background image

 

13 

Authentication Mode: 

This parameter must be consistence with the associated wireless 

station. 

Open System 

 

No authentication is needed among the wireless stations. 

Shared Key 

 

Only wireless stations using a shared key (WEP Key identified) are 

allowed to connecting each other. Setup the same key as the wireless stations which 
WL-U351 intends to connect. 

Auto 

 

Auto switch the authentication algorithm depending on the wireless stations 

which WL-U351 is connecting to 

Key Length: 

Select the 64-bit or 128-bit to encrypt transmitted data. Larger key length 

will provide higher level of security, but the throughput will be lower. 

Default Key ID: 

Select one of the keys (1~4) as the encryption key. 

Key Value

: The keys are used to encrypt data transmitted in the wireless network. Fill the 

text box by following the rules below: 

64-bit

 

 Input 10 digit Hex values (in the 

A-F

a-f

 and 

0-9

 range) as the encryption 

keys. For example: 

0123456aef

128-bit

 

 Input 26 digit Hex values (in the 

A-F

a-f

 and 

0-9

 range) as the encryption 

keys. For example: 

01234567890123456789abcdef

 

3.4 Advanced Setting

 

This screen allows user to enable/disable power saving mode, setup the fragmentation threshold 

and RTS/CTS threshold of WL-U351. 

 

Power Saving Mode: 

Check the check box to enable power saving mode. You 

may control the power consumption of WL-U351 by adjusting the save power 

level from 1 to 4. The higher power save level selected, the lower power used. 

But lower power is supplied may slow down the transmission rate of WL-U351. 

Summary of Contents for WL-U351

Page 1: ...Wireless USB Adapter WL U351 User s Manual...

Page 2: ...imits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment...

Page 3: ...Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric sho...

Page 4: ...mum System Requirements 4 1 6 SAFETY PRECAUTION 4 CHAPTER 2 INSTALLATION PROCEDURE 5 2 1 Hardware and Driver Installation 5 2 2 Utility Installation 7 CHAPTER 3 CONFIGURATION UTILITY 10 3 1 Wireless C...

Page 5: ...robust interference resistant solution in a multi user environment l Support 64 128 bit WEP key l Working range up to 300 feet indoor and 800 feet outdoor l Support Ad Hoc Infrastructure mode l Roamin...

Page 6: ...position is recommended Proper Access Point positioning combined with a clear radio signal will greatly enhance performance Ad Hoc An Ad Hoc wireless LAN is a group of computers each equipped with one...

Page 7: ...nection The wireless security network installs quickly and provides the flexibility to reconfigure easily 1 3 Specification Product 11Mbps Wireless USB Adapter Models WL U351 Attach Interface USB V1 1...

Page 8: ...5 Minimum System Requirements Before installation please check the following requirements with your equipment Pentium Based above IBM compatible PC system with an USB support CD ROM drive One Availabl...

Page 9: ...E 2000 Note If you ever install any Wireless USB Adapter before please uninstall the old driver and utility first A Insert WL U351 to your computer system will automatically detect the adapter and sho...

Page 10: ...6 C The Hardware Installation box will appear click Continue Anyway to start driver installation D Click Finish to complete the driver installation...

Page 11: ...tility The following installation operates under Window XP Procedures will be the same for Windows 98SE ME 2000 Note If you want to use this utility in windows XP system the system built in utility mu...

Page 12: ...the Setup exe program under the Utility folder The following InstallShield Wizard box will show up to guide you how to install properly then click Next C The Choose Destination Location screen will s...

Page 13: ...U351 from Programs Click Configuration Utility option F The Configuration Utility icon will be shown on system tray if not that mean the installation is fail Please uninstall the driver from the syste...

Page 14: ...the wireless station u Network Adapter Displays the product information u Available Network Displays all the SSID and Signal Strength of wireless stations nearby To search the available wireless stati...

Page 15: ...nnel SSID Tx Rate and Network Type You can click Change button for modifying these values Channel Shows the number of the radio channel used for the networking Only Access Points and Ad Hoc nodes crea...

Page 16: ...ad profile setting Load the setting values from the file entered in the Profile Name The new settings will be activated immediately u Write Current Setting to profile Write the current setting values...

Page 17: ...ne of the keys 1 4 as the encryption key u Key Value The keys are used to encrypt data transmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex valu...

Page 18: ...ct a setting within a range of 256 to 2305 bytes Minor change is recommended u RTS CTS Threshold Minimum packet size required for an RTS CTS Request to Send Clear to Send For packets smaller than this...

Page 19: ...work with Netware Windows NT 2000 XP or other LAN operating systems to support printer or file sharing Would the information be intercepted while transmitting on air WLAN features two fold protection...

Page 20: ...receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main al...

Reviews: