-
43 -
ICS
This page displays setting Internet connection sharing (ICS). Select a sharing public network and click
Apply button to make a connection.
Page 1: ...802 11n b g WLAN Module WM5206 User s Manual...
Page 2: ...erference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit diffe...
Page 3: ...end user has to be informed that the FCC radio frequency exposure guidelines for an uncontrolled environment can be satisfied The end user has to also be informed that any changes or modifications no...
Page 4: ...laraci n de exposici n a la radiaci n de Canada Este equipo cumple con los l mites de exposici n a la radiaci n de la IC establecidos para un ambiente no controlado Este equipo se debe instalar y oper...
Page 5: ...7 Verification 7 FOR WINDOWS 7 8 Install Software 8 Install Hardware 10 Verification 10 CHAPTER 3 NETWORK CONNECTION 11 HOW TO MAKE A CONNECTION 11 HOW TO ADD A PROFILE 13 CHAPTER 4 UTILITY CONFIGURA...
Page 6: ...CHAPTER 5 UNINSTALL 59 FOR WINDOWS 2000 XP 59 FOR WINDOWS VISTA 61 FOR WINDOWS 7 63...
Page 7: ...th the best convenience in narrow or crowded space for it s ultra micro size WM5206 is expected to be able to reach 150Mbps which is relatively lower than normal but still far more than sufficient to...
Page 8: ...grams Insert the included Installation CD into the computer The CD ROM will run automatically Please click Next to process the installation 2 When prompt to the following message please click Install...
Page 9: ...3 3 When the following screen appears click Finish to restart the computer to complete the software installation...
Page 10: ...ter The system will automatically detect the new hardware Verification To verify the device is active in the computer Go to Start Control Panel System Hardware Device Manager Expand the Network adapte...
Page 11: ...sert the WLAN Module into the computer until the InstallShield Wizard finished installing 1 Exit all Windows programs Insert the included Installation CD into the computer The CD ROM will run automati...
Page 12: ...6 2 When prompt to the following message please click Install to begin the installation 3 When the following screen appears click Finish to restart the computer to complete the software installation...
Page 13: ...er The system will automatically detect the new hardware Verification To verify the device is active in the computer Go to Start Control Panel Hardware and Sound Device Manager Expand the Network adap...
Page 14: ...rt the WLAN Module into the computer until the InstallShield Wizard finished installing 1 Exit all Windows programs Insert the included Installation CD into the computer The CD ROM will run automatica...
Page 15: ...9 2 When prompt to the following message please click Install to begin the installation 3 When the following screen appears click Finish to restart the computer to complete the software installation...
Page 16: ...the computer The system will automatically detect the new hardware Verification To verify the device is active in the computer Go to Start Control Panel Device Manager Expand the Network adapters cate...
Page 17: ...takes Windows XP OS for example Step 1 After set up the WLAN Module successfully please launch the Configuration Utility There are two ways to launch the utility by 1 Double clicking the Intelligent W...
Page 18: ...tomatically scan access points nearby or click Refresh button to site survey again Step 3 Then double click preferred access point or click Add to Profile button to make a connection if the access poi...
Page 19: ...nt please click Add to Profile button to enter Wireless Network Properties windows If the access point has been set up security please enter passwords and then click OK to save profile settings After...
Page 20: ...P Station Mode Show Tray Icon Check to show the wireless adapter icon at the tray Disable Adapter Check this to disable the wireless adapter Radio off Check this to turn OFF radio function Close Click...
Page 21: ...in use Infrastructure or Ad Hoc Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES and Not Use SSID Shows the connected access point network name Signal Strength...
Page 22: ...ate the correct one at preference The Profile manager enables users to Add Remove Edit Duplicate and Set Default profiles Profile Tab Profile Name Here shows a distinctive name of profile in this colu...
Page 23: ...em Shared Key WPA PSK WPA2 PSK WPA 802 1X WPA2 802 1X and WEP 802 1X Data encryption For Open System Shared Key and WEP 802 1X authentication mode the selection of encryption type is WEP For WPA PSK W...
Page 24: ...only server side certificates PEAP Protect Extensible Authentication Protocol PEAP transport securely authentication data by using tunnelling between PEAP clients and an authentication server PEAP ca...
Page 25: ...of the access points Channel Shows the currently channel in use Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES None and TKIP AES Network Authentication Show th...
Page 26: ...tton to search and rescan the available network Add to Profile Select an available network SSID on the list and then click Add to Profile button to add it into the profile list Note Double click on it...
Page 27: ...information of packets failed transmit after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Sh...
Page 28: ...ration method through an internal or external Registrar WPS Tab PIN Code 8 digit numbers It is required to enter PIN Code into Registrar when using PIN method When STA is Enrollee users can use Renew...
Page 29: ...This page displays the information of the WLAN Module Version Switch to AP Mode To access the soft AP mode please select the Mode on the function list of the Utility to make the WLAN Module act as a w...
Page 30: ...ral General SSID Shows the network name of the AP BSSID Shows the MAC address of the AP Association Table This table shows the connected client here Config Click the Config button to set up the Wirele...
Page 31: ...ES When encryption is set to WEP ASCII Only valid when using WEP encryption algorithm When key length is set to 64 bits user can enter 5 ASCII characters case sensitive and 128 bits for 13 ASCII chara...
Page 32: ...delivery traffic indication message DTIM is an element included in some beacon frames User can specify a value from 1 to 255 beacons Preamble Select from the pull down menu to change the Preamble typ...
Page 33: ...after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Shows information of packets failed trans...
Page 34: ...28 ICS This page displays setting Internet connection sharing ICS Select a sharing public network and click Apply button to make a connection...
Page 35: ...ow Tray Icon Check to show the wireless adapter icon at the tray Disable Adapter Check this to disable the wireless adapter Radio off Check this to turn OFF radio function Close Click to leave the Int...
Page 36: ...type in use Infrastructure or Ad Hoc Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES and Not Use SSID Shows the connected access point network name Signal Stren...
Page 37: ...ctivate the correct one at preference The Profile manager enables users to Add Remove Edit Duplicate and Set Default profiles Profile Tab Profile Name Here shows a distinctive name of profile in this...
Page 38: ...curity Network Authentication There are several types of authentication modes including Open System Shared Key WPA PSK WPA2 PSK WPA 802 1X WPA2 802 1X and WEP 802 1X Data encryption For Open System Sh...
Page 39: ...ient and network through an encrypted channel Unlike EAP TLS EAP TTLS requires only server side certificates PEAP Protect Extensible Authentication Protocol PEAP transport securely authentication data...
Page 40: ...e Network Tab SSID Shows the network name of the access points Channel Shows the currently channel in use Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES None a...
Page 41: ...11n wireless mode Refresh Click Refresh button to search and rescan the available network Add to Profile Select an available network SSID on the list and then click Add to Profile button to add it int...
Page 42: ...information of packets failed transmit after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Sh...
Page 43: ...ration method through an internal or external Registrar WPS Tab PIN Code 8 digit numbers It is required to enter PIN Code into Registrar when using PIN method When STA is Enrollee users can use Renew...
Page 44: ...This page displays the information of the WLAN Module Version Switch to AP Mode To access the soft AP mode please select the Mode on the function list of the Utility to make the WLAN Module act as a w...
Page 45: ...ral General SSID Shows the network name of the AP BSSID Shows the MAC address of the AP Association Table This table shows the connected client here Config Click the Config button to set up the Wirele...
Page 46: ...ES When encryption is set to WEP ASCII Only valid when using WEP encryption algorithm When key length is set to 64 bits user can enter 5 ASCII characters case sensitive and 128 bits for 13 ASCII chara...
Page 47: ...delivery traffic indication message DTIM is an element included in some beacon frames User can specify a value from 1 to 255 beacons Preamble Select from the pull down menu to change the Preamble typ...
Page 48: ...after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Shows information of packets failed trans...
Page 49: ...43 ICS This page displays setting Internet connection sharing ICS Select a sharing public network and click Apply button to make a connection...
Page 50: ...Tray Icon Check to show the wireless adapter icon at the tray Disable Adapter Check this to disable the wireless adapter Radio off Check this to turn OFF radio function Close Click to leave the Intel...
Page 51: ...rate and receiving rate Type Network type in use Infrastructure or Ad Hoc Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES and Not Use SSID Shows the connected a...
Page 52: ...sers may save multiple profiles and activate the correct one at preference The Profile manager enables users to Add Remove Edit Duplicate and Set Default profiles Profile Tab Profile Name Here shows a...
Page 53: ...curity Network Authentication There are several types of authentication modes including Open System Shared Key WPA PSK WPA2 PSK WPA 802 1X WPA2 802 1X and WEP 802 1X Data encryption For Open System Sh...
Page 54: ...ient and network through an encrypted channel Unlike EAP TLS EAP TTLS requires only server side certificates PEAP Protect Extensible Authentication Protocol PEAP transport securely authentication data...
Page 55: ...e Network Tab SSID Shows the network name of the access points Channel Shows the currently channel in use Encryption Shows the encryption type currently in use Valid value includes WEP TKIP AES None a...
Page 56: ...11n wireless mode Refresh Click Refresh button to search and rescan the available network Add to Profile Select an available network SSID on the list and then click Add to Profile button to add it int...
Page 57: ...information of packets failed transmit after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Sh...
Page 58: ...ration method through an internal or external Registrar WPS Tab PIN Code 8 digit numbers It is required to enter PIN Code into Registrar when using PIN method When STA is Enrollee users can use Renew...
Page 59: ...This page displays the information of the WLAN Module Version Switch to AP Mode To access the soft AP mode please select the Mode on the function list of the Utility to make the WLAN Module act as a w...
Page 60: ...ral General SSID Shows the network name of the AP BSSID Shows the MAC address of the AP Association Table This table shows the connected client here Config Click the Config button to set up the Wirele...
Page 61: ...ES When encryption is set to WEP ASCII Only valid when using WEP encryption algorithm When key length is set to 64 bits user can enter 5 ASCII characters case sensitive and 128 bits for 13 ASCII chara...
Page 62: ...delivery traffic indication message DTIM is an element included in some beacon frames User can specify a value from 1 to 255 beacons Preamble Select from the pull down menu to change the Preamble typ...
Page 63: ...after hitting retry limit Rx OK Shows information of packets received successfully Rx Packet Count Shows information of packets received successfully Rx Retry Shows information of packets failed trans...
Page 64: ...58 ICS This page displays setting Internet connection sharing ICS Select a sharing public network and click Apply button to make a connection...
Page 65: ...l For Windows 2000 XP To remove the utility and driver please refer to below steps When removing the utility the driver will be removed as well 1 Go to Start All Programs Intelligent Wireless Utility...
Page 66: ...60 2 Click Yes to completely remove the selected application and all of its features 3 Then click Finish to complete uninstall...
Page 67: ...ver please refer to below steps When removing the utility the driver will be removed as well 1 Go to Start Programs Intelligent Wireless LAN Utility Uninstall Intelligent 2 Click Yes to complete remov...
Page 68: ...62 3 Finally click Finish to complete uninstall...
Page 69: ...Windows 7 To remove the utility and driver please refer to below steps When removing the utility the driver will be removed as well 1 Go to Start Programs Intelligent Wireless Utility Uninstall Intel...
Page 70: ...64 2 Click Yes to complete remove the selected application and all of its features 3 Finally click Finish to complete uninstall...