background image

 

11 

None 

No security (not recommended). 
 

Allow Association to 
Mixed Cells 

Check this check box if the access point with which the client adapter is 
to associate has WEP set to Optional and WEP is enabled on the client 
adapter. Otherwise, the client is unable to establish a connection with 
the access point. 

Limit Time for 
Finding Domain 
Controller To 

Check this check box and enter the number of seconds (up to 300) after 
which the authentication process times out when trying to find the 
domain controller. Entering zero is like unchecking this check box, 
which means no time limit is imposed for finding the domain controller.   
Note: The authentication process times out whenever the authentication 
timer times out or the time for finding the domain controller is reached.   
 

Group Policy Delay 

Specify how much time elapses before the Windows logon process 
starts group policy. Group policy is a Windows feature used by 
administrators to specify configuration options for groups of users. The 
objective is to delay the start of Group Policy until wireless network 
authentication occurs. Valid ranges are from 0 to 65535 seconds. The 
value that you set goes into effect after you reboot your computer with 
this profile set as the active profile. 
This drop-down menu is active only if you chose EAP-based 
authentication.   
 

 

Summary of Contents for DNUR-W5370

Page 1: ...WLAN 802 11 b g n USB Adapter DNUR W5370 User Manual March 2012...

Page 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Page 3: ...ent off and on the user is encouraged to try to correct the interference by one of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and r...

Page 4: ...any other antenna or transmitter IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment sho...

Page 5: ...he end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end produc...

Page 6: ...ion est autoris e aux deux conditions suivantes 1 l appareil ne doit pas produire de brouillage et 2 l utilisateur de l appareil doit accepter tout brouillage radio lectrique subi m me si le brouillag...

Page 7: ...ormed to keep at least 20cm separation with the antenna while this end product is installed and operated The end user has to be informed that the IC radio frequency exposure guidelines for an uncontro...

Page 8: ...2 DRIVER UTILITY INSTALLATION UNINSTALLATION 8 3 CONNECTING TO AN EXISTING NETWORK 8 4 MODIFYING A WIRELESS NETWORK 9 4 1 MODIFYING GENERAL SETTINGS 9 4 2 MODIFYING SECURITY SETTINGS 10 5 SPECIFICATI...

Page 9: ...sing its network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your Blueray player to access the network configuration setti...

Page 10: ...y the settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client...

Page 11: ...e options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2...

Page 12: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Page 13: ...483GHz Japan 2 400 2 497GHz China 2 400 2 483GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operat...

Page 14: ...ed receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or c...

Page 15: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Reviews: