background image

Super G Wireless Notebook Adapter

 

 
 
 
 
 
 

 

 

 
 

Dual-Band A+G  
Wireless Notebook Adapter

 

GN-WLMA102 

 
 

User’s Guide 

 

 
 

September 2004 - Revision 2.0 

Summary of Contents for GN-WLMA102

Page 1: ...Super G Wireless Notebook Adapter Dual Band A G Wireless Notebook Adapter GN WLMA102 User s Guide September 2004 Revision 2 0 1 ...

Page 2: ...llation 7 Installing Drivers Ez Link Utility 7 Chapter 3 Configuration 11 Using the Gigabyte Ez Link Utility 11 Current Status Tab 11 Site Survey Tab 15 Profile Management Tab 16 Diagnostics Tab 28 Advanced Statistics 29 Adapter Info Tab 31 Appendix A FAQ 33 Appendix B Wireless Security 34 Appendix C Troubleshooting 34 ...

Page 3: ...Super G Wireless Notebook Adapter Appendix D Glossary 36 Appendix E Specifications 40 Appendix F Warranty 42 Appendix G Regulatory Information 42 3 ...

Page 4: ...1b while still remaining fully backward compatible with that standard Notebook PC s equipped with wireless adapters communicate with Wi Fi Application Points and wireless routers giving you the freedom of mobility and the convenience of getting online virtually wherever and whenever there is a wireless network keep in touch with friends and family via email instant messaging or just surfing the ne...

Page 5: ...ks in the 2 4 GHz band like 802 11b but operates at 54 Mbit s raw or about 24 7 Mbit s net throughput like 802 11a It is fully backwards compatible with 11b and uses the same frequencies 802 11a 11a The 802 11a standard uses the 5 GHz band and operates at a raw speed of 54 Mbit s with net achievable speeds in the mid 20 Mbit s The speed is reduced to 48 36 34 18 12 9 then 6 Mbit s as required to c...

Page 6: ...sed wireless networking at up to 54Mbss 802 11b based wireless networking at up to 11Mbps 802 11g based wireless networking at up to 54Mbps Data rates up to 108Mbps in Super A and Super G modes Dynamically scales down the data rate as needed 64 128 152 bit WEP encryption security RADIUS supported WPA PSK pre shared key authentication Automatic device power management minimizes battery drain Theore...

Page 7: ...l features and utilities that give you more stability and security than Window s default Wireless Zero Configuration Follow steps A through G below to install the Wireless LAN drivers and Ez Link Utility A First insert your Setup CD ROM into your notebook PC s CD ROM drive The Splash screen will automatically open Figure 2 Welcome splash screen Quick Installation Guide Manual Click to view the Qui...

Page 8: ...rer to view all files on the CD Exit Click to Exit the WLMA102 Welcome menu B Next insert your WLMA102 notebook card into your notebook PC With the label side up insert your WLMA102 Notebook Adapter into the free PCMCIA slot on your notebook PC C Click Install Wireless LAN Drivers and Utility D The Install Wizard will open as shown in figure 3 below Click Next to let the WLMA102 drivers and Utilit...

Page 9: ... click OK Figure 5 Insert Adapter Message F If you receive a message The software you are installing has not passed Windows Logo testing this is normal and the software has been tested to work with Windows Click Continue Anyway Follow the installation prompts and after completing installation click OK Restart Windows and remove the Setup CD ROM from the CD ROM drive Figure 6 Windows Logo Warning 9...

Page 10: ...also see the information bubble message on your tray Figure 7 InstallShield Complete Congratulations Installation of your Wireless Adapter is complete The Gigabyte WLMA102 default wireless settings are Infrastructure Mode NO security accepts all 2 4GHz and 5GHz wireless traffic Super A G mode ON and power save mode normal To change these or other settings please see Configuring the WLMA102 in Chap...

Page 11: ...onfiguration in a Profile Diagnostics Displays details regarding network connection health and performance Adapter Information Displays the card name MAC ID date and versions of the driver In addition to enabling you to configure your Adapter for use in various types of networks Ez Link Utility provides tools that enable you to assess the performance of the Adapter and other devices on the wireles...

Page 12: ...equency and rate which your current wireless connection is capable of transmitting or receiving packets Network Type Displays the network connection type options are Ad hoc and Infrastructure Server Based Authentication Indicates if an 802 1X compliant RADIUS authentication server is utilized IP Address The unique Internet Protocol ID for the notebook Current Channel The wireless radio channel bei...

Page 13: ...e mode or another client in ad hoc mode upon association None WEP CKIP or TKIP Authentication Type Specifies whether the client adapter must share the same WEP keys as the access point in order to authenticate or can authenticate to the access point regardless of its WEP settings Open or Shared Message Integrity Check Indicates whether your client adapter is using message integrity check MIC to pr...

Page 14: ...your client adapter is capable of transmitting The maximum level is dependent upon the radio band used and your country s regulatory agency 10 13 20 25 or 40 mW 802 11a 10 20 30 50 63 or 100 mW 802 11b g Current Signal Strength The signal strength for all received packets The higher the value the stronger the signal 0 to 100 or 0 to 100 dBm Current Signal Quality The signal quality for all receive...

Page 15: ...or a frequency Channel Set The regulatory domain for which your client adapter is currently configured This value is not user selectable America EMEA Japan or Rest of World Click OK to close the Advanced Status window Site Survey Tab The site survey screen displays a list of infrastructure and Ad hoc networks available for connection in the Network Name column To connect to a network simply click ...

Page 16: ...your current wireless connection profile and its details You may add as many wireless profiles as you wish by clicking New You may even import and export your profile as a configuration file This is handy if the laptop is to be used between two or more AP s There are two windows in the Profile Management Tab The top window displays all profiles with a green radio icon next to the active profile Th...

Page 17: ...configuration to a file Order Profiles Arranges the profiles in a list according to an order which is convenient to you Radio Toggle on or off the WLMA102 wireless radio receiver Profile Management General Tab Clicking Modify from the Profile Management Tab will present the Profile Management Dialogs There are three tabs here General Security and Advanced Tab Figure 12 Profile Management General T...

Page 18: ... Security Tab Set Security Method WPA Wi Fi Protected Access Choosing WPA opens the WPA EAP drop down menu The options include TLS and PEAP Click on the Configure button and fill in the Define Certificate dialog WPA Passphrase Enables WPA Pre Shared Key PSK Click on the Configure button and fill in the WPA Passphrase 802 1x RADIUS Authentication Enables 802 1x security and is only available if a R...

Page 19: ...Optional This is the default setting None no security is set Default setting Select the type of security encryption WPA WPA Passphrase WEP or RADIUS 802 1X from the radio buttons and click Configure Depending on the security selected the following Configure Security Screens will appear Configure Pre Shared Key WEP Security To use WEP select if you want Hex or ASCII method enter a pre shared key se...

Page 20: ...ofile Management window Figure 15 Enter WPA Passphrase Using LEAP Before you can enable LEAP authentication your network access point must be configured for LEAP authentication Perform one of the following from the Security Tab If you want to enable LEAP without WPA choose 802 1x under Set Security Options and LEAP in the 802 1x EAP Type drop down box If you want to enable LEAP with WPA choose WPA...

Page 21: ...ername and password which are registered with the RADIUS server User Name Enter a username Password Confirm Password Enter a password in both fields Domain If you wish to specify a domain name that will be passed to the RADIUS server along with your username enter it in the Domain field Include Windows Logon Domain with User Name If you work in an environment with multiple domains and therefore wa...

Page 22: ...e WPA EAP Type drop down box Figure 17 Define Certificate Window Select a Certificate Choose a certificate from the dropdown list Server Properties Choose an authority from the dropdown list Server Domain Name Leave the Server Domain Name field blank to allow the client to accept a certificate from any server that supplies a certificate signed by the certificate authority listed in the Server Prop...

Page 23: ...was downloaded in the Network Certificate Authority drop down list Use Windows User Name If you want your Windows username to also serve as your PEAP username check this box otherwise enter your PEAP username in the User Name box Set Password Select Token or Static Password depending on your users database If you want to implement added security by further refining the network certificate that wil...

Page 24: ...GTC Configuration window Login Name If the Login Name field is not filled in automatically enter your username with nothing after it for example csmith Enabling PEAP EAP MSCHAP V2 If you want to enable PEAP EAP MSCHAP V2 without WPA choose 802 1x under Set Security Options and PEAP EAP MSCHAP V2 in the 802 1x EAP Type drop down box If you want to enable PEAP EAP MSCHAP V2 with WPA choose WPA under...

Page 25: ...name and password check the Use Windows User Name and Password check box User information for PEAP Authentication Enter your PEAP username and password in the corresponding fields Profile Management Advanced Screen The Profile Management Advanced window see Figure 18 enables you to set parameters that control how the client adapter operates within an infrastructure or ad hoc network To open this w...

Page 26: ...Reducing the transmit power level conserves battery power but decreases radio range Power Save Mode Sets your client adapter to its optimum power consumption setting CAM Constantly Awake Mode Fast PSP Power Save Mode or Max PSP Max Power Saving Default CAM Constantly Awake Mode Network Type Specifies the type of network in which your client adapter is installed Default Infrastructure 802 11b Pream...

Page 27: ...andard for your regulatory domain The channel of the client adapter must be set to match the channel used by the other clients in the wireless network 802 11 Authentication Mode Specifies how your client adapter attempts to authenticate to an access point Open and shared authentication do not rely on a RADIUS server on your network Preferred Access Points If this profile is configured for use in a...

Page 28: ...ction to set additional parameters or click OK to save your changes and return to the Profile Management window Diagnostics Tab Basic transmit and receive statistics are available here Figure 18 with more advanced statistics available from the Advanced Statistics button Figure 18 Diagnostics Tab Transmit Multicast Packets Number of packets sent to a multicast address Broadcast Packets Number of pa...

Page 29: ...oadcast address Unicast Packets Number of packets received as a unicast address Total Bytes Total bytes received Advanced Statistics More advanced statistics about your network are available in the Advanced Statistics window Figure 19 Figure 19 Advanced Statistics Transmit Frames Transmitted OK The number of total frames transmitted or received without errors 29 ...

Page 30: ... Rate Mismatches The number of times the client adapter tried to associate to an access point but was unable to because the adapter s data rate was not supported by the access point Authentication Time Out The number of times the client adapter tried to authenticate to an access point but was unable to because the access point did not respond fast enough timed out Authentication Rejects The number...

Page 31: ...rs The number of frames that were discarded due to an incorrect message integrity check MIC value when CKIP was being used Adapter Info Tab The Driver Info Tab displays the information of the card s driver MAC address and version date Figure 20 Adapter Info Tab Card Name The Make and Model name of the wireless notebook adapter MAC Address The MAC address of the WLMA102 Driver Full path location of...

Page 32: ...Driver Date The date of manufacture of the WLMA102 driver file Client Name Name of the notebook client 32 ...

Page 33: ...tructure mode A Also referred to as Access Point Mode When a wireless network is set to infrastructure mode the wireless network is configured to communicate with a wired network through a wireless access point Q What is the IEEE 802 11g standard A The IEEE 802 11g standard specifies data rates of up to 54 Mbps in the 2 4 GHz band It uses Orthogonal Frequency Division Multiplexing OFDM which is pr...

Page 34: ...Use the highest encryption algorithm possible Use WPA if it is available 7 Change the WEP encryption keys periodically Don t Be a Statistic Wireless networks are easy to find Statistics show that roughly half of all wireless networks have no security in place at all i e they are open systems for anyone to freely use as they please In fact nearly 25 of the time the default administrator username pa...

Page 35: ...ware from your PC Reboot your PC and repeat the driver installation as specified in this User Guide Problem 3 I cannot communicate with other computers in Access Point infrastructure Mode Response Assure that the notebook or desktop is powered on Assure that the WLMA102 is configured with the same SSID and WEP settings as other computers in the Access Point configuration 35 ...

Page 36: ...bnet mask and default router and to provide other configuration information such as the addresses for printer time and news servers DMZ In computer networks a DMZ demilitarized zone is a computer host or small network inserted as a neutral zone between a company s private network and the outside public network It prevents outside users from getting direct access to a server that stores company dat...

Page 37: ...Super G Wireless Notebook Adapter 37 ...

Page 38: ...s like this 216 27 61 137 IPSec IPSec stands for IP Security It provides authentication and encryption over the Internet It functions at Layer 3 and thus secures everything on the network It has become a standard protocol used for virtual private networks VPNs MAC Address On a local area network LAN or other network the MAC Media Access Control address is your computer s unique hardware number Usu...

Page 39: ...ol the suite of communications protocols used to connect hosts on the Internet VPN Virtual private networks are secured private network connections built on top of publicly accessible infrastructure such as the Internet or the public telephone network VPNs typically employ some combination of encryption digital certificates strong user authentication and access control to provide security to the t...

Page 40: ... 108 96 72 48 36 24 18 and 12 Mbps Doze 25mA Receive 251mA Transmit 465mA Peak Output Power 22dBm Nominal Temp Range Minimum Receive Sensitivity 73dBm 54 Mbps Nominal Temp Range Antenna Internal antennas supporting diversity 802 11g Frequency Bands 2412 2484 MHz subject to local regulations Modulation Technology OFDM and DSSS Modulation Techniques 64QAM 16QAM QPSK BPSK CCK DQPSK DBPSK Date Rates B...

Page 41: ... Range Operating 0 55 deg C Storing 20 65 deg C Humidity Max 90 Non condensing SOFTWARE SUPPORT Driver Windows 98SE Me 2000 XP Security WPA AES 802 1X client for Windows XP 64 128 152 bit WEP Roaming Seamless roaming among 802 11b g access points Management Utility Monitors the network situation MECHANICAL Dimensions 120 x 54 x 7 mm Weight 40 1 g Packaging Packaging specially used by Gigabyte LED ...

Page 42: ...ursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not...

Page 43: ... In accordance with R TTE Directive 1995 5 EC Part 17 Requirements for Operation in the European Community GIGA BYTE Technology Inc declares the conformity of the above mentioned products for EN 300 328 2 V1 2 1 ETSI EN 300 328 1 V1 3 1 EN 301 489 1 and EN 301 489 17 Technical Requirements for Radio Equipment Countries of Operation and Conditions of Use in the European Community The user should ru...

Page 44: ...ss Email Model Serial Date of Purchase Place of Purchase From Whom Distributor Customer Service GIGA BYTE TECHNOLOGY CO LTD No 6 Bau Chiang Road Hsin Tien Taipei Hsien Taiwan Tel 886 2 89124888 Fax 886 2 89124007 http www GIGABYTE com tw Technical Support E mail networksupport GIGABYTE com tw 44 ...

Reviews: