background image

 

 

WPA – 

WPA provides a scheme of mutual authentication using 

either IEEE 802.1x/Extensible Authentication Protocol (EAP) 

authentication or pre-shared key (PSK) technology. It provides a 

high level of assurance to enterprises, small businesses and 

home users that data will remain protected and that only 

authorized users may access their networks. For enterprises that 

have already deployed IEEE 802.1x authentication, WPA offers 

the advantage of leveraging existing authentication databases 

and infrastructure.   

 

WPA-PSK

 – It is a special mode designed for home and small 

business users who do not have access to network authentication 

servers. In this mode, known as Pre-Shared Key, the user 

manually enters the starting password in their access point or 

gateway, as well as in each wireless stations in the network. 

WPA-PSK takes over automatically from that point, keeping 

unauthorized users that don't have the matching password from 

joining the network, while encrypting the data traveling between 

authorized devices. 

 

WPA2

 – Like WPA, WPA2 supports IEEE 802.1x/EAP 

authentication or PSK technology. It also includes a new 

advanced encryption mechanism using the Advanced Encryption 

Standard (AES). AES is required to the corporate user or 

government users. The difference between WPA and WPA2 is that 

WPA2 provides data encryption via the AES. In contrast, WPA 

uses Temporal Key Integrity Protocol (TKIP). 

 

WPA2-PSK – 

WPA2-PSK is also for home and small business. 

The difference between WPA-PSK and WPA2-PSK is that 

WPA2-PSK provides data encryption via the AES. In contrast, 

WPA-PSK uses Temporal Key Integrity Protocol (TKIP). 

 

 

802.1x Setting 

When you have set the Authentication Type to Open, Shared, 

WPA or WPA2, you can also enable IEEE 802.1x setting to use 

the authentication server or certification server to authenticate 

client users.   

 

 

Encryption Mode 

None

 – Disable the encryption mode. 

 

WEP

 – Enable the WEP Data Encryption. When the item is 

selected, you have to continue setting the WEP Encryption keys.

 

TKIP

 – TKIP (Temporal Key Integrity Protocol) changes the 

temporal key every 10,000 packets (a packet is a kind of message 

transmitted over a network.) This insures much greater security 

12

 

Summary of Contents for WL-U356R

Page 1: ...802 11g Wireless USB 2 0 Adapter WL U356R User s Manual...

Page 2: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separati...

Page 3: ...tes Iceland Liechtenstein Norway and Switzerland WEEE regulation To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical an...

Page 4: ...6 3 1 Site Survey 6 3 2 Profile 7 3 2 1 Configure the Profile 9 3 2 1 1 Configuration 9 3 2 1 2 Authentication and Security 11 3 2 1 3 802 1x Setting Certification 13 3 2 1 4 802 1x Setting CA Server...

Page 5: ...ement for some corporate and government users The power consumption of the WL U356R is also very low It provides several levels of power saving modes allowing user customizes the way of saving the pow...

Page 6: ...e Operating 0 C 55 C Storage 20 C 70 C Operating Humidity Operating 10 to 90 Non Condensing Storage 5 to 95 Non Condensing Certifications FCC CE 1 3 Package Contents Before you begin the installation...

Page 7: ...nce completed a menu screen will appear 3 Click the Configuration Utility hyperlink in the WL U356R field to initiate the installation procedure Note If the menu screen does not appear click Start at...

Page 8: ...You can see the installation progress in this screen 8 The system will automatically detect the card and display Found New Hardware Wizard screen Click Install the Software Automatically to continue...

Page 9: ...9 When the Hardware Installation screen appears click Continue Anyway to proceed 10 Click Finish to complete Found New Hardware Wizard 11 Click Finish to complete PLANET WL U356R Setup 5...

Page 10: ...n there are some items for you to operate the configuration utility z Lauch PLANET WL U356R Utilities Select Lauch PLANET WL U356R Utilities to open the Configuration Utility tool z Use Zero Configura...

Page 11: ...n and Network Type If you want to connect to any networks on the list double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan butto...

Page 12: ...c This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connecting Add Delete Edit Button Click these buttons to add delete edit the select...

Page 13: ...may specify a SSID for the WL U356R and then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu all the netwo...

Page 14: ...is recommended to setting the card to this mode This mode is also the default setting 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11...

Page 15: ...etworks that the card intends to connect Open No authentication is needed among the wireless network Shared Only wireless devices using a shared key WEP Key identified are allowed to connecting each o...

Page 16: ...between authorized devices WPA2 Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES...

Page 17: ...3456aef or test1 128 bit Input 26 digit Hex values in the A F a f and 0 9 range or 13 digit ASCII characters including a z and 0 9 as the encryption keys For example 01234567890123456789abcdef or admi...

Page 18: ...authentication protocols this card has supported are included as follows This setting has to be consistent with the wireless APs or Routers that the card intends to connect PEAP TTLS PEAP and TTLS are...

Page 19: ...t status Identity Enter the name as the identity for the server Password Enter the password as the identity for the server Use Client Certificate A client certificate is required for TLS and is option...

Page 20: ...s an issuer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the ho...

Page 21: ...Description Status Display the SSID and MAC ID of the network the card is connecting to Extra Info Display the link status Channel Display the number of the radio channel and the frequency used for t...

Page 22: ...higher percentage shown in the bar the more radio signal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation Noise Level Di...

Page 23: ...ere are only 802 11b wireless stations in the network you can set the card to this mode 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802...

Page 24: ...B only the maximum data rate is 11Mbps 11b so that there are only Auto 1 2 5 5 11Mbps options you can select Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and...

Page 25: ...int configured to provide Wireless Domain Services WDS takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive...

Page 26: ...ce over Internet Protocol VoIP phones televisions VCRs and MP3 players IEEE 802 11e Quality of Service QoS The Wi Fi Alliance defined WMM as a profile of the IEEE 802 11e extensions for 802 11 network...

Page 27: ...B Right Click the Wireless Network Connection and select Properties C Click Configure 23...

Page 28: ...D Select Advanced page enable the WMM Capable 24...

Page 29: ...escription AdHoc Wireless Mode Select B G mixed or Pure B mode Auto Channel Select Not applicable on WL U356R Auto Reconnect Mode Auto connecting to AP when disconnected B G protection To avoid collis...

Page 30: ...This MAC address will not write to EEPROM It is only used in run time Network Type Selecting Infrastructure or AdHoc mode Power Saving Mode Selecting different power mode Radio On Off RF switching RT...

Page 31: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Page 32: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Page 33: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Page 34: ...30...

Reviews: