background image

Federal Communication Commission Interference Statement: 

This equipment has been tested and found to comply with the limits for 
a Class B digital device, pursuant to Part 15 of the FCC Rules. These 
limits are designed to provide reasonable protection against harmful 
interference in a residential installation. This equipment generates, 
uses and can radiate radio frequency energy and, if not installed and 
used in accordance with the instructions, may cause harmful 
interference to radio communications. However, there is no guarantee 
that interference will not occur in a particular installation. If this 
equipment does cause harmful interference to radio or television 
reception, which can be determined by turning the equipment off and 
on, the user is encouraged to try to correct the interference by one of 
the following measures: 

 

Reorient or relocate the receiving antenna. 

 

Increase the separation between the equipment and receiver. 

 

Connect the equipment into an outlet on a circuit different from 
that to which the receiver is connected. 

 

Consult the dealer or an experienced radio/TV technician for 
help. 

 

FCC Caution: 

To assure continued compliance, any changes or modifications not 
expressly approved by the party responsible for compliance could void 
the user's authority to operate this equipment. 
This device complies with Part 15 of the FCC Rules. Operation is 
subject to the following two conditions: (1) This device may not cause 
harmful interference, and (2) this device must accept any interference 
received, including interference that may cause undesired operation. 

 

IMPORTANT NOTE 
FCC Radiation Exposure Statement: 

This equipment complies with FCC radiation exposure limits set forth 
for an uncontrolled environment. End users must follow the specific 
operating instructions for satisfying RF exposure compliance.   
This transmitter must not be co-located or operating in conjunction with 
any other antenna or transmitter.

 

 

Summary of Contents for GN-WPEAG

Page 1: ...Super G Wireless PCI Adapter Super G Wireless PCI Adapter GN WPEAG User s Guide October 2004 Revision 2 0 1 ...

Page 2: ... Installation 8 Installing PCI Adapter 8 Hardware Installation 8 Installing the Driver and Utility 9 SmartSetup 3 14 Chapter 3 Configuration 17 Using the Gigabyte Wireless Utility 17 Current Status Tab 17 Site Survey Tab 21 Profile Management Tab 22 Diagnostics Tab 34 Advanced Statistics 35 Adapter Information Tab 37 Appendix A FAQ 38 ...

Page 3: ...uper G Wireless PCI Adapter Appendix B Wireless Security 39 Appendix C Troubleshooting 40 Appendix D Glossary 41 Appendix E Specifications 44 Appendix F Regulatory Information 45 Appendix G Warranty 47 3 ...

Page 4: ...ving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution To assure continued compliance any changes or modifications not expressly approved by the party responsible for compliance could void the user s ...

Page 5: ...ports 64 128 152 bit WEP encryption 802 1x RADIUS authentication and WPA support giving you complete peace of mind over data security With SmartSetup 3 built in setting up and configuring a secure wireless network has never been easier SmartSetup 3 takes all the guesswork and mystery away giving you a bullet proof WPA connection generally in less than two minutes No pushing buttons no fussing with...

Page 6: ...er G is a set of technologies was invented by the Atheros Company to double the throughput of the 54Mbps promised by the IEEE 802 11g wireless standard To use Super G not only your PCI Adapter but your wireless Router or AP must also support the Atheros Super G functionality These and other advanced configuration options are explained further in Chapter 3 Configuring the WPEAG LEDs The WPEAG has t...

Page 7: ...For trouble free installation and operation please assure your PC meets the following minimum system requirements Desktop PC with a Pentium 300Mhz or higher compatible processor with an available PCI slot A CD ROM drive 20 Mbytes of hard disk space 7 ...

Page 8: ...tallation You will need a Phillips head screwdriver to perform the installation as described below Step 1 Power OFF your PC Step 2 Plug the PCI Adapter into an open PCI slot on the motherboard by pressing the card gently until the card edge connector is completely and firmly inserted into your motherboards PCI slot Figure 1 Insert your PCI Adapter Step 3 Once inserted attaché the antenna on the mo...

Page 9: ...ility You should use the drivers that are included on the CD ROM rather than the default Windows drivers The Gigabyte WMAG drivers have special features and utilities that give you more stability and security than Window s default Wireless Zero Configuration Step 1 Upon starting your PC the Windows Found New Hardware wizard will open Click Cancel to close this window 9 ...

Page 10: ...Found New Hardware Screen Step 2 Insert the WPEAG Setup CD into the CD ROM drive The Welcome screen will automatically open Step 2 From the main menu click Install Driver Utility Figure 5 WPEAG Welcome Screen 10 ...

Page 11: ...Super G Wireless PCI Adapter Step 3 InstallShield will install the WPEAG drivers Click Next to proceed Figure 6 InstallShield Step 4 Setup will detect your operating system 11 ...

Page 12: ...ws OS Step 5 If you receive the message Windows Logo Testing click Continue Anyway Figure 8 Windows Logo Testing Step 6 Click Finish to complete installation Figure 9 InstallShield Complete Step 6 Click Finish to complete installation 12 ...

Page 13: ...wireless utility represented by the four green bars Figure 10 New Wireless Connection Icon Congratulations Installation of your Wireless Adapter is complete The Gigabyte WPEAG default wireless settings are Infrastructure Mode NO security accepts all 2 4GHz wireless traffic Super G mode ON and power save mode normal To change these or other settings please see Configuring the WPEAG in Chapter 3 13 ...

Page 14: ...rtSetup 3 will detect this and activate In three easy steps you can establish a bulletproof WPA wireless network AND configure your Internet connection Only Gigabyte delivers this easy powerful and secure solution for your wireless network Step 1 Select the GIGABYTE wireless router from the available networks Figure 11 SmartSetup 3 Network Selection Step 2 Create a WPA Passphrase using any keyboar...

Page 15: ... I love green eggs and ham Figure 12 SmartSetup 3 Define Passphrase Step 3 Your GIGABYTE router s web configuration utility will automatically open and detect your ISP type Just key in the Username and Password Done Figure 13 Auto detecting your ISP type Note If Figure 13 does not appear please type 192 168 1 254 in the address bar of 15 ...

Page 16: ...b browser and click Smart Setup from the main menu which displays For more information about SmartSetup 3 please see the enclosed Quick Start Guide Congratulations Your secure WPA wireless LAN and Internet 16 ...

Page 17: ...configuration in a Profile Diagnostics Displays details regarding network connection health and performance Information Displays the card name MAC ID date and versions of the driver In addition to enabling you to configure your Adapter for use in various types of networks Ez Link Utility provides tools that enable you to assess the performance of the Adapter and other devices on the wireless netwo...

Page 18: ...requency and rate which your current wireless connection is capable of transmitting or receiving packets Network Type Displays the network connection type options are Ad hoc and Infrastructure Server Based Authentication Indicates if an 802 1X compliant RADIUS authentication server is utilized IP Address The unique Internet Protocol ID for the Adapter Current Channel The wireless radio channel bei...

Page 19: ...ode or another client in ad hoc mode upon association None WEP CKIP or TKIP Authentication Type Specifies whether the client adapter must share the same WEP keys as the access point in order to authenticate or can authenticate to the access point regardless of its WEP settings Open or Shared Message Integrity Check Indicates whether your client adapter is using message integrity check MIC to prote...

Page 20: ...client adapter is capable of transmitting The maximum level is dependent upon the radio band used and your country s regulatory agency 10 20 30 50 63 or 100 mW 802 11b g Current Signal Strength The signal strength for all received packets The higher the value the stronger the signal 0 to 100 or 0 to 100 dBm Current Signal Quality The signal quality for all received packets The higher the value the...

Page 21: ...atory domain for which your client adapter is currently configured This value is not user selectable America EMEA Japan or Rest of World Click OK to close the Advanced Status window Site Survey Tab The Site Survey screen displays a list of infrastructure and Ad hoc networks available for connection in the Network Name column To connect to a network simply click on the network name and press the Ac...

Page 22: ...s details You may add as many wireless profiles as you wish by clicking New You may even import and export your profile as a configuration file This is handy if the laptop is to be used between two or more AP s There are two windows in the Profile Management Tab The top window displays all profiles with a green radio icon next to the active profile The bottom window displays a brief summary of the...

Page 23: ... Arranges the profiles in a list according to an order which is convenient to you Radio Toggle on or off the WPEAG wireless radio receiver Profile Management General Tab Clicking Modify from the Profile Management Tab will present the Profile Management Dialogs There are three tabs here General Security and Advanced Tab Figure 18 Profile Management General Tab Profile Name A user defined free form...

Page 24: ...cate dialog W Click on the Configure button and fill in the WPA Passphrase AP type drop down menu The options include TLS PEAP and LEAP d click the Configure button to fill in the Define Pre Shared Keys window Set Security Method WPA Wi Fi Protected Access Choosing WPA opens the WPA EAP drop down menu The options include TLS and PA Passphrase Enables WPA Pre Shared Key PSK 802 1x RADIUS Authentica...

Page 25: ...the Allow Association to Mixed Cells check box if the access point to which the client adapter is to associate or the VLAN to which the clien will be as s Select the type of security encryption WPA WPA Passphrase WEP or RADIUS 802 1X from the radio buttons and click Configure Depending on figure C To use WEP select if you want Hex or ASCII method enter a pre shared ke s Note ASCII text WEP keys ar...

Page 26: ...rom the Security Tab tions and LEAP in the 802 1x EAP der ons and LEAP in the WPA EAP Type drop down box Using LEAP Before you can enable LEAP authentication your network access point must be configured for LEAP a If you want to enable LEAP without WPA choose 802 1x under Set Security Op Type drop down box If you want to enable LEAP with WPA choose WPA un Set Security Opti 26 ...

Page 27: ... in the Domain field Include Windows Logon Domain with User Name If you work in an environment with multiple domains and therefore want your Windows login domain to be passed to the RADIUS server along with your username Using EAP TLS or PEAP Before you can enable EAP TLS or PEAP authentication our etwork devices must meet the following requirements n You must have a valid Windows username and pas...

Page 28: ...list Server Domain Name Leave the Server Domain Name field blank to allow the client to accept a certificate from any server that supplies a certificate signed by the certificate authority listed in the Server Properties drop down list Login Name f the Login Name field is not filled in automatically enter your username in this format username domain com 28 ...

Page 29: ... Network Certificate Authority Choose the certificate authority from which the server certificate was downloaded in the Network Certificate Authority drop down list Use Windows User Name If you want your Windows username to also serve as your PEAP username check this box otherwise enter your PEAP username in the User Name box Set Password Select Token or Static Password depending on your users dat...

Page 30: ...Define PEAP EAP GTC Configuration window Login Name If the Login Name field is not filled in automatically enter your username with nothing after it for example csmith Enabling PEAP EAP MSCHAP V2 If you want to enable PEAP EAP MSCHAP V2 without WPA choose 802 1x under Set Security Options and PEAP EAP MSCHAP V2 in the 802 1x EAP Type drop down box If you want to enable PEAP EAP MSCHAP V2 with WPA ...

Page 31: ... your PEAP username and password check the Use Windows User Name and Password check box User information for PEAP Authentication Enter your PEAP username and password in the corresponding fields Profile Management Advanced Screen The Profile Management Advanced window see Figure 18 enables you to set parameters that control how the client adapter operates within an infrastructure or ad hoc network...

Page 32: ...radio range Power Save Mode Sets your client adapter to its optimum power consumption setting CAM Constantly Awake Mode Fast PSP Power Save Mode or Max PSP Max Power Saving Default CAM Constantly Awake Mode Network Type Specifies the type of network in which your client adapter is installed Default Infrastructure 802 11b Preamble Determines whether your client adapter uses both short and long radi...

Page 33: ... an access point Open and shared authentication do not rely on a RADIUS server on your network Preferred Access Points If this profile is configured for use in an infrastructure network and you want to specify up to four access points to which the client adapter should attempt to associate click Preferred APs The Preferred Access Points window appears Figure 28 Specify MAC Access Points Leave the ...

Page 34: ...eive statistics are available here Figure 29 with more advanced statistics available from the Advanced Statistics button Figure 29 Diagnostics Tab Transmit Multicast Packets Number of packets sent to a multicast address Broadcast Packets Number of packets sent to a broadcast address Unicast Packets Number of packets sent to a unicast address Total Bytes Total bytes transmitted 34 ...

Page 35: ... a unicast address Total Bytes Total bytes received Advanced Statistics More advanced statistics about your network are available in the Advanced Statistics window Figure 19 Figure 30 Advanced Statistics Transmit Frames Transmitted OK The number of total frames transmitted or received without errors Frames received The number of frames receive by the client Frames Dropped The number of frames drop...

Page 36: ...t Authentication Time Out The number of times the client adapter tried to authenticate to an access point but was unable to because the access point did not respond fast enough timed out Authentication Rejects The number of times the client adapter tried to authenticate to an access point but was rejected Association Time Out The number of times the client adapter tried to associate to an access p...

Page 37: ...plays the information of the card s driver MAC address and version date Figure 31 Adapter Info Tab Card Name The Make and Model name of the wireless Adapter MAC Address The MAC address of the WPEAG Driver Full path location of the driver used for the WPEAG Driver Version The version number of the WPEAG driver Driver Date The date of manufacture of the WPEAG driver file Client Name Name of the desk...

Page 38: ...lso referred to as Access Point Mode When a wireless network is set to infrastructure mode the wireless network is configured to communicate with a wired network through a wireless access point Q What is the IEEE 802 11g standard A The IEEE 802 11g standard specifies data rates of up to 54 Mbps in the 2 4 GHz band It uses Orthogonal Frequency Division Multiplexing OFDM which is provided by this st...

Page 39: ...d for the Administrator account 4 Enable MAC Address Filtering 5 Change the SSID periodically 6 Use the highest encryption algorithm possible Use WPA if it is available 7 Change the WEP encryption keys periodically Don t Be a Statistic Wireless networks are easy to find Statistics show that roughly half of all wireless networks have no security in place at all i e they are open systems for anyone ...

Page 40: ...to the PCI slot Uninstall the driver software from your PC and try reinstalling Try rebooting your PC Problem 2 I cannot communicate with other computers in Access Point infrastructure Mode Response Assure that the Desktop PC is powered on Assure that the WPEAG is configured with the same SSID and WEP settings as other computers in the Access Point configuration 40 ...

Page 41: ...such as the subnet mask and default router and to provide other configuration information such as the addresses for printer time and news servers DMZ In computer networks a DMZ demilitarized zone is a computer host or small network inserted as a neutral zone between a company s private network and the outside public network It prevents outside users from getting direct access to a server that stor...

Page 42: ...s like this 216 27 61 137 IPSec IPSec stands for IP Security It provides authentication and encryption over the Internet It functions at Layer 3 and thus secures everything on the network It has become a standard protocol used for virtual private networks VPNs MAC Address On a local area network LAN or other network the MAC Media Access Control address is your computer s unique hardware number Usu...

Page 43: ...the suite of communications protocols used to connect hosts on the Internet VPN Virtual private networks are secured private network connections built on top of publicly accessible infrastructure such as the Internet or the public telephone network VPNs typically employ some combination of encryption digital certificates strong user authentication and access control to provide security to the traf...

Page 44: ...ensitivity Minimum 73dBm 54Mbps typical 76dBm Nominal Temp Range Antenna External antenna with the gain of 2dBi SAFETY REGULATION AND OPERATING ENVIRONMENT FCC Part 15 USA DGT Taiwan EMC certification CE Europe TELEC Japan Temperature Range Operating 0 55 deg C Storing 20 65 deg C Humidity 10 90 Non condensing SOFTWARE SUPPORT Driver Windows 98SE Me 2000 XP Security WPA AES 802 1X client for Windo...

Page 45: ...modifications not expressly approved by the party responsible for compliance could void the user authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation ...

Page 46: ...bres d utilisation en France en utilisation intérieur Pour ce qui est des autres canaux ils peuvent être soumis à autorisation selon le départment L utilisation en extérieur est soumis à autorisation préalable et très restreint Vous pouvez contacter l Autorité de Régulation des Télécommunications http www art telecom fr pour de plus amples renseignements When operating in France this device may be...

Page 47: ... due to inappropriate assembling Products are damaged due to the use of illegal accessory Products are damaged due to parts disassembling without authorization Products are damaged due to exceeding environment limits Products are damaged due to unexpected external force Products are damaged due to nature disasters Products are copies or illegally smuggled goods PLEASE RECORD THE FOLLOWING INFORMAT...

Page 48: ...E mail networksupport gigabyte com tw 48 ...

Reviews: