background image

 

3

Compliances 
 
Federal Communication Commission Interference Statement 

This equipment has been tested and found to comply with the limits for a Class B digital device, 
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable 
protection against harmful interference in a residential installation. This equipment generates, 
uses and can radiate radio frequency energy and, if not installed and used in accordance with 
the instructions, may cause harmful interference to radio communications. However, there is no 
guarantee that interference will not occur in a particular installation. If this equipment does 
cause harmful interference to radio or television reception, which can be determined by turning 
the equipment off and on, the user is encouraged to try to correct the interference by one or 
more of the following measures: 
• Reorient or relocate the receiving antenna. 
• Increase the distance between the equipment and receiver. 
• Connect the equipment into an outlet on a circuit different from that to which the receiver is 
connected. 
• Consult the dealer or an experienced radio/TV technician for help. 

 
FCC Caution:

 To assure continued compliance, (example - use only shielded interface cables 

when connecting to computer or peripheral devices) any changes or modifications not 
expressly approved by the party responsible for compliance could void the user’s authority to 
operate this equipment.   
 
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two 
conditions: (1) This device may not cause harmful interference, and (2) this device must accept 
any interference received, including interference that may cause undesired operation. 
 

IMPORTANT NOTE 
FCC Radiation Exposure Statement: 

This equipment complies with FCC radiation exposure limits set forth for an uncontrolled 
environment. This transmitter must not be co-located or operating in conjunction with any other 
antenna or transmitter. 
 

CE Mark Declaration of Conformance for EMI and Safety (EEC) 

This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. 
The following references have been applied in order to prove presumption of compliance with 
the R&TTE Directive 1999/5/EC: 
 
• EN 300 328 
• EN 301 489-1 
• EN 301 489-17 
• EN 60950-1 
 
A copy of the CE Declaration of Conformity is available for download at: http://www.smc.com 

 

Intended for indoor use in the following countries: 
 

AT, BE, CZ, CY, DK, EE, FI, FR, DE, GR, HU, IS, IE, IT, LV, LT, LU, MT, NL, NO, PL, PT, SI, 
SK, ES, SE, CH, UK.

 

Summary of Contents for EZ Connect N SMCWUSB-N

Page 1: ...EZ Connect N Draft 11n Wireless USB2 0 Adapter SMCWUSB N...

Page 2: ...r any custom software or firmware configuration information or memory data of Customer contained in stored on or integrated with any products returned to SMC pursuant to any warranty Products returned...

Page 3: ...RANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS WHICH...

Page 4: ...assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices any changes or modifications not expressly approved by the party responsible fo...

Page 5: ...ter 2 Getting Started About Your Draft 11n Wireless USB2 0 Adapter 11 Package Content 11 System Requirement 12 LED Definition 12 Wireless Utility and Adapter Hardware Installation 12 Using the Utility...

Page 6: ...ghest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infrastructure mode wireless devices communicate to a...

Page 7: ...When a number of wireless stations are connected using a single access point you have a Basic Service Set BSS 6...

Page 8: ...communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a pri...

Page 9: ...able to move from one access point to another without losing the connection In the diagram below when the user moves from BSS 1 to BSS 2 the adapter automatically switches to the channel used in BSS 2...

Page 10: ...pter starting with the most secure EAP Extensible Authentication Protocol is used for authentication and utilizes dynamic WEP key exchange EAP requires interaction with a RADIUS Remote Authentication...

Page 11: ...sensitive You must use the same passphrase for all WLAN adapters with this feature in the same WLAN For WLAN adapters without the passphrase feature you can still take advantage of this feature by wr...

Page 12: ...pports the latest WPA and WPA2 wireless encryption standards which prevent unauthorized access to wireless networks and ensure data is secure Wireless security can also be set up easily using Wi Fi Pr...

Page 13: ...o power ON Wireless connected without data traffic Slow Blinking Power on without wireless connection Blue Normal Blinking Wireless connected with data traffic 2 5 Wireless Utility Adapter Hardware In...

Page 14: ...confirmation Click Next on the following screen STEP 4 In the destination Folder screen you are asked to confirm the Destination Folder for the application software If you would like you may change th...

Page 15: ...n it STEP 6 Click Finish to complete the client utility installation STEP 7 After clicking Finish the Wizard will exit Plug in the EZ Connect N Wireless USB2 0 Adapter to an available USB port The Fou...

Page 16: ...TEP 8 Click Install the software automatically Recommended then click Next A Hardware Installation warning may appear click Continue Anyway STEP 9 Click Finish to complete the Driver Utility installat...

Page 17: ...Hold your mouse pointer over the icon and press the right mouse button to open the Wireless Client Utility The Wireless Client Utility window as shown below will appear The user can now use any of th...

Page 18: ...Infrastructure access point Ad Hoc Wireless Mode Displays the wireless mode 802 11n 11g or 11b Channel Shows the currently connected channel Transmit Rate Displays the current transmit rate in Mbps A...

Page 19: ...g to a different network Hold your mouse pointer over the network icon and click the right mouse button to select the network Click the Connect button to connect the available network If no configurat...

Page 20: ...a configuration profile select the configuration from the Profile list and click the Edit button Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available in...

Page 21: ...nue the profile setting To define the security mode select the security button of the desired security mode And then click Next to continue Please see following table for details of security modes WPA...

Page 22: ...heck with the IT manager TTLS Tunneled Transport Layer Security An EAP variant that provides mutual authentication using a certificate for server authentication and via a secure TLS tunnel for the cli...

Page 23: ...tinuous Access Mode z Maximum Power Saving z Fast Power Saving 802 11b Preamble Displays the 802 11b preamble format The options include z Long z Short z Auto RTS Threshold Value from 0 2347 FRAG Thre...

Page 24: ...g The user obtains a device password PIN Code from the STA and enters the password into the Registrar Both the Enrollee and the Registrar use PIN Config method for the configuration setup The detail i...

Page 25: ...24...

Page 26: ...25 1 Go to the WPS setting page click Refresh button to update available WPS APs 2 Select an AP SSID BSSID that STA want join to 3 Click PIN button to start PIN connection...

Page 27: ...26 4 Enter PIN Code of STA into the Registrar when prompted by the Registrar 5 The result will look like the below figure...

Page 28: ...ding M1 Received M2 Received M2D Sending EAP Rsp ACK Sending M3 Received M4 Sending M5 Received M6 Sending M7 Received M8 Sending EAP Rsp Done Configured WPS status is disconnected WPS status is conne...

Page 29: ...tep 6 Click OK to confirm that you are going to uninstall the driver 3 2 Uninstall the Client Utility Follow the steps below to remove the Client Utility from your computer Step 1 To remove the utilit...

Page 30: ...ntication By using EAP to interact with an EAP compatible RADIUS server an access point helps a wireless station and a RADIUS server perform authentication ENCRYPTION The reversible transformation of...

Page 31: ...EE 802 1X and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database If you do not have an external RADIUS server use WPA PSK WPA2 PSK WPA Pre Shared...

Page 32: ...SMCWBR11 G SMCWUSB N...

Reviews: