Wistron NeWeb DNUR-W7601 User Manual Download Page 12

 

11

None 

No security (not recommended). 
 

Allow Association to 
Mixed Cells 

Check this check box if the access point with which the client adapter is 
to associate has WEP set to Optional and WEP is enabled on the client 
adapter. Otherwise, the client is unable to establish a connection with 
the access point. 

Limit Time for 
Finding Domain 
Controller To 

Check this check box and enter the number of seconds (up to 300) after 
which the authentication process times out when trying to find the 
domain controller. Entering zero is like unchecking this check box, 
which means no time limit is imposed for finding the domain controller. 
Note: The authentication process times out whenever the authentication 
timer times out or the time for finding the domain controller is reached. 
 

Group Policy Delay 

Specify how much time elapses before the Windows logon process 
starts group policy. Group policy is a Windows feature used by 
administrators to specify configuration options for groups of users. The 
objective is to delay the start of Group Policy until wireless network 
authentication occurs. Valid ranges are from 0 to 65535 seconds. The 
value that you set goes into effect after you reboot your computer with 
this profile set as the active profile. 
This drop-down menu is active only if you chose EAP-based 
authentication.  
 

 

Summary of Contents for DNUR-W7601

Page 1: ...WLAN 802 11 b g n USB Adapter DNUR W7601 User Manual February 2013...

Page 2: ...ay be reproduced stored in a retrieval system or transmitted in any form or by any means whether electronic mechanical photocopying recording or otherwise without the prior writing of the publisher Pe...

Page 3: ...uipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caut...

Page 4: ...he end user has to also be informed that any changes or modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment If the size of the end produc...

Page 5: ...e Pour les produits disponibles aux tats Unis Canada du march seul le canal 1 11 peuvent tre exploit s S lection d autres canaux n est pas possible This device and its antenna s must not be co located...

Page 6: ...the antenna and the users for the host this module is integrated into Under such configuration the IC RSS 102 radiation exposure limits set forth for an population uncontrolled environment can be sat...

Page 7: ...r modifications not expressly approved by the manufacturer could void the user s authority to operate this equipment IC statement is required to be available in the users manual This Class B digital a...

Page 8: ...2 DRIVER UTILITY INSTALLATION UNINSTALLATION 8 3 CONNECTING TO AN EXISTING NETWORK 8 4 MODIFYING A WIRELESS NETWORK 9 4 1 MODIFYING GENERAL SETTINGS 9 4 2 MODIFYING SECURITY SETTINGS 10 5 SPECIFICATI...

Page 9: ...sing its network function without installing driver or utility 3 Connecting to an Existing Network 1 Use the remote control that came with your Blueray player to access the network configuration setti...

Page 10: ...y the settings below for your network Profile Name Identifies the configuration wireless network profile This name must be unique Profile names are not case sensitive Client Name Identifies the client...

Page 11: ...e options include EAP FAST EAP TLS EAP TTLS EAP SIM PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP WPA WPA2 Passphrase Enables WPA WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2...

Page 12: ...ch means no time limit is imposed for finding the domain controller Note The authentication process times out whenever the authentication timer times out or the time for finding the domain controller...

Page 13: ...483GHz Japan 2 400 2 497GHz China 2 400 2 483GHz Channels support 802 11n b g US Canada 11 1 11 Major European country 13 1 13 France 4 10 13 Japan 11b 14 1 13 or 14th 11g 13 1 13 China 13 1 13 Operat...

Page 14: ...ed receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or c...

Page 15: ...ogy that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qualit...

Reviews: