background image

Extensible Authentication Protocol (EAP):

 An IETF standard that establishes an 

authentication protocol for network access. Many authentication methods, including 
passwords, certificates, and smart cards, work within this framework.

EAP-TLS:

 A type of authentication method using the Extensible Authentication Protocol 

(EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses 
certificates which use passwords. EAP-TLS authentication supports dynamic WEP key 
management.

EAP-TTLS:

 A type of authentication method using the Extensible Authentication Protocol 

(EAP) and Tunneled Transport Layer Security (TTLS). EAP-TTLS uses a combination of 
certificates and another method, such as passwords. It is more secure than MD5 
authentication, which uses passwords, and less secure than EAP-TLS authentication, 
which exclusively uses certificates. EAP-TTLS authentication supports dynamic WEP key 
management.

Encryption:

 Scrambling data so that only the authorized recipient can read it. Usually a 

key is needed to decrypt the data.

Extended Service Set IDentifier (ESSID):

 A type of unique identifier applied to both the 

AP and the wireless PC Card that is attached to each packet. This allows the AP to 
recognize each wireless client and its traffic.

F

Firewall:

A firewall is a set of related programs, located at a network gateway server, that 

protects the resources of a network from users from other networks.

Frequencies:

 Strike a piano key and you generate a tone. Pick up the tone with a 

microphone and your tone turns in to a "vibrating" or "cycling" electronic signal. The rate 
of vibration depends on the key struck. In electronics we refer to this rate of vibration as 
the number of "cycles per second." The formal term for this value is Hertz. As we move 
up in rate, such as in the Broadcast Band, we can use Kilohertz (KHz) to represent 1,000 
Hz, or Megahertz (MHz) to represent 1,000,000 Hz. Continuing much further upward, we 
finally reach 1,000,000,000 Hz, which we can fortunately shorten to a Gigahertz (GHz). 
These frequencies are the home of both 802.11a (5 GHz) and 802.11b (2.4 GHz).

I

Summary of Contents for 2200BG

Page 1: ...User s Guide PRO Wireless 2200BG Network Connection Model WM3B2200BG ...

Page 2: ...file Wizard you can create profiles automatically to suite your specific connection requirements Enhanced security measures using 802 1x WPA encryption and authentication and 128 bit WEP encryption is standard for both 802 11b and 802 11g Introduction to Wireless Networking Software Installation Using Intel R PROSet Connecting to a Network Security Overview Setting Up Security Troubleshooting Spec...

Page 3: ...nd names or their products Intel disclaims any proprietary interest in trademarks and trade names other than its own Microsoft and Windows are registered trademarks of Microsoft Corporation Other names and brands may be claimed as the property of others Intel Corporation assumes no responsibility for errors or omissions in this document Nor does Intel make any commitment to update the information ...

Page 4: ...er you select the operating mode for the kind of wireless network you want You can use your wireless adapter to connect to other similar wireless devices that comply with the 802 11 standard for wireless networking Choosing a Wireless LAN Wireless LANs can operate with or without access points depending on the number of users in the network Infrastructure mode uses access points to allow wireless ...

Page 5: ...network This name is called the Service Set Identifier SSID When you set up your wireless adapter you specify the SSID If you want to connect to an existing network you must use the name for that network If you are setting up your own network you can make up your own name and use it on each computer The name can be up to 32 characters long and contain letters and numbers Profiles When you set up y...

Page 6: ...s TKIP protects against WEP s known weaknesses Cisco Client Extention CCX is a server and client 802 1x authentication via a user supplied logon password When a wireless access point communicates with a Cisco LEAP enabled RADIUS Cisco Secure Access Control Server ACS server Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network an...

Page 7: ...ated on a wall containing metal such as an air conditioning duct which will interfere with the range of your signal Simply move the transmitter and test the signal strength again For users to have seamless coverage when moving from access point to access point the signal levels at each point must overlap There is software available that will seamlessly hand off changing signal levels from one acce...

Page 8: ...ultiple access points will of course reduce the impact of these factors if your area has dividing walls throughout What is a Site Survey A site survey is an in depth examination and analysis of a proposed wireless LAN site The purpose of a site survey is to determine the number of access points needed the types of antennas needed and the best placement for those access points and antennas Although...

Page 9: ...rk expansion most likely 2 Study blueprints of the proposed wireless LAN site A site blueprint provides a map of the site as well as the location of objects such as walls partitions and anything else that could affect the performance of a wireless LAN Examining the site blueprint prior to conducting the physical walk through helps you identify areas in which wireless equipment is likely to perform...

Page 10: ...Back to Contents Page Please read all restrictions and disclaimers ...

Page 11: ... The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer s instructions The computer has not been powered on since the hardware installation was completed No other wireless LAN card is installed in this computer To install the driver before installing hardware use Start Run and browse to the file SetupWLD exe in the path PROW2200 WIN2K ...

Page 12: ...rk Connections menu screen appears leave it open and click the Found New Hardware Wizard dialog to make that the active window 5 On the Install Hardware Device Drivers screen verify that Search for a suitable driver for my device recommended is selected then click Next 6 When the Locate Driver Files dialog appears verify that the item CD ROM drives is checked and click Next 7 When the Driver Files...

Page 13: ...allShield Wizard for Intel R PROSet screen click Next 14 On the License Agreement screen after reading the license agreement select I accept the terms in the license agreement and click Next 15 On the Setup Type screen verify that Typical is selected then click Next This is the recommended setting for a first time installation 16 On the Ready to Install the Program screen click Install 17 After th...

Page 14: ...l be automatically installed Before proceeding make sure that you are operating Windows XP with administrative rights If you log in to Windows XP without administrative rights you may run into problems during the installation The Intel R PROSet utility or the Windows XP wireless configuration feature can be used to configure wireless network settings The instructions below include steps for instal...

Page 15: ... Windows XP Wireless Configuration Required To disable the Windows XP wireless configuration feature so that you can use Intel R PROSet for wireless configuration continue as follows Instructions are written for use with the Windows XP Start Menu and Control Panel Category View not with Classic Start Menu or Control Panel views 8 Click Start and Control Panel 9 On the Pick a category screen click ...

Page 16: ... Agreement screen after reading the license agreement select I accept the terms in the license agreement and click Next 17 On the Setup Type screen select Typical and then click Next This is the recommended setting for a first time installation 18 On the Ready to Install the Program screen click Install 19 After the software is installed on your computer click Finish Click Exit to close the Intel ...

Page 17: ... building Problems with network connectivity Checking Adapter Statistics LAN Utility Conflict Message Message dialog Another wireless LAN utility is communicating with the Intel R PRO Wireless LAN adapter To avoid conflicts Intel R PROSet has temporarily disabled its Profile Management features is displayed Refer to Enabling Intel R PROSet to manage Your Wireless Connections for information Using ...

Page 18: ...eless adapter 1 Remove and re install the adapter 2 Uninstall and reinstall the adapter s drivers Before calling Customer Support Make a note of the following answers before calling customer support From the General tab view the adapter s connection details Check that it is associated with an access point and the quality and strength of the signal From the General page click the Details button and...

Page 19: ...r new software Conflicts with other resident software packages are always a possibility and they are not always the fault of the newest addition Sometimes just starting over fixes the problem Swap units around Does your problem follow the changed units or is it unique to a specific location If it follows the product the swapped unit could be damaged or improperly configured If the problem stays wi...

Page 20: ...e motors spot welders and similar electronically noisy devices Range is shorter than it should be Repeat some tests late in the evening or on a weekend when there may be less interference However some users leave their networks turned all the time so this test is not foolproof By all means try more than one channel Your range problem may just be a nearby user whose system uses your present test ch...

Page 21: ...t the channel is correct 2 To correct these settings click the Networks tab 3 Select the profile being used 4 Click the Edit button and make the changes Access Point Connection Problems Check the preamble length setting in the Windows Device Manager Advanced tab If it is determined that a short preamble length is required to connect to an access point try changing the Auto default setting to Long ...

Page 22: ...mode or other computers in peer to peer mode click the Statistics button in the Troubleshooting tab to display the current information about how well the adapter is transmitting and receiving information Back to Contents Page Please read all restrictions and disclaimers ...

Page 23: ...ings in Windows Changing the Preamble Length Setting Enabling Intel R PROSet to manage Your Wireless Connections If you are using Windows XP as your wireless manager the following described how to enable Intel R PROSet as your wireless manager 1 From the Desktop Click the Start button Control Panel If you are looking at the Category View of Control panel click switch to classic view If you are loo...

Page 24: ...ess adapter The Configuration Service can also be used if there is more than one wireless adapter installed using 802 11b bands When the Intel Configuration Service dialog is displayed listing the available networks checking Don t show this again option will prevent the dialog from displaying again if the adapter becomes unassociated The Configuration Service will continue to function and attempt ...

Page 25: ... is checked it indicates that Intel R PROSet is the default wireless network manager If cleared Windows XP is the wireless network manager NOTE If Windows XP Zero Configuration is enabled while using Intel R PROSet a notification dialog displays if you choose No on this dialog the Intel R PROSet profile management features are disabled Refer to the Advanced Settings for more information Mixed mode...

Page 26: ...alog for setting up WEP encryption displays before the connection is made The Configuration Service can be used in two ways 1 Connect to available network using profiles only In this mode the Configuration Service attempts to connect to a network access point using profiles from the Profile List only If no matching profile is found a dialog appears that lists the available networks You can also cl...

Page 27: ...nagement features are automatically disabled The Advanced Setting Notify when disabling profile management features check box must be checked in order to display the notification dialog if Windows XP Zero Configuration in not enabled The default setting is enabled checked For Windows XP Zero Configuration Select Yes to disable Windows XP Zero Configuration Intel R PROSet will continue to manage th...

Page 28: ...nstantly connect without a profile or create a new profile NOTE Profiles with the Enable Auto Import feature enabled will also be displayed in the profile list of available networks Refer to Automatic Profile Distribution for more information To scan for available networks 1 From the General page select the wireless adapter on the left side pane 2 Select the Networks tab 3 Click the Scan button 4 ...

Page 29: ...en Click the Connect button to connect to the network The selected network has WEP security settings If the selected network has WEP encryption security settings after clicking the Connect button the Profile Wizard Advanced Security page will display From this dialog you can enter the WEP security settings and connect to the network 8 Click OK to connect to a network Connecting to a Network Using ...

Page 30: ...d hoc profile from the Profile List and click the Connect button This method uses a pre defined ad hoc profile created by the Profile Wizard The ad hoc profile is displayed in the Profile List When joining an ad hoc network the transmit channel established by the first computer is used This channel may be different than the one selected when the ad hoc profile was created by the Profile Wizard End...

Page 31: ... 16 Click the Back button to change or verify the settings or click Finish when you have completed the profile settings and return to the Networks page Connect to the Network 17 Changing the default transmit channel from the Adapter tab Unless the other computers in the ad hoc network use a different channel from the default channel there is no need to change the default channel If you want to cha...

Page 32: ...d Using Intel R PROSet to switch the radio on off The radio can be switched on or off from General page in Intel R PROSet The current state of the radio is displayed in the wireless adapter task tray menu option The General page also displays the current state of the radio if the hardware option is installed Switching the radio On Off Note When your laptop is switched on the radio is constantly tr...

Page 33: ...rties 2 Click the Hardware tab 3 Click the Device Manager button 4 Double click Network adapters 5 Right click the installed wireless adapter in use 6 Choose Disable from the pop up menu 7 Click OK Viewing Adapter Advanced Settings in Windows The following advanced options are available in the Windows Device Manager Advanced tab if Intel R PROset is not installed If PROSet is installed the Advance...

Page 34: ...eamble used to make a connection If you have a problem connecting to an access point please contact your system administrator or check the preamble length setting If it is determined that a long preamble length is required to connect to the access point try changing the preamble to Long Only this option always uses a long preamble to connect to the access point The Auto Default setting option allo...

Page 35: ...his option allows automatic detection of the preamble setting received from the access point to enable the appropriate preamble option Short preamble is used if this option is supported if not long preamble is used Long Only Always use a long preamble length to connect to an access point Back to Contents Page Please read all restrictions and disclaimers ...

Page 36: ...rofiles are displayed in the Profile List in the wireless client manager General page Profiles can be arranged in order of network connection priority You can connect to one network using the first profile in the Profile List then automatically connect to another network using the next profile This allows you to stay connected while roaming freely from one wireless network to another Although you ...

Page 37: ...isco CCX version 1 mode This mode allows connection to access points that support multiple and blank network names SSIDs 4 Click OK to save the setting and return to the previous dialog Creating a New Profile To add a new profile use the Profile Wizard sequence of dialogs to configure the profile contents The following example uses all of the Profile Wizard dialogs although some of the settings ma...

Page 38: ... WEP or CKIP if Enable Cisco Client eXtentions is enabled on the General Settings page for the data encryption 13 If WEP is selected select either 64 or 128 bit for the Encryption Level 14 Select the key index 1 2 3 or 4 15 Enter the required pass phrase or hex key 16 Click the 802 1x Enabled checkbox to enable the 802 1x security option 17 Select MD5 as the 802 1x Authentication Type 18 Click the...

Page 39: ...rd for more information To import profiles 1 From the General page click the Networks tab 2 Click the Advanced button 3 Click the Import Export button 4 Click the Import button 5 Locate the profile to import on your hard disk or enter the profile name in the File name field The profile extension is profile 6 Click the Import to import the profile into the Profile List 7 Click OK three times to ret...

Page 40: ... return to the Networks page To password protect a new profile 1 From the Networks page and click the Add button 2 Enter the required Profile name and network SSID information 3 Click the Password protect this profile check box on the General Settings dialog 4 Click Next and enter the security settings 5 Click Next 6 Click the Password protect this profile check box 7 Enter the password and confir...

Page 41: ...laced All imported profiles will be placed at the bottom of the Profile List and the profile file will be immediately deleted after the import whether the import was successful or not To import a profile into the profile list 1 Select a profile to be edited from the Profile List in the Networks page and click the Edit button or click the Add button to create a new profile using the Profile Wizard ...

Page 42: ...NOTE You cannot delete all profiles from the profile list There must always be one profile displayed in the list Connecting to a Network without a Profile To connect to an available network without a profile 1 From the General page click the Networks tab 2 Click the Scan button 3 Select the network profile name with no profile shown and click the Connect button 4 Click the No connect me directly w...

Page 43: ...SID and no profile shown in the Available Networks list 4 Click the Connect button 5 Click the Yes create a profile for this network now option 6 The Profile Wizard dialog displays Enter a profile name and Network Name SSID and security settings if required Click Finish to save the profile settings and return to the Networks page 7 Select the new profile from the profile list and click Connect Loa...

Page 44: ... encryption key to encrypt data before transmitting it Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers Authentication provides an additional validation process from the adapter to the access point Supported a uthentication schemes are Open and Shared Key authentication Shared Key authentication is supported using 64 b...

Page 45: ...are renewed automatically on a periodic basis This makes the encryption key s more secure To enable dynamic encryption keys you must use 802 1x certificate based authentication methods such as TLS or TTLS or PEAP Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP Wireless Encryption Protocol You can choose a 64 or 128 bit level encryption Also the da...

Page 46: ... compliant RADIUS server This RADIUS server may authenticate either the user via passwords or the machine by MAC address 802 1x authentication is independent of the 802 11 authentication process The 802 1x standard provides an authentication framework There are different 802 1x authentication types each providing a different approach to authentication employing the same protocol and framework for ...

Page 47: ...LEAP for Cisco Client eXtentions mode only and PEAP for WPA modes only Overview 802 1x authentication is independent of the 802 11 authentication process The 802 1x standard provides a framework for various authentication and key management protocols There are different 802 1x authentication types each providing a different approach to authentication but all employing the same 802 1x protocol and ...

Page 48: ...sed for 802 1x MD5 Challenge EAP TLS EAP TTLS Protected EAP PEAP and EAP Cisco Wireless Light Extensible Authentication Protocol LEAP These are all methods for the WLAN client to identify itself to the RADIUS server With RADIUS authentication users identities are checked against databases RADIUS constitutes a set of standards addressing Authentication Authorization and Accounting AAA Radius includ...

Page 49: ...otected Access WPA Wi Fi Protected Access WPA is a security enhancement that strongly increases the level of data protection and access control to a WLAN WPA mode enforces 802 1x authentication and key exchange and only works with dynamic encryption keys To strengthen data encryption WPA utilizes its Temporal Key Integrity Protocol TKIP TKIP provides important data encryption enhancements that inc...

Page 50: ...des security protection from an introduction of a rogue access point that could mimic a legitimate access point on a network in order to extract information about user credentials and authentication protocols which could compromise security This feature only works with Cisco s LEAP authentication Standard 802 11 technology does not protect a network from the introduction of a rogue access point CK...

Page 51: ...ntication Wired Equivalent Privacy WEP encryption and shared authentication helps provide protection for your data on the network WEP uses an encryption key to encrypt data before transmitting it Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers Authentication provides an additional validation process from the adapter t...

Page 52: ... adapter or you can enter it yourself and specify the key the key length 64 bits or 128 bit key format ASCII characters or hexadecimal digits and key index the location where a specific key is stored The longer the key length the more secure the key Every time the length of a key is increased by one bit the number of possible keys double Under 802 11 a wireless station can be configured with up to...

Page 53: ...orresponding to the network the user wants to connect to For 128 bit encryption the pass phrase is 13 characters long or you can enter a 26 hexadecimal numbers for the WEP key to get connected to the appropriate network Note You must use the same encryption type key index number and WEP key as other devices on your wireless network Also if 802 1x authentication is being used WEP encryption must be...

Page 54: ...ctions on how to obtain a certificate on your network Certificates can be managed from Internet Settings accessed from either Internet Explorer or the Windows Control Panel applet Use the Content page of Internet Settings Windows XP and 2000 When obtaining a client certificate do not enable strong private key protection If you enable strong private key protection for a certificate you will need to...

Page 55: ...quest a certificate task and submit the form 4 On the Choose Request Type page select Advanced request then click Next 5 On the Advanced Certificate Requests page select Submit a certificate request to this CA using a form then click Submit 6 On the Advanced Certificate Request page choose the User certificate template Select Mark keys as exportable and click Next Use the provided defaults shown 7...

Page 56: ...essible in the Configure dialog of the Client this will happen if automatic is selected 7 Proceed to Completing the Certificate Import and click the Finish button The following example describes how to use WPA with TKIP encryption using TTLS or PEAP authentication Setting up the Client for TLS authentication Step 2 Specifying the certificate used by Intel R PROSet 1 Obtain and install a client cer...

Page 57: ...n server i e RADIUS server that is used by the authenticator Your certificate must be valid with respect to the authentication server This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority You should be logged in using the same username you used when the certificate was installed 1...

Page 58: ...the profile settings Setting up the Client for WPA PSK using WEP or TKIP authentication Use Wi Fi Protected Access Pre Shared Key WPA PSK mode if there is no authentication server being used This mode does not use any 802 1x authentication protocol It can be used with the data encryption types WEP or TKIP WPA PSK requires configuration of a pre shared key PSK You must enter a pass phrase or 64 hex...

Page 59: ... provides important data encryption enhancements including a re keying method 1 Obtain and install a client certificate refer to Setting up the Client for TLS authentication or consult your system administrator 2 From the General page click the Networks tab 3 Click the Add button 4 Enter the profile and network SSID name 5 Select Infrastructure for the operating mode 6 Click Next 7 Select WPA for ...

Page 60: ...t certificate information displays under Client Certificate 16 Click Close 17 Click the Finish button to save the security settings for the profile Setting up the Client for WPA using TKIP encryption and TTLS or PEAP authentication Using TTLS authentication These settings define the protocol and the credentials used to authenticate a user In TTLS the client uses EAP TLS to validate the server and ...

Page 61: ... allow intermediate certificates checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA If unchecked then the specified CA must have directly issued the server certificate 13 Enter the Server name If you know the server name enter this name Select the appropriate option to match the server name exactly or spe...

Page 62: ...ends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority You should be logged in using the same username you used when the certificate was installed 19 Select the certificate from the list and click OK The client certificate information displays under Client Certificate 20 Click Close 21 Click the Finis...

Page 63: ...utton to connect to the appropriate CCX enabled AP using the CCX Profile CCX Access Point and Client Configurations The access point provides settings to select different authentication types depending on the WLAN environment The client sends an Authentication algorithm field during the 802 11 authentication handshake that takes place between the client and the AP during connection establishment T...

Page 64: ... LAN driver is already loaded and the client sends 802 11 authentication with an Authentication algorithm value of 0x0 This is sufficient to get authenticated but the corresponding EAP or LEAP credentials need to be communicated to the AP to establish a connection Open and Required EAP only AP In the case where the AP is configured with Network EAP unchecked but Open and Required EAP checked the A...

Page 65: ...described above For this setup to work the client must use an Authentication Algorithm value of 0x0 as opposed to the need to use 0x80 for Network EAP only described above Therefore the Rogue AP checkbox also enables the client to support Network EAP only and Open and Required EAP only Cisco CCX Feature Support The Cisco mandatory Client Compliance Specifications Version1 0 Compliance to all manda...

Page 66: ...s IE Cisco Extension Symbol IE Mixed WEP and non WEP cells AP may respond to more than one SSID VLAN awareness Stealth mode support Clients should ignore missing SSIDs in beacons Multiple SSID support Client should be able to roam up to 3 SSIDs Client to use configured SSID in probe request Note Please refer to Cisco Client extensions version 1 0 document available at www cisco com for more detail...

Page 67: ...MT mates with cable connector U FL LP 066 Dual Diversity Antenna On board dual diversity switching Connector Interface 124 pin SO DIMM edge connector Operating Temperature 0 to 70 degrees Celsius Humidity 50 to 85 non condensing Type Frequency band 2 412 2 462 GHz US 2 412 2 484 GHz Japan 2 412 2 472 GHz Europe ETSI 2 457 2 462 GHz Spain 2 457 2 472 GHz France Frequency Modulation Modulation OFDM ...

Page 68: ... 45 W Receive 0 85 W Idle 60 mw Disable 50 mw Voltage 3 3 V General Operating Systems Windows XP 2000 Wi Fi Alliance certification Wi Fi certification for 802 11b and 802 11g WLAN Standard IEEE 802 11b Architecture Infrastructure or ad hoc peer to peer Security WPA Cisco CCX v1 0 LEAP PEAP TKIP EAP TLS EAP TTLS WEP 128 bit and 64 bit Product Safety UL C UL CB IEC 60590 Back to Contents Page Please...

Page 69: ...ransfer rate of 54Mbps an operating frequency of 2 4GHz and WEP encryption for security 802 11g networks are also referred to as Wi Fi networks 802 11x A series of IEEE specifications for LANs currently 802 11b 802 11a and 802 11g Using any one of these extensions to the 802 11 standard permits wireless communication between a client and an access point or between two clients 802 1x is based on th...

Page 70: ...l interference generated when both systems operate in the same location Broadcast SSID Used to allow an access point to respond to clients on a wireless network by sending probes D Data Rate Information Rate Not all bits carry user information Each group packet of bits contains headers trailers echo control destination information and other data required by the transmission protocol It is importan...

Page 71: ... that only the authorized recipient can read it Usually a key is needed to decrypt the data Extended Service Set IDentifier ESSID A type of unique identifier applied to both the AP and the wireless PC Card that is attached to each packet This allows the AP to recognize each wireless client and its traffic F Firewall A firewall is a set of related programs located at a network gateway server that p...

Page 72: ...d basis meaning that they must expect and accept interference from other legal users Products manufactured for ISM Band use must be approved by the FCC but the user does not have to be licensed In addition to WLAN ISM bands support cordless phones microwave ovens baby monitors toys ham radio transceivers and other wireless services K Kerberos An authentication system enabling protected communicati...

Page 73: ...amble A preliminary signal transmitted over a WLAN to control signal detection and clock synchronization R Radio Frequency RF Terms GHz MHz Hz The international unit for measuring frequency is Hertz Hz which is equivalent to the older unit of cycles per second One Mega Hertz MHz is one million Hertz One Giga Hertz GHz is one billion Hertz For reference the standard US electrical power frequency is...

Page 74: ...ry large or unusually complex installation situation you might want to consider calling in professionals to do your survey We are not permitted to suggest installer names but you can check your yellow pages or similar sources for likely candidates Static IP Address A permanent IP address that is assigned to a node in a TCP IP network T Transmission Control Protocol TCP A method protocol used with ...

Page 75: ...nd decode WEP transmissions The task is not trivial but it is possible If your data is extremely sensitive you should consider some form of secondary protection such as strong passwords and an additional level of encryption Suitable software packages are available from reputable suppliers Although not intended by the original architects WEP also helps prevents unauthorized access to your system by...

Page 76: ...Back to Contents Please read all restrictions and disclaimers ...

Page 77: ...Intel support is available online or by telephone Available services include the most up to date product information installation instructions about specific products and troubleshooting tips Online Support Technical Support http support intel com Network Product Support http www intel com network ...

Page 78: ...Corporate Web Site http www intel com Back to Contents Page Please read all restrictions and disclaimers ...

Page 79: ... 1 1992 Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCC s recommended limits The following safety precautions should be observed Do not touch or move antenna while the unit is transmitting or receiving Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts...

Page 80: ...aller VAR or antenna manufacturer for proper installation requirements Explosive Device Proximity Warning see below Antenna Warning see below Use on Aircraft Caution see below Other Wireless Devices see below Power Supply Access Point see below Explosive Device Proximity Warning Warning Do not operate a portable transmitter such as a wireless network device near unshielded blasting caps or in an e...

Page 81: ...in the countries for which it was intended and for verifying that it is configured with the correct selection of frequency and channel for the country of use Any deviation from the permissible settings for the country of use is an infringement of national law and may be punished as such For country specific information see the additional compliance information supplied with the product Wireless in...

Page 82: ...eless 2200BG adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization Examples of such situations include the following Using the Intel R PRO Wireless 2200BG adapter equipment on board airplanes or Using the Intel R PRO Wireless 2200BG adapter equipment in any other environment where the risk of interference with othe...

Page 83: ...igital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy If the equipment is not installed and used in accordance with the instructions the equipment may cause harmful interference to radio communications There is no gu...

Page 84: ...sue 2 and RSS 210 Issue 4 Dec 2000 Cet appariel numérique de la classe B est conforme à la norme NMB 003 No 2 et CNR 210 No 4 Dec 2000 To prevent radio interference to the licensed service this device is intended to be operated indoors and away from windows to provide maximum shielding Equipment or its trasmit antenna that is installed outdoors is subject to licensing Pour empêcher que cet apparei...

Reviews: