background image

 

 

 

Figure 2-4. Found New Hardware Wizard Complete

 

 
Step 6: 

Installation Wizard complete. Click

 Finish

 

 

2-2. SmartSetup 3  

 

 

 

Note: The following section applies to users of GIGABYTE Wireless Routers. 
 
GIGABYTE SmartSetup 3 is a powerful, yet user-friendly wireless network configuration 
wizard specially designed for GIGABYTE wireless networks. If you are connecting to a 
GIGABYTE wireless router, SmartSetup 3 will detect this and activate.     
 
In three easy steps, you can establish a bulletproof WPA(WPA-PSK)  wireless network 
AND configure your Internet connection.    Only GIGABYTE delivers this easy, powerful 
and secure solution for your wireless network! 
 

Step 1

:    Select the GIGABYTE wireless router from the available networks. 

 

Summary of Contents for GN-WB31N-RH

Page 1: ...GN WB31N RH AIRCRUISER N300 USB Adapter Quick Start Guide http www gigabyte com tw Rev 1 0 ...

Page 2: ...iving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution To assure continued compliance any changes or modifications not expressly approved by the party responsible for compliance could void the user s...

Page 3: ...GE 1 1 5 LED INDICATORS 1 1 6 SYSTEM REQUIREMENTS 1 CHAPTER 2 INSTALLATION 2 2 1 INSTALLING THE GN WB31N RH 2 2 2 SMARTSETUP 3 4 CHAPTER 3 USING THE WIRELESS UTILITY 2 3 1 PROFILE TAB 2 3 2 LINK STATUS TAB 1 3 3 SITE SURVEY TAB 2 3 4 STATISTICS TAB 3 3 5 QOS 1 3 6 ABOUT TAB 1 APPENDIX A TROUBLESHOOTING 2 APPENDIX B REGULATORY INFORMATION 3 APPENDIX C WARRANTY 4 ...

Page 4: ...ryption protects your network from would be hackers without a hit on performance High speed USB 2 0 Features a USB 2 0 interface that is up to 40 times faster than USB 1 1 allowing you to realize full 300 Mbps speed of the 802 11g wireless standard New antenna technology provides superior range above previous generation 802 11b adapters The GN WB31N RH supports office roaming for notebook PC users...

Page 5: ...Mbps Output power Legacy mode 18 dBm 11Mbps 14 dBm 54Mbps HT20 mode 14 dBm MCS7 72 2Mbps HT40 mode 14 dBm MCS7 150Mbps Receive Sensitivity Legacy mode 90 dBm 11Mbps 76 dBm 54Mbps HT20 mode 72 dBm MCS7 15 HT40 mode 70 dBm MCS7 15 Antenna One external dipole antenna and one printed PCB antenna Regulatory and Environmental Compliance EMC certification FCC part 15 USA CE Temperature Range Operating 0 ...

Page 6: ...he original packing material or the warranty will be voided 1 5 LED Indicators The AIRCRUISER N300 USB Wireless USB Adapter works with USB 2 0 interfaces There are two LED indicators on the Adapter as shown in the diagram below Name Color Condition Radio off None Solid off Radio on Green Blink then solid on Link to G Green Blink when accessing Solid on when connected 1 6 System Requirements For tr...

Page 7: ...talled we suggest you disable them before starting installation You can do this by going to Hardware Manager from Windows Control Panel and click disable on the WLAN driver Step 1 Locate an open USB port on your Notebook or Desktop PC and insert the GN WB31N RH Step 2 When the Add New Hardware Wizard screen appears click Cancel Figure 2 1 Add New Hardware Wizard Step 3 Insert the GN WB31N RH Insta...

Page 8: ...3 Figure 2 2 Found New Hardware Wizard Step 4 Select the driver locations Click Next Figure 2 3 Found New Hardware Wizard Step 5 Copying files when complete click on Next ...

Page 9: ...network configuration wizard specially designed for GIGABYTE wireless networks If you are connecting to a GIGABYTE wireless router SmartSetup 3 will detect this and activate In three easy steps you can establish a bulletproof WPA WPA PSK wireless network AND configure your Internet connection Only GIGABYTE delivers this easy powerful and secure solution for your wireless network Step 1 Select the ...

Page 10: ...ase using any keyboard character Make it no less than 8 but no more than 63 characters in length Anyone wishing to gain access to your network will first need to key in this Passphrase In the example below we used I love green eggs and ham Figure 2 6 SmartSetup 3 Define Passphrase ...

Page 11: ...atically open and detect your ISP type Just input the Username and Password Click Continue Figure 2 7 Auto detecting your ISP type Note If Figure2 7 Setup from the main menu which displays For more information about SmartSetup 3 please see the enclosed Quick Start Guide ...

Page 12: ...WB31N RH and then GN WB31N RH Utility Note You may only use the utility to change wireless configurations when the GN WB31N RH is enabled and operating You have to use Windows native Zero Configuration tool provided with Windows when the Adapter is not enabled Opening the GN WB31N RH Wireless Utility you are presented with the Profile Tab There are 5 main tabs with which to control and monitor you...

Page 13: ...work Name of the wireless router or Access Point Channel Shows the current wireless channel Authentication Sever authentication types They include OPEN Shared LEAP WPA WPA PSK WPA2 and WPA2 PSK Encryption The type of encryption used in this profile None WEP AES and TKIP Network Type Informs you if an Access Point infrastructure or Ad Hoc is connected In Ad Hoc you may select a channel for each mem...

Page 14: ... OK Figure 3 3 Configuration Description of items in Figure 3 3 is as follows Profile Name Users can save different profiles names for different configurations SSID Select the AP detected by the system from the drop down menu or input a SSID Default ANY Power Saving mode Select Power Saving Mode PSM to turn off the Adapter s transceiver when not in use or select CAM to continuously turn on transce...

Page 15: ...her This mechanism is a way to prevent data collision when Adapters require transmission Default OFF Fragment Threshold Fragmentation mechanism is used for improving the efficiency when high traffic flows along in the wireless network Default OFF 3 1 2 Authentication and Security Screen If an authentication or security setting is configured in your Access Point or router you must enable this funct...

Page 16: ... alphanumeric characters 0 9 a f example 3c29f2536bef3276d32e364a2c Note Using a Hex key is more secure than using an ASCII key and if you are connecting to a GIGABYTE Router or Access Point ASCII keys are not allowed and you must use a Hex key WPA PSK WPA2 PSK encryption WPA PSK WPA2 PSK Preshared Key uses TKIP or AES based on your choice You create a password or Passphrase as its often called an...

Page 17: ... TTLS Check Use Client Certificate to verify the authenticity of a Client Certificate during the authentication process Clicking More will open the Client Certificate Selection Window shown in Figure 3 7 Users can select one suitable certificate as Client Certificate Default OFF Tunnel Authentication PEAP and TTLS use two step authentication method The first step is that Server sets up a Tunnel wi...

Page 18: ...5 Protocol Use assigned authentication type in the safe tunnel Tunnel ID Users accounts Password Passwords for users accounts Figure 3 6 Client Certificate Selection List ...

Page 19: ... the server name of server certificate is the same as the name entered by the user or belongs to the same domain Use certificate chain If Use certificate chain is checked it indicates that Client will confirm whether CA server is reliable Default OFF Certificate issuer CA of a server certificate can be selected from certificate issuers on the drop down list Default ANY Allow intermediate Certifica...

Page 20: ...n Server Name 3 1 3 Advanced Screen The Advanced screen is the third tab in the trio of tabs under Edit Profile see Figure 3 8 It includes the 802 11b g n wireless transmission mode settings Once you have finished configuration just click OK Then you will return to the Profile Tab Figure 3 2 A reboot is not needed for changes to take effect Figure 3 8 Advanced Description of items in Figure 3 8 is...

Page 21: ... two stations with 802 11b and 802 11g within range of the same Access Point it is necessary to set 11B G Protection This setting only functions when 802 11 B G mix is selected as Wireless Mode Three setting are available AUTO ENABLE and DISABLE This is a mechanism implemented to prevent the Hidden Node problem Hidden Note is a situation in which two stations are within range of the same Access Po...

Page 22: ... and BSSID of a link will appear Channel The current channel number used by the Adapter Link Speed Transmission rate transferring and receiving at which data is transferred between Stations with Adapter and AP The speed will adjust according to different modes 802 11b 11g or mixed and distance Throughput Displays the transmitting Tx and receiving Rx bytes per second Link Quality Measures quality o...

Page 23: ...D that you want to connect or click the Connect button see Figure 3 10 Figure 3 10 Site Survey Description of items in Figure 3 10 is as follows SSID The name of the wireless network also known as Network Name BSSID Displays the MAC address of the Access Point or router Signal Strength Displays the strength of the signal from a station to the AP Channel Displays the current channel number used by ...

Page 24: ...802 11 Ad Hoc we can select a channel for all members in 802 11 Ad Hoc Rescan Rescan the available networks and then re display results Connect Connects with the highlighted Access Point Add to Profile Adds a specific Access Point into the profile 3 4 Statistics Tab The Statistics tab shows you the number of packets sent and received by the Adapter see Figure 3 11 Figure 3 11 Statistics Descriptio...

Page 25: ...l Retries Number of frames failing to receive ACK after many retries RTS Frames Successfully Receive CTS Number of RTS frames successfully received CTS Clear To Send from AP RTS Frames Fail To Receive CTS Number of RTS frames fail to receive CTS from AP Frames Receive Successfully Number of frames received successfully Frames Receive With CRC Error Number of frames received with CRC Errors Frames ...

Page 26: ...provides basic prioritization of data packets based on four categories voice video best effort and background WMM Power Save function can extend the battery life of Wi Fi devices by increasing the efficiency and flexibility of data transmission It is an addition to WMM technology that enables Quality of Service QoS functionality in Wi Fi networks by prioritizing traffic from different applications...

Page 27: ... Link Setup MAC Address Specify the MAC Address of client adapter you want to direct link and click Apply to add DLS status table Timeout Value Specify the timeout value for DLS DLS Status DLS Status displays all DLS connections If you want to terminate one of connections just select specified connection and click Tear Down button ...

Page 28: ...e of the Adapter Utility Driver Version Date The version number and date of the Adapter Driver EEPROM Version Hardware version number of the Adapter s EPROM IP Address The current IP Address of the Adapter Phy_Address The MAC address of the Adapter Sub Mask The current Subnet Mask of the Adapter Default Gateway The current IP Address of the Gateway typically the IP address of the AP ...

Page 29: ... sure if the MAC address of the Adapter is added in the AP Authorization Table Problem Can connect to an AP but cannot connect to the Internet Advice z Make sure the security settings are the same as that of Access Point When WEP or WPA encryption is enabled check if the WEP or WPA keys for the USB Adapter and AP are the same z Make sure the network configuration IP address subnet mask gateway and...

Page 30: ...d or operating in conjunction with any other antenna or transmitter Europe Declaration of Conformity This device is a 2 4 GHz low power RF device intended for home and office use in EU and EFTA member states In some EU EFTA member states some restrictions may apply Please contact local spectrum management authorities for further details before putting this device into operation GIGA BYTE Technolog...

Page 31: ... is damaged due to inappropriate assembling Products are damaged due to the use of illegal accessory Products are damaged due to parts disassembling without authorization Products are damaged due to exceeding environment limits Products are damaged due to unexpected external force Products are damaged due to nature disasters Products are copies or illegally smuggled goods PLEASE RECORD THE FOLLOWI...

Page 32: ...5 第十二條 型式認證合格之低功率射頻電機 非經許可 公司 商號或使用者均 不得擅自變更頻率 加大功率或變更原設計之特性及功能 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信 經發現有 干擾現象時 應立即停用 並改善至無干擾時方得繼續使用 前項合法通信 指依電信法規定作業之無線電通信 低功率射頻電機須忍受合法通信或工業 科學及醫療用電波輻射性電 機設備之干擾 ...

Reviews: