background image

 

3.2.1.1   Authentication 

vs. 

Security 

Parameter Description 

Authentication Type 

This setting has to be consistent with the wireless networks that 

the card intends to connect to.   All security keys within a network 

must match to allow successful communications. 

Open

 – No authentication is needed among the wireless network.

 

Shared

 – Only wireless stations using a shared key (WEP Key 

identified) are allowed to connecting each other.   

 

LEAP

 – LEAP is a pre-EAP, Cisco-proprietary protocol, with many

of the features of EAP protocols. Cisco controls the ability of other

vendors to implement this protocol, so it should be selected for 

use only when limited vendor choice for client, access-point, and 

server products is not a concern. When you have set up LEAP 

authentication, you have to enter the user name and password of 

your computer. 

 

WPA

 – WPA provides a scheme of mutual authentication using 

either IEEE 802.1x/Extensible Authentication Protocol (EAP) 

authentication or pre-shared key (PSK) technology. It provides a 

high level of assurance to enterprises, small businesses and 

home users that data will remain protected and that only 

authorized users may access their networks. For enterprises that 

have already deployed IEEE 802.1x authentication, WPA offers 

the advantage of leveraging existing authentication databases 

and infrastructure. 

 

WPA-PSK

 – It is a special mode designed for home and small 

business users who do not have access to network authentication

servers. In this mode, known as Pre-Shared Key, the user 

manually enters the starting password in their access point or 

gateway, as well as in each wireless station in the network. 

WPA-PSK takes over automatically from that point, keeping 

unauthorized users that don't have the matching password from 

joining the network, while encrypting the data traveling between 

authorized devices. 

 

WPA2 

– Like WPA, WPA2 supports IEEE 802.1 x/EAP 

authentications or PSK technology. It also includes a new 

advanced encryption mechanism using the Advanced Encryption 

Standard (AES). AES is required to the corporate user or 

government users. The difference between WPA and WPA2 is that

WPA2 provides data encryption via the AES. In contrast, WPA 

uses Temporal Key Integrity Protocol (TKIP). 

 

WPA2-PSK

 – WPA2-PSK is also for home and small business. 

15

 

Summary of Contents for HWPG1

Page 1: ......

Page 2: ...ipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person s body excluding extremities of...

Page 3: ...r to obtain a Return Authorization number Warranty is for repair or replacement only Hawking Technology does not issue any refunds BE SURE TO HAVE YOUR PROOF OF PURCHASE RETURN REQUESTS CAN NOT BE PRO...

Page 4: ...y 10 3 2 Profile 11 3 2 1 Configure the Profile 12 3 2 1 0 Configuration 12 3 2 1 1 Authentication vs Security 15 3 2 1 2 802 1x Setting Certification 18 3 2 1 3 802 1x Setting CA Server 20 3 3 Link S...

Page 5: ...dvanced solution defined by IEEE 802 11i for security in wireless networks The power consumption of the card is also very low Furthermore this card provides several levels of power saving modes allowi...

Page 6: ...Bm 1Mbps BPSK 8 PER 92dBm Dimension 19 H x 130 W x 121 D mm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE IC 1 3 Package Contents Before you begin the installation ple...

Page 7: ...Windows 98SE Me 2000 Note2 If you have installed a Wireless PCI Card driver utility before please uninstall them first before continuing with the HWPG1 software installation Software Installation A I...

Page 8: ...C Click Yes to process the installation if you accept the license agreement D Choose Hawking Configuration Tool and click next 4...

Page 9: ...E The system will automatically detect the card and display Hardware Installation screen Click Continue Anyway to continue F Please wait while the HWPG1 is configuring your software installation 5...

Page 10: ...re this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Restart your computer Software Installation Continue A After you hav...

Page 11: ...C Now you have completed the software installation Select Finish 7...

Page 12: ...utomatically This card will auto connect to wireless device which has better signal strength and no wireless security setting The Configuration Utility appears as an icon on the system tray of Windows...

Page 13: ...ect Exit to close the Configuration Utility tool In Windows XP there is a Windows Zero Configuration Tool for you to setup wireless clients By default this Windows Zero Configuration Tool is enabled I...

Page 14: ...Configuration Utility the system will scan all wireless channels to find all access points stations within the accessible range of your card and automatically connect to the wireless device with the...

Page 15: ...etworks on the list double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan button to collect the information of all the wireless n...

Page 16: ...escription Profile Name Define a recognizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID p...

Page 17: ...nother wireless station in the Wireless LAN network without going through an Access Point or Router Peer to Peer Transmit Power If you wish to lower the transmit power of the card to save the power of...

Page 18: ...t is transmitted directly to the wireless network Select a setting within a range of 0 to 2312 bytes Minor change is recommended Fragment Threshold The value defines the maximum size of packets any pa...

Page 19: ...prises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WP...

Page 20: ...tandard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the s...

Page 21: ...n Protocol EAP a method of authentication that has been in use for a number of years on networks that provide Point to Point Protocol PPP support as many internet service providers and enterprises do...

Page 22: ...APv2 PAP and EAP MD5 PEAP specifies that an EAP compliant authentication protocol must be used this card supports EAP MSCHAP v2 EAP TLS Smart card and Generic Token Card The client certificate is opti...

Page 23: ...ficate Store and made available to the RADIUS server for certification Parameter Description Tunnelled Authentication Protocol When the authentication type is PEAP or TTLS select a protocol to be used...

Page 24: ...3 2 1 3 802 1x Setting CA Server 3 3 Link Status From the Link Status option you can view all the information of the network you are connecting to 20...

Page 25: ...Status from the system tray The icon in your system tray will display different colors to help you distinguish the status of your wireless network Follow the table to the right to understand what eac...

Page 26: ...with its Tx counts Tx success Tx error RTS Success and RTS Failed and its Rx counts Rx success Rx error You may reset the counters by clicking Reset Counter 3 5 Advanced This option enables you to con...

Page 27: ...Turbo Mode Turbo Mode enables the card to deliver the better throughput in the same period and environment 23...

Page 28: ...24...

Page 29: ...l 3 7 Setting Up A Static IP Address Generally your IP settings will be assigned automatically However if your network doesn t support this capability please enter in the appropriate IP settings The I...

Page 30: ...b Go to your Control Panel Select Network Connections Right click on the Wireless Connection Properties 2 Select Internet Protocol TCP IP and Properties 26...

Page 31: ...ress 3 8 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this featu...

Page 32: ...rofile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connect...

Page 33: ...B Click Configure C Select Advanced page enable the WMM Capable 29...

Page 34: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 35: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 36: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Reviews: