About PLANET WL-U357 Utility: display Utility Version.
in the system tray.
14
5
3.2 Profile Management
3.2.1 Add a Profile
To add a new configuration profile, click New on the Profile Management tab. The Profile Management
dialog box displays the General tab.
Please note that the WL-U357 utility only allows the creation of 16 configuration profiles. After the
creation of 16 profiles, clicking the New button displays an error message
3.2.1.1 General Tab
Profile Name
Client Name
Identifies the configuration profile. This name must be
unique. Profile names are not case sensitive.
Identifies the client machine.
1
Network Names (SSIDs)
6
3.2.1.2 Security Tab
The IEEE 802.11 wireless network name. This field has a
maximum limit of 32 characters. WL-U357 can configure up
to three SSIDs (SSID1, SSID2, and SSID3).
This section describes the security settings of the PLANET WL-U357 Utility.
WPA & 802.1x Setting
Using EAP-TLS Security
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded
1
onto it. Check with the IT manager.
7
On the Security tab, choose the WPA radio button.
1.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TLS from the drop-down menu.
3. Click the Configure button.
4.
Select the appropriate certificate authority from the list. The server/domain name and the login
name are filled in automatically from the certificate information. Click OK.
5. Activate the profile.
Using EAP-TTLS Security
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded
onto it. Check with the IT manager.
On the Security tab, choose the WPA radio button.
1.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TTLS from the drop-down menu.
1
3. Click the Configure button.
Select the appropriate certificate from the drop-down list and click OK.
4.
5. Enter a EAP user name in the User Name field and password and start the EAP authentication
process.
6.
Click Advanced and:
o Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list. (recommended)
o Enter the domain name of the server from which the client will accept a certificate.
o Change the login name if needed.
7. Click OK.
8. Enable the profile.
Using PEAP-GTC Security
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the server
properties must already be set. Check with the IT manager.
1.
On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-GTC) from the drop-down menu.
18
3. Click the Configure button.
9
4. Select the appropriate network certificate authority from the drop-down list.
5. Enter a PEAP user name in the User Name field to use a separate user name and start the
PEAP authentication process.
6. Choose Token or Static Password, depending on the user database.
Note that Token uses a hardware token device or the Secure Computing SofToken program
(version 1.3 or later) to obtain and enter a one-time password during authentication.
7. Click Advanced and:
o Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list. (recommended)
o Enter the domain name of the server from which the client will accept a certificate.
o The login name used for PEAP tunnel authentication, fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change
the login name if needed.
8. Click OK.
9. Enable the profile.
Using PEAP-MSCHAP V2 Security
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the
server properties must already be set. Check with the IT manager.
On the Security tab, choose the WPA radio button.
1.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu.
1
3. Click the Configure button.
0
4. Select the appropriate certificate from the drop-down list.
5. Enter a PEAP user name in the User Name field to use a separate user name and start the
PEAP authentication process.
6. Click Advanced and:
o Leave the server name field blank for the client to accept a certificate from any server
with a certificate signed by the authority listed in the Network Certificate Authority
drop-down list. (recommended)
o Enter the domain name of the server from which the client will accept a certificate.
o The login name used for PEAP tunnel authentication, fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change
the login name if needed.
7. Click OK.
8. Enable the profile.
Using LEAP Security
LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for
LEAP authentication. Check with the IT manager.
1. On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-down
menu.
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down
menu.
2
2. Click the Configure button.
3. Select to Use Temporary User Name and Password by choosing the radio button. Check
Manually Prompt for LEAP User Name and Password to manually login and start the LEAP
authentication process.
4. Select to Use Saved User Name and Password by choosing the radio button and specify the
LEAP user name, password, and domain to save and use.
5. Specify a domain name:
o Check the Include Windows Logon Domain with User Name setting to pass the
Windows login domain and user name to the RADIUS server. (default)
o OR: Enter a specific domain name.
6. If desired, check No Network Connection Unless User Is Logged In to force the wireless
adapter to disassociate after logging off.
7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how
long LEAP should wait before declaring authentication failed, and sending an error
message. The default is 90 seconds.
8. Click OK.
9. Enable the profile.
WPA Passphrase Setting
21
2
1. On the Security tab, choose the WPA Passphrase radio button
2. Click on the Configure button.
3. Fill in the WPA Passphrase
4. Click OK
Pre-Shared Key setting
1. Click the Define Pre-Shared Keys radio button on the Security tab.
2. Click on Configure button.
3. Fill in the fields in the Define Pre-Shared Keys dialog box
4. Click OK for the changes to take effect
2
3
Key Button Description
Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F),
or ASCII text (all keyboard characters except spaces).
Encryption Keys Selects the default encryption keys used. Only allows the selection for a
shared First, Second, Third, or Fourth key whose corresponding field has
been completed.
WEP Keys (1-4)
Defines a set of shared encryption keys for network configuration security. At
least one Shared Key field must be populated to enable security using a
shared key.
Click on the radio button to set the key as the default encryption key.
WEP Key Size
Defines the size for each encryption key. The options include:
o 64- bit (enter 10 digits for hexadecimal, 5 ASCII characters)
o 128- bit (enter 26 digits for hexadecimal, 13 digits for ASCII)
o 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII)
Overwriting an Existing Static WEP Key
1. Click the Pre-Shared Key radio button on the Security tab.
2. Click on Configure.
3. In the window, all existing static WEP keys are displayed as asterisks for security reasons. Click
in the field of the existing static WEP key to overwrite.
4. Delete the asterisks in that field.
Enter a new key.
5.
6. Make sure to select the Transmit Key button to the left of this key is selected for the key to
transmit packets.
7. Click OK.
Disabling Static WEP
• To disable static WEP for a particular profile, choose None on the Profile Management tab and
click OK.
• OR: Select any other security option on the Profile Management tab to automatically disable
static WEP.
2
3.2.1.3 Advanced Tab
Transmit Power
Power Save Mode
Selects the transmit power level for 80211b/g in mW. Actual transmit
power may be limited by regulatory domain or hardware limitations.
Level
• Maximum: causes the access point to buffer incoming
messages for the wireless adapter. The adapter up periodically
polls the access point to see if any messages are waiting.
• Normal: uses maximum when retrieving a large number of
packets, then switches back to power save mode after retrieving
the packets.
• Off: turns power saving off, thus powering up the wireless
adapter continuously for a short message response time.
Network Type
802.11b Preamble Specifies the preamble setting in 802.11b. The default setting is Short &
Specifies the network as either infrastructure (access point mode) or ad
hoc.
Long (access point mode), which allows both short and long headers in
the 802.11b frames. The adapter can only use short radio headers if the
access point supports and uses them. Set to Long Only to override
allowing short frames.
Wireless Mode
Specifies 2.4 GHz 54 Mbps, 2.4 GHz 11 Mbps, or Super G operation in an
24
access point network.
5
The wireless adapter must match the wireless mode of the access point it
associates to.
Wireless Mode
when Starting an
Ad Hoc Network
802.11a
Authentication
Mode
This mode allows selection of the channel the wireless adapter uses. The
channels available depend on the regulatory domain. If the adapter finds
no other ad hoc adapters, this selection specifies which channel with the
adapter starts the ad hoc network with.
The wireless adapter must match the wireless mode and channel of the
clients it associates to.
Select what mode the wireless adapter uses to authenticate to an access
point:
• Auto: causes the adapter to attempt authentication using
shared, but switches it to open authentication if shared fails.
• Open: enables an adapter to attempt authentication regardless
of its WEP settings. It will only associate with the access point if
the WEP keys on both the adapter and the access point match.
• Shared: only allows the adapter to associate with access points
that have the same WEP key.
For infrastructure (access point) networks, click the Preferred APs button to specify up to four
access points to which the client adapter should attempt to associate.
3.2.2 Modify a Profile
To modify a configuration profile, select the configuration from the Profile list and click the Modify button.
Please refer to above sections for detailed explanations about the settings.
3.2.3 Remove a Profile
To remove a configuration profile, select the configuration from the Profile list and click the Remove
button.
The WL-U357 utility only allows the creation of 16 configuration profiles. After the creation of 16 profiles,
clicking the New button displays an error message. Remove an old profile or modify an existing profile for
a new use.
2
3.2.4 Switch Profiles
6
1. To switch to a different profile, go to the Profile Management tab.
2. Click on the profile name in the Profile List.
3. Click the Activate button.
3.2.5 Import a Profile
1. From the Profile Management tab, click the Import button. The Import Profile window appears.
2. Browse to the directory where the profile is located.
3. Highlight the profile name.
4. Click Open. The imported profile appears in the profiles list.
3.2.6 Export a Profile
1. From the Profile Management tab, highlight the profile to export.
2. Click the Export button. The Export Profile window appears.
3. Browse to the directory to export the profile to.
4. Click Save. The profile is exported to the specified location
3.2.7 Scan for Available Networks
Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc
networks. On this list, click Refresh to refresh the list at any time.
The Scan Result List provides icons below that specify the operational state and the signal strength for
available stations.
2
3.2.8 Auto Profile Selection Management
7
Including a profile in the auto selection feature allows the wireless adapter to automatically select that
profile from the list of profiles and use it to connect to the network.
Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button.
2. The Auto Profile Selection Management window appears, with a list of all created profiles in the
Available Profiles box.
3. Highlight the profiles to add to auto profile selection, then click Add. The profiles appear in the Auto
Selected Profiles box.
Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box.
2. Click Move Up or Move Down as appropriate.
The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest
priority.
3. Click OK.
4. Check the Auto Select Profiles box.
5. Save the modified configuration file.
When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab,
the client adapter scans for an available network. The profile with the highest priority and the same SSID
as one of the found networks is the one that is used to connect to the network. If the connection fails, the
client adapter tries the next highest priority profile that matches the SSID, and so on.
2
8
3.3 Diagnostics
The Diagnostics tab of the WL-U357 Utility provides buttons used to retrieve receive and transmit
statistics. The Diagnostics tab does not require any configuration.
The Diagnostics tab lists the following receive and transmit diagnostics for frames received by or
transmitted by the wireless network adapter:
• Multicast frames transmitted and received
• Broadcast frames transmitted and received
• Unicast frames transmitted and received
• Total bytes transmitted and received
Click the Adapter Information button for more general information about the WL-U357 and its driver.
Click the Advanced Statistics button on the Diagnostics tab to also show receive and transmit statistical
information for the following receive and transmit diagnostics for frames received by or transmitted to the
WL-U357:
Transmitted Frames
Received Frames
• Frames transmitted OK
• Frames retried
• Frames dropped
• No ACK frames
• Frames received OK
• Beacons
• Frames with errors
• CRC errors
2
• ACK frames
9
• Encryption errors
• RTS Frames
• Clear-to-send (CTS)
Frames
• No CTS frames
• Retried RTS frames
• Retried data frames
• Duplicate frames
• AP mismatches
• Data rate mismatches
• Authentication time-out
• Authentication rejects: the number of AP
authentication failures received by the
wireless network adapter
• Association time-out
• Association rejects: the number of access
point authentication rejects received by the
wireless network adapter
• Standard MIC OK
• Standard MIC errors
• CKIP MIC OK
• CKIP MIC errors
2
Chapter 4 Troubleshooting
0
This section provides solutions to problems usually encountered during the installation and operation
of the USB adapter. Read the description below to diffuse your doubts.
What is the IEEE 802.11g standard?
802.11g is the latest IEEE standard for high-speed WLAN communications that provides up to
54Mbps data rate in the 2.4GHZ band. It has become the mainstream technology of current
WLAN networks. It uses OFDM modulation to reach higher data transmission rate and
backward compatible with 802.11b
What is the IEEE 802.11b standard?
The IEEE 802.11b WLAN standard subcommittee, which formulates a standard for the industry.
The objective is to enable WLAN hardware from different manufacturers to interoperate.
What features does the IEEE 802.11 standard provide?
The product supports the following IEEE 802.11 functions:
‧ CSMA/CA plus Acknowledge protocol
‧ Multi-Channel Roaming
‧ Automatic Rate Selection
‧ RTS/CTS feature
‧ Fragmentation
‧ Power Management
What is Ad-hoc?
An Ad-hoc mode is a wireless network type in which a group of computers equipped with
wireless adapters are connected as an independent wireless LAN without any access point. All
computers operating in this mode must be configured to share the same radio channel and
SSID.
What is Infrastructure?
The difference between Infrastructure network and Ad-hoc network is that the former requires
an Access point. The Infrastructure mode is appropriate for enterprise-scale wireless access to
a central database or provides various wireless applications for mobile users.
What is BSS ID?
An Infrastructure network is called a Basic Service Set (BSS). All the wireless stations in a BSS
must share the same BSS ID.
What is TKIP?
It is another encryption method to overcome the inherent weaknesses of WEP, a next
generation of WEP. It adopts new algorithm (Michael) to generate 128/192-bit encryption keys
and provides per-packet key mixing, a message integrity check and a re-keying mechanism.
What is AES?
AES (Advanced Encryption Standard) is a chip-based encryption method of new generation
and has been incorporated into the newly-approved security standard 802.11i. It supports 128,
192 and 256-bit encryption key length and adopts Rijndael algorithm. It is widely believed it is
impossible to crack AES.
What is DSSS? What is FHSS? And what are their differences?
Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes
frequency in a pattern that is known to both transmitters and receivers. Properly synchronized,
the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears
to be short-duration impulse noise. Direct-sequence spread-spectrum (DSSS) generates a
redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip (or chipping
code). The longer the chip is, the greater the probability that the original data can be recovered.
Even if one or more bits in the chip are damaged during transmission, statistical techniques
embedded in the radio can recover the original data without-the need for retransmission. To an
unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by
most narrowband receivers.
What is Spread Spectrum?
Spread Spectrum technology is a wideband radio frequency technique developed by the
3
military for use in reliable, secure, mission-critical communication systems. It is designed to
trade off bandwidth efficiency for reliability, integrity, and security. In other words, more
bandwidth is consumed than in the case of narrowband transmission, but the trade off
produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver
knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned
to the right frequency, a spread –spectrum signal looks like background noise. There are two
main alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread
Spectrum (FHSS).
31
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.