apply Click this button to activate current settings.
To exit, click ‘X’ button at the upper-right corner of configuration window.
clients. You can select ‘Auto’ to let configuration utility to decide to use wireless protection or not. You can also select ‘ON’ or ‘OFF’ to force the use of wireless protection or not.
signal should be send. Default value is 100. Do not modify this value unless you know what will be affected.
card. Default value is 300. Do not modify this value unless you know what will be affected.
broadcasted to the public. Your wireless clients must know the exact SSID to be able to connect to your computer. This option is useful to enhance security level.
page back to default value.
~ 55 ~
4-2 Security Settings
This wireless card supports wireless encryption in AP mode, which will encrypt the data being transferred over the air to enhance data security level. It’s recommended to enable data encryption unless you wish to open your computer (and its internet connection) to the public.
When you click ‘Security Setting’ in Ralink configuration utility, the following window will appear:
Here are descriptions of every setup items:
Authentication Please select a wireless authentication type you Type wish to use. Available options are ‘Open’,
Encryption Please select an encryption mode. The Available options in this setting item will vary depending Type on the authentication type you select. If you
‘Shared’, ‘WPA-PSK’, ‘WPA2-PSK’, and ‘WPA-PSK / WPA2-PSK’. If you want to disable wireless data encryption, you must select ‘Open’ or ‘Shared’.
select ‘Not Use’, data will not be encrypted and people with some networking knowledge will be able to read the data you transfer with proper tool.
~ 56 ~
Note: WPA encryption is safer than WEP, however, some older wireless clients don’t
WPA Pre-shared Please input the WPA pre-shared key here. Key Only clients with the same pre-shared key you
Group Rekey You can specify the time interval to re-issue the Interval key to your wireless clients here. You can click
Wep Key Please input the WEP encryption key here #1 ~ #4 when you select ‘WEP’ as encryption type.
Show Password Check this box and the WPA pre-shared key or
support WPA encryption.
inputted here will be able to connect to your computer. This setting is only available when you select one of WPA encryptions.
the button ’10 seconds’ or ‘Kpackets’ to change the unit of time interval. (every 10 seconds or a thousand data packets times the value you specified in ‘Group Rekey Interval’ field)
There are 2 types of WEP key: Hex (number 0 to 9, and ASCII characters A to F) and ASCII (all alphanumerical characters plus symbols). Please select the type of WEP key first, and then input the WEP key according to the type of WEP key you selected.
If you want to use WEP 64 bits encryption, please input 10 characters if you select HEX, or input 5 characters if you select ASCII; If you want to use WEP 128bits encryption, please input 26 characters if you select HEX, or input 13 characters if you select ASCII. 128 bits encryption is safer then 64 bits, but the data transfer speed will be slightly reduced.
WEP key you inputted will be shown, but not
~ 57 ~
OK Click this button to save changes you made in
Cancel Click this button to discard all changes you
replaced by asteri sk (*).
this page.
made in this window.
~ 58 ~
4-3 802.1x Setting
802.1x is used for authentication of the "WPA" and "WPA2"
certificate by the server.
Authentication type:
PEAP: Protect Extensible Authentication Protocol. PEAP
transport securely authenticates data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN.
TLS/Smart Card: Transport Layer Security. Provides for
certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications between the WLAN client and the access point.
TTLS: Tunneled Transport Layer Security. This security
method provides for certificate-based, mutual authentication of the client and network through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side certificates.
~ 59 ~
EAP-FAST: Flexible Authentication via Secure Tunneling. It
was developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be supplied (distributed one time) to the client either manually or automatically. Manually, it is delivered to the client via disk or a secured network distribution method. Automatically, it is supplied as an in-band, over the air, distribution. For tunnel authentication, only support "Generic Token Card" authentication.
LEAP: Light Extensible Authentication Protocol is an EAP
authentication type used primarily by Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication.
MD5-Challenge: Message Digest Challenge. Challenge is an
EAP authentication type that provides base-level EAP support. It provides for only one-way authentication - there is no mutual authentication of wireless client and the network.
Session Resumption: The user can choose "Disable" and "Enable".
Tunnel Authentication:
Protocol: Tunnel protocol, List information include
"EAP-MSCHAP v2", "EAP-TLS/Smart card", "Generic Token Card", "CHAP", "MS-CHAP", "MS-CHAP-V2", "PAP" and "EAP-MD5".
Tunnel Identity: Identity for tunnel.
Tunnel Password: Password for tunnel.
~ 60 ~
ID \ PASSWORD:
Authentication ID/Password: The identity, password and
domain name for server. Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain names can be keyed in the blank space.
Tunnel ID/Password: Identity and Password for the server.
Client Certification:
Use Client certificate: Client certificate for server authentication.
EAP Fast
~ 61 ~
Allow unauthenticated provision mode: During the PAC can be
provisioned (distributed one time) to the client automatically. It only supported "Allow unauthenticated provision mode" and use "EAP-MSCHAP v2" authentication to authenticate now. It causes to continue with the establishment of the inner tunnel even though it is made with an unknown server.
Use protected authentication credential: Using PAC, the
certificate can be provided to the client manually via disk or a secured network distribution method.
Server Certification
Certificate issuer: Select the server that issues the certificate.
Allow intermediate certificates: It must be in the server
certificate chain between the server certificate and the server specified in the "certificate issuer must be" field.
Server name: Enter an authentication sever root.
~ 62 ~
4-4 Access Control
If you’re not going to open your computer and wireless resources to the public, you can use MAC address filtering function to enforce your access control policy, so only wireless clients with MAC address you defined by this function can be connected to your software access point.
Please follow the following instructions to set access control based on MAC address:
1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’
2. Click ‘Access Control’ tab, and the following messages will appear:
~ 63 ~
Here are descriptions of every setup items:
Access Policy Select the policy type of your access rule:
MAC address Input the MAC address of the wireless client
Add Add the MAC address you inputted in ‘MAC
Delete Please select a MAC address from the list, then Click ‘Delete’ button to remove it.
Remove All Delete all MAC addresses in the list.
Apply Save and apply changes you made.
Disable: Allow any wireless client with proper authentication settings to connect to this access point.
Allow All: Only allow wireless clients with MAC address listed here to connect to this access point.
Reject All: Reject wireless clients with MAC address listed here to be connected to this access point.
you you wish to allow or reject here. No colon (:) or hyphen (-) required.
address’ field to the list.
~ 64 ~
4-5 Connection table
If you want to see the list of all wireless clients connected to this access point, please follow the following instructions:
1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’
2. Click ‘Mac Table’ tab, and a list containing all connected wireless clients will appear:
~ 65 ~
Here are descriptions of every fields:
MAC Address Displays the MAC address of this wireless client.
AID The serial number of this wireless connection.
Power Saving Displays the capability of power-saving function Mode of this wireless client.
Status Displays additional information of this wireless mode Connection, like current wireless operating and
data transfer rate.
~ 66 ~
4-6 Event Log
This software access point will log all wireless-related activities as a log. You can follow the following instructions to view the content of the event log:
1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’
2. Click ‘Event Log’ tab, and the event log will be displayed:
You can click ‘Clear’ to remove all entries in the log.
~ 67 ~
4-7 Statistics
If you want to know detailed information about how your software access point works, you can follow the following instructions to view the statistics of the access point:
1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’
2. Click ‘Statistics’ tab, and the event log will be displayed:
You can click ‘RESET COUNTERS’ button to reset all counters to zero.
~ 68 ~
CHAPTER IIV: APPENDIX
5-1 Hardware Specification
Standards: IEEE 802.11n/g/b
Interface: USB 2.0 (USB 1.1 Compatible)
Frequency Band: 2.4000 ~ 2.4835GHz (Industrial Scientific
Medical Band)
Data Rate: 11b: 1/2/5.5/11Mbps
Securities: WEP 64/128, WPA, WPA2, Cisco CCX Support
Antenna: Internal 2 Antennas with Two TX and Two RX
Drivers: Windows 2000/XP/2003/Vista Server/7
LEDs: Link/Activity
Temperature: 32~131°F (0 ~ 55°C)
Humidity: 10-95% (NonCondensing)
Certification: FCC, CE
11g: 6/9/12/24/36/48/54Mbps
11n (20MHz): MCS0-15, 32 with Half Guard Interval Support (up to 144Mbps)
11n (40MHz): MCS0-15, 32 with Half Guard Interval Support (up to 300Mbps)
~ 69 ~
5-2 Troubleshooting
If you encounter any problem when you’re using this wireless network card, don’t panic! Before you call your dealer of purchase for help, please check this troubleshooting table, the solution of your problem could be very simple, and you can solve the problem by yourself!
Scenario Solution I can’t find any wireless access point / wireless device in ‘Site Survey’ function.
Nothing happens when I click ‘Launch config utilities’
1. Click ‘Rescan’ for few more times and see if you can find any wireless access point or wireless device.
2. Please move closer to any known wireless access point.
3. ‘Ad hoc’ function must be enabled for the wireless device you wish to establish a direct wireless link.
4. Please adjust the position of network card (you may have to move your computer if you’re using a notebook computer) and click ‘Rescan’ button for few more times. If you can find the wireless access point or wireless device you want to connect by doing this, try to move closer to the place where the wireless access point or wireless device is located.
1. Please make sure the wireless network card is inserted into your computer’s USB port. If the Ralink configuration utility’s icon is black, the network card is not detected by your computer.
2. Reboot the computer and try again.
3. Remove the card and insert it into another USB port.
4. Remove the driver and re-install.
5. Contact the dealer of purchase for help.
~ 70 ~
I can not establish connection with a certain wireless access point
The network is slow / having problem when transferring large files
1. Click ‘Connect’ for few more times.
2. If the SSID of access point you wish to connect is hidden (nothing displayed in ‘SSID’ field in ‘Site Survey’ function), you have to input correct SSID of the access point you wish to connect. Please contact the owner of access point to ask for correct SSID.
3. You have to input correct passphrase / security key to connect an access point with encryption. Please contact the owner of access point to ask for correct passphrase / security key.
4. The access point you wish to connect only allows network cards with specific MAC address to establish connection. Please go to ‘About’ tab and write the value of ‘Phy_Addess’ down, then present this value to the owner of access point so he / she can add the MAC address of your network card to his / her access point’s list.
1. Move closer to the place where access point is located.
2. Enable ‘Wireless Protection’ in ‘Advanced’ tab.
3. Try a lower TX Rate in ‘Advanced’ tab.
4. Disable ‘Tx Burst’ in ‘Advanced’ tab.
5. Enable ‘WMM’ in ‘QoS’ tab if you need to use multimedia / telephony related applications.
6. Disable ‘WMM – Power Save Enable’ in ‘QoS’ tab.
7. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number.
Please try one or more solutions listed above.
~ 71 ~
5-3 Glossary
1. What is the IEEE 802.11g standard?
802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.11a for the 5 GHz frequency band and applies it in the same 2.4 GHz frequency band as IEEE 802.11b. The 802.11g standard requires backward compatibility with 802.11b.
The standard specifically calls for:
A. A new physical layer for the 802.11 Medium Access Control
(MAC) in the 2.4 GHz frequency band, known as the extended rate PHY (ERP). The ERP adds OFDM as a mandatory new coding scheme for 6, 12 and 24 Mbps (mandatory speeds), and 18, 36, 48 and 54 Mbps (optional speeds). The ERP includes the modulation schemes found in 802.11b including CCK for 11 and 5.5 Mbps and Barker code modulation for 2 and 1 Mbps.
B. A protection mechanism called RTS/CTS that governs how
802.11g devices and 802.11b devices interoperate.
2. What is the IEEE 802.11b standard?
The IEEE 802.11b Wireless LAN standard subcommittee, which formulates the standard for the industry. The objective is to enable wireless LAN hardware from different manufactures to communicate.
~ 72 ~
3. What does IEEE 802.11 feature support?
The product supports the following IEEE 802.11 functions:
CSMA/CA plus Acknowledge Protocol Multi-Channel Roaming Automatic Rate Selection RTS/CTS Featu re Fragmentation Power Management
4. What is Ad-hoc?
An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN card, Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation.
5. What is Infrastructure?
An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers.
6. What is BSS ID?
A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID.
7. What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
8. What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. TKIP is involved in the IEEE 802.11i WLAN security standard, and the specification might be officially released by early 2003.
~ 73 ~
9. What is AES?
AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard. Compare with AES, TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at the hardware level.
10. Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products. Therefore, Wireless products can work with Netware, Windows 2000, or other LAN operating systems to support printer or file sharing.
11. Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, WLAN series offer the encryption function (WEP) to enhance security and Access Control. Users can set it up depending upon their needs.
12. What is DSSS? What is FHSS? And what are their differences?
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping code). The longer the chip is, the greater the probability that the original data can be recovered. Even if one or more bits in the chip are
~ 74 ~
damaged during transmission, statistical techniques embedded in the radio can recover the original data without-the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers.
13. What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to the right frequency, a spread –spectrum signal looks like background noise. There are two main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).
14. What is WMM?
Wi-Fi Multimedia (WMM), a group of features for wireless networks that improve the user experience for audio, video and voice applications. WMM is based on a subset of the IEEE
802.11e WLAN QoS draft standard. WMM adds prioritized capabilities to Wi-Fi networks and optimizes their performance when multiple concurring applications, each with different latency and throughput requirements, compete for network resources. By using WMM, end-user satisfaction is maintained in a wider variety of environments and traffic conditions. WMM makes it possible for home network users and enterprise network managers to decide which data streams are most important and assign them a higher traffic priority.
15. What is WMM Power Save?
WMM Power Save is a set of features for Wi-Fi networks that increase the efficiency and flexibility of data transmission in
~ 75 ~
order to conserve power. WMM Power Save has been optimized for mobile devices running latency-sensitive applications such as voice, audio, or video, but can benefit any Wi-Fi device. WMM Power Save uses mechanisms included in the IEEE 802.11e standard and is an enhancement of IEEE
802.11 legacy power save. With WMM Power Save, the same amount of data can be transmitted in a shorter time while allowing the Wi-Fi device to remain longer in a low-power “dozing” state.
16. What is GI?
GI stands for Guard Interval. It’s a measure to protect wireless devices from cross- interference. If there are two wireless devices using the same or near channel, and they are close enough, radio interference will occur and reduce the radio resource usability.
17. What is STBC?
STBC stands for Space-Time Block Coding, which is a technique used to transfer multiple copies of data by multiple antenna, to improve data transfer performance. By using multiple antennas, not only data transfer rate is improved, but also the wireless stability.
18. What is WPS?
WPS stands for Wi-Fi Protected Setup. It provides a simple way to establish unencrypted or encrypted connections between wireless clients and access point automatically. User can press a software or hardware button to activate WPS function, and WPS-compatible wireless clients and access point will establish connection by themselves. There are two types of WPS: PBC (Push-Button Configuration) and PIN code.
~ 76 ~
5-4 FCC and Other Compliance Statements
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from
that to which the receiver is connected.
4. Consult the dealer or an experienced radio technician for help.
FCC Caution
This device and its antenna must not be co-located or operating in conjunction with any other antenna or transmitter.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance could void the authority to operate equipment.
~ 77 ~
Federal Communication Commission (FCC) Radiation Exposure Statement
This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) during normal operation.
The antenna(s) used for this transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
Safety
This equipment is designed with the utmost care for the safety of those who install and use it. However, special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment. All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment.
EU Countries Intended for Use
The ETSI version of this device is intended for home and office use in Austria, Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, the Netherlands, Portugal, Spain, Sweden, and the United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states: Iceland, Liechtenstein, Norway, and Switzerland.
~ 78 ~
EU Countries Not intended for use
None.
CE Declaration:
This device corresponds to EU directive 1995/5EC: With the CE sign
Logilink®, a registered trademark of the 2direct GmbH ensures, that the
product is conformed to the basic standards and directives. These standards
can be requested online on www.logilink.com. All trademarks and registered
brands are the property of their respective owners.
~ 79 ~
Loading...