TRENDNET TEW429UB Users Manual

Copyright
This publication, including all photographs, illustrations and software, is protected under interna­tional copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author.
Copyright 2005 Version 1.0 (July, 2005)
The information in this document is subject to change without notice. The manufacturer makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. The manufacturer reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of the manufacturer to notify any person of such revision or changes.
Trademark recognition
All product names used in this manual are the properties of their respective owners and are acknowledged.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation
IMPORTANT NOTE: FCC Radiation Exposure Statement
 This equipment has been SAR-evaluated for use in laptops (notebooks) with side slot configuration. Maximum Averagre SAR (1g) is 0.910W/kg. 
This device complies with FCC RF Exposure limits set forth for an uncontrolled environment, under 47 CFR 2.1093 paragraph (d)(2).
This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter.
This device was tested for typical by stander conditions that may occur during use. To comply with FCC RF exposure requirements a minimum separation distance of 1.5 cm must be main- tained between the user’s body and the device, including the antenna.
TRENDware declares that TEW-429UB, (FCC ID: S92ZTEW429UB) is limited in CH1~CH11 for
2.4 GHz by specified firmware controlled in U.S.A.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environ- ment.
This device complies with FCC RF Exposure limits set forth for an uncontrolled environment, under 47 CFR 2.1093 paragraph (d) (2).
This transmitter must not be co-located or operated in conjunction with any other antenna or transmitter.
Table of Contents
Getting Started with the TEW-429UB ..........................................................1
Overview of the Wireless Client Utility ..........................................................................2
Working with Profiles ....................................................................................................3
Creating a Profile .....................................................................................................3
Modifying Profiles ..................................................................................................... 6
Checking for Available Access Points ........................................................................ 10
Disabling the Wireless Client Utility ............................................................................ 11
HotSpot Detector Hardware.......................................................................13
Charging TEW-429UB ................................................................................................13
Identifying Components ..............................................................................................13
LCD Icons .............................................................................................................. 13
Finding a HotSpot .................................................................................................. 14
Accessing a HotSpot ..............................................................................................14
Exploring the Wireless Client Utility Screens ............................................15
The Network Screen ...................................................................................................15
Wireless Setting .....................................................................................................16
TCP/IP Setting ....................................................................................................... 17
Link Information ...................................................................................................... 17
The Profile Screen ......................................................................................................18
Profile List .............................................................................................................. 19
The SiteSurvey Screen ...............................................................................................20
Available Networks .................................................................................................20
Detailed Info. Screen ..............................................................................................21
The Options Screen .................................................................................................... 21
Options ...................................................................................................................22
The Version Screen ....................................................................................................22
Configuring Wireless Security ...................................................................23
Configuring Security ................................................................................................... 23
Configuring WEP .................................................................................................... 23
Configuring WPA & WPA2 ..................................................................................... 26
Configuring WPA-PSK & WPA2-PSK (to be supported) ........................................ 26
Configuring 802.1x ................................................................................................. 27
Configuring 802.1x – PEAP ....................................................................................27
Configuring 802.1x – PEAP-TLS ............................................................................29
Glossary .................................................................................................... 31
Appendix ............................................................................................................33
Maintenance ................................................................................................................ 33
Checking the Wireless Client Utility Version ............................................................33
Uninstalling the Wireless Client Utility .....................................................................34
Upgrading the Wireless Client Utility .......................................................................34
Troubleshooting ...............................................................................................................
.................................................................................................................................35
Problems Starting the 802.11g Wireless Client Utility Program
Problems with the Link Status .................................................................................35
Problems with Security Settings
Specifications ..............................................................................................................36
Wi-Fi Radio: ............................................................................................................36
iv --
Getting Started with the TEW-429UB
Congratulations on purchasing the TEW-429UB! The quick start guide included with your TEW-429UB tells you how to install the Wireless Client Utility and how to operate the Hotspot Detector features of the TEW-429UB.
This manual provides information for setting up and configuring the TEW-429UB. This manual is intended for both home users and professionals. It is not required to read some of the more technical information in this manual to operate and enjoy the TEW-429UB. It is included for your reference only.
The following conventions are used in this manual:
THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT
NOTE
HAND.
THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE
YOUR NETWORK EXPERIENCE.
THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE
YOUR NETWORKING EXPERIENCE OR COMPROMISE YOUR SECURITY.
L
IKE NOTES AND TIPS, THE IMPORTANT SYMBOL INDICATES INFORMATION THAT
CAN IMPROVE NETWORKING.
THIS INFORMATION SHOULD NOT BE OVERLOOKED.
1
Overview of the Wireless Client Utility
The Wireless Client Utility is included on the CD that shipped with the TEW-429UB. Install the utility as described in the Quick Start Guide before attaching the TEW-429UB to your computer.
BE SURE TO INSTALL THE WIRELESS CLIENT UTILITY BEFORE YOU ATTACH
IMPORTANT
When the TEW-429UB is installed, it is configure d to a uto mat ically load when you start your computer. The utility icon displays in t he system tray at the bottom-right corner of your screen.
THE TEW-429UB TO YOUR COMPUTER. ATTACHING THE TEW-429UB BEFORE THE UTILITY IS INSTALLED COULD CAUSE THE INSTALLATION TO FAIL.
Double-click the TEW-429UB icon in the system tray, the following Network screen opens:
2
The Link Information pane provides information on your current connection. This same pane is shows at the bottom of all screens so you are always aware of your connection status.
WHEN THE TEW-429UB IS NOT CONNECTED TO YOUR COMPUTER, MOST
WIRELESS CLIENT UTILITY ARE UNAVAILABLE. SETTINGS OR
NOTE
SETTINGS IN THE BUTTONS THAT ARE NOT AVAILABLE ARE GRAYED OUT.
Working with Profiles
A profile is a record of the configuration you use to connect to a particular access point. Without profiles, you would have to reconfigure the TEW-429UB each time you change access points. Using the Profile screen you can configure the TEW-429UB to access your home network and your office network. Each configuration is saved as a profile. Then when yo u go from the office to your home you just select the appropriate profile.
NOTE
C
REATING A PROFILE
1. Click Profile
YOU CAN CHANGE PROFILES WITHOUT REBOOTING YOUR COMPUTER. (PERHAPS
WHEN WALKING FROM ONE ACCESS POINT TO ANOTHER WITHIN YOUR OFFICE.) YOU USE MUST REBOOT THE COMPUTER WHEN CHANGING ACCESS POINTS.
WINDOWS CONTROL PANEL TO CONFIGURE YOUR CONNECTIONS, YOU
IF
3
2. Click Add. The Wireless Client Utility Profile Wizard opens.
3. Type a descriptive name for the profile such as Office or CoffeeShop.
4. Click the drop-down arrow at Network Mode and select Infrastructure or Ad-Hoc. Choose Infrastructure when connecting to an access point or wireless router. You will need to know the SSID of the access point.
Choose Ad-Hoc when connecting directly to another computer without using an access point. You can type anything for the SSID as long as the same SSID is used on the computer you are connecting to.
5. In the SSID pane click Browse. The utility performs a site survey and displays the results.
The SSID (Service Set IDentifier) is the name assigned to a wireless Wi-Fi network. All devices must use this case-sensitive name, which is a text string up to 32 bytes long, in order to communicate.
4
6. Select the SSID you want to connect to and click Add to Profile.
7. Click Next. The WLAN Security Configuration screen appears.
This screen reflects the security settings detected in the access point you want to connect to. Security settings vary in complexity and you may have to con sult your network admi nistrator f or this information. See “Configuring Wireless Security” for more information.
8. Select the Security Mode from the drop-down list and then select the appropriate settings for the
security mode.
5
9. Click Next
10. Click Save to complete the wizard and save the new profile. (If you do not want to activate the
profile, uncheck the Apply this profile now checkbox.)
M
ODIFYING PROFILES
You may need to modify settings for a profile. For example, if you purchase a new router, or if your office administrator provides you with new security settings. Refer to the following to modify a profile.
1. Open the Wireless Client Utility and click Profile.
6
2. Select the profile you want to modify and click Properties, the following window appears
3. Make the changes you want to the Basic Settings and click Advanced Settings.
Unless you have a thorough understanding of wireless networking, it is recommended that you leave these settings at the defaults.
7
4. Click WLAN Security.
A
Click the drop-down arrow at Security Mode to choose from the following settings: Disabled (No Encryption)
All data sent between the access point and the client is left unencrypted and may be viewed by other wireless devices.
WEP (Wired Equivalent Privacy) Encrypts all traffic sent between the access point and the client using a shared key. When using WEP encryption, only access points and PCs using the same WEP Key can communicate with each other
WPA/WPA2
WPA encrypts all traffic between the access point and the client using either TKIP or AES encryption. Depending on the authentication protocol selected, each client must authenticate using their own unique username, password, and security certificate.
WPA-PSK/WPA2-PSK
WPA-PSK or WPA2-PSK is a compromise between WPA/WPA2 and WEP. Lik e WEP, it uses a pre-shared key that every user of the net work must have in order to send and receive data. Like WPA, it uses either TKIP or AES.
IMPORTANT
I
T IS RECOMMEDED THAT YOU USE WPA/WPA2 OR WPA-PSK/WPA2-PSK WHENEVER POSSIBLE. WPA (WI-FI PROTECTED ACCESS) PROVIDES STRON- GER ENCRYPTION THAN THE EARLIER WEP (WIRED EQUIVALENT PRIVACY) METHOD.
ND KEY MANAGEMENT.
WPA2 PROVIDES EVEN STRONGER ENCRYPTION, AUTHENTICATION
8
Loading...
+ 32 hidden pages