User Guide
WPCI810 Wireless PCI Adapter
s
WPCI810G and WPCI810GP
WPCI810G
WPCI810GP
Page 1: ...User Guide WPCI810 Wireless PCI Adapters WPCI810G and WPCI810GP WPCI810G WPCI810GP ...
Page 2: ...PA 19044 1 215 323 1000 declares under sole responsibility that the WN825G and WPCI810G comply with 47 CFR Parts 2 and 15 of the FCC Rules as a Class B digital device This device complies with Part 15 of FCC Rules Operation of the device is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference that may cause undesire...
Page 3: ...tions Copyright 2004 Motorola Inc All rights reserved No part of this publication may be reproduced in any form or by any means or used to make any derivative work such as translation transformation or adaptation without written permission from Motorola Inc Motorola reserves the right to revise this publication and to make changes in content from time to time without obligation on the part of Moto...
Page 4: ...on Icon Description 3 2 Enabling the Motorola Wireless Configuration Utility 3 3 Connecting to an Existing Wireless Network 3 4 Configuring a New Wireless Network 3 5 Modifying Properties for a Configured Wireless Network 3 9 Performance Enhancement 3 11 Controlling the Radio 3 12 Preferred Networks Setting up the Connection Order 3 13 Move Up and Move Down buttons 3 14 Advanced Selection Rules 3 ...
Page 5: ... difficulty connecting to the wireless network 4 1 I would like to see if my Internet connection is live 4 2 Software Solutions 4 3 How do I enable LEAP for my corporate network 4 3 I am unable to roam with WDS enabled 4 3 What if Pass Phrase isn t supported What do I enter for my security 4 4 Section 5 Glossary ...
Page 6: ...early 5 times faster 802 11g wireless standard With Wi Fi Protected Access WPA supported your wireless connections are robust and secure giving you the confidence to communicate without fear that the signal could be compromised The WPCI810GP comes loaded with Performance Enhancement technology that accelerates your wireless network and your fun This new technology boosts wireless performance among...
Page 7: ... with the latest specifications Understanding Your User Guide The User Guide is subdivided into the following sections Overview Describes the WPCI810 and its functions the technology used and recommended practices for using it Installation Provides instructions for installing the hardware and setting up the firmware to get your adapter up and running Configuration and Status Describes the Configur...
Page 8: ...ter C hec k t h at yo urb ox cont ai ns t hese i t e ms U s erGui de S e ct i on 1 I nse rt t h e I ns t a l l at i on A ssi s t a nt C D R OM U s erGui de S e ct i on 2 I nst al l t h e sof t w are f oryo uru ni t f r o mt he C D R OM U s erGui de S e ct i on 2 I nse rt your card i nt o t he P C U s erGui de S e ct i on 2 C D R OM WP C I 810G WP C I A nt enna Q u i ckS t a r t G u i d e ...
Page 9: ...d the frequency spectrum used designated by the lower case letter after the standard For example your PCI adapter card can work with both the b and g specifications The 802 11b specification transmits data rates up to 11 Mbps while the 802 11g specification transmits data rates up to 54 Mbps Both standards operate in the 2 4 GHz range These are theoretical speeds so your performance may vary A Wor...
Page 10: ...TO 54 Mbps 802 11g COMPATIBLE Tested to comply With FCC Standards For Home Or Office Use Made in Taiwan This device is approved as Motorola Model WPCI810G FCC ID F2NWPCI810G MODEL WPCI810G PART NUMBER 498467 001 00 S N PPPPMMYJJJSSSSSCAABBCCCC MAC AB CD EF 01 23 45 The WPCI810 has the following features Feature Description 1 ANT Connection for the antenna 2 ACT Indicates the activity of the wirele...
Page 11: ... Or Office Use Made in Taiwan This device is approved as Motorola Model WPCI810G FCC ID F2NWPCI810G MODEL WPCI810G PART NUMBER 498467 001 00 S N PPPPMMYJJJSSSSSCAABBCCCC MAC AB CD EF 01 23 45 MAC Address The following describes the features on the WPCI810 label Feature Description Label Includes the model number part number serial number and MAC Address MAC Address Location of the PCI adapter card...
Page 12: ...ing information from your network administrator Network names SSID of the specific wireless networks to which you are going to connect WPA Wi Fi Protected Access wireless network key information may include network authentication type encryption type network key for any WPA enabled networks to which you want to connect WEP Wired Equivalent Privacy wireless network key information network key for a...
Page 13: ...curity technology for wireless local area networks the subset of the future IEEE Std 802 11i standard that encrypts data sent over radio waves The WPA protocol was developed to overcome the weaknesses of the WEP Wired Equivalent Privacy protocol Both protocols require the use of network key information and either protocol can be enabled or disabled depending on the type of network connection being...
Page 14: ...east secure WEP A network key used TKIP A network key used more secure WPA The network operates in IEEE 802 1x authentication mode This mode is for environments with a Remote Access Dial In User Service RADIUS infrastructure This environment requires heavy technical support to set up and maintain and is used by large corporations In a RADIUS environment various Extensible Authentication Protocols ...
Page 15: ...nsert the CD ROM and direct Windows to its proper location for example D WIN98 3 When prompted power down the PC and then unplug the electrical connection to install the adapter card 4 Using the instructions you received with your desktop PC remove the cover from your desktop PC 5 Locate an empty PCI slot in your desktop PC 6 Using the instructions that came with your desktop PC install the adapte...
Page 16: ...connector 9 Return power to the PC and complete the installation instructions supplied on the CD ROM Device Configuration Setup After installing the adapter card and software you are now able to connect to wireless networks Refer to Section 3 Configuration for information on how to create detailed connectivity profiles so you can connect to a wireless network setup security and setup modes of oper...
Page 17: ...tion to Discover available wireless networks Setup operation modes Create connectivity profiles Setup security Monitor the wireless network environment Perform diagnostic discovery The screenshots shown may look slightly different from the ones in your version of the software ...
Page 18: ...ab There are no networks available The signal strength is Very Low The signal strength is Low The signal strength is Good The signal strength is Very Good The signal strength is Excellent The small bars on either side of the antenna indicate network activity The bar on the left indicates receive and the bar on the right indicates transmit Wireless Network Icons The infrastructure network is connec...
Page 19: ... the network To enable the Motorola Wireless Configuration Utility 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window is displayed 2 Check Let this tool manage your wireless settings if not enabled 3 Unless you are using Windows XP do not clear Let this tool manage your wireless settings If using Windows XP you can use the W...
Page 20: ...works identify themselves with their Network Name SSID as seen in the Available networks field in the example below To quickly connect to an existing wireless network 5 Click the antenna icon The Connect to Wireless Network window is displayed The window displays any current wireless networks 6 Highlight the Available network you want to access 7 If the Network key background area turns white ente...
Page 21: ... you want to connect to a wireless network that is not in the Available networks field you can configure a network profile 1 Right click the antenna icon in the system tray and select Open Utility 2 The Motorola Wireless Configuration Utility window is displayed 3 Click Add ...
Page 22: ... Enter information for the new wireless network based on the descriptions in the following table Field Description Network name SSID Enter a Network Name SSID of no more than 32 alphanumeric characters This is the SSID for a particular wireless network The Network Name SSID is case sensitive ...
Page 23: ... be required to enter further information on the Authentication tab Ask your network administrator for additional information Data Encryption Select the type of security encryption algorithm used The available types of encryption are based on the type of the authentication selected Disabled No encryption Available only with Open and Shared authentication WEP Deselect Network Key is provided for me...
Page 24: ...uter to computer ad hoc network Select if the network you are creating or accessing is a computer to computer ad hoc network If you are attempting to connect to an infrastructure network then do not select this setting 6 After entering the information for this network click OK The Wireless Network window is displayed and the new network is listed in the Preferred networks area 7 Your computer is c...
Page 25: ...ss network 1 Right click the antenna icon in the system tray and select Open Utility 2 The Motorola Wireless Configuration Utility window displays Your computer automatically connects to the network displayed at the top of the Preferred networks list 3 In the Preferred networks list highlight the network you want to configure and click Properties ...
Page 26: ...thentication tab Match the setting used by the network 6 If the network requires Data Encryption select the type of encryption required Match the setting used by the network 7 If using WPA PSK enter the Pass Phrase in the Network key field In the example above the network is configured for WPA PSK for Authentication and TKIP for Encryption 8 For additional information about the fields on this wind...
Page 27: ...reless network can still support non Performance Enhanced client devices including standard 802 11g and or 802 11b devices Under these conditions the network steps down to support full backward compatibility but the WPCI810GP will still function normally 1 Click Start click Settings and then click Control Panel 2 Click System and select the Hardware tab 3 Click Device Manager 4 Click Network adapt...
Page 28: ...ly with restrictions prohibiting the emission of radio signals for example while onboard a commercial aircraft 1 To disable the radio using the antenna icon right click the antenna icon in the system tray and click Disable Radio 2 To enable the radio right click the antenna icon and click Enable Radio ...
Page 29: ...red Networks Setting up the Connection Order There are two ways to specify the order that the adapter uses to connect to an available network in your Preferred networks list Using the Move Up and Move Down buttons Using Advanced Selection Rules ...
Page 30: ...ss network in the order you specify in the Preferred networks list To move a network within the list 1 Highlight the network you want to move 2 Click either the Move up or Move down button depending on where you want the selected network to appear in the list In the example above the 2nd network is selected and the Move up button is active showing that you can move that network up when the button ...
Page 31: ...ced The Advanced window displays 2 Choose one of the three ways to display and choose networks from the list Choosing Access point networks only or Computer to computer networks only limits the number of networks in your preferred list 3 Selecting Automatically connect to non preferred networks allows you to connect to any network your utility can find For example this is useful if you are traveli...
Page 32: ...rred network list 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 In the Preferred networks list highlight the network you want to remove 3 Click Remove The network is removed from your preferred network list 4 Click Apply or OK to save the change ...
Page 33: ...e Site Monitor tab The Visible Networks list provides information about all of the detected networks the Network Name SSID Channel Signal Strength and Security 3 In the Selected Network area of the window highlight a network to get more information about that network This area provides information about which wireless transmission standard is used on the network a graphic representation of the sig...
Page 34: ... click Advanced The Advanced Site Monitor window displays This window provides detailed information about the network selected 5 To start a log of network activity click Start Log The Save log file as window displays 6 Select a drive and directory to store the networks log file 7 Click Save ...
Page 35: ...file The information is sent to the file approximately every six seconds The log is a comma delimited list that can be imported to a spreadsheet to enable you to view the activity on the network over a specific time period 8 Click Stop Log to stop the log information from being sent to the networks log file 9 To freeze the display click Freeze ...
Page 36: ...ew link status 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Link Status tab The Link Status tab provides information about the currently connected wireless network ...
Page 37: ...stics for the network you are connected to 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Statistics tab The Statistics tab provides information about the selected wireless network ...
Page 38: ...lect Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Diagnostics tab 3 Various diagnostic tests are available Select a test to learn more about it 4 Click the desired test to enable and click Run The results Passed or Failed are displayed in the next column 5 Click the desired test to view individual results which appear in the Recommendations field ...
Page 39: ... for the adapter installed in your PC 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Information tab The Information tab provides the firmware version number and hardware and software details about the adapter card ...
Page 40: ...hen click Control Panel 2 Click System and select the Hardware tab 3 Click Device Manager 4 Click Network adapters 5 Click Motorola Wireless PCI Adapter WPCI810 and select the Advanced tab 6 To change the value for any of the listed properties click the Property 7 Change the value in the Value box by either clicking the Value arrow and selecting a new value or by typing a new value as appropriate ...
Page 41: ...o one of these countries you may change the value for IBSS Channel Number to 12 13 or 14 Location Allows you to match the regulatory permissions of the country in which you are using the Adapter Match the country in which you are using the adapter Performance Enhancement WPCI810GP only This toggles the feature on or off The default is enabled Frame Bursting Select this option if the network uses F...
Page 42: ...CI adapter and access point radio signal is enabled Review your access point s documentation for further instructions Ensure that your wireless PCI adapter for your PC and the wireless access point have the same security settings that will allow your computer to access the wireless network Refer to the Configuration section of the documentation that came with your access point Verify that the Acce...
Page 43: ...wed by the Router s IP address and press Enter For example type ping 192 168 10 1 The router s IP address is most likely the default gateway If you receive a reply the first word will be Reply then your computer is connected to the router Proceed to Step 4 If you do NOT receive a reply repeat steps 1 4 on a different computer to verify that the first computer is not the cause of the problem 5 In t...
Page 44: ... further details 3 Add a new network refer to Section 3 for details 4 In the Preferred networks area highlight the network you want to configure 5 In the Available networks area click Configure or in the Preferred networks area click Properties 6 Select the type of authentication required in this case CCX Match the authentication used by the access point 7 Click the Authentication tab to enter fur...
Page 45: ...se or Motorola s Pass Phrase algorithm which means you have to enter the entire Key Content found in the appropriate Key field So using the WEP example from above if using Key 1 you would enter 03F32226A etc into the Network Key field of the example Network Adapter seen below Ensure that the Key index matches what is selected on the wireless network ...
Page 46: ... session The clients communicate directly to each other and not through an established such as through a router Also known as IBSS Independent Basic Service Set ASCII The American Standard Code for Information Interchange refers to alphanumeric data for processing and communication compatibility among various devices normally used for asynchronous transmission B Bandwidth The transmission capacity...
Page 47: ...er long distances CPE Customer Premise Equipment typically computers printers etc that are connected to the gateway at the subscriber location CPE can be provided by the subscriber or the cable service provider Also called a client Crossover Cable A crossover cable is a cable that is used to interconnect two computers by crossing over reversing their respective pin contacts A crossover cable is so...
Page 48: ...ernet to download files from a server to a computer Driver Software that enables a computer to interact with a network or other device For example there are drivers for printers monitors graphics adapters modems Ethernet USB HPNA and many others DSL Digital Subscriber Line DSSS Direct Sequence Spread Spectrum DSSS is a transmission technology used in WLAN transmissions where a data signal at the s...
Page 49: ...rated by a device to inform an operator or the network management system that something has occurred F Firewall A security software system on the some devices that enforces an access control policy between the Internet and the LAN for protection Firmware Code written onto read only memory ROM or programmable read only memory PROM Once firmware has been written onto the ROM or PROM it is retained e...
Page 50: ...e computer I ICMP Internet Control Message Protocol is a protocol used for error problem and informational messages sent between IP hosts and gateways ICMP messages are processed by the IP software and are not usually apparent to the end user IEEE The Institute of Electrical and Electronics Engineers Inc http www ieee org is an organization that produces standards technical papers and symposiums f...
Page 51: ...the most widely used LAN standard LEAP Lightweight Extensible Authentication Protocol LEAP is an authentication implementation of 802 1X by Cisco which provides a challenge response authentication mechanism and dynamic WEP key assignment M MAC Address The Media Access Control address is a unique 48 bit value permanently saved in the ROM at the factory to identify each Ethernet network device It is...
Page 52: ... some security because the IP addresses of LAN computers are invisible on the Internet Network Two or more computers connected to communicate with each other Networks have traditionally been connected using some kind of wiring NIC A Network Interface Card converts computer data to serial data in a packet format that it sends over the LAN A NIC is installed in an expansion slot or can be built in E...
Page 53: ...d connection PPTP Point to Point Tunneling Protocol encapsulates other protocols It is a new technology to create VPNs developed jointly by several vendors Private IP Address An IP address assigned to a computer on the LAN by the DHCP server for a specified lease time Private IP addresses are invisible to devices on the Internet See also Public IP Address Protocol A formal set of rules and convent...
Page 54: ...re on a computer Routing Table A table listing available routes that is used by a router to determine the best route for a packet RTS Request To Send S Server In a client server architecture a dedicated computer that supplies files or services such as file transfer remote login or printing to clients Also see client Service Provider A company providing Internet connection services to subscribers S...
Page 55: ...track outstanding packets checks error in incoming packets and retransmits packets if requested TCP IP The Transmission Control Protocol Internet Protocol suite provides standards and rules for data communication between networks on the Internet It is the worldwide Internetworking standard and the basic communications protocol of the Internet Tunnel To place packets inside other packets to send ov...
Page 56: ...s a method to exchange voice fax and other information over the Internet Voice and fax have traditionally been carried over traditional telephone lines of the Public Switched Telephone Network PSTN using a dedicated circuit for each line VoIP enables calls to travel as discrete data packets on shared lines VoIP is an important part of the convergence of computers telephones and television into a s...
Page 57: ...otects the privacy of data transmitted over a wireless LAN WEP uses keys to encrypt and decrypt transmitted data The access point must authenticate a client before it can transfer data to another client WEP is part of IEEE 802 11b Wi Fi Wireless fidelity pronounced why fy brand name applied to products supporting IEEE 802 11b g WLAN Wireless LAN WPA Wi Fi Protected Access A security regimen develo...
Page 58: ...MGBI 516590 001 07 04 Visit our website at www motorola com broadband ...