background image

 

AirLive WL-1000CAM User’s Manual

 

23

 

3.2.1.4  802.1x Setting-CA Server 
 

Parameter Description 

Use Certificate Chain 

When the EAP authentication type such as TLS, TTLS or PEAP is 
selected and required a certification to tell the client what server 
credentials to accept from the authentication server in order to 
verify the server, you have to enable this function. 

Certificate Issuer 

Choose the server from the list to issue the certificate. If “Any 
Trusted CA” is selected, any CA included in the list (provided by 
the Microsoft Certificate Store) is permitted. 

 

 

Parameter Description 

Allow Intermediate Certificates 

A server designates an issuer as a trusted root 
authority by placing the issuer's self-signed certificate, 
which contains the issuer's public key, into the trusted 
root certification authority certificate store of the host 
computer. Intermediate or subordinate certification 
authorities are trusted only if they have a valid 
certification path from a trusted root certification 
authority. 

 

Server Name 

Enter the authentication server name. 

Server name must match exactly  When selected, the server name must match exactly the server 

name found on the certificate.   

Domain name must end in 
specified name 

When selected, the server name field identifies a domain. The 
certificate must use a server name belonging to this domain or to 
one of its sub-domains (e.g. zeelans.com, where the server is 
blueberry.zeelans.com) but it may be any name used in the 
certificate name field. 

 

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Summary of Contents for WT-2000 USB

Page 1: ...WT 2000 USB Turbo G Wireless LAN Card User s Manual ...

Page 2: ... apparatus with the basic restrictions related to human exposure to electromagnetic field 10MHz 300GHz General public Safety for information technology equipment including electrical Business equipment Manufacturer Importer Position Title Vice President OvisLink Corp 5F NO 6 Lane 130 Min Chuan Rd Hsin Tien City Taipei County Taiwan AirLive WT 2000USB EN 300 328 V1 6 1 2004 11 Wideband transmission...

Page 3: ...s aplicables o exigibles de la Directiva 1999 5 CE pt Português Portuguese OvisLink Corp declara que este AirLive WT 2000USB está conforme com os requisitos essenciais e outras disposições da Directiva 1999 5 CE el Ελληνική Greek ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ OvisLink Corp ΔΗΛΩΝΕΙ ΟΤΙ AirLive WT 2000USB ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999 5 ΕΚ sl Slovens...

Page 4: ...rks and or registered trademarks of their respective holders Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and ca...

Page 5: ...quipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 200...

Page 6: ...2 2 Install the Driver and Utility 7 CHAPTER III CONFIGURATION UTILITY 10 3 1 Site Survey 13 3 2 Profile 14 3 2 1 Configure the Profile 15 3 2 1 1 Configuration 16 3 2 1 2 Authentication and Security 18 3 2 1 3 802 1x Setting Certification 21 3 2 1 4 802 1x Setting CA Server 23 3 3 Link Status 24 3 4 Advance 25 3 5 About 28 3 6 Turbo Mode 28 3 7 WMM Function 29 CHAPTER IV TROUBLESHOOTING 31 ...

Page 7: ...ient users are required to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and government users When you use the devices such a...

Page 8: ...rts 32 bit PCI interface 1 2 Specifications Standard IEEE 802 11b g Interface 32 bit PCI Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band Modulation OFDM with BPSK QPSK 16QAM 64QAM 11g BPSK QPSK CCK 11b Data Rate 54 48 36 24 18 12 11 9 6 5 5 2 1Mbps auto fallback Security 64 128 bit WEP Data Encryption WPA TKIP with IEEE 802 1x WPA2 AES with IEEE 802 1x Note WPA2 is enabled in Wi...

Page 9: ...AirLive WT 2000USB User s Manual 6 One PCI Card One CD Driver Utility User s Manual One Quick Guide If any of the above items is missing contact your supplier as soon as possible ...

Page 10: ...I Card driver utility before please uninstall the old version first 2 1 Install the Hardware A Turn off your computer and remove its cover B Insert the PCI card to an available PCI slot firmly C Secure this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Turn on the computer 2 2 Install the Driver and Utility A Found New H...

Page 11: ...er s Manual 8 B Insert the Installation CD to your CD ROM Drive Execute the setup program C Click Next to process the installation if you accept the license agreement D The system starts to install the software of the card ...

Page 12: ...AirLive WL 1000CAM User s Manual 9 E The system will automatically detect the card and display Hardware Installation screen Click Install to continue F Please click Finish to complete the installation ...

Page 13: ...rs as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate the configuration utility z Lauch Config Utilities Select Lauch Config Utilities to open the Configuration Utility tool z Use Zero Configuration as Configuration Utility z Select Use Zero Configuration as Configurati...

Page 14: ... enabled If you want to use the Utility for the card please follow one of the ways as below First Way Right click the icon in the system tray and select Use RaConfig as Configuration Utility Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced ...

Page 15: ...dows to configure my wireless network settings to enable the utility for the card Note If Wireless Zero Configuration is enabled you can only configure the advance setting or check the link status and statistics from the configuration utility of the card ...

Page 16: ...ofile list Parameter Description Available Networks This list shows all available wireless networks within range of your card It also displays the information of the networks including the SSID BSSID Signal Strength Channel Encryption Authentication and Network Type If you want to connect to any networks on the list double click the item on the list and the card will automatically connect to the s...

Page 17: ... profiles and the relative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting Add Delete Edit Button Click these buttons to add delete edit the selected profiles Activate Button Click Activate to connect to the selected profile When a profile is activated the ...

Page 18: ...AirLive WL 1000CAM User s Manual 15 3 2 1 Configure the Profile ...

Page 19: ...ication is done via the Access Point or Router Ad Hoc Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or Router TX Power If you want to lower the transmit power of the card for saving the power of the system you can select the lower percentages from the list The lower power will cause the lower signal strength and the...

Page 20: ...ted directly to the wireless network Select a setting within a range of 0 to 2347 bytes Minor change is recommended Fragment Threshold The value defines the maximum size of packets any packet size larger than the value will be fragmented If you have decreased this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a...

Page 21: ...level of assurance to enterprises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WPA offers the advantage of leveraging existing authentication databases and infrastructure WPA PSK It is a special mode designed for home and small business users who do not ...

Page 22: ...o ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network Note All devices in the network should use the same encryption method to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key must be u...

Page 23: ...s a wireless station on the LAN it sends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmit data over the link In turn the device responds with its identity and the AP relays this identity to an authentication server which is typically an external RADIUS server An example...

Page 24: ...e most secure of the EAP protocols but not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a certificate to the client After validating the server s certificate the client presents a client certificate to the server for validation MD5 Challenge MD5 Challenge is the easiest EAP Type It requires the wireless station to enter a set of use...

Page 25: ...s the protected user EAP Identity used for authentication The identity specified may contain up to 63 ASCII characters is case sensitive and takes the form of a Network Access Identifier consisting of name of the user user s home realm The user s home realm is optional and indicates the routing domain Password The password used for authentication It may contain up to 63 ASCII characters and is cas...

Page 26: ...uer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the host computer Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority Server Name Enter the authentication serv...

Page 27: ...the transmission and reception rate of the network The maximum transmission rate is 54Mbps Throughput Kbits sec Display the speed of data transmitted and received Link Quality This bar indicates the quality of the link The higher the percentage the better the quality dBm If you want to know the signal strength in the unit of dBm select this check box Signal Strength This bar shows the signal stren...

Page 28: ...tics This option enables you to view the statistic information of the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 4 Advance This option enables you to configure more advanced settings for example wireless mode protection mode and etc ...

Page 29: ...he regulation of the country B G Protection If you have a mix of 802 11b and 802 11g wireless stations in the network it is recommended to enable the protection mechanism This mechanism can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the card will be a little lower due to many of frame traffic should be tra...

Page 30: ...the radio monitoring and fast roaming LEAP Turn on CCKM During normal operation LEAP enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication including communication with the main RADIUS server When you configure your wireless LAN for fast re association however LEAP enabled client devices roam from one access point to another without involv...

Page 31: ...he card is displayed in the screen as well 3 6 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this feature known as Turbo Mode enables higher throughput than IEEE 802 11g standard Up to 54Mbps When the card is connecting to the Routers or APs with the proprietary Tu...

Page 32: ...e defined WMM as a profile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connected to the AP or Router with WMM function you can enable the function of the card by following the steps below A In the Desktop of the computer right click My Network Places and sel...

Page 33: ...AirLive WT 2000USB User s Manual 30 C Click Configure D Select Advanced page enable the WMM Capable ...

Page 34: ...nal speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective...

Page 35: ...roducts can work with Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption fu...

Page 36: ...y and security In other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two m...

Reviews: