Federal Communication Commission Interference
Statement
This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the
following measures:
z Reorient or relocate the receiving antenna.
z Increase the separation between the equipment and receiver.
z Connect the equipment into an outlet on a circuit different from that to
which the receiver is connected.
zConsult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by
the party responsible for compliance could void the user’s authority to
operate this equipment.
Country Code Statement
For product available in the USA/Canada market, only channel 1~11 can be
operated. Selection of other channels is not possible.
To maintain compliance with FCC RF exposure requirements, use only
belt-clips, holsters or similar accessories that do not contain metallic
components in its assembly. The use of accessories that do not satisfy these
requirements may not comply with FCC RF exposure requirements, and should
be avoided.
CAUTION:
Any changes or modifications not expressly approved by the grantee of this
device could void the user’s authority to operate the equipment.
This transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
Federal Communication Commission (FCC) Radiation
Exposure Statement
This EUT is compliance with SAR for general population/uncontrolled
exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance
with the measurement methods and procedures specified in OET Bulletin 65
Supplement C. This equipment should be installed and operated with minimum
distance 2.5cm between the radiator & your body.
CE Statement:
Hereby, AboCom, declares that this device is in compliance with the
essential requirement and other relevant provisions of the R&TTE
Driective 1999/5/EC.
UNINSTALLATION FOR WINDOWS 2000/XP...............................................76
UNINSTALLATION FOR WINDOWS VISTA.................................................78
INTRODUCTION
The WN2000 is an IEEE802.11b/g/n USB adapter that connects you r
notebook to a wireless local area. The WN2000 fully complies with IEEE
802.11n draft 3.0 and IEEE 802.11 b/g standards, delivers reliable,
cost-effective, feature rich wireless connectivity at high throughput from
an extended distance.
The WN2000 is a very small adapter that can connects notebook,
handheld or desktop computer equi pped with USB interface for wireless
network applications. It allows you to take full advantage of your
notebook’s mobility with access to real-time information and online
services anytime and anywhere.
Features
¾ 1T1R Mode with 150Mbps PHY Rate for both.
¾ Complies with IEEE 802.11n draft 3.0 and IEEE 802.11 b/g standards.
¾ Supports WEP 64/128, WPA, WPA2.
¾ Supports WMM and WMM-PS.
¾ Supports WPS configuration.
¾ Supports USB 2.0/1.1 interface.
¾ Portable and mini-size design.
¾ Compatible with Micr osoft Windows Vista, XP, 2000.
-
1 -
Windows 2000/XP Installation
Install the Software
Caution!
Do not insert the wireless card into your computer until the InstallShield
Wizard finish installing.
1. Exit all Windows programs. Insert the included CD-ROM into your
computer. The CD-ROM will run automatically.
2. When the License Agreement screen appears, please read the
contents and select “I accept the terms of the license agreement
“ then click Next to continue.
-
2 -
3. Select the check box to choose a Configuration Tool from the listed
two choices.
z Configuration Tool: Choose to use our configuration utility.
z Microsoft Zero Configuration Tool: Choose to use Windows XP’s
built-in Zero Configuration Utility (ZCU).
Click Next to continue.
5. When you are prompted the following message, please click Install
to begin the installation.
-
3 -
6. When the following screen appears, click Finish to complete the
software installation.
-
4 -
Install the Hardware
Note: Insert the Wireless USB card when you finished your software
installation.
Insert the USB Adapter into the USB Port of your computer. The system
will automatically detect the new hardware.
-
5 -
Windows Vista Installation
Install the Software
Do not insert the wireless LAN adapter into your computer until the
procedures in “Driver& Utility Installation” have been performed.
1. Insert the included CD-ROM into the CD-ROM drive of your
computer.
2. When the Main Menu screen appears, click “Driver & Utility
Installation” to start the software installation.
3. When the License Agreement screen appears, please read the
contents and select “I accept the terms of the license agreement
“ then click Next to continue.
-
6 -
4. When you are prompted the following message, please click Install
to begin the installation.
5. When the following screen appears, click Finish to complete the
software installation.
-
7 -
Install the Hardware
Note: Insert the Wireless USB card when you finished your software
installation.
Insert the USB Adapter into the USB Port of your computer. The system
will automatically detect the new hardware.
Verification
To verify if the device exists in your computer and is enabled, go to Start >
Control Panel > System > Hardware > Device Manager. Expand the Network
Adapters category. If the PROLiNK WN2000 Mini USB2.0 Wireless Adapter
is listed here, it means that your device is properly installed and enabled.
-
8 -
NETWORK CONNECTION
IP Address
Note: When assigning IP Addresses to the computers on the network, remember
to have the IP address for each computer set on the same subnet mask. If your
Broadband Router use DHCP technology, however, it won’t be necessary for you
to assign Static IP Address for your computer.
1. To configure a dynamic IP address (i.e. if your broadband Router has the DHCP
technology), check the Obtain an IP Address Automatically option.
2. To configure a fixed IP address (if you broadband Router is not DHCP
supported, or when you need to assign a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field; for
example, enter 192.168.1.1 in the IP address field, and 255.255.255.0 for the
Subnet Mask.
-
9 -
UTILITY CONFIGURATION FOR
WINDOWS 2000/XP
After the Wireless adapter has been successfully installed, users can use the
included Configuration Utility to set their preference.
Go to StartJ (All) ProgramJ PROLiNK WN2000J PROLiNK WN2000 Wireless Utility.
You can also open the Configuration Utility by double clicking the icon or right
clicking to select Launch Config Utility.
-
10 -
Station Mode
Notice: Under screen resolution 800 x 600 pixels, click the triangle button at
the right down corner of the utility to expand the information of the station,
the information will not be displayed completely.
Profile
Profile can book keeping your favorite wireless setting among your home, office,
and other public hot-spot. You may save multiple profiles, and activate the correct
one at your preference. The Profile manager enables you to Add, Edit, Delete and
Activate profiles.
Click this button to show the information of Status Section.
Click this button to hide the information of Status Section.
Profile Tab
Profile Name
SSID
You can see a distinctive name of profile in this column.
The default is PROF# (# 1, #2, #3....)
The SSID is the unique name shared among all points in
your wireless network.
-
11 -
Network Type
Authentication
Encryption
Use 802.1x
Tx Power
Channel
Power Save
Mode
RTS Threshold
Fragment
Threshold
Add
Shows the network type of the device, including
Infrastructure and Ad-Hoc.
Shows the authentication mode.
Shows the encryption type.
Whether or not use 802.1x feature.
Transmit power, the amount of power used by a radio
transceiver to send the signal out.
Shows the selected channel that is currently in use.
Choose from CAM (Constantly Awake Mode) or PSM
(Power Saving Mode.)
Shows the RTS Threshold of the device.
Shows the Fragment Threshold of the device.
Click to add a profile from the drop-down screen.
System Configuration tab:
Profile Name: User can enter profile name, or use default
name defined by system. The default is PROF# (# 1, #2,
#3....).
-
12 -
SSID: The SSID is the unique name shared among all
points in your wireless network. The name must be
identical for all devices and points attempting to connect
to the same network. User can use pull-down menu to
select from available APs.
Power Save Mode:
•CAM (Constantly Awake Mode): When this mode is
selected, the power supply will be normally provided
even when there is no throughput.
•PSM (Power Saving Mode): When this mode is
selected, this device will stay in power saving mode
even when there is high volume of throughput.
Network Type: There are two types, Infrastructure and
Ad-hoc modes. Under Ad-hoc mode user can also choose
the preamble type, the available preamble type includes
Auto and Long. In addition to that, the channel field will
be available for setup in Ad-hoc mode.
• The Infrastructure is intended for the connection
between wireless network cards and an Access Point.
With the wireless adapter, you can connect wireless
LAN to a wired global network via an Access Point.
• The Ad-hoc lets you set a small wireless workgroup
easily and quickly. Equipped with the wireless
adapter, you can share files and printers between each
PC and laptop.
Tx Power: Transmit power, the amount of power used by
a radio transceiver to send the signal out. Select the Tx
power percentage from the pull-down list including Auto,
100%, 75%, 50%, 25%, 10% and Lowest.
Preamble: This function will show up when Ad-hoc
network type be selected. A preamble is a signal used in
wireless environment to synchronize the transmitting
timing including Synchronization and Start frame
delimiter. Select from the pull-down menu to change the
-
13 -
Preamble type into Auto or Long.
RTS Threshold: User can adjust the RTS threshold
number by sliding the bar or key in the value directly. The
default value is 2347. RTS/CTS Threshold is a mechanism
implemented to prevent the “Hidden Node” problem. If
the “Hidden Node” problem is an issue, users have to
specify the packet size. The RTS/CTS mechanism will be activated if the data size exceeds the value you set.
This value should remain at its default setting of 2347.
Should you encounter inconsistent data flow, only minor
modifications of this value are recommended.
Fragment Threshold: User can adjust the Fragment
threshold number by sliding the bar or key in the value
directly. The default value is 2346. The mechanism of
Fragmentation Threshold is used to improve the efficiency
when high traffic flows along in the wireless network. If
your Wireless LAN Adapter often transmits large files in
wireless network, you can enter new Fragment Threshold
value to split the packet. The value can be set from 256
to 2346.
Authentication and Security tab:
Authentication Type: There are several types of authentication modes including Open, Shared, Leap,
WPA, WPA-PSK, WPA2 and WPA2-PSK.
•Open: If your access point/wireless router is using
"Open” authentication, then the wireless adapter will
-
14 -
need to be set to the same authentication type.
•Shared: Shared key is when both the sender and the
recipient share a secret key.
•LEAP: Light Extensible Authentication Protocol. It is
an EAP authentication type used primarily in Cisco
Aironet WLANs. It encrypts data transmissions using
dynamically generated WEP keys, and supports mutual
authentication (only with CCX mode enabled.)
•WPA/ WPA-PSK/ WPA2/ WPA2-PSK: WPA or
WPA-PSK authentications offer two encryption
methods, TKIP and AES. For WPA-PSK, select the
type of algorithm TKIP or AES and then enter a WPA
Shared Key of 8-64 characters in the WPA Pre-shared
Key field.
Encryption Type: For Open and Shared authentication
mode, the selection of encryption type are None and
WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK
authentication mode, the encryption type supports both
TKIP and AES.
WPA Pre-shared Key: This is the shared secret between
AP and STA. For WPA-PSK and WPA2-PSK
authentication mode, this field must be filled with
character longer than 8 and less than 64 lengths.
WEP Key: Only valid when using WEP encryption
algorithm. The key must match with the AP’s key. There
are several formats to enter the keys.
PEAP transport securely authentication data by using
tunnelling between PEAP clients and an authentication
server. PEAP can authenticate wireless LAN clients
using only server-side certificates, thus simplifying the
implementation and administration of a secure
wireless LAN.
•TLS / Smart Card: Transport Layer Security.
Provides for certificate-based and mutual
authentication of the client and the network. It relies
on client-side and server-side certificates to perform
-
16 -
authentication and can be used to dynamically
generate user-based and session-based WEP keys to
secure subsequent communications between the
WLAN client and the access point.
•TTLS: Tunnelled Transport Layer Security. This
security method provides for certificate-based, mutual
authentication of the client and network through an
encrypted channel. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
•EAP-FAST: Flexible Authentication via Secure
Tunnelling. It was developed by Cisco. Instead of
using a certificate, mutual authentication is achieved
by means of a PAC (Protected Access Credential)
which can be managed dynamically by the
authentication server. The PAC can be provisioned
(distributed one time) to the client either manually or
automatically. Manual provisioning is delivery to the
client via disk or a secured network distribution
method. Automatic provisioning is an in-band, over
the air, distribution. For tunnel authentication, only
support "Generic Token Card" authentication now.
•MD5-Challenge: Message Digest Challenge.
Challenge is an EAP authentication type that provides
base-level EAP support. It provides for only one-way
authentication - there is no mutual authentication of
wireless client and the network. (Only Open and
Shared authentication mode can use this function.)
Tunnel Authentication:
• Protocol: Tunnel protocol, List information including
EAP-MSCHAP v2, EAP-TLS/ Smart Card, and
Generic Token Card.
•Tunnel Ide ntity: Identity for tunnel.
-
17 -
• Tunnel Password: Password for tunnel.
Session Resumption: Reconnect the signal while broken
up, to reduce the packet and improve the transmitting
speed. User can click the box to enable or disable this
function.
ID\PASSWORD tab:
ID/ PASSWORD: Identity and password for server.
•Authentication ID / Password: Identity, password
and domain name for server. Only "EAP-FAST" EAP
method and "LEAP" authentication can key in domain
name. Domain name can be keyed in blank space.
•Tunnel ID / Password: Identity and Password for
server.
Show Password: Check this box to show the password
you entered.
OK: Click to save settings and exit this page.
Cancel: Click to call off the settings and exit.
Client Certification tab:
Use Client certificate: Choose to enable server
-
18 -
Delete
Edit
Activate
authentication.
OK: Click to save settings and exit this page.
Cancel: Click to call off the settings and exit.
Server Certification tab:
Use certificate chain: Choose use server that issuer of
certificates.
Allow intimidate certificates: It must be in the server
certificate chain between the server certificate and the
server specified in the certificate issuer must be field.
Server name: Enter an authentication sever root.
Server name must match: Click to enable or disable this
function.
Domain name must end in specified name: Click to
enable or disable this function.
OK: Click to save settings and exit this page.
Cancel: Click call off the settings and exit.
Click to delete an existing profile.
Click to edit a profile.
Click to make a connection between devices.
-
19 -
Network
The Network page displays the information of surrounding APs from last scan
result. The tab lists the information including SSID, Network type, Channel,
Wireless mode, Security-Enabled and Signal.
Network Tab
Sorted by
Show dBm
SSID
Network Type
Channel
Wireless mode
Encryption
Signal
Rescan
Add to Profile
Indicate that AP list are sorted by SSID, Channel or Signal.
Check the box to show the dBm of the AP list.
Shows the name of BSS network.
Network type in use, Infrastructure for BSS, Ad-Hoc for
IBSS network.
Shows the currently used channel.
AP support wireless mode. It may support 802.11b,
802.11g or 802.11n wireless mode.
Shows the encryption type currently in use. Valid value
includes WEP, TKIP, AES, Not Use and WPS.
Shows the receiving signal strength of specified network.
Click to refresh the AP list.
Select an item on the list and then click to add it into the
profile list.
-
20 -
Loading...
+ 59 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.