background image

 

R&TTE Compliance Statement 

 

This equipment complies with all the requirements of Directive 1999/5/EC of the 
European Parliament and the Council of March 9, 1999, on radio equipment and 
telecommunication terminal equipment and the mutual recognition of their conformity 
(R&TTE). 
 

Safety 

 

This equipment is designed with the utmost care for the safety of those who install and 
use it. However, special attention must be paid to the dangers of electric shock and 
static electricity when working with electrical equipment. All guidelines of this and of 
the computer manufacturer must therefore be allowed at all times to ensure the safe 
use of the equipment. 
 

EU Countries Intended for Use   

 

The ETSI version of this device is intended for home and office use in Austria, 
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, 
the Netherlands, Portugal, Spain, Sweden and the United Kingdom. 
 
The ETSI version of this device is also authorized for use in EFTA member states: 
Iceland, Liechtenstein, Norway and Switzerland. 
 

EU Countries Not Intended for Use   

 

None. 

 

Summary of Contents for 523974

Page 1: ...WIRELESS 300N USB ADAPTER USER MANUAL MODEL 523974 INT 523974 UM 0809 04 ...

Page 2: ...equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This device and its antenna must not be co located or operating in conjunction with any other antenna or transmitter This device complies with Part 15 of the FCC Rules Operation is subject to t...

Page 3: ...gers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacturer must therefore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France Germany Greece Ireland Italy Luxembourg ...

Page 4: ...guration Utility 8 3 1 Utility Overview 8 3 2 Available Network 10 3 3 General 11 3 4 Profile 12 3 4 1 Configure the Profile 13 3 5 Status 17 3 6 Statistics 17 3 7 Wi Fi Protect Setup WPS 18 3 8 Software AP 21 3 8 1 AP Properties Setting 22 3 8 2 AP Advanced 22 3 8 3 AP Statistics 23 3 8 4 ICS 24 ...

Page 5: ...nt into a wireless access point Supports the most popular operating systems Windows 2000 XP Vista and Windows 7 Complies with 2 4 GHz IEEE 802 11n standard and is backward compatible with IEEE 802 11g b standards Use with INTELLINET NETWORK SOLUTIONS Wireless N WLAN products for best compatibility and performance Supports Hi Speed USB 2 0 1 1 interface 1 2 Specifications Standards IEEE 802 11b 11 ...

Page 6: ...XP Procedures are similar for Windows 2000 Vista 7 Note2 If you have installed the Wireless PC Adapter driver and utility before uninstall the old version first I Install the Driver and Utility A Insert the installation CD in your CD ROM drive Execute the Setup exe program B Select a setup language and click OK to proceed C Click Next to go to the next step ...

Page 7: ...3 D When you see the following screen click Install to begin the installation E The system starts to install the driver and utility F Click Finish to complete the driver and utility installation ...

Page 8: ... in the system tray or right click the icon and select Open configuration utility B The utility of the adapter is displayed Click the Available Network tab and double click on the wireless access point you want to connect to C Input the security setting and click OK to start the network connection ...

Page 9: ...a 7 A With Windows Vista 7 you can use Windows Zero Configuration to connect to a wireless access point Click Start then click Control Panel Click Network and Internet in the Control Panel B Click Connect to a network under Network and Sharing Center ...

Page 10: ...s shown then click Connect D If it s an unnamed access point i e the SSID of this wireless access point is hidden you ll be prompted to input its name and the name must be identical to the SSID setting of the wireless access point you re connecting to ...

Page 11: ...to input its security or passphrase here It must match the encryption setting on the access point F If you can see the screen below the connection between your computer and wireless access point has been successfully established Click Close to start the network connection ...

Page 12: ... the icon Right click the icon in the system tray There are some options for operating the configuration utility Open Config Utility Select Open Config Utility to open the configuration utility About Select About to show the utility information Hide Select Hide to hide the utility in the system tray Quit Select Quit to quit the utility in the system tray In the System Tray In the System Tray Right...

Page 13: ...several adapters in your PC from the utility Show Tray Icon To show the icon in the system tray select the item Disable Adapter This is to disable or enable the adapter Windows Zero Config To configure the adapter from Windows XP Zero Configuration check the item Radio Off This is to turn off or turn on the radio of the adapter If the radio is turned off the adapter will not work This is the statu...

Page 14: ... Parameter Description Available Network s This list shows all information of the available wireless networks within the range of your adapter SSID Channel Encryption Network Authentication Signal etc To connect to any network on the list double click the selected network Refresh Click Refresh to update the available networks list It is recommended that you refresh the list any time you have chang...

Page 15: ...tructure This operation mode indicates the presence of an 802 11 access point All communication is done via the access point or router IBSS This displays if you decided to connect to other wireless stations in the wireless LAN network without going through an access point or router Encryption This displays the encryption setting of the current connection None WEP TKIP or AES SSID The SSID up to 32...

Page 16: ... manage a profile Parameter Description Available Profile s This list shows the preferred networks for the wireless connection You can add remove edit and duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Click these buttons to add delete edit the selected profiles Duplicate To build up the new profile with the same settings as the current profil...

Page 17: ...adapter This is a computer to computer ad hoc network wireless access points are not used There are two kinds of network type Infrastructure This operation mode requires the presence of an 802 11 access point All communication is done via the access point or router Ad Hoc Connect to another wireless adapter in the wireless LAN network without going through an access point or router If this is sele...

Page 18: ...PA2 PSK provides data encryption via AES In contrast WPA PSK uses the Temporal Key Integrity Protocol TKIP WPA 802 1X WPA provides a scheme of mutual authentication using either IEEE 802 1x Extensible Authentication Protocol EAP authentication or pre shared key PSK technology It provides a high level of assurance to enterprises small businesses and home users that data will remain protected and th...

Page 19: ...r users PASSPHRASE This is a text string with a maximum of 32 alphanumeric characters for example Test The WEP key is based on the passphrase determined by you This passphrase may not work with other vendors products due to possible incompatibility with other vendors passphrase generators so you must use the same passphrase or WEP key settings for all wireless computers within the network Key Leng...

Page 20: ...for use only when limited vendor choice for client access point and server products is not a concern When you have set up LEAP authentication you need to enter the user name and password of your computer PEAP TTLS PEAP and TTLS are similar and easier than TLS in that they specify that a stand alone authentication protocol be used within an encrypted tunnel TTLS supports any protocol within its tun...

Page 21: ... to linking time and link status If you re unsure about the status of the adapter and the network you are connecting go to the screen for more details 3 6 Statistics You can get real time information about the packet transmission and receiving status during wireless communication from this screen To recount the statistics value click Reset ...

Page 22: ...IN button and then press a WPS button or enter an 8 digit code on the wireless access point you want to establish a secure connection to I Pin Input Config PIN 1 The PIN code of your wireless network card is an 8 digit number located at the upper right position of configuration utility Remember it and input the number to your wireless access point as the WPS PIN code Refer to the user manual of yo...

Page 23: ...uter select the SSID of the wireless access point that you want to connect to and click Select 4 You ll need to wait up to two minutes while the install procedure runs If a wireless access point with the correct PIN code is found you ll be connected to that access point ...

Page 24: ... by your access point s manufacturer then click PBC in the wireless configuration utility to start to establish a wireless connection by WPS This may require up to a minute to complete 2 When the connection between is successfully established via WPS information about the access point you connected to will be displayed ...

Page 25: ...e unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs The default SSID of the AP is Full Computer Name _AP Wireless adapters connecting to the AP should set up the same SSID as the AP BSSID This is the MAC address of the adapter Associate Table All the wireless adapters connected to the software AP will be displayed in the list Config Click Config for...

Page 26: ...22 3 8 1 AP Properties Setting Refer to Section 3 4 1 for the setting of the parameters for the AP Note that Ad Hoc mode is not enabled for the AP 3 8 2 AP Advanced ...

Page 27: ...Preamble The preamble defines the length of the CRC block for communication among the wireless stations There are two modes Long and Short High network traffic areas should use the shorter preamble type Set Defaults Click to return all settings to default values Apply Confirm the settings on the Advanced screen 3 8 3 AP Statistics You can get real time information about the packet transmission and...

Page 28: ...4 3 8 4 ICS To connect to the Internet through this SoftAP you need to make a bridge between SoftAP and your Internet connection Select the Internet connection in your SoftAP host machine and click Apply ...

Page 29: ...nd 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wireless LAN hardware from different manufacturers to communicate 3 What doe...

Page 30: ...hat is AES AES Advanced Encryption Standard a chip based security has been developed to ensure the highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption standards It is also included in IEEE 802 11i standard ...

Reviews: