background image

SECTION 3 

CONFIGURATION

 

3-4 

SECTION 3, CONFIGURATION 

 

Click 

Advanced

. The Motorola Wireless Configuration Utility 

window is displayed: 

 

Summary of Contents for WPCI180G

Page 1: ...User Guide Wireless PCI Adapter WPCI810G ...

Page 2: ...ult your dealer or local power company Upon completion of any service or repairs to this product ask the service technician to perform safety checks to determine that the product is in safe operating condition It is recommended that the customer install an AC surge protector in the AC outlet to which this device is connected This is to avoid damaging the equipment by local lightning strikes and ot...

Page 3: ... equipment The manufacturer is not responsible for any radio or television interference caused by unauthorized modification of the devices included with this product or the substitution or attachment of connecting cables and equipment other than specified by the manufacturer Correction of interference caused by such unauthorized modification substitution or attachment is the responsibility of the ...

Page 4: ...Configuration for New Network 3 7 Configuring Properties for an Existing Wireless Network 3 10 WPA Configuration for Existing Network 3 13 Preferred Networks Setting up the Connection Order 3 16 Move up and Move down buttons 3 17 Advanced Selection Rules 3 17 Removing a Network From Your Preferred Network List 3 18 Viewing Site Monitor Information 3 20 Viewing Link Status 3 22 Viewing Network Stat...

Page 5: ... the ability to wirelessly connect to your network to receive and send emails and to print documents to work or play on your PC without restrictions Your adapter incorporates the latest technology into an easy to install upgradeable package Wireless PCI Adapter WPCI810G Features The WPCI810G has the following features CD ROM based Installation Wizard to provide easy installation Device Configurati...

Page 6: ...uently asked questions and possible solutions Glossary List of terms and acronyms used in this book or used in the field of wireless networking and networking in general Box Contents Your box contains the following WPCI810G CD ROM Quick Start Guide Antenna Ge t t in g St a r t e d 1 2 3 4 M otorolaWPCI8 1 0 G W i re les s PCIA d apter C heck t hat your b o x con t ai ns t hesei t e m s Us e r G ui...

Page 7: ...art of the wireless network Wireless Connections Your Wireless PCI Adapter uses a radio transmission technology defined by the Institute of Electrical and Electronics Engineers IEEE called 802 11 Wireless Fidelity Wi Fi This standard is subdivided into distinct categories of speed and the frequency spectrum used designated by the lower case letter after the standard For example your PCI adapter ca...

Page 8: ...E UP TO 54 Mbps 802 11g COMPATIBLE Tested to comply With FCC Standards For Home Or Office Use Made in Taiwan This device is approved as Motorola Model WPCI810G FCC ID F2NWPCI810G MODEL WPCI810G PART NUMBER 498467 001 00 S N PPPPMMYJJJSSSSSCAABBCCCC MAC AB CD EF 01 23 45 The WPCI810G has the following features Feature Description 1 ANT Connection for the antenna 2 ACT Indicates the activity of the ...

Page 9: ... Home Or Office Use Made in Taiwan This device is approved as Motorola Model WPCI810G FCC ID F2NWPCI810G MODEL WPCI810G PART NUMBER 498467 001 00 S N PPPPMMYJJJSSSSSCAABBCCCC MAC AB CD EF 01 23 45 MAC Address The following describes the features on the WPCI810G label Feature Description Label Includes the model number part number serial number and MAC Address MAC Address Location of the PCI adapte...

Page 10: ...rt the CD ROM and direct Windows to its proper location for example D WIN98 3 When prompted power down the PC and then unplug the electrical connection to install the adapter card 4 Using the instructions you received with your desktop PC remove the cover from your desktop PC 5 Locate an empty PCI slot in your desktop PC 6 Using the instructions that came with your desktop PC install the adapter c...

Page 11: ... to the connector 9 Return power to the PC and complete the installation instructions supplied on the CD ROM Device Configuration Setup After installing the adapter card and software you are now able to connect to wireless networks Refer to Section 3 Configuration for information on how to create detailed connectivity profiles so you can connect to a wireless network setup security and setup modes...

Page 12: ...us of the network at a glance as well as access the Motorola Wireless Configuration Utility The table below describes the various states of the utility Icon Description The radio transmitter has been disabled from the utility To enable access the utility s Wireless Networks tab There are no networks available The signal strength is Very Low The signal strength is Low The signal strength is Good Th...

Page 13: ...ation To connect to an existing wireless network 1 Double click the antenna icon in your System Tray The Connect to Wireless Network window is displayed The window displays any available wireless networks detected 2 Highlight the Available network you want to access 3 If prompted enter a Network key Enter the network key you used to set up security on your access point 4 Click Connect ...

Page 14: ...N SECTION 3 SECTION 3 CONFIGURATION 3 3 Configuring a New Wireless Network To configure a new wireless network 1 Double click the antenna icon in the system tray The Connect to Wireless Network window is displayed ...

Page 15: ...SECTION 3 CONFIGURATION 3 4 SECTION 3 CONFIGURATION 2 Click Advanced The Motorola Wireless Configuration Utility window is displayed ...

Page 16: ...d Description Network name SSID Enter a Network Name SSID from 1 to 32 alphanumeric characters This is the SSID for a particular wireless access point Data encryption WEP enabled The security setting encrypts your wireless transmission Select if the type of security encryption algorithm used on this network is WEP64 or WEP128 Network Authentication Shared mode Select if your access point requires ...

Page 17: ...sensitive ASCII characters are allowed or 26 hexadecimal characters using only characters 0 9 and A F Key index advanced There are four Keys 1 2 3 4 that can be selected The key selected must match the wireless network s Key index The key is provided for me automatically This refers to dynamic key generation provided by a RADIUS server If your network is configured with dynamic key management then...

Page 18: ...o not currently have WPA support installed for Windows 98SE ME 2000 utilize the Funk utility located on the CD ROM Windows XP SP 1 refer to Microsoft s website and knowledge base article 815485 or search for WPA support on their website Enter information for the new wireless network that can use WPA support Field Description Network name SSID Enter a Network Name SSID of no more than 32 alphanumer...

Page 19: ...e the same key between your AP and client WPA Wi Fi Protected Access WPA authentication 802 1X is used with an EAP type WPA PSK WPA authentication 802 1X is used with a pre shared key Motorola recommends using WPA PSK because it provides the strongest security algorithm Data encryption Select the type of security encryption algorithm used on this network The security setting encrypts your wireless...

Page 20: ...ected The Key selected must match the network s Key index The key is provided for me automatically This refers to dynamic key generation provided by a RADIUS server If your network is configured with dynamic key management then check this box Otherwise leave unchecked This is a computer to computer ad hoc network Select if the network you are creating is a computer to computer ad hoc network After...

Page 21: ...RATION Configuring Properties for an Existing Wireless Network To configure network properties for an existing wireless network 1 Double click the antenna icon in the system tray The Connect to Wireless Network window is displayed 2 Click Advanced ...

Page 22: ...Motorola Wireless Configuration Utility window displays 4 In the Available networks list or the Preferred networks list highlight the network you want to configure In the Available networks area click Configure or in the Preferred networks area click Properties ...

Page 23: ... authentication click OK and this network is added to the list of preferred networks 7 If the network is not open and requires WEP data encryption click Data encryption WEP enabled 8 If the network is not open and requires network authentication click Network Authentication Shared mode 9 Edit the fields that you want to change for the selected wireless network For additional information about the ...

Page 24: ...led If you do not currently have WPA support installed for Windows 98SE ME 2000 utilize the Funk utility located on the CD ROM Windows XP SP 1 refer to Microsoft s website and knowledge base article 815485 or search for WPA support on their website Edit the information for the selected wireless network Field Description Network name SSID Enter a Network Name SSID of no more than 32 alphanumeric ch...

Page 25: ...re the same key between your AP and client WPA Wi Fi Protected Access WPA authentication 802 1X is used with an EAP type WPA PSK WPA authentication 802 1X is used with a pre shared key Motorola recommends using WPA PSK because it provides the strongest security algorithm Data encryption Select the type of security encryption algorithm used on this network The security setting encrypts your wireles...

Page 26: ... The Key selected must match the network s Key index The key is provided for me automatically This refers to dynamic key generation provided by a RADIUS server If your network is configured with dynamic key management then check this box Otherwise leave unchecked This is a computer to computer ad hoc network Select if the network you are creating is a computer to computer ad hoc network After fini...

Page 27: ...erred Networks Setting up the Connection Order There are two ways you can specify the order that the adapter uses to try to connect to an available network in your Preferred networks list Using the Move up and Move down buttons Using Advanced selection rules ...

Page 28: ...e selected network to appear in the list Advanced Selection Rules You can select some advanced rules for the adapter to use in displaying and selecting a network from the list of Preferred networks To select an advanced rule to display and choose a network 1 On the Motorola Wireless Configuration Utility window on the Wireless Networks tab click Advanced The Advanced window is displayed 2 Choose o...

Page 29: ...ON 3 CONFIGURATION Removing a Network From Your Preferred Network List To remove a wireless network from your preferred network list 1 Double click the antenna icon in the system tray The Connect to Wireless Network window is displayed ...

Page 30: ...IGURATION 3 19 2 Click Advanced The Motorola Wireless Configuration Utility window is displayed 3 In the Preferred networks list highlight the network you want to remove 4 Click Remove The network is removed from your preferred network list ...

Page 31: ...nitor tab The Visible Networks list provides information about all of the detected networks It lists the Network Name SSID Channel Signal Strength and Security 4 Highlight a network to get more information about that network in the Selected Network area of the window This area provides information about which wireless transmission standard is used on the network a graphic representation of the sig...

Page 32: ...rk click Advanced The Advanced Site Monitor window is displayed This window provides detailed information about the network you selected 6 To start a log of network activity click Start Log The Save log file as window is displayed 7 Select a drive and directory to store the networks log file 8 Click Save ...

Page 33: ...ted to a spreadsheet You can then view the activity on the network over a specific time period 9 Click Stop Log to stop the log information from being sent to the networks log file 10 To freeze the display click Freeze Viewing Link Status To view link status 1 Double click the antenna icon in the system tray 2 Highlight the network for which you want to view link status 3 Click Advanced 4 Click th...

Page 34: ...tics 3 Click Advanced The Motorola Wireless Configuration Utility window is displayed 4 Click the Statistics tab The Statistics tab provides information about the selected network Activating LEAP Lightweight Extensible Authentication Protocol LEAP is an authentication implementation of 802 1X by Cisco which provides a challenge response authentication mechanism and dynamic WEP key assignment 1 Dou...

Page 35: ...etwork for which you want to view statistics 3 Click Advanced The Motorola Wireless Configuration Utility window is displayed 4 Click the LEAP tab 5 Click Enable LEAP to activate the function 6 To add a network click Properties The LEAP Network Properties window displays ...

Page 36: ...ly and then OK to save your changes Viewing Adapter Product Information To view product information for the adapter installed in your PC 1 Double click the antenna icon in the system tray 2 Click Advanced The Motorola Wireless Configuration Utility window is displayed 3 Click the Information tab The Information tab provides the firmware version number and hardware and adapter details about the ada...

Page 37: ...wireless PCI adapter and access point radio signal is enabled Review your access point s documentation for further instructions Ensure that your wireless PCI adapter for your PC and the wireless access point have the same security settings that will allow your computer to access the wireless network Refer to the Configuration section of the documentation that came with your access point Verify tha...

Page 38: ...ing followed by the Router s IP address and press Enter For example type ping 192 168 10 1 The router s IP address is most likely the default gateway If you receive a reply the first word will be Reply then your computer is connected to the router Proceed to Step 4 If you do NOT receive a reply try from a different computer to verify that the first PC is not the cause of the problem 4 In the Comma...

Page 39: ...ablished such as through a router Also known as IBSS Independent Basic Service Set ASCII The American Standard Code for Information Interchange refers to alphanumeric data for processing and communication compatibility among various devices normally used for asynchronous transmission B Bandwidth The transmission capacity of a medium in terms of a range of frequencies Greater bandwidth indicates th...

Page 40: ...ervice provider Also called a client Crossover Cable A crossover cable is a cable that is used to interconnect two computers by crossing over reversing their respective pin contacts A crossover cable is sometimes known as a null modem D Default Gateway A routing device that forwards traffic not destined to a station within the local subnet DHCP A Dynamic Host Configuration Protocol server dynamica...

Page 41: ...logy used in WLAN transmissions where a data signal at the sending station is combined with a higher data rate bit sequence or chipping code that divides the user data according to a spreading ratio The chipping code is a redundant bit pattern for each bit that is transmitted which increases the signal s resistance to interference If one or more bits in the pattern are damaged during transmission ...

Page 42: ...rotocol for exchanging files between computers FTP is commonly used to download programs and other files to a computer from web pages on Internet servers G Gateway A device that enables communication between networks using different protocols See also router GUI Graphical User Interface H Hexadecimal A base sixteen numbering system that uses sixteen sequential numbers 0 to 9 and the letters A to F...

Page 43: ...nterconnected networks using TCP IP IP Internet Protocol is a set of standards that enable different types of computers to communicate with one another and exchange data through the Internet IP provides the appearance of a single seamless communication system and makes the Internet a virtual network IP Address A unique 32 bit value that identifies each host on a TCP IP network TCP IP networks rout...

Page 44: ...per bound on the size of a message that can be transferred by the network in a single frame Messages exceeding the MTU must be fragmented before transmission and reassembled at the destination Multicast A data transmission sent from one sender to multiple receivers See also broadcast and unicast N NAT Network Address Translation is an Internet standard for a LAN to use one set of IP addresses for ...

Page 45: ... Groper Port Triggering A mechanism that allows incoming communication with specified applications PPP Point to Point Protocol is used to transport other protocols typically for simple links over serial lines It is most commonly used to access the Internet with a dial up modem PPPoE Point to Point Protocol over Ethernet Used by many DSL Internet Service Providers for broadband connection PPTP Poin...

Page 46: ...r may not be similar A router is typically located at a gateway between networks A router operates on OSI Network Layer 3 It filters packets based on the IP address examining the source and destination IP addresses to determine the best route on which to forward them A router is often included as part of a network switch A router can also be implemented as software on a computer Routing Table A ta...

Page 47: ...an two segments T TCP Transmission Control Protocol on OSI transport layer four provides reliable transport over the network for data transmitted using IP network layer three It is an end to end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP TCP uses a timer to track outstanding packets checks error in incoming packets and retransmits packets if ...

Page 48: ...ces to a single USB port V VoIP Voice over Internet Protocol is a method to exchange voice fax and other information over the Internet Voice and fax have traditionally been carried over traditional telephone lines of the Public Switched Telephone Network PSTN using a dedicated circuit for each line VoIP enables calls to travel as discrete data packets on shared lines VoIP is an important part of t...

Page 49: ... LAN WEP uses keys to encrypt and decrypt transmitted data The access point must authenticate a client before it can transfer data to another client WEP is part of IEEE 802 11b Wi Fi Wireless fidelity pronounced why fy brand name applied to products supporting IEEE 802 11b g WLAN Wireless LAN WPA Wi Fi Protected Access A security regimen developed by IEEE for protection of data on a WLAN WWW World...

Page 50: ...MGBI 493961 001 07 03 Visit our website at www motorola com broadband ...

Reviews: