LIMITED WARRANTY
Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from
defects in workmanship and materials, under normal use and service, for the applicable warranty
term. All SMC products carry a standard 90-day limited warranty from the date of purchase from
SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not
operating as warranted with a similar or functionally equivalent product, during the applicable
warranty term. SMC will endeavor to repair or replace any product returned under warranty within
30 days of receipt of the product. The standard limited warranty can be upgraded to a Limited
Lifetime* warranty by registering new products within 30 days of purchase from SMC or its
Authorized Reseller. Registration can be accomplished via the enclosed product registration card
or online via the SMC website. Failure to register will not affect the standard limited warranty. The
Limited Lifetime warranty covers a product during the Life of that Product, which is defined as the
period of time during which the product is an “Active” SMC product. A product is considered to be
“Active” while it is listed on the current SMC price list. As new technologies emerge, older
technologies become obsolete and SMC will, at its discretion, replace an older product in its
product line with one that incorporates these newer technologies. At that point, the obsolete
product is discontinued and is no longer an “Active” SMC product. A list of discontinued products
with their respective dates of discontinuance can be found at:
http://www.smc.com/index.cfm?action=customer_service_warranty .
All products that are replaced become the property of SMC. Replacement products may be either
new or reconditioned. Any replaced or repaired product carries either a 30-day limited warranty or
the remainder of the initial warranty, whichever is longer. SMC is not responsible for any custom
software or firmware, configuration information, or memory data of Customer contained in, stored
on, or integrated with any products returned to SMC pursuant to any warranty. Products returned
to SMC should have any customer-installed accessory or add-on components, such as expansion
modules, removed prior to returning the product for replacement. SMC is not responsible for these
items if they are returned with the product. Customers must contact SMC for a Return Material
Authorization number prior to returning any product to SMC. Proof of purchase may be required.
Any product returned to SMC without a valid Return Material Authorization (RMA) number clearly
marked on the outside of the package will be returned to customer at customer’s expense. For
warranty claims within North America, please call our toll-free customer support number at (800)
762-4968. Customers are responsible for all shipping charges from their facility to SMC. SMC is
responsible for return shipping charges from SMC to customer.
WARRANTIES EX CLUSIV E: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED
ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE
PRODUCT IN QUESTION, AT SMC’S OPTION. THE FOREGOING W ARRANTIES AND
REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES OR
CONDITIONS, EXPRESS OR IMPLIED, EI THER I N FACT OR BY OPERATION OF LAW,
STA TU T ORY OR OTHERWISE, INCLUDING WARRANTIES OR CONDITIONS OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SMC NEITHER
ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO A SSUM E FOR IT ANY OTHER
LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE OR USE OF
ITS PRODUCTS. SMC SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING
AND EXAMINATION DISCLOSE THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST
OR WAS CAUSED BY
CUSTOMER’S OR ANY TH IRD P ERSO N ’S MISU SE , NEGLECT, IMPROPER INSTALLATION
OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR, OR AN Y OTHER CAUSE BEYOND
THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER
HAZARD.
i
Page 3
LIMIT ATION OF LIABILITY: IN NO EVENT, WHETHER BASED IN CONTRACT OR T O RT
(INCLUDING NEGLIGENCE), SHALL SMC BE LIABLE FOR INCIDENTAL, CONSEQUENTIAL,
INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE,
LOSS OF BUSINESS, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION
WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR
INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED R ESE LLER H AS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW
THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF INCIDENTAL OR
CONSEQUENTIAL DAMAGES FOR CO NSUMER PRODUCTS, SO THE ABOVE LIMITATIONS
AND EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC
LEGAL
RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL
BE T AKEN TO AFFECT YOUR STATUTORY RIGHTS.
* SMC will provide warranty service for one year following discontinuance from the active
SMC price list. Under the limited lifetime warranty , internal and external power supplies, fans,
and cables are covered by a standard one-year warranty from date of purchase.
SMC Networks, Inc.
38 Tesla
Irvine, CA 92618
ii
Page 4
Compliances
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference by one or more of the following
measures:
• Reorient or relocate the receiving antenna.
• Increase the distance between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: To assure continued compliance, (example - use only shielded interface cables
when connecting to computer or peripheral devices) any changes or modifications not expressly
approved by the party responsible for compliance could void the user’s authority to operate this
equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions: (1) This device may not cause harmful interference, and (2) this device
must accept any interference received, including interference that may cause undesired operation.
IMPORTANT NOTE
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
CE Mark Declaration of Conformance for EMI and Safety (EEC)
This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
The following references have been applied in order to prove presumption of compliance with the
R&TTE Directive 1999/5/EC:
• EN 300 328
• EN 301 489-1
• EN 301 489-17
• EN 60950-1
iii
Page 5
Table of Contents
Chapter 1 - Getting Started with the SMCWPCI-N 6
Chapter 2 - Wireless LAN Networking 7
Transmission Rate (Transfer Rate) 7
Type of Wireless Networks 7
Wireless LAN Security 11
Chapter 3 - Hardware and Wireless Utility 13
About Your Draft 11n Wireless PCI Adapter 13
Package Content 13
System Requirement 13
LED Definition 13
Hardware and Wireless Utility Installation 14
Using the Utility to Configure Your Network 17
Chapter 4 – Maintenance 26
Uninstall the Driver 26
Uninstall the Client Utility 26
Upgrading the Wireless Utility 26
Glossary 27
5
Page 6
Chapter 1 - Getting Started with the SMCWPCI-N
Congratulations on purchasing the SMCWPCI-N. This manual provides information for setting up
and configuring the SMCWPCI-N. This manual is intended for both home users and
professionals. It is not required to read some of the more technical information in this manual
(such as in “Wireless LAN Networking” and “Configuring Wireless Security”) to operate and
enjoy the SMCWPCI-N. It is included for your reference only.
The following conventions are used in this manual:
THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT
NOTE
HAND.
THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS T O IMPROVE
YOUR NETWORK EXPERIENCE.
THE CAUTION SYMBOL ALERTS YOU T O SITUATIONS THAT MAY DEGRADE
YOUR NETWORKING EXPERIENCE OR COMPROMISE YOUR SECURITY.
LIKE NOTES AND TIPS, THE IMPORTANT SYMBOL INDICATES INFORMATION
THAT CAN IMPROVE NETWORKING.
LOOKED.
THIS INFORMATION SHOULD NOT BE OVER-
6
Page 7
Chapter 2 - Wireless LAN Networking
This section provides background information on wireless LAN networking technology.
T
HE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING
NETWORK SETTINGS AND P ARTICULARLY SECURITY SETTTINGS SHOULD ONLY
BE DONE BY AN AUTHORIZED ADMINISTRAT OR.
Transmission Rate (Transfer Rate)
The SMCWPCI-N provides various transmission (data) rate options for you to select. In most
networking scenarios, the factory default Auto setting proves the most efficient. This setting
allows your SMCWPCI-N to operate at the maximum transmission (data) rate. When the
communication quality drops below a certain level, the SMCWPCI-N automatically switches to a
lower transmission (data) rate. Transmission at lower data speeds is usually more reliable.
However, when the communication quality improves again, the SMCWPCI-N gradually increases
the transmission (data) rate again until it reaches the highest available transmission rate.
Types of Wireless Networks
Wireless LAN networking works in either of the two modes: ad-hoc and infrastructure. In infrastructure mode, wireless devices communicate to a wired LAN via access points. Each access
point and its wireless devices are known as a Basic Service Set (BSS). An Extended Service Set
(ESS) is two or more BSS in the same subnet. In ad hoc mode (also known as peer-to-peer
mode), wireless devices communicate with each other directly and do not use an access point.
This is an Independent BSS (IBSS).
To connect to a wi red network within a coverage area using access poi nts, set the SMCWPCI-N
operation mode to Infrastructure (BSS). To set up an independent wireless workgroup without an
access point, use Ad-hoc (IBSS) mode.
A
D-HOC (IBSS) NETWORK
Ad-hoc mode does not require an access point or a wired network. Two or more wireless stations
communicate directly to each other. An ad-hoc network may sometimes be referred to as an
7
Page 8
Independent Basic Service Set (IBSS).
To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and
channel for each station.
8
Page 9
When a number of wireless stations are connected using a single access point, you have a Basic
Service Set (BSS).
9
Page 10
In the ESS diagram below, communication is done through the access points, which relay data
packets to other wireless stations or devices connected to the wired network. Wireless stations
can then access resources, such as a printer, on the wired network.
10
Page 11
In an ESS environment, users are able to move from one access point to another without losing
the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the
SMCWPCI-N automatically switches to the channel used in BSS (2).
Roaming in an ESS network diagram
Wireless LAN Security
Because wireless networks are not as secure as wired networks, it’s vital that security settings
are clearly understood and applied.
DONOT ATTEMPT TO CONFIGURE OR CHANGE SECURITY SETTTINGS FOR A
NETWORK WITHOUT AUTHORIZA TION AND WITHOUT CLEARL Y UNDERSTANDING
THE SETTINGS YOU ARE APPLING .
DATA YOU SEND CAN BE SEEN BY OTHERS.
The list below shows the possible wireless security levels on your SMCWPCI-N starting with the
most secure. EAP (Extensible Authentication Protocol) is used for authentication and utilizes
dynamic WEP key exchange. EAP requires interaction with a RADIUS (Remote Authentication
Dial-In User Service) server either on the WAN or the LAN to provide authentication service for
wireless stations.
1. Wi-Fi Protected Access (WPA)
2. IEEE802.1X EAP with RADIUS Server authentication
WITH POOR SECURITY SETTINGS, SENSITIVE
3. WEP Encryption
4. Unique ESSID
11
Page 12
ATA ENCRYPTION WITH WEP
D
The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to
make wireless networks as secure as wired networks. WEP encryption scrambles all data packets
transmitted between the SMCWPCI-N and the access point or other wireless stations to keep
network communications private. Both the wireless stations and the access points must use the
same WEP key for data encryption and decryption.
There are two ways to create WEP keys in your SMCWPCI-N.
• Automatic WEP key generation based on a password phrase called a passphrase. The
passphrase is case sensitive. You must use the same passphrase for all WLAN adapters
with this feature in the same WLAN.
• For WLAN adapters without the passphrase feature, you can still take advantage of this
feature by writing down the four automatically generated WEP keys from the Security Settings screen of the wireless utility and entering them manually as the WEP keys in the
other WLAN adapter(s).
The SMCWPCI-N allows you to configure up to four WEP keys and only one key is used as the
default transmit key at any one time.
12
Page 13
Chapter 3 - Hardware and Wireless Utility
This chapter introduces the Adapter and prepares you to use the Wireless Utility.
About Your Draft 11n Wireless PCI Adapter
With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment.
The following lists the main features of your Card.
• IEEE802.11n draft v1.0 compliant
• Wireless speeds up to 300Mbps
• Increased speeds & coverage - up to 5x the speed of 802.11g
• Fully backwards compatible with 802.11b/g wireless networks
• Stream HD video, Listen to digital music, Play online games, Transfer large files, Make VoIP calls
& Surf the Internet simultaneously
• WEP 64-/128-Bit, WPA & WPA2 wireless encryption
• EZ Installation Wizard for easy installation
• Supports Windows 2000/XP
• WLAN management utility
• Three external antennas for maximum speed and coverage
The following table describes the LEDs on the 11n (Draft) Wireless PCI Adapter
STATUS PWR LED LNK LED
POWER OFF
POWER ON
Radio on without association
Associated without traffic
Associated with traffic
Two LEDs slow blinking mutually
Two LEDs slow blinking together
Two LEDs bli nking together per traffic amount
OFF OFF
Slow Blinking OFF
13
Page 14
Hardware and Wireless Utility Installation
Follow the instructions below to install the PCI Card and Wireless Utility.
Do not insert the EZ Connect™ N Wireless PCI Adapter until instructed.
1. Put the EZ Installation & Documentation CD in to your CD-ROM drive. The CD will auto run. If the
CD does not auto run browse to your CD drive & double-click the “SMCWPCI_N.exe” file.
2. Click [Install Driver/Utility] to start the installation Wizard.
3. The installation Wizard will run. Click [Next] to continue.
14
Page 15
4. To install to the default folder location click [Next]. It is recommended to use the default folder
location unless you are an advanced user. To change the installation folder click the [Browse] button
and specify a new location. Click [Next] to continue.
5. The wizard is ready to begin installation. Click [Inst all].
6. A “Software Installation” warning may appear, click [Continue Anyway].
7. Click[Finish] to exit in the installation wizard.
15
Page 16
8. Turn off your computer.
9. Insert the EZ Connect™ N Wireless PCI Adapter in to an available PCI slot. IMPORTANT: For
correct installation of new hardware please refer to your Computer user manual. NOTE: To install
the card you may be required to remove the attached antennas. This is done by pulling the
antennas from the base.
10. Once the EZ Connect™ N Wireless PCI Adapter is inserted screw on the larger 5dBi antenna to the
connector marked with a green sticker. If you had to remove the antennas in step 9 reconnect them
now. The antennas push on (not screw on) to the remaining connectors.
11. Turn On your computer.
12. The “Found New Hardware Wizard” will appear. Click [No, not this time], then Next].
13. Click [Install the software automatically (Recommended)], then click [Next].
16
Page 17
14. A “Hardwa re Installation” warning may appear, click [Continue Any way].
15. Click [Finish] to complete the Driver/Utility installation.
17
Page 18
Using the Utility to Configure Your Network
The following are explanations on how to configure and use the Utility program. After completing the
installation procedure, a new icon as shown below will automatically appear in the lower right tray bar.
Hold your mouse pointer over the icon, and double click the left mouse button to open the Wireless Client
Utility.
The Wireless Client Utility window as shown below will appear.
The user can now use any of the management functions available in the IEEE 802.11 Wireless Client Utility.
Link Information
Click the Link Information tab to see general information about the program and its operation.
18
Page 19
The following table describes the items found on the Link Information screen.
Wireless Network Status
Profile Name
The name of the current selected configuration profile. Set
up the configuration name on the Profile tab.
SSID
Link Status
Displays the wireless network name.
Shows whether the station is associated to the wireless
network.
Network Type
The type of network the station is connected to. The options
include:
Infrastructure (access point) Ad Hoc
Wireless Mode
Transmit Rate
AP MAC Address
Displays the wireless mode. 802.11g, 11b or 11n
Displays the current transmit rate in Mbps.
Displays the MAC address of the access point the wireless
card is associated to.
Signal Strength Shows the strength of wireless signal.
Channel
Control Channel
Extension Channel
Channel number of the control 20MHz channel
To locate the 40MHz channel on combination with the control
19
Page 20
channel
Channel Width
Authentication
IP Address
Subnet Mask
DNS Server
Security
Gateway
20MHz only or 40/20MHz channel support
Security Status
Shows the security type – Disable, WEP, WPA/WPA2,
WAP-PSK/WAP2-PSK or 802.1X
Displays the authentication mode.
TCP/IP Status
Displays the computer's IP address.
Displays subnet mask
Displays gateway address
Display DNS server address
Site Survey
Click the Site Survey tab to see available infrastructure and ad hoc networks.
On this screen, click Refresh to refresh the list at any time.
Connecting to a different network
Hold your mouse pointer over the network icon, and click the right mouse button to select the network.
20
Page 21
Click the Connect button to connect the available network. If no configuration profile exists for that
network, the Profile Settings window opens to ask to create a profile for the network. Follow the
procedures to create profile for that network.
Profile
To add a new configuration profile, click Add on the Profile tab.
To modify a configuration profile, select the configuration from the Profile list and click the Edit button.
21
Page 22
Scan Available Networks
Click the Browsebutton on the Profile Settings screen to scan for available infrastructure and ad hoc
networks. On this list, click Refresh to refresh the list at any time.
To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile
Settings.
22
Page 23
Click Next to continue.
To define the security mode, select the security button of the desired security mode. And then click Next to
continue. Please see following table for details of security modes.
This card support three modes of WEP, include:
WEP
64 Bits128 Bits152 Bits
Except 152-Bit ode, both 64-Bit & 128-Bit modes support
Passphrase.
WPA/WPA2
Enables the use of Wi-Fi Protected Access (WP A).
Choosing WPA/WPA2 opens the WPA/WPA2 Security Settings
screen. The options include:
TLS(Transport Layer Security) is a Point-to-Point Protocol
(PPP) extension supporting additional authentication methods
within PPP. Transport Layer Security (TLS) provides for mutual
authentication, integrity-protected cipher suite negotiation, and key
exchange between two endpoints
Protocol) authenticates wireless LAN clients using only
server-side digital certificates by creating an encrypted SSL/TLS
tunnel between the client and the authentication
then protects the subsequent user authentication exchange.
server. The tunnel
PEAP (EAP-MSCHAP V2) (Protected Extensible
Authentication Protocol) To use PEAP (EAP-MSCHAP V2)
security, the server must have WPA-PEAP certificates, and
the server properties must already be set. Check with the IT
manager
TTLS(Tunneled Transport Layer Security) An EAP variant that
provides mutual authentication using a certificate for server
authentication, and via a secure TLS
tunnel for the client
LEAP (Lightweight and Efficient Application Protocol)
is the general framework for a set of high-performance,
efficient protocols which are ideal for mobile and wireless
applications. LEAP is designed to address all the technical
requirements of the wireless data communications industry,
and is oriented towards providing the greatest benefit to the
industry and the consumer
WPA-PSK/WPA2-PSK
Enables WPA/WPA2 Passphrase security.
Fill in the WPA/WPA2 Passphrase on Security Settings screen.
802.1x
Enables 802.1x security. This option requires IT administration.
Choosing 802.1x opens the 802.1x Security Settings screen. The
options include:
TLSPEAPTTLSLEAP
Advanced Settings
After Security Settings finished, the Advanced Settings screen will be shown as following.
24
Page 25
The following table describes the items found on the Advanced Settings screen.
Power Save Mode
Shows the power save mode. Power management is disabled in ad
hoc mode.The options include:
z Continuous Access Mode
z Maximum Power Saving
z Fast Power Saving
802.11b Preamble
Displays the 802.11b preamble format.
The options include:
z Long
z Short
z Auto
RTS Threshold
FRAG Threshold
Wireless Mode
Value from 0 ~ 2347
Value from 256 ~ 2346
Enable or disable 802.11n mode.
After advance settings are finished, the following screen showed as below.
You can activate the profile now or later.
25
Page 26
Chapter 4 - Maintenance
This chapter describes how to uninstall or upgrade the Wireless Utility.
Uninstall the Driver
Follow the steps below to remove (or uninstall) the Card driver from your computer.
Step 1. To remove the driver from the OS, go to Start -> Control Panel
Step 2. Double-click System
Step 3. Under Hardware tab, click Device Manager.
Step 4. Double-click Network Card
Step 5. Right-click mouse button on “SMC EZ Connect N Wireless PCI Adapter”, and choose Uninstall
Step 6. Click OK to confirm that you are going to uninstall the driver
Uninstall the Client Utility
Follow the steps below to remove the Client Utility from your computer.
Step 1. To remove the utility from the OS, go to Start -> Control Panel
Step 2. Double-click Add-Remove Programs
Step 3. Select SMC EZ Connect N Wireless PCI Adapter, and click the Uninstall button
Upgrading the Wireless Utility
To perform the upgrade, follow the steps below.
Step 1. Download the latest version of the utility from the web site and save the file on your computer.
Step 2. Follow the steps in Section 3.2 to remove the current Wireless Utility from your computer.
Step 3. Restart your computer if prompted.
Step 4. After restarting, refer to the procedure in the Chapter 2 to install the new utility.
26
Page 27
Glossary
For unfamiliar terms used below, look for entries elsewhere in the glossary.
AD-H OC (IBSS)
Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless
from computer to computer without the use of a base station (access point).
Two or more wireless stations communicate directly to each other. An ad-hoc network may
sometimes be referred to as an Independent Basic Service Set (IBSS).
CHANNEL
A radio frequency used by a wireless device is called a channel.
EAP AUTHENTICATION
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE802.1X transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless
station and a RADIUS server perform authentication.
ENCRYPTION
The reversible transformation of data from the original to a difficult-to-interpret format. Encryption is a mechanism for protecting confidentiality, integrity, and authenticity of data. It uses an
encryption algorithm and one or more encryption keys.
FRAGMENTATION THRESHOLD
This is the maximum data fragment size that can be sent before the packet is fragmented into
smaller packets.
IEEE 802.1X
The IEEE 802.1X standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using an external
RADIUS server.
INFRASTRUCTURE (BSS)
When a number of wireless stations are connected using a single AP, you have a Basic Service Set (BSS).
ROAMING
In an infrastructure network, wireless stations are able to switch from one BSS to another as
they move between the coverage areas. During this period, the wireless stations maintain
uninterrupted connection to the network. This is roaming. As the wireless station moves from
place to place, it is responsible for choosing the most appropriate AP depending on the signal
strength, network utilization among other factors.
27
Page 28
SSID
The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other.
TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and
distributed by the authentication server.
USER AUTHENTICATION
WPA applies IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. If you do not have an external RADIUS server,
use WPA-PSK/WPA2-PSK (WPA -Pre-Shared Key) that only requires a single (identical)
password entered into each access point, wireless gateway and wireless client. As long as the
passwords match, clients will be granted access to a WLAN.
WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between
the SMCWPCI-N and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data
encryption and decryption.
WPA/PA2
Wi-Fi Protected Access (WPA) and WPA2 is a subset of the IEEE 802.11i security
specification draft. Key differences between WPA and WEP are user authentication and
improved data encryption. WPA2 is a wireless security standard that defines stronger
encryption, authentication and key management than WPA
Page 29
TECHNICAL SUPPORT
From U.S.A. and Canada (24 hours a day, 7 days a week)
Phn: (800) SMC-4-YOU / (949) 679-8000
Fax: (949) 679-1481
ENGLISH
Technical Support information available at www.smc.com
FRENCH
Informations Support Technique sur www.smc.com
DEUTSCH
Technischer Support und weitere Information unter www.smc.com
SPANISH
En www.smc.com Ud. podrá encontrar la información relativa a
servicios de soporte técnico
DUTCH
Technische ondersteuningsinformatie beschikbaar op www.smc.com
PORTUGUES
Informações sobre Suporte Técnico em www.smc.com
SWEDISH
Information om Teknisk Support fi nns tillgängligt på www.smc.com