background image

20

If you want to use WEP 64 bit encryption, please input 10

characters; if you select HEX, or input 5 characters if you

select ASCII; If you want to use WEP 128bit encryption,

please input 26 characters if you select HEX, or input 13

characters if you select ASCII.  128 bit encryption is safer

then 64 bit, but the data transfer speed will be slightly

reduced.

Show Password

:

 

Check this box and the WPA pre shared

key or WEP key you inputted will be shown, but not

replaced by asterisk (*).

OK

:

 

Click this button to save changes you made in this

page.

Cancel

:

 

Click this button to discard all changes you made

in this window.

Access Control

If you’re not going to open your computer and wireless

resources to the public, you can use MAC address filtering

function to enforce your access control policy, so only

wireless clients with MAC address you defined by this

function can be connected to your software access point.

Summary of Contents for Wireless-N CardBus Adapter

Page 1: ...dards Supports QoS WMM WMM PS Supports 64 128 bit WEP WPA TKIP with IEEE 802 1x WPA2 AESwithIEEE802 1x functionsfor high level of security Threeinternalantennawith2T3Rfeatureenhances datathroughputwithincreasedtransmittingrange for all compatible legacy bands 802 11 a b g Farther coverage less dead spaces and higher throughput with MIMO technology SystemRequirements PC computer with an available C...

Page 2: ...pter Driver CD QuickInstallationGuide Layout ActivityLED Flashing Transferring receving data Off No wireless activity Link LED On Linked to a wireless access point transferring data Off No wireless activity ActivityLED LinkLED Figure 1 Layout ...

Page 3: ... when being used for long time This is normal and is not a malfunction DO NOT put the network card on paper cloth or other flammable objects after the network card has been used for a long time Hardware Installation Generalinstructionsforinstallingthecardbusareprovided below Since the design of portable computers vary refer toyoursystem sreferencemanualforfurtherinformation if needed 1 Power off y...

Page 4: ...ncel 2 Insert the driver CD Click Start Run Type D CardBus setup exe click OK Change D to match your CD ROM drive letter 3 ChooseIacceptthetermsofthelicenseagreement then click Next 4 Choose Install driver and Ralink WLAN utility then click Next 5 Choose Ralink Configuration Tool then click Next Note Skip this step and continue to step 6 if you have Windows 2000 6 Click Install 7 Click Finish Rest...

Page 5: ...Ralink WLAN utility then click Next 6 Click Install 7 Click Finish Restart your system to complete the installation 8 A new icon will appear at lower right corner of your computer desktop shown in Figure 2 you can put the mouse cursor on the icon and the status of wireless card will be displayed as a popup balloon When you want to configure your wireless connection please right click on this icon ...

Page 6: ...ect uses encryption you have to configure the wireless network card and input required parameters to get connected to the wireless access point you wish to connect There are two ways you can configure your wireless network card to connect to wirelessaccesspoint usingtheRalinkconfigurationutility which comes with wireless card driver and using built in windows zero configuration utility Using Ralin...

Page 7: ...inFigure4 Ifthewirelessaccess point you wish to connect does not show here please click Rescan to try again until the one you preferredisdisplayed YoumayhavetoclickRescan several times before you can see the access point you wish to use If you still can not see the access pointyouwishtouseafterclickingRescanformore than five times please move your computer closer to the location where the wireless...

Page 8: ... within one minute Please jump to step 5 on page 9 if the access point you selected enables encryption otherwise proceed to next step 4 If the wireless access point does not have SSID you ll be prompted to input it here Please ask the owner of wireless access point and input the exact SSID here then click OK when ready If the SSID you provided here is wrong you ll not be able to connect to this ac...

Page 9: ...ownonFigure7 pleaseasktheownerofthe wireless access point to obtain the correct passphrase preshared key and enter here then click OK If the value you inputted here is wrong youwillnotbeabletoconnecttothiswirelessaccess point Authenticationtypeisselectedautomatically please don t change it Iftheaccesspointyouselecteddoesnotenableencryption and does not require authentication please skip this step ...

Page 10: ... selected shown in Figure 8 Figure 8 SSID TheServiceSetIDentifierofwirelessaccesspointor other network device You can think it as the name of access point of wireless device BSSID TheMACaddressofwirelessaccesspointorother network device Unlike SSID BSSID of every access point or network device is unique and will not be the same with others So you can identify a single access point or wireless devi...

Page 11: ...ce uses If the wireless access point does not require authentication you ll see Unknown displayed here Network Type Shows the type of wireless connection If it sawirelessaccesspoint Infrastructurewillbedisplayed here if it s a computer or network device AdHoc will be displayed here Note Wirelessaccesspoint Infrastructure is a network device which acts as a bridge to let wired and wireless network ...

Page 12: ...d select Use Zero Configuration as Configuration utility shown in Figure 9 Figure 9 2 Click Start Control Panel then click Network and Internet Connections 3 Click Network Connections 4 Right click Wireless Network Connection it may have a number as suffix if you have more than one wireless network card please make sure you right click theRalink 802 11n Wireless LAN Card then select View Available...

Page 13: ...an click Refresh networklisttorescanaccesspoints Clicktheaccess point you want to use if it s shown then click Connect shown in Figure 11 Figure 11 6 If the access point is protected by encryption you havetoinputitssecuritykeyorpassphrase Itmust matchtheencryptionsettingontheaccesspoint If the access point you selected does not use encryption you ll not be prompted for security key or passphrase ...

Page 14: ...ting mode to AP mode to simulate the function of a real wireless access point by software therefore all other computers and wireless devices can connect to your computer wirelessly even share the internet connection you have Switch to AP Mode and Basic Configuration The operating mode of the wireless card is Station Mode becoming a client of other wireless access points by default Ifyouwanttoswitc...

Page 15: ...puttheSSID thenameusedtoidentifythis wireless access point here Up to 32 numerical characters can be accepted here excepting space TX Rate Please select the data transfer rate here The maximum TX rate you can select here depends on the wireless mode you re using It s safe to select Auto to let wireless card select a proper TX rate according to the strength and quality of radio signal When the wire...

Page 16: ...ac Address Click this button to use the MAC addressofthewirelesscardasSSID AprefixofAPwillbe added Security Setting Set the security options wireless data encryption Please refer to chapter 3 2 Security Settings fordetails WirelessProtection Wirelessprotectionwillpreventdata collision when there are both 802 11b and 802 11g clients You can selectAuto to let configuration utility to decide to use w...

Page 17: ... you know what will be affected No forwarding among wireless clients Check this box and wireless clients will not be able to exchange data with each other Hide SSID Check this box and the SSID will not be broadcasted to the public Your wireless clients must knowtheexactSSIDtobeabletoconnecttoyourcomputer This option is useful to enhance security level Allow BW 40 MHz Check this box to allow BW 40M...

Page 18: ...encryption unless you wish to open your computer and its internet connection to the public When you click Security Setting in Ralink configuration utility shown in Figure 14 Figure 14 AuthenticationType Pleaseselectawirelessauthentication typeyouwishtouse AvailableoptionsareOpen Shared WPA PSK WPA2 PSK and WPA PSK WPA2 PSK If you want to disable wireless data encryption you must select Open or Sha...

Page 19: ...ere will be able to connect to your computer This setting is only available when you select one of WPA encryptions Group Rekey Interval You can specify the time interval to re issue the key to your wireless clients here You can click the button 10 seconds or Kpacketsto change the unit of time interval every 10 seconds or a thousand data packets times the value you specified in Group Rekey Interval...

Page 20: ... reduced Show Password Check this box and the WPA pre shared key or WEP key you inputted will be shown but not replaced by asterisk OK Click this button to save changes you made in this page Cancel Click this button to discard all changes you made in this window AccessControl If you re not going to open your computer and wireless resourcestothepublic youcanuseMACaddressfiltering function to enforc...

Page 21: ...cess point Reject All Reject wireless clients with MAC address listed here to be connected to this access point MAC address Input the MAC address of the wireless client you you wish to allow or reject here No colon or hyphen required Add AddtheMACaddressyouinputtedinMACaddress field to the list Delete PleaseselectaMACaddressfromthelist thenclick Delete button to remove it Remove Delete all MAC add...

Page 22: ... Address DisplaystheMACaddressofthiswireless client AID The serial number of this wireless connection Power Saving Mode Displays the capability of power saving function of this wireless client Status Displays additional information of this wireless connection likecurrentwirelessoperatingmodeanddata transfer rate ...

Page 23: ...23 Event Log This software access point will log all wireless related activities as a log shown in Figure 17 Figure 17 You can click Clear to remove all entries in the log ...

Page 24: ...24 Statistics This page shows detailed information about how your software access point works shown in Figure 18 Figure 18 You can click RESET COUNTERS button to reset all counters to zero ...

Page 25: ...25 Blank Page ...

Page 26: ...26 Blank Page ...

Page 27: ...policyperiod pleasefollowthesestepstohavetheproductrepaired orreplaced Step 1 Submit your RMA request Go to www siig com click Support then RMA to submit a request to SIIG RMA If the product is determined to be defective an RMA number willbeissued Step 2 After obtaining an RMA number ship the product Properlypacktheproductforshipping Allaccessoriesthatcame withtheoriginalpackagemustbeincluded Clea...

Page 28: ... Inc SIIG and the SIIG logo are registered trademarks of SIIG Inc Microsoft Windows and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and or other contries Pentium is a registered trademark of Intel Corporation Other names used in this publication are for identification only and may be trademarks of their respective companies April 2009 ...

Reviews: