This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained
herein, may be reproduced without written consent of the author.
Copyright 2005
Version 1.0 (July, 2005)
Disclaimer
The information in this document is subject to change without notice. The manufacturer makes no
representations or warranties with respect to the contents hereof and specifically disclaims any
implied warranties of merchantability or fitness for any particular purpose. The manufacturer
reserves the right to revise this publication and to make changes from time to time in the content
hereof without obligation of the manufacturer to notify any person of such revision or changes.
Trademark recognition
All product names used in this manual are the properties of their respective owners and are
acknowledged.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful interference
to radio or television reception, which can be determined by turning the equipment off and on, the
user is encouraged to try to correct the interference by one of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that
• to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
Page 3
IMPORTANT NOTE: FCC Radiation Exposure Statement
This device complies with FCC RF Exposure limits set forth for an uncontrolled environment,
under 47 CFR 2.1093 paragraph (d)(2).
This transmitter must not be co-located or operated in conjunction with any other antenna or
transmitter.
This device was tested for typical by stander conditions that may occur during use. To comply
with FCC RF exposure requirements a minimum separation distance of 1.5 cm must be maintained between the user’s body and the device, including the antenna.
U-MEDIA declares that TEW-429UF, (FCC ID: S9ZTEW429UF) is limited in CH1~CH11 for 2.4
GHz by specified firmware controlled in U.S.A.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
This device complies with FCC RF Exposure limits set forth for an uncontrolled environment,
under 47 CFR 2.1093 paragraph (d) (2).
This transmitter must not be co-located or operated in conjunction with any other antenna or
transmitter.
Page 4
Table of Contents
Getting Started with the TEW-429UF ..........................................................1
Overview of the Wireless Client Utility ..........................................................................2
Working with Profiles ....................................................................................................3
Creating a Profile .....................................................................................................3
Congratulations on purchasing the TEW-429UF! The quick start guide included with your
TEW-429UF tells you how to install the Wireless Client Utility and how to operate the Hotspot Finder
feature of the TEW-429UF.
This manual provides information for setting up and configuring the TEW-429UF. This manual is
intended for both home users and professionals. It is not required to read some of the more
technical information in this manual to operate and enjoy the TEW-429UF. It is included for your
reference only.
The following conventions are used in this manual:
THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT
NOTE
HAND.
THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE
YOUR NETWORK EXPERIENCE.
THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE
YOUR NETWORKING EXPERIENCE OR COMPROMISE YOUR SECURITY.
L
IKE NOTES AND TIPS, THE IMPORTANT SYMBOL INDICATES INFORMATION THAT
CAN IMPROVE NETWORKING.
THIS INFORMATION SHOULD NOT BE OVERLOOKED.
1
Page 8
Introduction
The TEW-429UF supports Wi-Fi Detector, 802.11b/g USB 2.0 Adapter and Flash Drive 3-in-1
function in a USB portable form factor enclosure. Furthermore, the TEW-429UF features user
friendly automatic WLAN driver/utility installation. When you plug-in the TEW-429UF to the USB
port of your laptop or desktop computer at the first time, Windows (2000, XP) will automatically
pop-up auto-run dialog and start driver/utility installation. The users can really benefit from the
all-in-one advantage.
Working as an USB flash disk, the TEW-429UF contains two disk partitions at default. One of the
partitions is emulated as a CD-ROM drive that contains WLAN adapter driver/utility and it is
configured to read only (write protected) area. The other is configured for normal flash disk usage.
This two partitions share the total memory of 512MB.
Overview of the Wireless Client Utility
The Wireless Client Utility is included on the adapter. Install the
utility as described in the Quick Start Guide.
* Please note: Some of the listed capacity is used for formatting and other functions (20MB is reserved for
User’s Guide and Driver Utility) and thus is not available for data storage. Please see User’s Guide for detail.
When the TEW-429UF is installed, it is configured to automatically load when you start your
comput er . The utilit y i c o n d i s p l a y s in the system tray at the bottom-right corner of your screen.
Double-click the TEW-429UF icon in the system tray, the following Network screen opens:
2
Page 9
The Link Information pane provides information on your current connection. This same pane is
shows at the bottom of all screens so you are always aware of your connection status.
WHEN THE TEW-429UF IS NOT CONNECTED TO YOUR COMPUTER, MOST
WIRELESS CLIENT UTILITY ARE UNAVAILABLE. SETTINGS OR
NOTE
SETTINGS IN THE
BUTTONS THAT ARE NOT AVAILABLE ARE GRAYED OUT.
Working with Profiles
A profile is a record of the configuration you use to connect to a particular access point. Without
profiles, you would have to reconfigure the TEW-429UF each time you change access points.
Using the Profile screen you can configure the TEW-429UF to access your home network and your
office network. Each configuration is saved as a profile. Then when yo u go from the office to your
home you just select the appropriate profile.
NOTE
C
REATING A PROFILE
YOU CAN CHANGE PROFILES WITHOUT REBOOTING YOUR COMPUTER. (PERHAPS
WHEN WALKING FROM ONE ACCESS POINT TO ANOTHER WITHIN YOUR OFFICE.)
YOU USE
MUST REBOOT THE COMPUTER WHEN CHANGING ACCESS POINTS.
WINDOWS CONTROL PANEL TO CONFIGURE YOUR CONNECTIONS, YOU
Refer to the following to add a profile
1. Click Profile.
IF
3
Page 10
2. Click Add. The Wireless Client Utility Profile Wizard opens.
3. Type a descriptive name for the profile such as Home or Office
4. Click the drop-down arrow at Network Mode and select Infrastructure or Ad-Hoc. Choose
Infrastructure when connecting to an access point or wireless router. You will need to know the
SSID of the access point.
Choose Ad-Hoc when connecting directly to another computer without using an access point.
You can type anything for the SSID as long as the same SSID is used on the computer you are
connecting to.
5. In the SSID pane click Browse. The utility performs a site survey and displays the results.
The SSID (Service Set IDentifier) is the name assigned to a wireless Wi-Fi network. All devices
must use this case-sensitive name, which is a text string up to 32 bytes long, in order to
communicate.
6. Select the SSID you want to connect to and click Add To Profile.
4
Page 11
7. Click Next. The WLAN Security Configuration screen appears.
This screen reflects the security settings detected in the access point you want to connect to.
Security settings vary in complexity and you may have to con sult your network admi nistrator f or
this information.
8. Select the Security Mode from the drop-down list and then select the appropriate settings for the
security mode.
5
Page 12
9. Click Next
10. Click Save to complete the wizard and save the new profile. (If you do not want to activate the
profile, uncheck the Apply this profile now checkbox.)
M
ODIFYING PROFILES
You may need to modify settings for a profile, for example, if you purchase a new router, or if your
office administrator provides you with new security settings. Refer to the following to modify a profile.
1. Open the Wireless Client Utility and click Profile.
6
Page 13
2. Select the profile you want to modify and click Properties.
3. Make the changes you want to the Basic Settings and click Advanced Settings.
Unless you have a thorough understanding of wireless networking, it is recommended that
you leave these settings at the defaults.
7
Page 14
4. Click WLAN Security.
Click the drop-down arrow at Security Mode to choose from the following settings:
Disabled (No Encryption)
All data sent between the access point and the client is left unencrypted and may be viewed by
other wireless devices.
WEP (Wired Equivalent Privacy)
Encrypts all traffic sent between the access point and the client using a shared key. When using
WEP encryption, only access points and PCs using the same WEP Key can communicate with
each other
WPA/WPA2
WPA encrypts all traffic between the access point and the client using either TKIP or AES
encryption. Depending on the authentication protocol selected, each client must authenticate
using their own unique username, password, and security certificate.
WPA-PSK/WPA2-PSK
WPA-PSK or WPA2-PSK is a compromise between WPA/WPA2 and WEP. Lik e WEP, it uses a
pre-shared key that every user of the net work must have in order to send and receive data. Like
WPA, it uses either TKIP or AES.
8
Page 15
5. Make the changes you want and click TCP/IP Config.
Select the Use IP Changer checkbox. This allows you to bypass your existing wireless TCP/ IP
settings and configure TCP/IP settings for each profile.
Use DHCP
DHCP (Dynamic Host Configuration Protocol) automatically assign IP addresses. Check this
radio button if your router is set to DHCP.
Use static IP below
Check this radio button if you have to enter a static IP address.
9
Page 16
Checking for Available Access Points
The number of access points or hot spots for public use is constantly increasing in major cities.
Many Web sites report on the locati ons of hot spots. Check t he following Web sites f or updated
information for your location.
• http://intel.jiwire.com
• www.hotspot-locations.com
• www.hotspotlist.com
• www.wififreespot.com
• www.wifinder.com
• www.wi-fizone.org
If you think you are in the vicinity of an access point, you can use the SiteSurvey screen to list the
ones available.
Remember, you do not have to turn on your computer to find access poin ts.
You can use the hot spot finder functionality of the TEW-429UF to locate
access points while you are walking around.
To scan for access points using the TEW-429UF, refer to the following.
1. Open the Wireless Client Utility and click SiteSurvey.
10
Page 17
2. Available wireless networks are listed. Click Refresh anytime to update the list.
3. Select the network you want and click Connect. Or click Add To Profile if you want to connect
later.
For details about any of the listed access points, select it from the list and click Detailed Info to
see the following screen. (You can also double-click an access point to view the Detailed Info
screen.
11
Page 18
Disabling the Wireless Client Utility
You may need to have Windows manage your wireless network settings. In that case, you should
disable the Wireless Client Utility. To disable the Wireless Client Utility refer to the following.
1. Open the Wireless Client Utility and click Options.
2. Select the Let Windows manage this wireless adapter check box and click Apply Now.
12
Page 19
Exploring the Wireless Client Utility Screens
The Network Screen
When the TEW-429UF is installed, it is configured to automatically load when you start your
compute r . Th e u t i l i ty icon dis p l a y s in the system tray at the bottom-right corner of your screen.
Double-click the TEW-429UF icon in the system tray, the following Network screen opens:
WIRELESS SETTING
The Wireless Setting pane settings are described below
Current Profile
Shows the current profile you have selected. If you have not added a
profile, only Default shows. The settings shown in the Network
screen are for the current profile. Click the drop down arrow to
select another profile.
Reconnect (button)
Network Mode
Security
Authentication
13
Press to reconnect to the current access point.
Shows the current network mode. Infrastructure or ad-hoc mode.
Shows the security status.
Shows the authentication required.
Page 20
TCP/IP SETTING
The TCP/IP Setting pane settings are described below.
IP Address
Subnet Mask
Gateway
DNS Server
Shows the current network IP address.
Shows the current subnet mask status.
Shows the current gateway.
Shows the current network DNS
address.
IP Release (button)
Click to release the current TCP/IP settings.
IP Renew (button)
INK INFORMATION
L
The Link Information pane settings are described below. The Link Information pane shows the
network status.
SSID
Click to renew the TCP/IP settings.
Shows the current SSID (Service Set
IDentifier). This is the name assigned
to a wireless Wi-Fi network. All
devices must use this case-sensitive
name in order to communicate.
Status
Link Speed
Signal Level
BSSID
Channel
Shows the current connection status.
Shows the speed of the current connec-
tion. Tx is the transmit speed; Rx the
receive speed.
Shows the signal strength of the current connection.
Shows the ID of the current BSS.
Shows the network channel.
14
Page 21
The Profile Screen
)
A profile is a record of the configuration you use to connect to a particular access point. Without
profiles, you would have to reconfigure the TEW-429UF each time you change access points.
Using the Profile screen you can configure the TEW-429UF to access your home network and
your office network. Each configuration is saved as a profile.
PROFILE LIST
The Profile List pane settings are described below.
Name
Shows the name of the profile that you assigned. If only default displays,
no profiles have been added.
SSID
Shows the name (usually the equipment vendor's name) assigned to a
wireless Wi-Fi network. (The keyword “ANY” means any available
IP Address
Add (button)
Remove (button)
Properties (button)
Apply (button)
Up (button)
Down (button)
network.
Shows the IP address.
Click to add a profile.
Click to remove the selected profile.
Click to view properties for the selected profile.
Click to apply changes after modifying settings.
Use the Up/Down buttons to move the selected profile to the top of the list
or to the bottom. When in the Network screen, the TEW-429UF attempts
to connect to the network at the top of this list first.
15
Page 22
The SiteSurvey Screen
Use the SiteSurvey screen to scan for available networks in your vicinity.
NETWORKS
E
The Available Networks pane settings are described below.
SSID
Shows the name (usually the equipment vendor's
name) assigned to a wireless Wi-Fi network.
Mode
Strength
Ch
Security
Refresh (button)
Shows the signal type (802.11a/b/g).
Shows the signal strength.
Shows the network channel.
Shows the security status.
Click to refresh the list of currently available net-
works.
Detailed Info (button)
Connect (button)
Click to view properties for the selected network.
Click to connect to the selected network. (The network is not added to the profile list.)
Add To Profile (button)
Click to add the network to the profile list.
AVAILABL
16
Page 23
DETAILED INFO. SCREEN
For details about any of the listed access points, select it from the list and click Detailed Info to
see the following screen. (You can also double-click an access point to view the Detailed Info
screen.
The Options Screen
By default, the Wireless Client Utility configures your wireless settings. Use this screen to disable
the Wireless Client Utility.
17
Page 24
O
PTIONS
The Options pane settings are described below.
Let Windows manage
this wireless adapter
(tick box)
When you check the Let Windows manage this wireless adapter
check-box, Windows Zero Configuration manages your wireless
settings. The Wireless Client Utility still shows the link status of the
adapter.
Apply Now (button)
Click to execute the changes.
The Version Screen
This screen displays the software and hardware information of the adapter. You cannot make
changes to this screen.
18
Page 25
Configuring Wireless Security
This chapter covers the configuration of security options in the 802.11 Wireless Client Utility.
Configuring Security
When you create a profile you need to configure the security settings with the information provided
by the administrator. You modify security settings by selecting the profile and clicking Properties.
19
Page 26
CONFIGURING WEP
Refer to the following to modify WEP settings.
1. In the Properties window, click WLAN Security.
2. Click the drop-down arrow at Security Mode and choose WEP.
3. Click the Use Static WEP checkbox.
20
Page 27
4. Click Configure. The WEP Configuration screen appears.
WEP Method
Authentication
Make Key using PassPhrase
Manual Input (ASCII)
Manual Input (HEX)
Default Key
Select the encryption to match your access point: 64, 128, or 256-bit. The
encryption level must match the encryption level used by your access
point.
Options are Auto, Open System, and Shared. For most installations
choose Auto.
A WEP Key is automatically generated as you type in any Passphrase of
your choice. Use this feature when you have used a Passphrase to
generate your WEP key on your access point.
Generate your own WEP Key (4 keys maximum) using ASCII characters
(5 characters for 64-bit, 13 characters for 128-bit, 26 characters for
256-bit)
Generate your own WEP Key using hexadecimal characters (10
characters for 64-bit, 26 characters for 128-bit, 52 characters for 256-bit).
Four keys are used for decryption; you have to choose a default key from
them for encryption. Make sure access point uses same WEP key.
21
Page 28
CONFIGURING WPA & WPA2
Refer to the following to configure WPA & WPA2.
1. Click the drop-down arrow at Security Mode and choose WPA or WPA2.
2. Click the drop-down arrow at Encryption Method and choose TKIP or AES.
To configure 802.1X (authentication protocol) for WPA or WPA2
C
ONFIGURING WPA-PSK & WPA2-PSK
Refer to the following to configure WPA-PSK & WPA2-PSK.
22
Page 29
1. Click the drop-down arrow at Security Mode and choose WPA-PSK or WPA2-PSK.
2. Click the drop-down arrow at Encryption Method and choose TKIP or AES. (Most access
points use TKIP for WPA-PSK & AES for WPA2-PSK.)
3. At PSK Passphrase enter the same pass phrase used to configure the WPA-PSK or
WPA2-PSK on your access point.
C
ONFIGURING 802.1X
You need to know if your access point supports 802.1X and then apply the configuration here.
1. Choose the EAP method under Authentication protocol.
2. Options for User Information depend on the EAP method chosen.
C
ONFIGURING 802.1X – PEAP
Refer to the following to configure PEAP.
23
Page 30
1. At WPA or WPA2 security mode, click Configure button next to Authentication Protocol.
2. Select Inner PEAP protocol.
3. Click Save to finish and return to the previous screen.
4. Type in a unique User ID and Password under User Information.
5. If your network uses a user server certificate click Configure Certificate (see Note below).
The following window appears:
Use user certificate
Validate server certificate
Server name:
Server name should match exactly
6. Click OK to apply the settings.
Check this box if your network
requires user certification and then
select the certificate from the dropdown menu.
Check this box if your network
requires servercertification and then
select the certificate authority from the
drop-down menu.
Type in the name of the server that is
used for 802.1X authentication.
Check this box if the server name should
exactly match the name in the certificate.
24
Page 31
CONFIGURING 802.1X – EAP-TLS
1. At Security Mode select WPA or WPA2 from the drop-down menu.
2. At Authentication Protocol select TLS from the drop-down menu. TLS requires both server
and user certification. Click Configure Certificate
25
25
Page 32
Use user certificate
Check this box if your network
requires user certification and then
select the certificate from the dropdown menu.
Validate server certificate
Server name:
Server name should match exactly
5. Click OK to apply the settings.
Server Certificates require a wired connection to the network so you
Can obtain the certificate(s) from the certificate authority. Your network
administrator can provide on certificate management.
.
Check this box if your network
requires server certification and then
select the certificate authority from the
drop-down menu.
Type in the name of the server that is
used for 802.1X authentication.
Check this box if the server name should
exactly match the name in the certificate.
26
Page 33
HotSpot Detector
This section explains the hardware section of the TEW-429UF.
Charging the TEW-429UF
The TEW-429UF is powered by a rechargeable battery. The battery must be charged before first
use as follows.
Most notebook computer USB connectors are horizontal.
The TEW-429UF should be connected with the display
facing up. If the USB connector on your computer is
CAUTION
1. Remove the cap from the
TEW-429UF.
2. With the display facing up,
insert the TEW-429UF into a
USB connector on your
computer.
The
screen indicating the battery
is charging.
vertical, connect the TEW-429UF carefully to avoid
damaging the connectors.
icon on the LCD
Identifying Components
The illustration below shows the buttons and LEDs on the TEW-429UF.
Seek
Next
Seek LED Power LED
Power
27
Page 34
LCD Icons
The illustration below shows the icons in the LCD. All the icons will not necessarily appear
together as shown here.
1 SSID:
2 Channel:
3 Found:
4 Power:
5 Scan mode:
6 Security
7 Signal
Strength
2
1
3
Displays the SSID of the current connection. Scrolls
horizontally for longer names.
Displays the channel number of the current
connection.
Displays the number of connections found. Up to 16
connections can be monitored.
Indicates the battery status:
fully charged;
Press and hold the Seek button to scroll through
the three modes: [S]; [F]; and [D].
Scan results are ranked in order of signal
strength.
Only lists open hot spots ranked in order of
signal strength.
Continually refreshes details of the selected hot
spot. Allows you to lock on and monitor the
signal strength as you move around.
Displays the security settings of the network:
[WEP]/[WPA] security enabled;
disabled.
Displays the signal strength (five levels) and
radio band: [G]/[B] 802.11g/b.
recharging.
6 4 5
7
low;
security
Fully charged and Recharging icons would appear during charging process only.
Finding a Hot Spot
Refer to the following to find a hot spot.
3. Switch Power to ON. The TEW-429UF boots and searches for hot spots.
4. Press Next to scroll the available hot spots.
Accessing a Hot Spot
5. Connect the TEW-429UF to your computer and open the Wireless Client Utility.
6. Open the SiteSurvey screen and select the hot spot you want to access.
7. Click Connect to access the hot spot.
28
Page 35
Glossary
For unfamiliar terms used below, look for entries elsewhere in the glossary.
AD-H OC (IBSS)
Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless
from computer to computer without the use of a base station (access point).
Two or more wireless stations communicate directly to each other. An ad-hoc network may
sometimes be referred to as an Independent Basic Service Set (IBSS).
CHANNEL
A radio frequency used by a wireless device is called a channel.
EAP AUTHENTICATION
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE802.1X transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless
station and a RADIUS server perform authentication.
ENCRYPTION
The reversible transformation of data from the original to a difficult-to-interpret format. Encryption
is a mechanism for protecting confidentiality, integrity, and authenticity of data. It uses an
encryption algorithm and one or more encryption keys.
FRAGMENTATION THRESHOLD
This is the maximum data fragment size that can be sent before the packet is fragmented into
smaller packets.
IEEE 802.1X
The IEEE 802.1X standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using an external
RADIUS server.
INFRASTRUCTURE (BSS)
When a number of wireless stations are connected using a single AP, you have a Basic Service
Set (BSS).
ROAMING
In an infrastructure network, wireless stations are able to switch from one BSS to another as they
move between the coverage areas. During this period, the wireless stations maintain
uninterrupted connection to the network. This is roaming. As the wireless station moves from
place to place, it is responsible for choosing the most appropriate AP depending on the signal
strength, network utilization among other factors.
29
Page 36
SSID
The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless
network. Wireless devices must have the same SSID to communicate with each other.
TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and
distributed by the authentication server.
USER AUTHENTICATION
WPA applies IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless
clients using an external RADIUS database. If you do not have an external RADIUS server, use
WPA-PSK/WPA2-PSK (WPA -Pre-Shared Key) that only requires a single (identical) password
entered into each access point, wireless gateway and wireless client. As long as the passwords
match, clients will be granted access to a WLAN.
WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the
TEW-429UF and the AP or other wireless stations to keep network communications private.
Both the wireless stations and the access points must use the same WEP key for data
encryption and decryption.
WPA/WPA2
Wi-Fi Protected Access (WPA) and WPA2 (future upgrade) is a subset of the IEEE 802.11 i
security specification draft. Key differences between WPA and WEP are user authentication and
improved data encryption. WPA2 is a wireless security standard that defines stronger
encryption, authentication and key management than WPA.
30 -- Glossary
Page 37
Appendix
This section provides maintenance and troublshooting procedures. Specifications of the
TEW-429UF are also provided. The following topics are discussed:
Maintenance
Installing a newer version of the Wireless Client Utility may improve the performance of the
TEW-429UF. Before installing the new version, you must uninstall the old one.
CHECKING THE WIRELESS CLIENT UTILITY VERSION
To check the current Wireless Client Utility, open the utility on the Version screen. In the S/W
Information pane, note the Utility Version number.
IMPORTANT
31
If you need to contact technical support, you will need to provide the S/W
Information. Be sure to check the screen in the utility that is installed on
your computer and not the screen shown in this manual.
Page 38
UNINSTALLING THE WIRELESS CLIENT UTILITY
Refer to the following to uninstall (remove) the Wireless Client Utility from your computer.
2. When prompted, click Yes to remove the driver and utility software.
3. Click Finish to complete the uninstallation.
4. Reboot your computer if prompted.
PGRADING THE WIRELESS CLIENT UTILITY
U
Contact your dealer or technical support for details on downloading the current Wireless Client
Utility. Refer to the following to upgrade the Wireless Client Utility.
1. Double-click the Setup.exe file that you downloaded. The installation wizard screen opens.
2. Click Next to continue.
3. Click Next in the Choose Destination Location screen.
4. Click Install to begin the installation.
5. Click Finish to exit the wizard and complete the installation.
32 – Specifications
Page 39
Working over Windows 98 & 98SE
Working as an USB flash disk under Win 98/98SE
The following flash disk driver installation is required only for Windows 98 and 98 Second Edition
(98SE) operating systems. The TEW-429UF works as a true “plug-and-go” flash disk device upon
the rest of Windows operation systems, such as Windows ME, 2000 and XP. You just need to
simply plug-in the TEW-429UF to computer USB port then Windows will automatically detect the
TEW-429UF as a flash disk device.
(1) Place TEW-429UF driver/manual CD to the CD-ROM drive of your computer.
(2) Run “Setup.exe” file to copy the TEW-429UF USB flash disk driver for Windows 98/98SE to your
computer.
(3) Click "Finish" to complete the driver copy.
(4) Plug-in the TEW-429UF to a free USB port of your computer. Windows will
install USB flash disk driver automatically.
Now you can use TEW-429UF as a flash disk.
Working as an USB Wi-Fi adapter under Win 98/98SE
To use TEW-429UF as an USB Wi-Fi adapter, you have to enable flash disk function first (see the
above section), then install WLAN driver.
(1) Plug-in the TEW-429UF to a free USB port of your computer
(2) Use Windows Explorer to find out "TEW-429UF" flash disk drive, then double click.
(3) Run “Setup.exe” to install WLAN adapter driver.
(4) Follow the WLAN adapter installation procedure to complete WLAN driver installation. The
WLAN adapter driver installation procedure is identical to Windows XP.
Page 40
Troubleshooting
PROBLEMS STARTING THE 802.11 WIRELESS CLIENT UTILITY PROGRAM
PROBLEM CORRECTIVE ACTION
Windows does not
auto-detect the
TEW-429UF.
PROBLEMS WITH THE LINK STATUS
Make sure the TEW-429UF power switch is turned off and properly inserted into
the USB port and then restart your computer.
Perform a hardware scan by clicking Start, Settings, Control Panel and then
double-click Add/Remove Hardware. (Steps may vary depending on Windows
version).
Follow the on-screen instructions to search for the TEW-429UF (Wireless 802.11
USB Network Adapter) and install the driver.
Check for possible hardware conflicts. In Windows, click Start, Settings, Control Panel, System, Hardware and then click Device Manager. Verify the status of the
TEW-429UF (Wireless 802.11 USB Network Adapter) under Network Adapter.
(Steps may vary depending on the Windows version).
Install the TEW-429UF in another computer. If the error persists, there may be a
hardware problem. In this case, please contact your local dealer for support.
PROBLEM CORRECTIVE ACTION
The link quality and/or
signal strength is poor all
the time from the status
bar.
Search and connect to another AP with a better link quality using the Site Survey screen.
Change the channel used by your AP.
Move your computer closer to the AP or the peer computer(s) within the
transmission range.
There may be too much radio interference (for example microwave or
another AP using the same channel) around your wireless network.
Relocate or reduce the radio interference.
PROBLEMS WITH SECURITY SETTINGS
“Disconnected” (meaning
authentication failure)
Shown in the Status Bar
LED PWR and LINK are
on but cannot receive or
sending data and connect
to network
Make sure your AP/Router has the same setting as your client adapter and
follow AP/Router’s security settings.
Make sure your AP/Router has the same setting as your client adapter and
follow AP/Router’s security settings.
34 – Specifications
Page 41
Problems Communicating With Other Computers
PROBLEM CORRECTIVE ACTION
The TEW-429UF
computer cannot
communicate with the
other computer.
Infrastructure
Make sure you are connected to the network.
Make sure that the AP and the associated computers are turned on and
working properly.
Make sure the TEW-429UF computer and the associated AP use the
same SSID.
Change the AP and the associated wireless clients to use another radio
channel if interference is high.
Make sure that the computer and the AP share the same security option
and key. Verify the settings in the Profile Security Settings screen.
Ad-Hoc (IBSS)
Verify that the peer computer(s) is turned on.
Make sure the TEW-429UF computer and the peer computer(s) are
using the same SSID and channel.
Make sure that the computer and the peer computer(s) share the same
security option and key.
Change the wireless clients to use another radio channel if interference is
high.
Page 42
Specifications
KEY FEATURES
1. Compact, light weight size with friendly user interface.
2. Function Hotspot Finder and USB 2.0 high speed flash drive in an enclosure.
3. Support USB 2.0 high speed and backward compatible with USB 1.1
4. Support LCD screen with complete site survey information: Signal Strength, Security & Encryption,
Operation Channel, Radio Band, and SSID.
5. Support up to 300 times continuous scanning.
6. Support 2.4GHz 802.11b/g standard.
7. Built-in rechargeable battery with auto-charging through USB host port.
8. Support WLAN driver auto-run function for Win 2000, XP.
9. USB flash drive OS compatibility:
No driver required: Windows 2000, XP, ME, Mac OS 9.x above, Linux 2.4 above
Driver required: Windows 98/98SE
z Host interface: USB 2.0 high speed device port
z One LCD screen
z Two LED indications
z One power switch
z Two push buttons: SCAN, NEXT
z One rechargeable battery: 180 mAh
z Power Consumption: 470 mA (max.)
OFTWARE:
S
z Support Windows XP, 2K, ME & 98SE driver
z Support Windows-based Wireless LAN monitor utility
z Compatible with Windows Zero Configuration
z Supports 64-bit, 128-bit, 256-bit WEP (Manual type-in & Passphrase)
z Supports WPA-PSK, WPA, WPA2-PSK, and WPA2
z Supports EAP-TLS, and EAP-PEAP authentication
36 – Specifications
Page 43
Limited Warranty
TRENDware warrants its products against defects in material and workmanship, under normal use and
service, for the following lengths of time from the date of purchase.
Wireless Products – 3 Years Warranty
If a product does not operate as warranted above during the applicable warranty period, TRE NDware shall, at
its option and expense, repair the defective product or part, deliver to customer an equivalent product or part
to replace the defective item, or refund to customer the purchase price paid for the defective product. All
products that are replaced will become the property of TRENDware. Replacement products may be new or
reconditioned.
TRENDware shall not be responsible for any software, firmware, information, or memory data of customer
contained in, stored on, or integrated with any products returned to TRENDware pursuant to any warranty.
There are no user serviceable parts inside the product. Do not remove or attempt to service the product by
any unauthorized service center. This warranty is voided if (i) the product has been modified or repaired by
any unauthorized service center, (ii) the product was subject to accident, abuse, or improper u se (iii) the
product was subject to conditions more severe than those specified in the manual.
Warranty service may be obtained by contacting TRENDware office within the applicable warranty period for a
Return Material Authorization (RMA) number, accompanied by a copy of the dated proof of the purchase.
Products returned to TRENDware must be pre-authorized by TRENDware with RMA number marked on the
outside of the package, and sent prepaid, insured and packaged appropriately for safe shipment.
WARRANTIES EXCLUSIVE: IF THE TRENDWARE PRODUCT DOES NOT OPERATE AS WARRANTED
ABOVE, THE CUSTOMER’S SOLE REMEDY SHALL BE, AT TRENDWARE’S OPTION, REPAIR OR
REPLACEMENT. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU
OF ALL OTHER WARRANTIES, EXPRESSED OR IMPLIED, EITHER IN FACT OR BY OPERATION OF
LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. TRENDWARE NEITHER ASSUMES NOR AUTHORIZES ANY OTHER
PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE,
INSTALLATION MAINTENANCE OR USE OF TRENDWARE’S PRODUCTS.
TRENDWARE SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION
DISCLOSE THAT THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY
CUSTOMER’S OR ANY THIRD PERSON’S MISUSE, NEGLECT, IMPROPER INSTALLATION OR
TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR OR MODIFY, OR ANY OTHER CAUSE BEYOND
THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD.
LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW TRENDWARE ALSO EXCLUDES
FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY, WHETHER BASED IN CONTRACT OR TORT
(INCLUDING NEGLIGENCE), FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR P UNITIVE
DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF
INFORMATION OR DATE, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH
THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF
THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR
REFUND OF THE PURCHASE PRICE PAID, AT TRENDWARE’S OPTION. THIS DISCLAIMER OF
LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL
OF ITS ESSENTIAL PURPOSE.
Governing Law: This Limited Warranty shall be governed by the laws of the state of California.
AC/DC Power Adapter, Battery, Cooling Fan, and Power Supply carry 1 Year Warranty.
Page 44
38 – Specifications
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.