background image

4

5

Click the circled symbol to open the utility from the task bar.
The Hama Wireless LAN Utility starts with the following 
screen, whereby the values in the columns may be 
different.
This screen shows all available wireless networks. The 

SSID

, which is used to identify WLAN devices in the 

respective wireless LAN, the router MAC address 

(BSSID),

 

the 

signal strength

, the 

channel

 used, the 

encryption 

algorithm

 and the 

authentication

 and the 

type of network

 

are displayed.
The lower section of this window shows the connection 
status 

(Connected / Disconnected)

. Click 

Update

 to search 

for wireless networks again.

3.1 Quick confi guration

First, select the required network by clicking the corresponding line in the list. The network selected is 
highlighted in blue in the list. Now click the 

Connect

 button. 

You are connected to the network if the selected network is run without encryption and the signal is strong 
enough. This is indicated by the green symbol and Connected is shown in the status window.

If the network you selected is encrypted, another window opens in which you can enter the encryption data. 
The data must be identical to the router or access point settings. The 

authentication type

 and 

encryption

 are 

generally already selected in accordance with the target network. Enter the code which must correspond 
exactly with the code used by the router or access point. 
Click 

Ok

 to confi rm after you make your entries.

If you do not have this code yourself, please contact the person responsible for confi guring the router or 
access point.
For detailed information on setting encryption, please see Page 6, under the heading:

Setting the wireless LAN encryption.

If you have made these entries successfully, a green symbol is also displayed to indicate the successfully 
connection in the network overview.

For further information on the connection made, open the 

Status

 tab. It contains information on the 

Connection quality, Signal strength

 or 

Interference level.

3.2 Detailed confi guration

When confi guring, it is useful to create a profi le. A profi le serves to save various settings for a connection 
under a certain name. For example, if you want to connect to various wireless networks, you can save the 
settings for the networks in profi les, which allows you to change the confi guration quickly.

3.2.1 Creating a new profi le

You need the following information to create a profi le:

• 

SSID

 (network ID): This is the name of the required network. 

• 

Encryption

 used in the target network

• 

Network type 

 (type of network): Infrastructure or ad-hoc

There are two basic ways to create a profi le:

Version 1 :

  

Change to the 

Profi le

 tab and click 

Add.

      or

Version 2 :

  

Open the 

Site Survey

 tab. All networks are listed in this tab. Select the 

 

 

required network in the list and click 

Add to profi le.

 

For hidden networks only:

 

If the SSID fi eld is empty, the router or access point is set to hide the network. The SSID cannot 

 

therefore be copied automatically.

In both cases, the following window is displayed on 
the screen:
The device supports the infrastructure and ad-hoc 
network types.

Infrastructure:

 Select this type if you want to connect 

this wireless LAN device to a wireless LAN router or 
access point.

Ad-hoc

: Select this type if you want to connect 

directly to another wireless LAN client device, e.g. another 
USB stick or a WLAN PCI card without a wireless LAN 
router or access point. Two WLAN client devices are 
required for this.

3.2.1.1 Infrastructure mode

First enter a name for your profi le 

(Profi le name)

, e.g. “PROF1”.

If you have selected 

version 1

 to create the new profi le, you must enter the network ID 

(SSID)

 of the target 

network in the SSID fi eld. This is in the wireless LAN settings in your router or access point or you can ask the 
person in charge. If you have selected 

version 2,

 the 

SSID

 has already been copied automatically from the 

network overview.

To reduce the energy consumption, you can run the device in power saving mode. In this mode, certain 
functions are deactivated or run at a lower setting if they are not fully used. Select 

Constantly Awake Mode

, if 

you want to work at full power all the time.

Select 

Infrastructure

 under network type. This mode facilitates connection to a wireless LAN router or access 

point. The settings for 

TX Power, RTS Threshold 

and 

Fragment Threshold

 can be left at the default settings.

Summary of Contents for 62732

Page 1: ...u s t e r Wireless LAN PCI Card MiMo 300 Express 00062732 www hama de Hama GmbH Co KG Postfach 80 86651 Monheim Germany Tel 49 0 9091 502 0 Fax 49 0 9091 502 274 hama hama de www hama de 00062732 05 0...

Page 2: ...istent f r das Suchen neuer Hardware Beenden Sie diesen mit Abbrechen Bitte speichern Sie vor der Installation alle evtl offenen Dokumente die Sie gerade bearbeiten Schlie en Sie danach alle laufenden...

Page 3: ...Namen abzuspeichern M chten Sie sich z B abwechselnd mit verschiedenen drahtlosen Netzwerken verbinden so k nnen Sie die Einstellungen f r die Netzwerke in Profilen speichern wodurch eine schnelle Umk...

Page 4: ...ung verwendet werden wechseln Sie zur Registerkarte Authentifi zierung und Sicherheit und setzen Sie die Konfiguration unter Wireless LAN Verschl sselung einstellen fort Betreiben Sie ihr Netzwerk ohn...

Page 5: ...absolut identisch mit dem im Netzwerk verwendetet Schl ssel sein Er hat eine L nge von mindestens 8 und h chstens 63 beliebigen Zeichen bei ASCII wobei Buchstaben Zahlen und Sonderzeichen erlaubt sin...

Page 6: ...e Programme bevor Sie den PC neu starten 6 Installation von Treiber und Konfigurations Programm unter MAC OS X Bitte speichern Sie vor der Installation alle evtl offenen Dokumente die Sie gerade bearb...

Page 7: ...WLAN Netzwerk aus indem Sie in der Liste in die entsprechende Zeile klicken Das gew hlte Netzwerk ist in der Liste jetzt blau hinterlegt Klicken Sie jetzt auf den Button Connect Sie sind mit dem Netzw...

Page 8: ...nem Passwort oder einem beliebigen anderen Berechtigungsnachweis geschehen Verschl sselung Encryption Die Verschl sselung ist ein Vorgang bei dem ein Klartext mit Hilfe eines Verschl sselungsverfahren...

Page 9: ...ivaten Bereich doch eher seltene Authentifizie rungsmethode wird ein so genannter Authentifizierungsserver RADIUS Server verwendet Die Angaben die sie zur Konfiguration dieser Authentifizierungsmethod...

Page 10: ...rogram on Windows After you start the operating system the Windows New Hardware Wizard dialogue box opens Click Cancel to close it Before installation please save any open documents you may be working...

Page 11: ...ves to save various settings for a connection under a certain name For example if you want to connect to various wireless networks you can save the settings for the networks in profiles which allows y...

Page 12: ...your network uses encryption switch to the Authentication and Security tab and continue configuration under Setting wireless LAN encryption If your network is not encrypted click OK to accept the set...

Page 13: ...hared key field The code entered must be absolutely identical with that used in the network It must be min 8 and max 63 random characters for ASCII Letters numbers and special characters can be used 6...

Page 14: ...ve all open documents and close all programs before restarting the PC 6 Installing the driver and configuration program on MAC OS X Before installation please save any open documents you may be workin...

Page 15: ...less networks again 8 1 Quick configuration First select the required WLAN network by clicking the corresponding line in the list The network selected is highlighted in blue in the list Now click the...

Page 16: ...a certain characteristic This can be done by fingerprint password or any other proof of authorisation Encryption Encryption is a process in which a plain text is transformed into a coded text via an...

Page 17: ...rotocol An authentication server RADIUS server is used for the latter authentication method which is rarely used for private applications Your administrator can give you the information you require to...

Page 18: ...t d marr Quittez ce dernier en cliquant sur annuler Veuillez sauvegarder tous vos documents ouverts avant de lancer l installation Quittez ensuite tous les programmes actifs Ins rez le CD ROM fourni d...

Page 19: ...auvegarder diff rentes configurations de connexion sous une certaine d nomination Vous pourrez donc vous connecter diff rents r seaux sans fil en sauvegardant leurs param tres sous des profils distinc...

Page 20: ...nuez la configuration sous Configuration du chiffrement du r seau local sans fil dans le cas o vous utilisez un chiffrement pour votre r seau Confirmez vos r glages avec OK dans le cas o votre r seau...

Page 21: ...ment identique au code utilis dans le r seau Le code comporte au moins 8 caract res et au plus 63 en cas de codage ASCII les lettres les chiffres et les caract res sp ciaux peuvent tre utilis s Le cod...

Page 22: ...ible que vous deviez red marrez votre ordinateur apr s la d sinstallation du programme Sauvegardez tous vos documents ouverts et fermez toutes les applications avant de red marrer votre ordinateur 6 I...

Page 23: ...d sirez utiliser en cliquant sur son nom dans la liste Le r seau s lectionn appara t alors contrast en bleu Cliquez sur le bouton Connecter Il est possible que vous soyez connect e automatiquement un...

Page 24: ...Cette caract ristique peut tre une empreinte digitale un mot de passe ou tout autre justificatif Chiffrement Encryption Le chiffrement est une proc dure au cours de laquelle un texte en langage clair...

Page 25: ...domaine priv n cessite un serveur d authentification serveur RADIUS Vous pouvez vous procurer les informations requises pour la configuration de cette m thode d authentification chez votre administrat...

Page 26: ...tion af driver og konfigurationsprogram under Windows Efter start af styresystemet ses Windows dialog assistenten til s gning efter ny hardware Afslut dette med afbryd Gem alle bne dokumenter inden in...

Page 27: ...m forskellige tr dl se netv rk kan du gemme indstillingerne for netv rkene i profiler og dermed f mulighed for hurtig omkonfiguration 3 2 1 Oprettelse af ny profil For at kunne oprette en profil har d...

Page 28: ...r dighed i Europa Hvis der bruges en sikkerhedskryptering i dit netv rk skal du skifte til fanebladet Authentication and Security og forts tte konfigurationen under Indstilling af tr dl s LAN sikkerh...

Page 29: ...n gle skal v re fuldst ndig identisk med den n gle der anvendes i netv rket Den har en l ngde p mindst 8 og maks 63 vilk rlige tegn ved ASCII hvor b de bogstaver tal og specialtegn er tilladt eller 6...

Page 30: ...kan det v re n dvendigt at genstarte systemet Gem derfor alle bne dokumenter og luk alle programmer inden du genstarter din pc 6 Installation af driver og konfigurationsprogram under MAC OS X Gem alle...

Page 31: ...g f rst det nskede WLAN netv rk ved at klikke p den tilsvarende linje i listen Det valgte netv rk f r nu en bl baggrund i listen Klik s p knappen Connect Du er tilsluttet netv rket n r det valgte netv...

Page 32: ...hj lp af et fingeraftryk et password eller en hvilken som helst anden autorisationsdokumentation Kryptering Encryption Krypteringen er en proces hvor en klartekst forvandles til en chiffertekst via e...

Page 33: ...e der dog sj ldent bruges af private anvendes en s kaldt autentificeringsserver RADIUS server De oplysninger der kr ves til konfiguration af denne autentificeringsmetode f r du af din administrator Me...

Page 34: ...Prehl senie o zhode pod a R TTE smernice 99 5 EG J n jdete na www hama de Radio jatelep telaitteitakoskevandirektiivin99 5 EY mukainenvaatimustenmukaisuusvakuutusl ytyyosoitteesta www hama de Konform...

Reviews: