background image

 

30

ROAMING 

In an infrastructure network, wireless stations are able to switch from one BSS to another 
as they move between the coverage areas. During this period, the wireless stations 
maintain uninterrupted connection to the network. This is roaming. As the wireless station 
moves from place to place, it is responsible for choosing the most appropriate AP 
depending on the signal strength, network utilization among other factors. 

 

SSID 

The SSID (Service Set Identity) is a unique name shared among all wireless devices in a 
wireless network. Wireless devices must have the same SSID to communicate with each 
other. 

 

TEMPORAL KEY INTEGRITY PROTOCOL (TKIP) 

Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and 
distributed by the authentication server. 

 

USER AUTHENTICATION 

WPA applies IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate 
wireless clients using an external RADIUS database. If you do not have an external RADIUS 
server, use WPA-PSK/WPA2-PSK (WPA -Pre-Shared Key) that only requires a single (identi-
cal) password entered into each access point, wireless gateway and wireless client. As long 
as the passwords match, clients will be granted access to a WLAN. 

 

WEP 

WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between 
the WCB-321A and the AP or other wireless stations to keep network communications pri-
vate. Both the wireless stations and the access points must use the same WEP key for data 
encryption and decryption. 

 

WPA/WPA2 

Wi-Fi Protected Access (WPA) and WPA2 (future upgrade) is a subset of the IEEE 802.11i 
security specification draft. Key differences between WPA and WEP are user authentication 
and improved data encryption. WPA2 is a wireless security standard that defines stronger 
encryption, authentication and key management than WPA. 

 
 
 

Summary of Contents for EZ Connect N SMCWUSB-N

Page 1: ...EZ Connect N Draft 11n Wireless USB2 0 Adapter SMCWUSB N...

Page 2: ...r any custom software or firmware configuration information or memory data of Customer contained in stored on or integrated with any products returned to SMC pursuant to any warranty Products returned...

Page 3: ...RANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS WHICH...

Page 4: ...assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices any changes or modifications not expressly approved by the party responsible fo...

Page 5: ...ter 2 Getting Started About Your Draft 11n Wireless USB2 0 Adapter 11 Package Content 11 System Requirement 12 LED Definition 12 Wireless Utility and Adapter Hardware Installation 12 Using the Utility...

Page 6: ...ghest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infrastructure mode wireless devices communicate to a...

Page 7: ...When a number of wireless stations are connected using a single access point you have a Basic Service Set BSS 6...

Page 8: ...communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a pri...

Page 9: ...able to move from one access point to another without losing the connection In the diagram below when the user moves from BSS 1 to BSS 2 the adapter automatically switches to the channel used in BSS 2...

Page 10: ...pter starting with the most secure EAP Extensible Authentication Protocol is used for authentication and utilizes dynamic WEP key exchange EAP requires interaction with a RADIUS Remote Authentication...

Page 11: ...sensitive You must use the same passphrase for all WLAN adapters with this feature in the same WLAN For WLAN adapters without the passphrase feature you can still take advantage of this feature by wr...

Page 12: ...pports the latest WPA and WPA2 wireless encryption standards which prevent unauthorized access to wireless networks and ensure data is secure Wireless security can also be set up easily using Wi Fi Pr...

Page 13: ...o power ON Wireless connected without data traffic Slow Blinking Power on without wireless connection Blue Normal Blinking Wireless connected with data traffic 2 5 Wireless Utility Adapter Hardware In...

Page 14: ...confirmation Click Next on the following screen STEP 4 In the destination Folder screen you are asked to confirm the Destination Folder for the application software If you would like you may change th...

Page 15: ...n it STEP 6 Click Finish to complete the client utility installation STEP 7 After clicking Finish the Wizard will exit Plug in the EZ Connect N Wireless USB2 0 Adapter to an available USB port The Fou...

Page 16: ...TEP 8 Click Install the software automatically Recommended then click Next A Hardware Installation warning may appear click Continue Anyway STEP 9 Click Finish to complete the Driver Utility installat...

Page 17: ...Hold your mouse pointer over the icon and press the right mouse button to open the Wireless Client Utility The Wireless Client Utility window as shown below will appear The user can now use any of th...

Page 18: ...Infrastructure access point Ad Hoc Wireless Mode Displays the wireless mode 802 11n 11g or 11b Channel Shows the currently connected channel Transmit Rate Displays the current transmit rate in Mbps A...

Page 19: ...g to a different network Hold your mouse pointer over the network icon and click the right mouse button to select the network Click the Connect button to connect the available network If no configurat...

Page 20: ...a configuration profile select the configuration from the Profile list and click the Edit button Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available in...

Page 21: ...nue the profile setting To define the security mode select the security button of the desired security mode And then click Next to continue Please see following table for details of security modes WPA...

Page 22: ...heck with the IT manager TTLS Tunneled Transport Layer Security An EAP variant that provides mutual authentication using a certificate for server authentication and via a secure TLS tunnel for the cli...

Page 23: ...tinuous Access Mode z Maximum Power Saving z Fast Power Saving 802 11b Preamble Displays the 802 11b preamble format The options include z Long z Short z Auto RTS Threshold Value from 0 2347 FRAG Thre...

Page 24: ...g The user obtains a device password PIN Code from the STA and enters the password into the Registrar Both the Enrollee and the Registrar use PIN Config method for the configuration setup The detail i...

Page 25: ...24...

Page 26: ...25 1 Go to the WPS setting page click Refresh button to update available WPS APs 2 Select an AP SSID BSSID that STA want join to 3 Click PIN button to start PIN connection...

Page 27: ...26 4 Enter PIN Code of STA into the Registrar when prompted by the Registrar 5 The result will look like the below figure...

Page 28: ...ding M1 Received M2 Received M2D Sending EAP Rsp ACK Sending M3 Received M4 Sending M5 Received M6 Sending M7 Received M8 Sending EAP Rsp Done Configured WPS status is disconnected WPS status is conne...

Page 29: ...tep 6 Click OK to confirm that you are going to uninstall the driver 3 2 Uninstall the Client Utility Follow the steps below to remove the Client Utility from your computer Step 1 To remove the utilit...

Page 30: ...ntication By using EAP to interact with an EAP compatible RADIUS server an access point helps a wireless station and a RADIUS server perform authentication ENCRYPTION The reversible transformation of...

Page 31: ...EE 802 1X and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database If you do not have an external RADIUS server use WPA PSK WPA2 PSK WPA Pre Shared...

Page 32: ...SMCWBR11 G SMCWUSB N...

Reviews: