background image

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

WL-611GS 

 

User’s Guide

 

 

802.11g Wireless LAN PC Card

 

 

 

Summary of Contents for WL-611GS

Page 1: ...WL 611GS User s Guide 802 11g Wireless LAN PC Card ...

Page 2: ...uipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the fo...

Page 3: ...s the following standards were applied ETS 300 826 301 489 1 General EMC requirements for Radio equipment EN 609 50 Safety ETS 300 328 2 Technical requirements for Radio equipment Caution This equipment is intended to be used in all EU and EFTA countries Outdoor use may be restricted to certain frequencies and or may require a license for operation Contact local Authority for procedure to follow T...

Page 4: ...a 2 4GHz range Gemtek s WL 611GS fully utilizes the benefits of 802 11g standard on the proven compatibility between two transfer modes and the high speed bit transfer that is desirable for multimedia application in Wireless environment Features The WL 611GS has the following features Wireless security using WPA with TKIP encryption 802 1X with EAP type Authentication 32 bit Cardbus Interface Back...

Page 5: ...e power is now turned on The PWR LED on the front panel will illuminate Step 4 With the adapter card product label and LEDs facing up insert the adapter card into the CardBus slot Step 5 Complete the installation instructions supplied on the CD ROM Configuration If using Windows XP you can use the Windows XP Wireless Zero Configuration WZC utility to manage your wireless client adapter You have th...

Page 6: ...on select the type of authentication required WPA might require further Authentication options found on the Authentication tab Match the setting used by the network Step 7 Enter information for the new wireless network based on the descriptions in the following Network Authentication Select if your access point requires authentication Match the authentication used by the network Open No authentica...

Page 7: ...ge integrity check to protect packets from tampering PPK Per Packet Key hashing to prevent weak key attacks extended IV initialization vector to reduce IV reuse and the possibility that a hacker will collect sufficient packets to crack the encryption and a re keying mechanism to change the temporal key dynamically TKIP is the most commonly used encryption method however if your wireless clients do...

Page 8: ...for this network click OK The Wireless Network window is displayed and the new network is listed in the Preferred networks area Step 9 Your computer is connected to the selected network when you see a blue bubble on top of the icon for that network If the blue bubble does not appear click Refresh If it still does not appear double check that the wireless settings match the configuration of the wir...

Reviews: