background image

21

7. From the Select one or more PAC Authority to use with this Profile list,

highlight the PAC authorities associated with the network defined by
the profile's SSID. The list contains the names of all the authentication
servers from which you have previously pr ovisioned a PAC.

8. Click

Manage

. The Select EAP-FAST PAC window appears.

This window lets you group PAC authorities to facilitate authentication
while roaming. For example, if there are three PAC authorities at a
certain site covering different areas of the  site, you can create a group
containing these authorities and select one of them in the PAC list. In
this way, if you're roaming around the site, the other authorities in the
group will allow you access to the network.

A group consists of one or more aut horities. Each authority may have
one or more PAC files. A PAC authority can belong to only one group.

9. To create a new group, click

New Group

. A group consists of one or

more authority servers that the user trusts. To rename the group,
right-click the group and choose

Rename

. You can also rename the

group by clicking it and typing the new name.

When you create a new group, you can either import a PAC file into it
using the

Import

button or you can move a PAC from another group to

the new group.

10.To import a PAC, click

Import

. The PAC Import window appears. Do the

following:

a. Click

Browse

and select a PAC file to import. The default

location is C:/Program Files/Atheros.

b. Click the PAC file (*.pac) so that it appears in the File name box

at the bottom of the window.

c. Click

Open

.

d

.

If the Enter Password window appears, enter the PAC file
password, which can be obtained from your system
administrator, and click

OK

.

No

t

e

:

PAC 

f

i

l

e

 

p

a

s

s

wo

r

d

s

 

a

r

e

 

o

p

t

i

o

n

a

l

.

 

Th

e

 

PAC 

a

u

t

h

o

r

i

t

y

 

d

e

t

e

r

mi

n

e

s

wh

e

t

h

e

r

 

t

o

 

i

s

s

u

e

 

PAC 

f

i

l

e

s

 

t

h

a

t

 

r

e

q

u

i

r

e

 

u

s

e

r

-

s

u

p

p

l

i

e

d

 

p

a

s

s

wo

r

d

s

.

Ne

v

e

r

t

h

e

l

e

s

s

,

 

a

l

l

 

PAC 

f

i

l

e

s

 

(

e

v

e

n

 

t

h

o

s

e

 

wi

t

h

o

u

t

 

p

a

s

s

wo

r

d

s

)

 

a

r

e

 

e

n

c

r

y

p

t

e

d

Summary of Contents for MWL-6200D

Page 1: ...Wireless LAN USB Adapter USER S MANUAL VERSION 1 1 2008 02 28 ...

Page 2: ...IS drivers for the WLAN 11n ISM Band Dongle in Windows 2000 Windows XP Windows XP 64 Windows Vista Windows Vista 64 This guide also includes the detailed instructions for configuring the network adapter to interact with an access point AP in infrastructure mode Read this before installing the Atheros WLAN 11n ISM Band Dongle and NDIS driver in the targeted operating system OS environment All right...

Page 3: ...TRAY ICON 9 5 2 GENERAL CONNECTION SETTING 11 5 2 1 Current Status 11 5 2 2 Profile Management 15 5 2 3 Diagnostics 17 5 3 SECURITY 19 5 3 1 WPA WPA2 19 5 3 2 802 1x 30 5 3 3 WPA Passphrase 30 5 3 4 Pre Shared Key Static WEP 31 5 3 5 None 31 5 4 JumpStart for Wireless 31 6 Install VISTA Driver 37 7 Technical Specifications 41 8 Troubleshooting 42 9 Glossary 43 ...

Page 4: ...r relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different fr om that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harm...

Page 5: ...undesired operation Europe R TTE Directive This device complies with the specifications listed below EN 300 328 V1 6 1 2004 11 EN 301 489 1 V1 4 1 2002 08 EN 301 489 17 V1 2 1 2002 08 EN 60950 1 2001 The channel identifiers channel center frequencies and regulatory domains of each 22 MHz wide channel are shown in following Table Regulatory Domains Channel Identifier Center Frequency MHZ Japan ETSI...

Page 6: ...utdoor up to 280 meters 270 240 180 120 90 60 54 48 36 30 24 22 18 12 11 6 5 5 2 1 Mbps selectable Data Rate and maximum of 300Mbps Support USB 2 0 interface 64 bit 128 bit or WEP TKIP AES 2 400GHz ISM Frequency Band Modulation Method BPSK QPSK 16 QAM 64 QAM Spread Spectrum IEEE 802 11b DSSS Direct Sequence Spread Spectrum IEEE 802 11g n OFDM Orthogonal Frequency Division Multiplexing Easy operati...

Page 7: ...B ADAPTER TO PC Quick Start Guide Connect your WLAN USB dongle to your PC Install driver GETTING TO KNOW WIRELESS LAN USB ADAPTER LED LED turns on when POWER is applied to the WLAN Mini USB Adapter LED is blinking when PC is sending data through WLAN Mini USB Adapter ...

Page 8: ...ect to the Internet Ad Hoc Wireless Network Infrastructure Wireless Network The most obvious difference between Infrastructure wireless network and Ad Hoc wireless network is that the PCs in Infrastructure wireless network can access the resource in the Internet through Access Point Depending on your requirement you can easily set up your PC s network to be a Ad Hoc or Infrastructure wireless netw...

Page 9: ...ddress to a computer on a TCP IP network In network with static IP addressing the netwo rk administrator manually assigns an IP address to each computer Once a static IP address is assigned a computer uses the same IP address every time it reboots and logs on to the network You may manually change the IP address in the Network Properties dialog box Network using static IP address is easy to set up...

Page 10: ...automatically activate the autorun installation program after you insert the disk into your CD drive Step 1 Insert the installation driver CD into your CD ROM chose your language and click Next to continue Step 2 Click Next to continue ...

Page 11: ...t and click Next to continue Step 4 Choose the installation type To install the client utilities and driver select the appropriate button and click Next Step 5 Insert WLAN USB adapter into USB port and click OK to continue ...

Page 12: ...ated folder Or click Browse to select different folder Step 7 Click Next to continue Step 8 If you have multiple computers to access choose SSO Single sign on feature set Or you can choose Do not install SSO feature set and Click Next to continue ...

Page 13: ...8 Step 9 Start copying files until it finishes the installation Step 10 Click Finish to complete installation ...

Page 14: ...e signal strength using colors and the received signal strength indication RSSI Hold the mouse cursor over the tray icon to display the current configuration profile name and association as well as transmit and receive speed and the wireless adapter name and IP address Right click on the tray icon to Help Open the online help Open Atheros Client Utility Launch the Atheros Client Utility ACU Use th...

Page 15: ...for a connection add a profile first Show Connection Status Display the Connection Status window This window displays information about the connection Active Profile Displays the name of the active configuration profile Auto Profile Selection Shows whether auto profile selection is enabled Connection Status Displays whether the adapter is connected to a wireless network Link Quality Lists the qual...

Page 16: ...d 10 20 dB Yellow Poor 5 10 dB Red Poor 5 dB Gray No Connection No Connection Received signal strength indication RSSI Displayed in dB or percentage Enable or disable the tray icon in the Action menu 5 2 GENERAL CONNECTION SETTING 5 2 1 Current Status The Current Status tab contains general information about the program and its operations The Current Status tab does not require any configuration T...

Page 17: ...nnel S h o w s t h e c u r r e n t l y c o n n e c t e d c h a n n e l Control Channel S h o w s t h e c o n t r o l c h a n n e l A v a i l a b l e f o r 8 0 2 1 1 n d e v i c e s o n l y Extension Channel S h o w s t h e e x t e n s i o n c h a n n e l D i s p l a y e d o n l y i f t h e S T Ai s c o n n e c t e d i n a 4 0 MH z c h a n n e l A v a i l a b l e f o r 8 0 2 1 1 n d e v i c e s o n...

Page 18: ... s s D i s p l a y s t h e MA Ca d d r e s s o f t h e a c c e s s p o i n t t h e w i r e l e s s a d a p t e r i s a s s o c i a t e d t o 1 1 n MI MO P o w e r S a v e S h o w s t h e MI MOp o w e r s a v e m o d e s t a t u s A v a i l a b l e f o r 8 0 2 1 1 n d e v i c e s o n l y P o w e r S a v e Mo d e S h o w s t h e p o w e r s a v e m o d e P o w e r m a n a g e m e n t i s d i s a b l...

Page 19: ... l F r e q u e n c y D i s p l a y s c o n t r o l f r e q u e n c y t h e s t a t i o ni s u s i n g A v a i l a b l e f o r 8 0 2 1 1 n d e v i c e s o n l y E x t e n s i o n F r e q u e n c y D i s p l a y s e x t e n s i o n f r e q u e n c y t h e s t a t i o n i s u s i n g A v a i l a b l e f o r 8 0 2 1 1 n d e v i c e s o n l y C h a n n e l S e tS h o w s t h e c u r r e n t c h a n n e...

Page 20: ...tructure mode edit the Network Type field on the Advanced tab Note that the ACU only allows the creation of 16 configuration profiles After the creation of 16 profiles clicking the New button displays an error message Remove an old profile or modify an existing profile for a new use b Remove a Configuration Profile 1 Go to the Profile Management tab 2 Select the profile to remove from the list of ...

Page 21: ...Export button The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location e Ordering Profiles Including a profile in the auto selection feature allows the wi reless adapter to automatically select that profile from the list of profiles and use it to connect to the network Including a profile in auto profile sel...

Page 22: ...profile selection enabled th e wireless adapter scans for available networks The highest priority profile with the same SSID as a found network is used to connect to the network On a failed connection the client adapter tries with the next highest priority profile 5 2 3 Diagnostics The Diagnostics tab of the Atheros Client Utility provides buttons used to retrieve receive and transmit statistics T...

Page 23: ... c e i v e d O K B e a c o n s R e c e i v e d F r a m e s R e c e i v e d w i t h e r r o r s C R Ce r r o r s E n c r y p t i o n e r r o r s D u p l i c a t e f r a m e s A P m i s m a t c h e s D a t a r a t e m i s m a t c h e s A u t h e n t i c a t i o n t i m e o u t A u t h e n t i c a t i o n r e j e c t s t h e n u m b e r o f A P a u t h e n t i c a t i o n f a i l u r e s r e c e i v ...

Page 24: ...an be edited Contact your system administrator The type of security mode the station is using The options include the following 5 3 1 WPA WPA2 Enables the use of Wi Fi Protected Access WPA Choosing WPA WPA2 opens the WPA WPA2 EAP drop down menu The options include EAP FAST To use EAP FAST security the machine must already support EAP FAST Check with the IT manager 1 Click the Security tab from the...

Page 25: ... To know more about this option refer Using EAP TLS security 5 If you want to force the client adapter to disassociate after you log off so that another user cannot gain access to the wireless network using your credentials check the No Network Connection Unless User is Logged In check box The default setting is checked 6 Perform one of the following o If you want to enable automatic PAC provision...

Page 26: ...up A group consists of one or more authority servers that the user trusts To rename the group right click the group and choose Rename You can also rename the group by clicking it and typing the new name When you create a new group you can either import a PAC file into it using the Import button or you can move a PAC from another group to the new group 10 To import a PAC click Import The PAC Import...

Page 27: ...er the user is logged off if the profile is not configured with the No Network Connection Unless User is Logged In option Private PACS that are stored in the private store can be accessed and used only by the user who provisioned them or the system administrator They are not accessible until the user is logged onto the local system This is the default option h Click Import The PAC file appears und...

Page 28: ...han user authentication Doing so enables your computer to connect to the network prior to user logon The default setting is unchecked N o t e I f y o u d o n o t c h e c k t h e U s e Ma c h i n e I n f o r m a t i o n f o r D o m a i n L o g o nc h e c k b o x m a c h i n e a u t h e n t i c a t i o n i s n o t p e r f o r m e d A u t h e n t i c a t i o n d o e s n o t o c c u r u n t i l y o u ...

Page 29: ...y server that supplies a certificate signed by the certificate authority listed in the Trusted Root Certification Authorities drop down list recommended o In the Server Domain Name field enter the domain name of the server from which the client will accept a certificate 9 If the Login Name is filled in automatically enter your username in this format username domain 10 Click OK to save your change...

Page 30: ...Name field to use a separate user name and password and start the EAP authentication process 4 Click Settings and o Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority listed in the Network Certificate Authority drop down list recommended o Enter the domain name of the server from which the client wil l accept a certif...

Page 31: ...server certificate was downloaded in the Trusted Root Certification Authorities drop down box 7 Choose Token or Static Password depending on the user database N o t e t h a t T o k e n u s e s a h a r d w a r e t o k e n d e v i c e o r t h e S e c u r e C o m p u t i n g S o f T o k e n p r o g r a m v e r s i o n 1 3 o r l a t e r t o o b t a i n a n d e n t e r a o n e t i m e p a s s w o r d d...

Page 32: ...ck the Validate Server Identity check box to force the system to authenticate the identity of the server as an added level of security 3 Choose the certificate authority from which the server certificate was downloaded in the Trusted Root Certification Authorities drop down box 4 Perform one of the following to specify how you want to establish a network connection o If you want to connect using a...

Page 33: ...Trusted Root Certification Authorities drop down box on the Define PEAP EAP MSCHAP V2 Configuration window this is the recommended option or enter the domain name of the server from which the client will accept a certificate 8 If the Login Name field is not filled in automaticall y enter your username with nothing after it 9 Click OK 10 Enable the profile LEAP To use security In the Atheros Client...

Page 34: ...Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password by choosing the radio button o Specify the LEAP user name password and domain to save and use 4 Enter the user name and password 5 Confirm the password 6 Specify a domain name o Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name t...

Page 35: ... the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association 5 3 3 WPA Passphrase To use WPA Passphrase security In the Atheros Client Utility access the Security tab in the Profile Management window 1 On the Security tab choose the WPA Passphrase radio button 2 Cli...

Page 36: ...to Mixed Cells is checked on the Security Tab to allow association 5 3 5 None No security not recommended 5 4 JumpStart for Wireless Jumpstart is an application for configuring the wireless network Access Point wireless router After a successful configuratio n it also creates profiles for the wireless network s client applications like Microsoft s Wireless Zero Configuration and Atheros Client Uti...

Page 37: ... Start Programs Atheros Jumpstart or an icon called Jumpstart on desktop Step 2 Choose Join a wireless network and click Next to continue Step 3 Users have three ways to connect to an AP a Push Button Configuration 1 Click Push Button Configuration in the configuration web page of your AP that you want to connect ...

Page 38: ...33 2 Within two minutes choose the first option and click Next to continue 3 Search for the AP 4 Connect Successfully ...

Page 39: ...34 b Enter a Pin code into AP 1 Choose the second option and you ll get a Pin number 2 Enter the Pin number in the configuration web page into the Client PIN Number blank and click Start PIN ...

Page 40: ...35 3 Click Next to continue 4 Connect Successfully c Enter a Pin from AP 1 Choose the third option and enter PIN number from the configuration web page of your AP 2 Click Next and continue ...

Page 41: ...36 3 Connect Successfully ...

Page 42: ...L DRIVER UTILITY 6 2 Install Manually Plug your USB dongle into USB interface windows Vista will search for compatible driver to install Step 1 Select Locate and install the driver software Windows will guide you through the process of installing driver software for your device Step 2 Insert the installation disc into the CD ROM and click next to continue installation ...

Page 43: ...8 Step 3 Windows Vista search for the software and it will be installed successfully Step 4 After installation right click the network icon on the Windows Vista System Tray and click Connect to a network ...

Page 44: ...39 Step 5 Select a network to connect to and click Connect Step 6 Click Connect Anyway if the network is an unsecured network ...

Page 45: ...40 Step 7 USB Dongle successfully connected to network Click Close ...

Page 46: ...c Operation mode Infrastructure Access Points is needed Transmitter Output Power 14 dBm 11n 17 dBm 11b 14 dBm 11g Operating at 11Mbps 80dBm Operating at 54Mbps 70dBm Receiver Sensitivity Operating at 300Mbps 64dBm Operating Range Indoor Up to 100 m Outdoor Up to 280 m Security 64 bit 128 bit or WEP Wired Equivalent Privacy TKIP AES I O Interface USB 2 0 LED Link Active Operating system supported W...

Page 47: ...lled the Utility from the attached CD Symptom The PC Card is linking but can t share files with others Remedy Make sure the file and printer sharing function is enabled You can enable the function by checking the icon of My Computer Control Panel Network file and printer sharing I want to be able to give others to access to my files Symptom Slow or poor performance Remedy Try to select another cha...

Page 48: ... by server dynamically to clients on the n etwork DHCP is used for Dynamic IP Addressing and requires a dedicated DHCP server on the network Direct Sequence Spread Spectrum This is the method the wireless cards use to transmit data over the frequency spectrum The other method is frequency hoppin g Direct sequence spreads the data over one frequency range channel while frequency hopping jumps from ...

Page 49: ...de bandwidth for unlicensed use in the so called ISM Industrial Scientific and Medical band Spectrum in the vicinity of 2 4 GHz in particular is being made available worldwide This presents a tru ly revolutionary opportunity to place convenient high speed wireless capabilities in the hands of users around the globe Local Area Network LAN A LAN is a group of computers each equipped with the appropr...

Page 50: ... method of assigning IP addresses to clients on the network In networks with Static IP address the network administrator manually assigns an IP address to each computer Once a Static IP address is assigned a computer uses the same IP address every time it reboots and logs on to the network unless it is manually changed Temporal Key Integrity Protocol TKIP The Temporal Key Integrity Protocol pronou...

Page 51: ...services and or fiber optic cabling WANs may span a city a state a country or even the world Wired Equivalent Privacy WEP Now widely recognized as flawed WEP was a data encryption method used to protect the transmission between 802 11 wireless clients and APs However it used the same key among all communicating devices WEP s problems are well known including an insufficient key length and no autom...

Page 52: ...rs is not covered by this warranty All mail or transportation costs inclu ding insurance are at the expense of the owner Do not send any product to service center for warranty without a RMA Return Merchandise Authorization and proof of purchase Ensure a trackable method of delivery is used keep tracking number y is valid only in the country of purchase We assumes no liability that may result direc...

Reviews: