background image

 

                                                                                                                        44 

 

 

 
 

Definitions:  

 

 

h

 

Rescan:

 Click on this button to view a list of Access Points in the area. 

h

 

Renew: 

Regenerate a new PIN code 

h

 

Config Mode:

 switch between Enrollee or Registrar 

h

 

Profile Detail:

 show profile of the selected party 

Summary of Contents for ENUWI--XAN3

Page 1: ...ENUWI XAN3 Wireless N150 Adapter User s Manual ...

Page 2: ...LEAP Authentication 18 802 1x with PEAP 19 PEAP Authentication with EAP TLS Smartcard 19 802 1x with TTLS with EAP MD5 MS CHAP MS CHAPv2 20 802 1x CA Server 21 NETWORK SITE SURVEY 23 ADVANCED CONFIGURATION 25 WPS 25 UNINSTALL THE DRIVERS CLIENT UTILITY 27 3 ENUWI XAN3 USB ADAPTER FOR MAC OS X 31 INSTALLING THE DRIVERS 31 PROFILES 33 INFRASTRUCTURE MODE 34 AD HOC MODE 36 AUTHENTICATION AND SECURITY...

Page 3: ... 150 Adapter implements a Wireless N Draft 2 0 technology which extremely improves wireless signal for your computer than the existing wireless 802 11g technology The incredible speed of the ENUWI XAN3 802 11n Wireless USB adapter makes heavy traffic networking activities more flexible Enjoy the racing speed of wireless connection Adding an Encore s ENUWI XAN3 Wireless N 150 Adapter to your Mac or...

Page 4: ...reless Multimedia Enhancements Quality of Service supported QoS enhanced power saving for Dynamic Networking USB 2 0 1 1 USB 2 0 interface and backward compatible with USB 1 1 Package Contents Open the package carefully and make sure that none of the items listed below are missing Do not discard the packing materials in case of return the unit must be shipped in its original packaging h One ENUWI ...

Page 5: ...ollowing list describes some of the many applications made possible through the power and flexibility of wireless LANs a Difficult to wire environments There are many situations where wires cannot be laid easily Historic buildings older buildings open areas and across busy streets make the installation of wired LANs either impossible or very expensive b Temporary workgroups Consider situations in ...

Page 6: ...es Training sites at corporations and students at universities use wireless connectivity to ease access to information information exchanges and learning Network Configuration To better understand how the wireless LAN products work together to create a wireless network it might be helpful to depict a few of the possible wireless LAN PC card network configurations The wireless LAN products can be c...

Page 7: ... to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater which effectively doubles the distance between wireless stations The image below depicts a network in infrastructure mode ENUWI XAN3 for Windows XP Windows 7 Windows Vista ...

Page 8: ...g the installation process Software Driver Installation Follow the steps below in order to install the ENUWI XAN3 software drivers 1 Insert the ENUWI XAN3 CD ROM provided in the package The setup should run automatically and you should see a pop up welcome screen in a few seconds then will disappear and replace with the ENUWI XAN3 Main Menu screen If the setup does not run automatically you must m...

Page 9: ...9 2 Click on Windows Driver icon to start the installation process ...

Page 10: ...10 3 Click on the Install button to begin the installation 4 Wait for a few seconds until the driver and client utility is installed ...

Page 11: ...11 5 The installation is complete Click on the Finish button ...

Page 12: ...ew hardware 8 A new Encore icon is now added to the task bar or system tray similar to the picture above Right click on the icon and then click on Launch Config Utilities You can also launch the Encore Wireless Utility software by going to START then move your mouse over to All Programs move your mouse over to Encore Wireless then click on Encore Wireless Utility Note Click on Use Zero Configurati...

Page 13: ...an be configured as Infrastructure or Ad hoc mode The configuration settings for each mode are described below Infrastructure Mode The infrastructure mode requires the use of an Access Point AP In this mode all wireless communication between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the ran...

Page 14: ...If your notebook is connected to external power then select 100 or auto if not select one of the lower values for power saving h RTS Threshold Place a check in this box if you would like to enable RTS Threshold Any packet in the RTS CTS handshake larger than the specified value bytes will be discarded h Fragment Threshold Place a check in this box if you would like to enable Fragment Threshold Any...

Page 15: ...work and is case sensitive h Network Type Select Ad hoc from the drop down list h Preamble Select Auto from the drop down list unless you are aware of the preamble type long or short used in each station h Channel Displays the channel number of the Access Point h TX Power Select a transmit power from the drop down list If your notebook is connected to external power then select 100 or auto if not ...

Page 16: ...y select 64 or 128 bit WEP Wired Equivalent Privacy key to encrypt data Default setting is Disable WEP encrypts each frame transmitted from the radio using one of the Keys from a panel When you use WEP to communicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pass phrase The following information is included in this tab as the imag...

Page 17: ...grity checking feature which makes sure that keys haven t been tampered with EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client h Authentication Type Sel...

Page 18: ...assword box to check it LEAP Authentication LEAP Lightweight Extensible Authentication Protocol also known as Cisco Wireless EAP provides username password based authentication between a wireless client and a RADIUS server LEAP is one of several protocols used with the IEEE 802 1X standard for LAN port access control LEAP also delivers a session key to the authenticated station so that future fram...

Page 19: ...ation Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client PEAP Authentication with EAP TLS Smartcard EAP TLS Smartcard provides for certificate based and mutual authentication of the c...

Page 20: ... MD5 MS CHAP MS CHAPv2 802 1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority 802 1X uses an existing protocol called EAP EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the auth...

Page 21: ...lly an authentication or RADIUS server to clients Most EAPs require a certificate issued by a root authority or a trusted commercial Certificate Authority h Use certificate chain Place a check in this to enable the certificate use h Certificate issuer Select the Certification Authority from the drop down list h Allow intermediate certificates During tunnel creation the client must verify the serve...

Page 22: ...22 certificate authority otherwise it will not h Server name Enter the server name if not selected from the existing drop down list above h Click on the OK button to save the changes ...

Page 23: ...plays the SSID of the Access Point The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensitive h MAC AP MAC address h Channel Displays the channel number of the Access Point h Mode Displays the supporting AP mode h Signal Displays the receiving signal strength from the Access Point h Rescan Click on this ...

Page 24: ...plays the authentication type h Encryption Displays the encryption type h Network Type Displays the network type infrastructure or ad hoc h IP Address Displays the IP address h Sub Mask Displays the subnet mask IP address h Default Gateway Displays the IP address of the default gateway h Link Speed The current rate at which the client is transmitting and receiving h Transmit ReceiveThroughput Disp...

Page 25: ... By pressing this button the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi Fi Protected Setup Connecting to the WPS Secured Network Press the WPS button on your router Open the ENUWI AXN3 Wireless LAN Utility by doing right click on the logo located next to the Windows clock at the bottom right of the screen click to sele...

Page 26: ...26 h Rescan Click on this button to view a list of Access Points in the area h Connect Click on the AP to start WPS connection with the AP h Disconnect Click to terminate WPS connection ...

Page 27: ...ason the best way to solve the problem may be to completely uninstall the software driver and its utility and repeat the installation procedure again Follow these steps below in order to uninstall the client utility 1 Click on Start Encore Wireless Uninstall Encore ENUWI XAN3 2 The un installation process will follow ...

Page 28: ...28 3 Select the Remove all button ...

Page 29: ...un installation process and then click on the Next button 5 Click Finish to go to the next screen 6 The un installation process is complete For some PC you will be prompted to restart your PC If so select Yes I want to restart my computer now radio button and then click on the Finish button Then remove the USB adapter ...

Page 30: ...30 NOTE The image above may have different title from your screen ignore it ...

Page 31: ... install the USB adapter drivers 1 Insert the CD ROM provided to in this package The setup should run automatically If the setup would not run automatically then you must manually select the setup dmg file from the CD ROM drive 2 Click on the Continue button to configure the next step ...

Page 32: ...32 3 Select the Macintosh HD and then click on the Continue button 4 Click on the Continue button to configure the next step ...

Page 33: ...er Profiles The Profile tab is used to store the settings of multiple Access Points such as home office café etc When adding a profile you are required to enter a profile name and SSID as well as configure the power saving mode network type RTS fragmentation threshold and encryption authentication settings A profile can be configured as Infrastructure or Ad hoc mode The configuration settings for ...

Page 34: ...reless communication between two computers has to be via the AP It doesn t matter if the AP is stand alone or wired to an Ethernet network If used in stand alone the AP can extend the range of independent wireless LANs by acting as a repeater which effectively doubles the distance between wireless stations ...

Page 35: ...book uses its battery power This option minimizes the battery usage while the network is idle h Network Type Select Infrastructure from the drop down list h TX Power Select a transmit power from the drop down list If your notebook is connected to external power then select 100 or auto if not select one of the lower values for power saving h RTS Threshold Place a check in this box if you would like...

Page 36: ...al for all points in the network and is case sensitive h Network Type Select Ad hoc from the drop down list h TX Power Select a transmit power from the drop down list If your notebook is connected to external power then select 100 or auto if not select one of the lower values for power saving h Preamble Select Auto from the drop down list unless you are aware of the preamble type long or short use...

Page 37: ...ncryption is designed to make the data transmission more secure You may select 64 or 128 bit WEP Wired Equivalent Privacy key to encrypt data Default setting is Disable WEP encrypts each frame transmitted from the radio using one of the Keys from a panel When you use WEP to communicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pas...

Page 38: ...Access Point This approach offers the simplicity of the WEP key but uses stronger TKIP encryption EAP Extensible Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client h Au...

Page 39: ...o Disconnected Indicates that there are no APs or clients in the area h Current Channel The operating frequency channel that the client is using infrastructure mode h Link Speed The current rate at which the client is transmitting and receiving h Throughput bytes sec Displays the Tx transmit and Rx receive kilo bytes per second h Link Quality In infrastructure mode this bar displays the transmissi...

Page 40: ...s and Stations in the area and allows you to connect to a specific one The following information is included in this tab as the image depicts below h SSID Displays the SSID of the Access Point The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensitive h BSSID Displays the MAC address of the Access Point ...

Page 41: ...on the Connect button h Add Profile Click on this button to add the SSID and its associated settings into a profile h Click on the OK button if you have made any changes Statistics The Statistics tab displays transmit and receive packet statistics in real time Information included is frames transmitted received successfully transmitted successfully without and after retry received with CRC error d...

Page 42: ...nhance the throughput h Click on the Apply button to save the changes WPS WPS Wireless Push Button is used for WiFi Protected Setup By pressing this button the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi Fi Protected Setup Connecting to the WPS Secured Network on Mac Computers 1 Press the WPS button on your router 2 Ope...

Page 43: ...utton and wait a few seconds for the router and your ENUWI XAN3 to establish association 4 When connected a green check mark is visible and your router s SSID or wireless ID name should be listed under the WPS Profile List ...

Page 44: ...ns h Rescan Click on this button to view a list of Access Points in the area h Renew Regenerate a new PIN code h Config Mode switch between Enrollee or Registrar h Profile Detail show profile of the selected party ...

Page 45: ...45 h Connect Click on the AP to start WPS connection with the AP h Disconnect Click to terminate WPS connection h Import Profile Load pre stored profile database h Delete Remove the selected item ...

Page 46: ...6 About The About tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card firmware version and date ...

Page 47: ...tandard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and receive RF signals AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions can be made in both directions...

Page 48: ...f the stations in a Wi Fi network periodically broadcasts network control data to other wireless stations Bit rate The amount of bits that pass in given amount of time Bit sec Bits per second BOOTP Bootstrap Protocol Allows for computers to be booted up and given an IP address with no user intervention Bottleneck A time during processes when something causes the process to slowdown or stop all tog...

Page 49: ...Controls the movement of data on the physical link of a network DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd Decibels related to dipole antenna dBi Decibels relative to isotropic radiator dBm Decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predeter...

Page 50: ... Name that will always by linked to their changing IP address The IP address is updated by either client software running on a computer or by a router that supports Dynamic DNS whenever the IP address changes Dynamic IP address IP address that is assigned by a DHCP server and that may change Cable Internet providers usually use this method to assign IP addresses to their customers E EAP Extensible...

Page 51: ...at provides a data rate of 1 billion bits per second GUI Graphical user interface H H 323 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A...

Page 52: ...d and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Intranet A private network Intrusion Detection A type of security that scans ...

Page 53: ...manufacturer Mbps Megabits per second MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signa...

Page 54: ...s in a network NIC Network Interface Card NTP Network Time Protocol O OFDM Orthogonal Frequency Division Multiplexing is the modulation technique for both 802 11a and 802 11g OSI Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks becau...

Page 55: ...l is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Reboot To restart a computer and reload it s operatin...

Page 56: ...ng a user session that involves multimedia content such as voice or chat SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for a wireless network Stateful inspection A feature ...

Page 57: ...and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network Upgrade To install a more recent version of a software or firmware product Upload To send a request from one computer to another and have a file transmitted from the requesting computer to the other UPnP Universal Plug and Play URL Uniform Resource...

Page 58: ...red network Wide Area Network The larger network that your LAN is connected to which may be the Internet itself or a regional or corporate network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wirele...

Page 59: ...6 QAM QPSK BPSK 802 11b DSSS DBPSK DQPSK CCK Operating Channels 11 for North America 13 for Europe Receiver Sensitivity 135Mbps Typical 65dBm 10 PER 54Mbps Typical 68dBm 10 PER 11Mbps Typical 84dBm 8 PER Available transmit power 2 412 2 472G IEEE802 11b 18dBm 1 11Mbps 2 412 2 472G IEEE802 11g 15 dBm 6Mbps 14 dBm 54Mbps 2 412 2 472G IEEE802 11n 15dBm Antenna Configuration 1X 2dBi 1T1R Mode Networki...

Page 60: ... of the following measures z Reorient or relocate the receiving antenna z Increase the separation between the equipment and receiver z Connect the equipment into an outlet on a circuit different from that to which the receiver is connected z Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for...

Reviews: