ZyXEL Communications WM5204Z User Manual

ZyXEL
WM5204Z
Wireless LAN USB 2.0 Adapter
Release 2.0
Company Confidential
Federal Communication Commission
Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
FCC Caution:
Any changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment.
The users manual or instruction manual for an intentional or unintentional radiator shall caution the user that changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment.
Company Confidential
IMPORTANT NOTE: FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
This device is intended only for OEM integrators under the following conditions:
1) The antenna must be installed such that 20 cm is maintained between the antenna and
users, and
2) The transmitter module may not be co-located with any other transmitter or antenna,
3) For all products market in US, OEM has to limit the operation channels in CH1 to CH11
for 2.4G band by supplied firmware programming tool. OEM shall not supply any tool or info to the end-user regarding to Regulatory Domain change. As long as 3 conditions above are met, further transmitter test will not be required. However, the OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc.).
IMPORTANT NOTE: In the event that these conditions can not be met (for example
certain laptop configurations or co-location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization.
End Product Labeling
This transmitter module is authorized only for use in devices where the antenna may be installed such that 20 cm may be maintained between the antenna and users (for example access points, routers, wireless ASDL modems, and similar equipment). The final end product must be labeled in a visible area with the following: "Contains TX FCC ID:
Company Confidential
I88WM5204Z
Manual Information To the End User
The OEM integrator has to be aware not to provide information to the end user regarding how
to install or remove this RF module in the users manual of the end product which integrates this module. The end user manual shall include all required regulatory information/warning as show in this manual.
注意 ! 依據 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用
者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍受合法通信 或業、科學醫療用電波輻射性電機設之干擾。
本模組於取得認證後將依規定於模組本體標示審合格籤,並要求平台上標示「本 產品內含射頻模組:ID 編號」
Company Confidential
About this manual
This Users Manual describes how to install and operate your 802.11b/g Wireless LAN Module. Please read this manual before you install the product. This manual includes the following topics:
l Product description and features.
l Software installation procedure for certification use
Company Confidential
Table of Contents
CHAPTER 1: INTRODUCTION ......................................................................................1
FEATURES ............................................................................................................................1
CHAPTER 2: INSTALLATION........................................................................................2
FOR WINDOWS 2000/XP.......................................................................................................2
Install the Software.................................................................................................................2
Install the Hardware................................................................................................................4
Verification...............................................................................................................................5
FOR WINDOWS VISTA............................................................................................................6
Install the Software.................................................................................................................6
Install the Hardware................................................................................................................8
Verification...............................................................................................................................8
NETWORK CONNECTION.........................................................................................................9
IP Address................................................................................................................................9
FOR LINUX KERNEL 2.4/2.6 INSTALLATION ............................................................................10
Install the Hardware..............................................................................................................10
Install the Software...............................................................................................................10
FOR MAC OS 10.5 INSTALLATION.........................................................................................12
Install the Software...............................................................................................................12
Install the Hardware..............................................................................................................13
CHAPTER 3: UTILITY CONFIGURATION.................................................................14
FOR WINDOWS 2000/XP.....................................................................................................14
Station Mode..........................................................................................................................15
Utility Menu List.....................................................................................................................32
Soft AP mode.........................................................................................................................33
FOR WINDOWS VISTA..........................................................................................................40
Station Mode..........................................................................................................................41
Utility Menu List.....................................................................................................................57
Soft AP mode.........................................................................................................................58
CHAPTER 4: UNINSTALLATION.................................................................................65
FOR WINDOWS 2000/XP.....................................................................................................65
FOR WINDOWS VISTA..........................................................................................................67
FOR MAC OS 10.5..............................................................................................................69
FOR LINUX KERNEL 2.4/2.6.................................................................................................71
Company Confidential
Chapter 1: Introduction
The Wireless LAN Module is an IEEE802.11b/g Module that connects your notebook to a wireless local area network. The Wireless LAN Module fully complies with IEEE 802.11 b/g standards, delivers reliable, cost-effective, feature rich wireless connectivity at high throughput from an extended distance.
It allows you to take full advantage of your notebooks mobility with access to real-time information and online services anytime and anywhere.
Features
Ø 1T1R Mode with 54Mbps PHY Rate for both. Ø Complies with IEEE 802.11 b/g standards. Ø Supports WEP 64/128 bits, WPA, WPA2. Ø Supports WMM and WMM-PS. Ø Supports WPS configuration. Ø Portable and mini-size design. Ø Compatible with Microsoft Windows 2000/XP/Vista, Mac OS 10.3/10.4/10.5, and Linux
Kernel 2.4/2.6 operating systems.
Company Confidential
Chapter 2: Installation
For Windows 2000/XP
Install the Software
Note: Do not insert the Wireless LAN Module into the computer until the Install Shield Wizard has finished installing.
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically.
2. When the License Agreement screen appears, please read the contents and select I accept the
terms of the license agreement then click Next to continue.
Company Confidential
3. Select the check box to choose a Configuration Tool from the listed two choices.
l Configuration Tool: Choose to use the configuration utility.
l Microsoft Zero Configuration Tool: Choose to use Windows XPs built-in Zero
Configuration Utility (ZCU).
Click Next to continue.
5. When prompt to the following message, please click Install to begin the installation.
Company Confidential
6. When the following screen appears, click Finish to complete the software installation.
Install the Hardware
Note: Insert the Wireless LAN Module after software installation.
Insert the Wireless LAN Module into the computer. The system will automatically detect the new hardware.
Company Confidential
Verification
To verify if the device is active in the computer. Go to Start > Setting > Control Panel > System > Hardware > Device Manager. Expand the Network Adapters category. If the 802.11b/g Wireless LAN Module is listed here, it means that the device is properly installed and enabled.
Company Confidential
For Windows Vista
Install the Software
Note: Do not insert the Wireless LAN Module into the computer until the Install Shield Wizard has finished installing.
1. Exit all Windows programs. Insert the included Installation CD into the computer. The CD-ROM
will run automatically.
2. When the License Agreement screen appears, please read the contents and select I accept the
terms of the license agreement then click Next to continue.
Company Confidential
3. When prompt to the following message, please click Install to begin the installation.
4. When the following screen appears, click Finish to complete the software installation.
Company Confidential
Install the Hardware
Note:
Insert the Wireless LAN Module when finished software installation.
Insert the Wireless LAN Module into the computer. The system will automatically detect the new hardware.
Verification
To verify if the device is active in the computer. Go to Start > Setting > Control Panel > System > Hardware > Device Manager. Expand the Network Adapters category. If the 802.11b/g Mini Wireless LAN Adapter is listed here, it means that the device is properly installed and enabled.
Company Confidential
Network Connection
IP Address
Note: When assigning IP address(es) to computers on the network, remember to have IP address for each computer set on the same subnet mask. If the Broadband Router has enabled its DHCP server function, it wont be necessary to assign static IP address for PC.
1. To configure a dynamic IP address (i.e. if the broadband Router has enabled the DHCP server
funciton), check the Obtain an IP address automatically option.
2. To configure a fixed IP address (if DHCP server function is not enabled in Broadband Router, or
when PC needs to be assigned a static IP address), check the Use the following IP address option. Then, enter an IP address into the empty field; for example, enter 192.168.1.1 in the IP address field,
255.255.255.0 for the Subnet Mask, and 192.168.1.254 for the default gateway.
Company Confidential
For Linux Kernel 2.4/2.6 Installation
Install the Hardware
Note: Please insert the Wireless LAN Module into the PC USB port BEFORE the driver installation.
Install the Software
Please execute the Terminal program and follow the steps below to install the driver of Wireless LAN Module.
Company Confidential
1. Go to root
# cd /home # mkdir DRIVER(example) # cd DRIVER # cp xxx_RT3070_Linux_STA_x.x.x.x.tar.bz2 /home/DRIVER
2. # tar -jxvf xxx_RT3070_Linux_STA_x.x.x.x.tar.bz2
go to "./xxx_RT3070_Linux_STA_x.x.x.x" directory.
3. # make clean
4. # make
PS: If there is ERROR Message after compile, then user may need to recheck the Makefile or .c and .h
5. # cd /etc/Wireless/
6. # mkdir RT2870STA
7. go to "./home/DRIVER/xxx_RT3070_Linux_STA_x.x.x.x" directory
8. # cp RT2870STA.dat /etc/Wireless/RT2870STA/RT2870STA.dat
9. go to "./home/DRIVER/xxx_RT3070_Linux_STA_x.x.x.x/os/linux/" directory.
Load driver [kernel 2.4] # /sbin/insmod rt3070sta.o # /sbin/ifconfig ra0 inet YOUR_IP up [kernel 2.6] # /sbin/insmod rt3070sta.ko # /sbin/ifconfig ra0 inet YOUR_IP up Unload driver # /sbin/ifconfig ra0 down # /sbin/rmmod rt3070sta
10. Scan AP
# iwlist ra0 scanning
11. Connect to AP
# iwpriv ra0 set SSID="AP's SSID"
12. Check status
# iwconfig ra0 or # ifconfig ra0
Note:
1. Supporting Kernel: Linux kernel 2.4 and 2.6 series. Tested in Redhat
7.3 or later.
2. Clear DHCP on ra0
# killall dhclient
3. Get DHCP from AP
Company Confidential
# dhclient ra0
For Mac OS 10.5 Installation
Install the Software
Note: Do not insert the Wireless LAN Module into the computer until the installation finished.
1. Insert the included CD-ROM into the CD-ROM drive of your computer. Please find and execute
the xxx.dmg file, then select the install Mac version of your PC, and click the USBWireless­Leopard.pkg file to install.
2. When the Welcome screen appears, click Continue to start.
3. Please click Install to process the installation.
Company Confidential
4. The computer restart message will show up, please click Continue Installation to install.
5. After finished the installation, please click Restart to complete the installation.
Note: Mac OS support version 10.3, 10.4, 10.5.
Install the Hardware
Note:
Insert the Wireless LAN Module when finished software installation.
Insert the Wireless LAN Module into the USB Port of the computer. The system will automatically
Company Confidential
detect the new hardware.
Chapter 3: Utility Configuration
For Windows 2000/XP
After the Wireless LAN Module has been successfully installed, users can use the included Configuration Utility to set the preference.
Go to Startg (All) Programg Intelligent Wirelessg Intelligent Wireless Utility.
Users can also open the Configuration Utility by double clicking or right clicking the icon in the task tray to select Launch Config Utility.
Company Confidential
Station Mode
IMPORTANT NOTICE: Under screen resolution 800 x 600 pixels, if users click the triangle button, at the lower right corner of the utility window, to expand the station linking information, it will NOT be displayed completely.
Profile
Profile can let users book keeping the favorite wireless setting among home, office, and other public hot-spot. Users may save multiple profiles, and activate the correct one at preference. The Profile manager enables users to Add, Edit, Delete, and Activate profiles.
Click this button to show the information of Status Section.
Click this button to hide the information of Status Section.
Profile Tab
Profile Name
SSID
Company Confidential
Network Type
Authentication
Encryption
Here shows a distinctive name of profile in this column. The default is
PROF# (#1, #2, #3....)
The SSID is the unique name shared among all wireless access points in the wireless network.
Shows the network type of the device, including Infrastructure.
Shows the authentication mode.
Shows the encryption type.
Use 802.1x
Whether or not use 802.1x feature.
Tx Power
Channel
Power Save Mode
RTS Threshold
Fragment Threshold
Add
Transmit power, the amount of power used by a radio transceiver to send the signal out.
Shows the selected channel that is currently in use.
Choose from CAM (Constantly Awake Mode) or PSM (Power Saving Mode.)
Shows the RTS Threshold of the device.
Shows the Fragment Threshold of the device.
Click to add a profile from the drop-down screen.
System Configuration tab:
Profile Name: Users can enter profile name, or use default name defined
by system. The default is PROF# (#1, #2, #3....).
SSID: The SSID is the unique name shared among all wireless access
points in the wireless network. The name must be identical for all devices and wireless access points attempting to connect to the same network. Users can use pull-down menu to select from available access points.
Network Type: The Infrastructure is intended for the connection between wireless
network cards and an access point. With the Wireless LAN Module,
Company Confidential
users can connect wireless LAN to a wired global network via an access point.
Tx Power: Transmit power, the amount of power used by a radio transceiver to send the signal out. Select the Tx power percentage from the pull-down list including Auto, 100%, 75%, 50%, 25%, 10% and
Lowest.
Power Save Mode:
selection of encryption type are
None
and
WEP
. For
WPA
,
WPA2
,
CAM (Constantly Awake Mode): When this mode is selected, the
power supply will be normally provided even when there is no throughput. (Default power save mode is CAM.)
PSM (Power Saving Mode): When this mode is selected, this device
will stay in power saving mode even when there is high volume of throughput.
RTS Threshold: Users can adjust the RTS threshold number by sliding the bar or key in the value directly. (The default value is 2347.) RTS/CTS Threshold is a mechanism implemented to prevent the Hidden Node problem. If the Hidden Node problem is an issue, users have to specify the packet size. The RTS/CTS mechanism will be activated if the data size exceeds the values that have been set.
This value should remain at its default setting of 2347. Should users encounter inconsistent data flow, only minor modifications of this value are recommended.
Fragment Threshold: Users can adjust the Fragment threshold number by sliding the bar or key in the value directly. (The default value is 2346.) The mechanism of Fragmentation Threshold is used to improve the efficiency when high traffic flows along in the wireless network. If the Wireless LAN Module often transmits large files in wireless network, users can enter new Fragment Threshold value to split the packet. The value can be set from 256 to 2346.
Authentication and Security tab:
Authentication Type: There are several types of authentication modes including Open, Shared, Leap, WPA, WPA-PSK, WPA2 and WPA2-PSK.
Open: If the access point or wireless router is using "Open
authentication, then the Wireless LAN Module will need to be set to the same authentication type.
Shared: Shared key is when both the sender and the recipient share a
secret key.
LEAP: Light Extensible Authentication Protocol. It is an EAP
authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication (only with CCX mode enabled.)
Company Confidential
WPA/ WPA-PSK/ WPA2/ WPA2-PSK: WPA or WPA-PSK
authentications offer two encryption methods, TKIP and AES. For WPA-PSK, select the type of algorithm TKIP or AES and then enter a WPA Shared Key of 8-64 characters in the WPA Pre-shared Key field.
Encryption Type: For Open and Shared authentication mode, the
WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
WPA Pre-shared Key: This is the shared secret key between AP and
STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less than 64 lengths.
WEP Key: Only valid when using WEP encryption algorithm. The key must match with the APs key. There are four formats to enter the keys.
ASCII (64 bits): 5 ASCII characters (case sensitivity).
ASCII (128 bits): 13 ASCII characters (case sensitivity).
Hexadecimal (64 bits): 10 Hex characters (0~9, a~f).
Hexadecimal (128 bits): 26 Hex characters (0~9, a~f).
Show Password: Check this box to show the passwords that have been
entered.
802.1x Setting: When users use radius server to authenticate client certificate for WPA authentication mode (WPA authentication do not support EAP Method- MD5-Challenge).
802.1x tab:
EAP Method:
PEAP: Protect Extensible Authentication Protocol. PEAP transport
securely authentication data by using tunnelling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the
Company Confidential
implementation and administration of a secure wireless LAN.
TLS / Smart Card: Transport Layer Security. Provides for
certificate-based and mutual authentication of the client and the network. It relies on client-side and server-side certificates to perform authentication and can be used to dynamically generate user-based and session-based WEP keys to secure subsequent communications
Loading...
+ 53 hidden pages