background image

 

13 

 

3.3 

WEP and WPA Encryption 

WEP is an data encryption algorithm, which protects Wireless LAN data in the network 

against eavesdropping. WEP has been found that it has some security problems. The 

adapter supports WPA (Wi-Fi Protected Access) that combines IEEE 802.1x and TKIP 

(Temporal Key Integrity Protocol) technologies. Client users are required to authorize before 

accessing to Aps or AP Routers, and the data transmitted in the network is 

encrypted/decrypted by a dynamically changed secret key. This adapter is also built-in AES 

engine which ensure the highest degree of security and authenticity for digital information 

and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless 

network.

 

 

3.3.1 WEP Setting 

 

 

 

Parameter Description 

Key Length 

You may select the 64-bit, 128-bit or 256-bit to encrypt 

transmitted data. Larger key length will provide higher level of 

security, but the throughput will be lower. 

 

 

Default Key ID 

Select one of the keys (1~4) as the encryption key. 

 

 

Key Format 

Hexdecimal

 – Only “A-F“, “a-f“ and “0-9“ are allowed to be set as 

WEP key. 

ASCII

 –Numerical values, characters or signs are allowed to be 

the WEP key. It is more recognizable for user. 

 

 
 

 
 

 
 

Summary of Contents for EW-7317UHg

Page 1: ...8 80 02 2 1 11 1g g H HI I G Ga ai in n W Wi ir re el le es ss s L LA AN N U US SB B A Ad da ap pt te er r User Manual Version 1 0 Sep 2004 ...

Page 2: ...warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Furth...

Page 3: ... an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated in accordance with provided instructions and a minimum 5 cm spacing must be provided between computer mounted antenna and person s body excluding extremities of hands wrist and feet during wireless ...

Page 4: ... of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use i...

Page 5: ...URATION UTILITY 8 3 1 WIRELESS CONNECTION STATUS 8 3 2 GENERAL CONNECTION SETTING 10 3 3 WEP AND WPA ENCRYPTION 13 3 3 1 WEP Setting 13 3 3 2 WPA Setting 14 3 4 ADVANCED SETTING 16 3 5 SOFTWARE AP MODE 17 3 5 1 AP Connection Status 18 3 5 2 AP General Connection Setting 19 3 5 3 MAC Address Filter 21 4 TROUBLESHOOTING 23 ...

Page 6: ...s network This adapter is cost effective together with the versatile features it is the best solution for you to build your wireless network 1 1 Features Complies with the IEEE 802 11b and IEEE 802 11g 2 4GHz standards Up to 54Mbps high data transfer rate Support 64 128 256 bit WEP WPA TKIP IEEE 802 1x and AES functions for high level of security Supports Software AP function which turns the wirel...

Page 7: ... Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following items One USB Adapter One USB 2 0 Extension Cable 150 cm One Quick Guide One CD Driver Utility User Manual If any of the above items is missing contact your supplier as soon as possible ...

Page 8: ...XP Procedures are similar for Windows 98SE Me 2000 2003 Server Note3 If you have installed the Wireless PC Card driver utility before please uninstall the old version first Please follow below instructions to install the USB Adapter I Install the Configuration Utility A Insert the Installation CD to your CD ROM Drive Execute the setup program B If you want to install the software program in anothe...

Page 9: ...4 C Click Continue Anyway to finish the installation ...

Page 10: ...e USB Adapter into the USB port of your computer B The Found New Hardware Wizard is displayed select Install the software automatically Recommended and click Next C Click Continue Anyway and the system will start to install the USB adapter ...

Page 11: ...tion Utility To setup the USB adapter double click the icon in the system tray For Windows XP there is a Windows Zero Configuration Tool by default for you to setup wireless clients If you want to use the Utility of the USB adapter please follow one of the ways as below ...

Page 12: ... Double click the utility icon in the system tray B Click Yes to use the utility of the USB adapter Second Way A Double click the icon B Click Advance C Uncheck Use Windows to configure my wireless network settings ...

Page 13: ... to install the adapter to PC or laptop with USB 2 0 interface This adapter runs at lower performance while you connect it to the USB 1 1 1 0 port of your computer instead 2 This adapter will work in 11b mode when the network type is in Ad Hoc mode It is defines by Wi Fi organization If you want to enable the data rate up to 54Mbps 11g please follow steps listed below A Go to Network Connections B...

Page 14: ...r and the wireless station on the list 1 Double click the wireless station on the list directly 2 Select the station you intend to connect and then click Connect this site Current Network Information Display the information about the wireless network this adapter is connecting to The information includes Channel Type SSID TX Rate and Encrypt settings Note Please refer to Section 3 2 for the descri...

Page 15: ...e quality TX Frame It shows the number of data frames which are transmitted by the adapter successfully RX Frame It shows the number of data frames which are received by the adapter successfully 3 2 General Connection Setting Click More Setting users are allowed to setup the wireless connection setting Encryption Setting of the USB adapter and other advanced functions Parameter Description General...

Page 16: ...en only the device with the same SSID can interconnect to the adapter Any If Any check box is enabled the adapter will survey and connect to one of the available wireless stations without checking the consistency of channel and SSID with the wireless station Network Type Ad Hoc This mode enables wireless network adapters interconnecting without through AP or Router Select this mode if there is no ...

Page 17: ...tting Click this button to setup the WPA function Please refer to Section 3 3 for the details Profile Profile Name You can save the network setting as a profile To connect to the network without making additional configuration you can load the profile Load Load the setting values from the file in the Profile Name list The new settings will be activated immediately Save Current Input a file name an...

Page 18: ... key This adapter is also built in AES engine which ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the security in the wireless network 3 3 1 WEP Setting Parameter Description Key Length You may select the 64 bit 128 bit or 256 bit to encrypt transmitted data Larger key length will provide higher level...

Page 19: ...settings 3 3 2 WPA Setting The adapter can automatically detect the WPA setting of the AP which the adapter intends to connect to To connect to the AP you should setup the same setting with the AP There are two kinds of WPA mode WPA and WPA PSK WPA is designed for enterprise which requires a RADIUS Server and Certificate Server for the authentication WPA PSK is a special mode designed for home and...

Page 20: ...lease contact with your administrator TLS Select a certificate from the Certificate list PEAP Input the User Name and Password and also select a certificate from the Certificate list User Name It is the setting for PEAP protocol Password It is the setting for PEAP protocol Pre shared Key It is the setting for WPA PSK mode Input a 8 to 63 digits of ASCII format to be the password for the authentica...

Page 21: ...p the fragmentation threshold and RTS CTS threshold of the adapter Parameter Description User Interface Select the display language of the utility Two languages are enabled English and Chinese Country Roaming IEEE 802 11d Country Roaming is a standard that enable the wireless devices work at the proper transmission power and radio channel regulated by the country where the user is located World Mo...

Page 22: ...agmented If you have decreased this value and experience high packet error rates you can increase it again but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Minor change is recommended RTS CTS Threshold Minimum packet size required for an RTS CTS Request To Send Clear to Send For packets smaller than this threshold an RTS CTS is not sent a...

Page 23: ...e wireless adapters which are connecting to the AP Current Network Setting Display the connection setting of the current network It includes Channel SSID WEP and TX Power Level More Setting For setting more functions including disable enable WEP MAC Address Filter and Bridge Adapter etc Please refer to Section 3 5 2 TX Frame It shows the number of data frames which are transmitted by the AP succes...

Page 24: ...General Connection Setting Channel Select the number of the radio channel used by the AP The wireless adapters which connects to the AP should set up the same channel Basic Rate Select the basic data transmission speed supports by the AP When the AP works in 11b mode the maximum data rate is 11Mbps so that there are two options including 1 2 Mbps and 1 2 5 5 11Mbps you can select ...

Page 25: ...ed the AP will not appear in the site survey list of any wireless adapters It means Only the wireless adapters set the same SSID can connect to the AP It aviods the AP being connected by unauthorized users Tx Power There are four levels for you to setup the transmission power of the AP The higher transmission power the larger transmission distance and wireless coverage Change Apply Clcik Change wi...

Page 26: ... not sent and the packet is transmitted directly to the WLAN Select a setting within a range of 0 to 2347 bytes Minor change is recommended Preamble The preamble defines the length of the CRC block for communication among the wireless networks There are two modes including Long and Short High network traffic areas should use the shorter preamble type MAC Address Filter This AP can protect from the...

Page 27: ...he wireless adapters with the MAC Address setup in the table will be rejected to connect to the AP Filter MAC Address MAC Address is a unique identification for hardware devices in the network It is a 12 digit hexadecimal values There are fifty sets of MAC Address can setup in the table Fill the MAC Addresses of wireless adapters you want to accept or reject to access the AP in this table ...

Page 28: ...OFDM as a mandatory new coding scheme for 6 12 and 24 Mbps mandatory speeds and 18 36 48 and 54 Mbps optional speeds The ERP includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IE...

Page 29: ...p based security has been developed to ensure the highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption standards It is also included in IEEE 802 11i standard Compare with AES TKIP is a temporary protocol for replacing WEP security until manufacturers imple...

Page 30: ...r the original data without the need for retransmission To an unintended receiver DSSS appears as low power wideband noise and is rejected ignored by most narrowband receivers 13 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is designed to trade off bandwidth ...

Reviews: