This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received; including interference that may cause
undesired operation. Federal Communications Commission (FCC) Statement.
This Equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates uses and can
radiate radio frequency energy and if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined b y turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC RF Radiation Exposure Statement:
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
- 1 -
Chapter 1 Install Driver for Windows Series
This section describes the installation of the 11b/g Wireless Mini PCI Adapter driver for the
Windows98/ME/2000 and Windows XP operating systems.
1-1 Set up 11b/g Wireless Mini PCI Adapter for Windows Series
Step 1: After inserting the Wireless Mini PCI Adapter into the Mini PCI port on notebook or
desktop, the Windows will auto-detect the Wireless Mini PCI Adapter and a “Found New Hardware Wizard” window will show up. Select “Cancel” to install the driver from CD-Rom.
- 2 -
Step 2: Insert the Product CD-ROM into the CD-ROM drive. Select “Setup.exe” to install Driver
and Utility.
Step 3: After installing the driver, you can check if your device is active in the device management
- 3 -
Chapter 2 Configure Wireless Mini PCI Adapter
This chapter will show you how to configure your Wireless Mini PCI Adapter by using utility in
the Product CD Package under Windows series Operation System
2-1 Install Utility
1. After finishing the install process, you can execute the utility as follows
2. You will see the utility icon after you executing program “Wireless Utility” if your Wireless
Mini PCI Adapter is alive
3. If your operation system belong to Windows XP and have updat e to SP1, click the right button
on the icon. You will see the frame below. If you want to configure your Wireless Mini PCI Adapter with “Wireless Zero Configure” supported by XP, you should choose “Use Zero
- 4 -
Configuration as Configuration utility”.
- 5 -
2-2 Configure Wireless Mini PCI Adapter with Zero Configure
After installing Wireless Mini PCI Adapter, the Windows XP will display a “Wireless Network
Connection ” message.
Click on the message and the “Automatic Wireless Network Configuration” will then appear
automatically and allow users to connect to an available Wireless infrastructure network (Access
Point), shown as follows. You may click the “Advanced” button to make advanced configuration
for the Wireless LAN Card, shown as below.
Choose one
suitable server
In order to reconfigure you Wireless connection, you can deal as follow procedure
1. Click left button on the network icon as bellow.
- 6 -
2. Click Properties to continue
3. Click Wireless Networks to reconfigure the Wireless network connection.
4. If you need a key (WEP) to connect the Wireless network, you should keyin the key that
supported by the Wireless network router or access point
- 7 -
- 8 -
Chapter 3 Configure Wireless Mini PCI Adapter with
“ Wireless Utility” for Windows 98/ME/2000/XP
Click the utility icon, and you will see the application interface as step 2.
3-1 Site Survey Page
1. The means of item
z SSID : Name of AP
z BSSID : Mac Address of AP
z Signal : Signal strength of AP
z Channel : AP used channel
z Encryption : what encrypted mechanism does AP used, the encrypted mechanism contain four
ways , WEP, AES, TKIP, NOT USE
zAuthentication : What authentication mechanism does AP used.
- 9 -
zNetwork Ty pe : What Network Type does the AP belong to.
2. The connected AP
z the system will choose the suitable AP when you start up RaConfig in the first time
z if you want to connect with another AP, double click mouse’s left button in the SSID of AP.
z indicate connect successful.
3. if the connect is success, it will show the SSID of the connected AP
4. rescan and upgrade all the AP’s information in time
5. connect with selected AP
6. Save the selected AP’s information to Profile
3-1-1 Add/Edit Profile
System Configuration: as figure bellow
- 10 -
1. Profile Name: Different AP can be set up into different Profile Name
2. SSID: The drop-down menu can select which AP is detected by system
3. Power Save Mode: can select〔CAM(Constantly Awake Mode)〕 or 〔Power Saving Mode〕
mode. Selecting the” CAM when AC Power” means the power saving mode can automatically
switch into CAM, if the computer uses the AC power, not using the batteries instead. Selecting
the “Power Save Mode” can only work under the infrastructure mode.
4. Network Type: Can select “Infrastructure” or “802.11 Ad Hoc” mode. When set up to
“Infrastructure” mode, the “Power Saving” mode will be enabled, but the “11b Preamble Type”
will not; When set up to “802.11 Ad Hoc” mode, the “Power Saving Mode” will not be enabled,
but “11b Preamble” will, and the channel selection in the session 7 will show up as well.
5. TX Power: Transmit power, the amount of power used by a radio transceiver to send the signal
out. User can choose power value by sliding the bar.
6. Preamble: There are three types, Auto, Long and Short are supported.
7. Ad hoc wireless mode: There are five types. 802.11B only, 802.11 B/G mixed 802.11A only,
802.11 A/B/G mixed and 802.11G only modes are supported.
- 11 -
8. RTS Threshold: User can adjust the RTS threshold number by sliding the bar or key in the value
directly. The default value is 2312.
9. Fragment Threshold: User can adjust the RTS threshold number by sliding the bar or key in the
value directly. The default value is 2312.
Note: Channel: Only available for setting under ad-hoc mode. User can choose the channel
frequency to start their ad-hoc network.
Profile function is based on the needs to set up the most linkable AP in order to record the system
configuration and to set up the authentication security. The function of each session is shown below
- 12 -
3-2 Authentication & Security
As shown in picture. When the Encryption feature is enabled, the other setups are same as the said
WEP setting.
1. Authentication Type: There are three type of authentication modes supported by RaConfig.
They are open, Shared, WPA-PSK and WPA system.
2. 802.1x Setting: It will display to set when user use radius server to authenticate client certificate
for WPA authentication mode. The detail operation will explain in section 5-6 Configure
connection with WPA by 802.1x setting
3. Encryption Type: For open and shared authentication mode, the selection of encryption type are
None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the
encryption type supports both TKIP and AES.
4. WPA Pre-shared Key: This is the shared secret between AP and STA. For WPA-PSK and
WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less
than 32 lengths.
5. WEP Key: Only valid when using WEP encryption algorithm. The key must matched AP key.
There are several formats to enter the keys.
i. Hexadecimal、40bits:10 Hex characters.
- 13 -
ii. Hexadecimal、128bits:32Hex characters.
iii. ASCII、40bits:5 ASCII characters.
iv. ASCII、128bits:13 ASCII characters.
3-2-1 802.1x Setting
802.1x is a authentication for 『WPA』and 『WPA2』certificate to server. Show as figure
1. Authentication type:
i. PEAP: Protect Extensible Authentication Protocol. PEAP transport securely
authentication data by using tunneling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients using only server-side
certificates, thus simplifying the implementation and administration of a secure
wireless LAN.
ii. TLSSmart Card: Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on client-side and
server-side certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys to secure subsequent
communications between the WLAN client and the access point.
- 14 -
iii. TTLS: Tunneled Transport Layer Security. This security method provides for
certificate-based, mutual authentication of the client and network through an
encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only server-side
certificates.
iv. LEAP: Light Extensible Authentication Protocol. It is an EAP authentication type
used primarily in Cisco Aironet WLANs. It encrypts data transmissions using
dynamically generated WEP keys, and supports mutual authentication.
v. MD5-Challenge: Message Digest Challenge. Challenge is an EAP authentication
type that provides base-level EAP support. It provides for only one-way
authentication - there is no mutual authentication of wireless client and the network.
2. Session Resumption: user can choose “ Disable ”, “ Reauthentication ”, “ Roaming ”,
“ SameSsid ” and “ Always ”.
3. Identity and Password: Identity and password for server.
4. Use Client Certificate: Client Certificate for server authentication.
5. Tunnel Authentication
i. Protocol: Tunnel protocol, List information include “ EAP-MSCHAP ”,
“ EAP-MSCHAP v2 ”, “ CAHAP ” and “ MD5 ”
ii. Tunnel Identity: Identity for tunnel.
iii. Tunnel Password: Password for tunnel.
6. CA Server: Certificate Authority Server. Each certificate is signed or issued by it. The detail
operation will explain in section 4-2-2 CA Server
3-2-2 CA Server
Depending on the EAP in use, only the server or both the server and client may be authenticated and
require a certificate. Server certificates identify a server, usually an authentication or RADIUS
server to clients. Most EAPs require a certificate issued by a root authority or a trusted commercial
CA. Show as the figure.
1. Certificate issuer: Choose use server that issuer of certificates.
2. Allow intimidate certificates: It must be in the server certificate chain between the server
certificate and the server specified in the certificate issuer must be field.
3. Server name: Enter an authentication sever root.
- 15 -
- 16 -
3-3 Profile Page
Profile can book keeping your favorite wireless setting among your home, office, and other public
hotspot. You may save multiple profiles, and activate the correct one at your preference.
1. Definition of each field:
i. Profile: Name of profile, preset to PROF* (* indicate 1, 2, 3,).
ii. SSID: AP or Ad-hoc name.
iii. Cannel: Channel in use for Ad-Hoc mode.
iv. Authentication: Authentication mode.
v. Encryption: Security algorithm in use.
vi. Network Type: Network’s type, icluding infrastructure and Ad-Hoc.
2. Connection status
Indicate connection is successful on currently activated profile.
Indicate connection is failed on currently activated profile.
3. Add a new profile.
4. Delete an existing profile.
5. Edit Profile
6. Activate selected profile.
- 17 -
Loading...
+ 41 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.