background image

SECTION 2 

INSTALLATION

 

2-2  

WPCI810G

v2

 

Small Office/Home Office Users 

The access point that communicates with the WPCI810G

v2

 has a 

pre-assigned network name (SSID) that the WPCI810G

v2

 recognizes 

upon startup.  

If you are setting up a new wireless network and want to use 
WEP security, use any string of characters for the network key. If 
this feature is enabled on the wireless network, you’ll use the 
same network key for your WPCI810G

v2

.  

If you are connecting to an existing WEP enabled network, obtain 
the network key from the access point.  

If you are connecting to a WPA-enabled access point, obtain the 
WPA (Wi-Fi Protected Access) wireless network key information 
(network authentication type, encryption type, network key) from 
the access point.  

Security Options 

The WPCI810G

v2

 is designed for both the home user and business. 

WPA (Wi-Fi Protected Access) protocol is designed into the chipset. 
WPA is a powerful, standards-based, interoperable security 
technology for wireless local area networks (the subset of the future 
IEEE Std 802.11i standard) that encrypts data sent over radio waves.  

The WPA protocol was developed to overcome the weaknesses of 
the WEP (Wired Equivalent Privacy) protocol. Both protocols require 
the use of network key information, and either protocol can be 
enabled or disabled, depending on the type of network connection 
being made. 

Various options are available for selecting network authentication and 
data encryption. It is important for you to understand these options 
when deciding which (if any) security protocol to use. 

Security Example 

If you want to use a more secure protocol, the wireless network to 
which you are connecting must also support that protocol. For 
example, you decide to enable WPA-PSK on your WN825G, a good 
choice because of the robust security WPA-PSK offers. However, the 
slightly older wireless network you want to connect to only supports 
WEP, which means that you cannot use WPA (and should use WEP) 
because the security protocols must match between the network 
adapter and the access point. 

Summary of Contents for WPCI810Gv2

Page 1: ...User Guide Wireless PCI Adapter WPCI810Gv2 ...

Page 2: ...7 CFR Parts 2 and 15 of the FCC Rule as a Class B digital device This device complies with Part 15 of FCC Rules Operation of the device is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference that may cause undesired operation Wireless LAN and your Health Caution Exposure to Radio Frequency Radiation To comply with ...

Page 3: ... may require a license for operation Contact local authority for regulations Copyright 2004 Motorola Inc All rights reserved No part of this publication may be reproduced in any form or by any means or used to make any derivative work such as translation transformation or adaptation without written permission from Motorola Inc Motorola reserves the right to revise this publication and to make chan...

Page 4: ...n 3 Configuration Icon Description 3 2 Enabling the Motorola Wireless Configuration Utility 3 3 Connecting to an Existing Wireless Network 3 4 Configuring a New Wireless Network 3 5 Modifying Properties for a Configured Wireless Network 3 10 Controlling the Radio 3 12 Preferred Networks Setting up the Connection Order 3 13 Move Up and Move Down buttons 3 14 Advanced Selection Rules 3 15 Removing a...

Page 5: ...g difficulty connecting to the wireless network 4 1 I would like to see if my Internet connection is live 4 2 Software Solutions 4 3 How do I enable LEAP for my corporate network 4 3 I am unable to roam with WDS enabled 4 4 What if Pass Phrase isn t supported What do I enter for my security 4 4 Section 5 Glossary ...

Page 6: ...more You ll need one WPCI810Gv2 for each desktop computer The WPCI810Gv2 complies with the 802 11b and the new nearly 5 times faster 802 11g wireless standard With Wi Fi Protected Access WPA supported your wireless connections are robust and secure giving you the confidence to communicate without fear that the signal could be compromised Your adapter incorporates the latest technology into an easy...

Page 7: ...th the latest specifications Understanding Your User Guide The User Guide is subdivided into the following sections Overview Describes the WPCI810Gv2 and its functions the technology used and recommended practices for using it Installation Provides instructions for installing the hardware and setting up the firmware to get your adapter up and running Configuration and Status Describes the Configur...

Page 8: ... Adapter C he c k t h a t yo u r b ox co ntai n s thes e i t e ms Us erG u i d e Se ct ion 1 Inse rt t h e I ns t a l l at ion A ss i s t a n t CD RO M Us erG u i d e Se ct ion 2 Install t h e soft war e for y o ur u n i t fr o mthe CD ROM Us erG u i d e Se ct ion 2 Inse rt yo ur ca r d int o t h e P C Us erG u i d e Se ct ion 2 CD ROM WPCI 8 10 Gv2 WP CI A nt e nna Q u i ck S t a rt G u i de ...

Page 9: ...and the frequency spectrum used designated by the lower case letter after the standard For example your PCI adapter card can work with both the b and g specifications The 802 11b specification transmits data rates up to 11 Mbps while the 802 11g specification transmits data rates up to 54 Mbps Both standards operate in the 2 4 GHz range These are theoretical speeds so your performance may vary A W...

Page 10: ...O 54 Mbps 802 11g COMPATIBLE Tested to comply With FCC Standards For Home Or Office Use Made in China This device is approved as Motorola Model WPCI810Gv2 FCC ID ACQWPCI810GV2 MODEL WPCI810Gv2 PART NUMBER 498467 001 00 S N PPPPMMYJJJSSSSSCAABBCCCC MAC AB CD EF 01 23 45 The WPCI810Gv2 has the following features Feature Description 1 ANT Connection for the antenna 2 ACT Indicates the activity of the...

Page 11: ...r Office Use Made in China This device is approved as Motorola Model WPCI810Gv2 FCC ID ACQWPCI810GV2 MODEL WPC I810Gv2 PART NUMBER 498467 001 00 S N PPPPMMYJJJSSSSSCAABBCCCC MAC AB CD EF 01 23 45 MAC Address The following describes the features on the WPCI810Gv2 label Feature Description Label Includes the model number part number serial number and MAC Address MAC Address Location of the PCI adapt...

Page 12: ...lowing information from your network administrator Network names SSID of the specific wireless networks to which you are going to connect WPA Wi Fi Protected Access wireless network key information may include network authentication type encryption type network key for any WPA enabled networks to which you want to connect WEP Wired Equivalent Privacy wireless network key information network key fo...

Page 13: ...s based interoperable security technology for wireless local area networks the subset of the future IEEE Std 802 11i standard that encrypts data sent over radio waves The WPA protocol was developed to overcome the weaknesses of the WEP Wired Equivalent Privacy protocol Both protocols require the use of network key information and either protocol can be enabled or disabled depending on the type of ...

Page 14: ...KIP A network key used more secure WPA The network operates in IEEE 802 1x authentication mode This mode is for environments with a Remote Access Dial In User Service RADIUS infrastructure This environment requires heavy technical support to set up and maintain and is used by large corporations In a RADIUS environment various Extensible Authentication Protocols EAPs are supported These may include...

Page 15: ... insert the CD ROM and direct Windows to its proper location for example D WIN98 3 When prompted power down the PC and then unplug the electrical connection to install the adapter card 4 Using the instructions you received with your desktop PC remove the cover from your desktop PC 5 Locate an empty PCI slot in your desktop PC 6 Using the instructions that came with your desktop PC install the adap...

Page 16: ...e connector 9 Return power to the PC and complete the installation instructions supplied on the CD ROM Device Configuration Setup After installing the adapter card and software you are now able to connect to wireless networks Refer to Section 3 Configuration for information on how to create detailed connectivity profiles so you can connect to a wireless network setup security and setup modes of op...

Page 17: ...ection to Discover available wireless networks Setup operation modes Create connectivity profiles Setup security Monitor the wireless network environment Perform diagnostic discovery The screenshots shown may look slightly different from the ones in your version of the software ...

Page 18: ...tab There are no networks available The signal strength is Very Low The signal strength is Low The signal strength is Good The signal strength is Very Good The signal strength is Excellent The small bars on either side of the antenna indicate network activity The bar on the left indicates receive and the bar on the right indicates transmit Wireless Network Icons The infrastructure network is conne...

Page 19: ...ut the network To enable the Motorola Wireless Configuration Utility 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window is displayed 2 Check Let this tool manage your wireless settings if not enabled 3 Unless you are using Windows XP do not clear Let this tool manage your wireless settings If using Windows XP you can use the...

Page 20: ...etworks identify themselves with their Network Name SSID as seen in the Available networks field in the example below To quickly connect to an existing wireless network 1 Click the antenna icon The Connect to Wireless Network window is displayed The window displays any current wireless networks 2 Highlight the Available network you want to access 3 If the Network key background area turns white en...

Page 21: ...If you want to connect to a wireless network that is not in the Available networks field you can configure a network profile 1 Right click the antenna icon in the system tray and select Open Utility 2 The Motorola Wireless Configuration Utility window is displayed 3 Click Add ...

Page 22: ... window is displayed 5 Enter information for the new wireless network based on the descriptions in the following table Field Description Network name SSID Enter a Network Name SSID of no more than 32 alphanumeric characters This is the SSID for a particular wireless network ...

Page 23: ...thod is used WPA Wi Fi Protected Access WPA authentication 802 1X is used with an EAP type WPA PSK WPA authentication 802 1X is used with a Pre Shared Key which enables you to enter a static Network key CCX Cisco proprietary standard Lightweight Extensible Authentication Protocol LEAP Note If you select WPA WPA PSK or CCX you may be required to enter further information on the Authentication tab A...

Page 24: ...ata encryption when WEP or WPA PSK is selected This can be entered in ASCII or hexadecimal for WEP and in ASCII for WPA PSK Key index advanced There are four Keys 1 2 3 4 that can be selected for WEP The key index selected here must match the network s key index The key is provided for me automatically Select if the key is automatically provided Most often the key is not automatically provided so ...

Page 25: ...and the new network is listed in the Preferred networks area 7 Your computer is connected to the selected network when you see a blue bubble on top of the icon for that network If the blue bubble does not appear click Refresh If it still does not appear double check that the wireless settings match the configuration of the wireless network ...

Page 26: ...less network 1 Right click the antenna icon in the system tray and select Open Utility 2 The Motorola Wireless Configuration Utility window displays Your computer automatically connects to the network displayed at the top of the Preferred networks list 3 In the Preferred networks list highlight the network you want to configure and click Properties ...

Page 27: ...Authentication tab Match the setting used by the network 6 If the network requires Data Encryption select the type of encryption required Match the setting used by the network 7 If using WPA PSK enter the Pass Phrase in the Network key field In the example above the network is configured for WPA PSK for Authentication and TKIP for Encryption 8 For additional information about the fields on this wi...

Page 28: ...mply with restrictions prohibiting the emission of radio signals for example while onboard a commercial aircraft 1 To disable the radio using the antenna icon right click the antenna icon in the system tray and click Disable Radio 2 To enable the radio right click the antenna icon and click Enable Radio ...

Page 29: ...erred Networks Setting up the Connection Order There are two ways to specify the order that the adapter uses to connect to an available network in your Preferred networks list Using the Move Up and Move Down buttons Using Advanced Selection Rules ...

Page 30: ...less network in the order you specify in the Preferred networks list To move a network within the list 1 Highlight the network you want to move 2 Click either the Move up or Move down button depending on where you want the selected network to appear in the list In the example above the 2nd network is selected and the Move up button is active showing that you can move that network up when the butto...

Page 31: ...anced The Advanced window displays 2 Choose one of the three ways to display and choose networks from the list Choosing Access point networks only or Computer to computer networks only limits the number of networks in your preferred list 3 Selecting Automatically connect to non preferred networks allows you to connect to any network your utility can find For example this is useful if you are trave...

Page 32: ...erred network list 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 In the Preferred networks list highlight the network you want to remove 3 Click Remove The network is removed from your preferred network list 4 Click Apply or OK to save the change ...

Page 33: ...he Site Monitor tab The Visible Networks list provides information about all of the detected networks the Network Name SSID Channel Signal Strength and Security 3 In the Selected Network area of the window highlight a network to get more information about that network This area provides information about which wireless transmission standard is used on the network a graphic representation of the si...

Page 34: ...rk click Advanced The Advanced Site Monitor window displays This window provides detailed information about the network selected 5 To start a log of network activity click Start Log The Save log file as window displays 6 Select a drive and directory to store the networks log file 7 Click Save ...

Page 35: ... file The information is sent to the file approximately every six seconds The log is a comma delimited list that can be imported to a spreadsheet to enable you to view the activity on the network over a specific time period 8 Click Stop Log to stop the log information from being sent to the networks log file 9 To freeze the display click Freeze ...

Page 36: ...iew link status 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Link Status tab The Link Status tab provides information about the currently connected wireless network ...

Page 37: ...istics for the network you are connected to 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Statistics tab The Statistics tab provides information about the selected wireless network ...

Page 38: ...elect Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Diagnostics tab 3 Various diagnostic tests are available Select a test to learn more about it 4 Click the desired test to enable and click Run The results Passed or Failed are displayed in the next column 5 Click the desired test to view individual results which appear in the Recommendations field ...

Page 39: ...n for the adapter installed in your PC 1 Right click the antenna icon in the system tray and select Open Utility The Motorola Wireless Configuration Utility window displays 2 Click the Information tab The Information tab provides the firmware version number and hardware and software details about the adapter card ...

Page 40: ...m this screen Primarily you are concerned with the IBSS Channel Number Location and Xpress Technology areas 1 Click Start click Settings and then click Control Panel 2 Click System and select the Hardware tab 3 Click Device Manager 4 Click Network adapters 5 Click Motorola Wireless Network Adapter WPCI810G and select the Advanced tab ...

Page 41: ...s the channel number on which to operate The WPCI810Gv2 comes preset for use on channels 1 11 These values are legal in most countries Some countries allow use on more channels If you travel to one of these countries you may change the value for IBSS Channel Number to 12 13 or 14 Location Allows you to match the regulatory permissions of the country in which you are using the Adapter Match the cou...

Page 42: ...s PCI adapter and access point radio signal is enabled Review your access point s documentation for further instructions Ensure that your wireless PCI adapter for your PC and the wireless access point have the same security settings that will allow your computer to access the wireless network Refer to the Configuration section of the documentation that came with your access point Verify that the A...

Page 43: ...owed by the Router s IP address and press Enter For example type ping 192 168 10 1 The router s IP address is most likely the default gateway If you receive a reply the first word will be Reply then your computer is connected to the router Proceed to Step 4 If you do NOT receive a reply repeat steps 1 4 on a different computer to verify that the first computer is not the cause of the problem 5 In ...

Page 44: ...ess Configuration utility is enabled refer to Section 3 for further details 3 Add a new network refer to Section 3 for details 4 In the Preferred networks area highlight the network you want to configure 5 In the Available networks area click Configure or in the Preferred networks area click Properties 6 Select the type of authentication required in this case CCX Match the authentication used by t...

Page 45: ...for my security Some wireless cards do not support Pass Phrase or Motorola s Pass Phrase algorithm which means you have to enter the entire Key Content found in the appropriate Key field So using the WEP example from above if using Key 1 you would enter 03F32226A etc into the Network Key field of the example Network Adapter seen below Ensure that the Key index matches what is selected on the wirel...

Page 46: ...on session The clients communicate directly to each other and not through an established such as through a router Also known as IBSS Independent Basic Service Set ASCII The American Standard Code for Information Interchange refers to alphanumeric data for processing and communication compatibility among various devices normally used for asynchronous transmission B Bandwidth The transmission capaci...

Page 47: ...over long distances CPE Customer Premise Equipment typically computers printers etc that are connected to the gateway at the subscriber location CPE can be provided by the subscriber or the cable service provider Also called a client Crossover Cable A crossover cable is a cable that is used to interconnect two computers by crossing over reversing their respective pin contacts A crossover cable is ...

Page 48: ...ternet to download files from a server to a computer Driver Software that enables a computer to interact with a network or other device For example there are drivers for printers monitors graphics adapters modems Ethernet USB HPNA and many others DSL Digital Subscriber Line DSSS Direct Sequence Spread Spectrum DSSS is a transmission technology used in WLAN transmissions where a data signal at the ...

Page 49: ...erated by a device to inform an operator or the network management system that something has occurred F Firewall A security software system on the some devices that enforces an access control policy between the Internet and the LAN for protection Firmware Code written onto read only memory ROM or programmable read only memory PROM Once firmware has been written onto the ROM or PROM it is retained ...

Page 50: ...me computer I ICMP Internet Control Message Protocol is a protocol used for error problem and informational messages sent between IP hosts and gateways ICMP messages are processed by the IP software and are not usually apparent to the end user IEEE The Institute of Electrical and Electronics Engineers Inc http www ieee org is an organization that produces standards technical papers and symposiums ...

Page 51: ... the most widely used LAN standard LEAP Lightweight Extensible Authentication Protocol LEAP is an authentication implementation of 802 1X by Cisco which provides a challenge response authentication mechanism and dynamic WEP key assignment M MAC Address The Media Access Control address is a unique 48 bit value permanently saved in the ROM at the factory to identify each Ethernet network device It i...

Page 52: ...s some security because the IP addresses of LAN computers are invisible on the Internet Network Two or more computers connected to communicate with each other Networks have traditionally been connected using some kind of wiring NIC A Network Interface Card converts computer data to serial data in a packet format that it sends over the LAN A NIC is installed in an expansion slot or can be built in ...

Page 53: ...and connection PPTP Point to Point Tunneling Protocol encapsulates other protocols It is a new technology to create VPNs developed jointly by several vendors Private IP Address An IP address assigned to a computer on the LAN by the DHCP server for a specified lease time Private IP addresses are invisible to devices on the Internet See also Public IP Address Protocol A formal set of rules and conve...

Page 54: ...are on a computer Routing Table A table listing available routes that is used by a router to determine the best route for a packet RTS Request To Send S Server In a client server architecture a dedicated computer that supplies files or services such as file transfer remote login or printing to clients Also see client Service Provider A company providing Internet connection services to subscribers ...

Page 55: ...o track outstanding packets checks error in incoming packets and retransmits packets if requested TCP IP The Transmission Control Protocol Internet Protocol suite provides standards and rules for data communication between networks on the Internet It is the worldwide Internetworking standard and the basic communications protocol of the Internet Tunnel To place packets inside other packets to send ...

Page 56: ... is a method to exchange voice fax and other information over the Internet Voice and fax have traditionally been carried over traditional telephone lines of the Public Switched Telephone Network PSTN using a dedicated circuit for each line VoIP enables calls to travel as discrete data packets on shared lines VoIP is an important part of the convergence of computers telephones and television into a...

Page 57: ...rotects the privacy of data transmitted over a wireless LAN WEP uses keys to encrypt and decrypt transmitted data The access point must authenticate a client before it can transfer data to another client WEP is part of IEEE 802 11b Wi Fi Wireless fidelity pronounced why fy brand name applied to products supporting IEEE 802 11b g WLAN Wireless LAN WPA Wi Fi Protected Access A security regimen devel...

Page 58: ...Visit our website at www motorola com broadband ...

Reviews: