background image

 

than the standard WEP security. 

 

AES

 – AES has been developed to ensure the highest degree of 

security and authenticity for digital information and it is the most 

advanced solution defined by IEEE 802.11i for the security in the 

wireless network. 

 

Note: All devices in the network should use the same encryption 

method to ensure the communication. 

 

 

WPA Pre-Shared Key 

The WPA-PSK key can be from 8 to 64 characters and can be 

letters or numbers. This same key must be used on all of the 

wireless stations in the network. 

 

 

WEP Key 

(Key1 ~ Key4) 

The WEP keys are used to encrypt data transmitted in the 

wireless network. There are two types of key length: 64-bit and 

128-bit. Select the default encryption key from Key 1 to Key 4 by 

selected the radio button. 

 

Fill the text box by following the rules below. 

64-bit

 – Input 10-digit Hex values (in the “A-F”, “a-f” and “0-9” 

range) or 5-digit ASCII characters (including “a-z” and “0-9”) as 

the encryption keys. For example: “0123456aef“ or “test1”. 

 

128-bit

 – Input 26-digit Hex values (in the “A-F”, “a-f” and “0-9” 

range) or 13-digit ASCII characters (including “a-z” and “0-9”) as 

the encryption keys. For example: 

“01234567890123456789abcdef“ or “administrator”. 

 

3.2.1.3 802.1x Setting-Certification 

 

The IEEE 802.1X specification describes a protocol that can be used for authenticating both clients and 

servers on a network. The authentication algorithms and methods are those provided by the Extensible 

Authentication Protocol (EAP), a method of authentication that has been in use for a number of years 

on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and 

enterprises do.   

   

When an AP acting as an authenticator detects a wireless station on the LAN, it sends an EAP-Request 

for the user's identity to the device. (EAP, or the Extensible Authentication Protocol, is an authentication 

protocol that runs before network layer protocols transmit data over the link.) In turn, the device 

responds with its identity, and the AP relays this identity to an authentication server, which is typically 

an external RADIUS server. 

 

An example for MD5 Authentication 

 

15

 

Summary of Contents for WML-3565

Page 1: ...802 11g Wireless MIMO PCMCIA Adapter WML 3565 User s Manual...

Page 2: ...turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separati...

Page 3: ...Iceland Liechtenstein Norway and Switzerland WEEE regulation To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and el...

Page 4: ...lation 6 3 CONFIGURATION UTILITY 8 3 1 Site Survey 9 3 2 Profile 10 3 2 1 Configure the Profile 11 3 2 1 1 Configuration 11 3 2 1 2 Authentication and Security 13 3 2 1 3 802 1x Setting Certification...

Page 5: ...ed secret key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and governme...

Page 6: ...mental Mechanical Characteristics Temperature Operating 0 C 55 C Storage 20 C 70 C Operating Humidity Operating 10 to 90 Non Condensing Storage 5 to 95 Non Condensing Dimensions 114 x 54 x 5 mm L x W...

Page 7: ...3565 into your PC 2 1 Configuration Utility Installation 1 Insert the bundled CD into the CD ROM drive to launch the autorun program Once completed a menu screen will appear 2 Click the Configuration...

Page 8: ...URST option will be enabled to increase the transfer speed However the AP must support this feature as well If the target AP is complying with 802 11b g standard please select Optimize for WiFi mode 6...

Page 9: ...7 Please click Finish to complete the installation 5...

Page 10: ...required Just click Yes to proceed 1 After the PC restart Please insert WML 3565 into a vacant PCMCIA slot 2 The system will automatically detect the card and display Found New Hardware Wizard screen...

Page 11: ...7...

Page 12: ...n Utility appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate t...

Page 13: ...t Parameter Description Available Networks This list shows all available wireless networks within range of your card It also displays the information of the networks including the SSID BSSID Signal St...

Page 14: ...the relative settings of the profiles including Profile Name SSID Channel etc This sign indicates the activated profile is been connecting This sign indicates the activated profile is not been connec...

Page 15: ...may specify a SSID for the WML 3565 and then only the device with the same SSID can interconnect to the card If you want to add the network nearby to the profile list pull down the menu all the netwo...

Page 16: ...is recommended to setting the card to this mode This mode is also the default setting 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 1...

Page 17: ...etworks that the card intends to connect Open No authentication is needed among the wireless network Shared Only wireless devices using a shared key WEP Key identified are allowed to connecting each o...

Page 18: ...between authorized devices WPA2 Like WPA WPA2 supports IEEE 802 1x EAP authentication or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES...

Page 19: ...3456aef or test1 128 bit Input 26 digit Hex values in the A F a f and 0 9 range or 13 digit ASCII characters including a z and 0 9 as the encryption keys For example 01234567890123456789abcdef or admi...

Page 20: ...authentication protocols this card has supported are included as follows This setting has to be consistent with the wireless APs or Routers that the card intends to connect PEAP TTLS PEAP and TTLS are...

Page 21: ...the password as the identity for the server Use Client Certificate A client certificate is required for TLS and is optional for TTLS and PEAP This forces a client certificate to be selected from the a...

Page 22: ...s an issuer as a trusted root authority by placing the issuer s self signed certificate which contains the issuer s public key into the trusted root certification authority certificate store of the ho...

Page 23: ...e network the card is connecting to Extra Info Display the link status Channel Display the number of the radio channel and the frequency used for the networking Link Speed Mbps Display the transmissio...

Page 24: ...ignal been received by the card This indicator helps to find the proper position of the wireless device for quality network operation Noise Level Display the noise level in the wireless environment 3...

Page 25: ...n the network you can set the card to this mode 802 11 G only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11g wireless stations in the network you...

Page 26: ...you can select Tx BURST Tx Burst enables the card to deliver the better throughput in the same period and environment This feature only takes effect when the connected AP also supports Tx Burst Enabl...

Page 27: ...takes the place of the RADIUS server and authenticates the client so quickly that there is no perceptible delay in voice or other time sensitive applications Enable Radio Measurement When this parame...

Page 28: ...ion you can click the hyperlink to connect the PLANET website You can also obtain basic information about the WML 3565 such as the Driver Utility and EEPROM Version The MAC Address of the card is disp...

Page 29: ...802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the WML 3565 is connected to the AP or...

Page 30: ...C Click Configure D Select Advanced page enable the WMM Capable 26...

Page 31: ...on when B mode station and G mode station exist concurrently CAM when AC power When use AC power it doesn t enter into sleep mode Country Region 11A Not applicable on WML 3565 Country Region 11G Suppo...

Page 32: ...ection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is MIMO MIMO multiple input multiple output a technique for boosting wireless bandwidth and ran...

Page 33: ...highest degree of security and authenticity for digital information wherever and however communicated or stored while making more efficient use of hardware and or software than previous encryption sta...

Page 34: ...eivers 14 What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable secure mission critical communication systems It is d...

Reviews: