background image

Version: 2.0

iii

802.11n Long-Range

USB WiFi Antenna

User Manual

Version: 2.0

Summary of Contents for WiFi King

Page 1: ...Version 2 0 iii 802 11n Long Range USB WiFi Antenna User Manual Version 2 0 ...

Page 2: ...ect a configuration tool 5 To connect with Microsoft Zero Configuration tool 5 To connect with 802 11n Wireless LAN Utility 7 INTRODUCTION TO THE 802 11N WIRELESS LAN UTILITY 8 Interfaces 8 Link Status Information 9 Profile 10 Network 19 Advanced 20 Statistics 21 WMM 22 WPS 24 CCX 35 Radio On Off 35 AP MODE MANAGEMENT GUIDE FOR WINDOWS 2000 XP VISTA 36 Config 38 Security Setting 40 Access Control ...

Page 3: ...s USB Adapter The WiFi King Wireless USB adapter is an IEEE 802 11n wireless 150 Mbps wireless adapter which is also compatible with IEEE 802 11b g and IEEE 802 11a b g wireless devices at 11 54 Mbps You can configure this adapter with ad hoc mode to connect to other 2 4GHz wireless computers or in infrastructure mode to connect to a wireless AP or router for accessing the internet This adapter in...

Page 4: ...ware Installation Note y For Linux or Mac driver installation guide please refer to the instruction in Driver Linux README or Driver Mac README in the CD Rom y The screenshots will vary slightly depending on the version of Windows but the procedures and screens are similar 1 The system finds the newly installed device automatically Click Cancel to close this window 2 Insert the CD Rom that came wi...

Page 5: ... install the driver and wireless utility or install the driver only 4 Select if you are going to configure your wireless network with this device or with Microsoft Zero Configuration tool Note This can be changed after installing this software ...

Page 6: ...Version 2 0 4 5 Click the Install button to start installing 6 Click the Finish button to complete installation ...

Page 7: ... your wireless network settings Note You could use either the software we provide or Microsoft Zero Configuration tool to configure this adapter To switch between the two configuration tools please right click on the icon on system tray to select To connect with Microsoft Zero Configuration tool After specifying the Microsoft Zero Configuration tool to configure your wireless network right click o...

Page 8: ...able wireless networks Select the network you want to connect to To connect to a wireless network with more security settings please click Change advanced settings and configure to be compatible with your wireless network security settings ...

Page 9: ...dapter As default the utility is started automatically upon starting your computer and connects to a connectable wireless network with best signal strength and with no security setting Right click on the icon in the system ray and select Launch Config utilities if the utility does not start Please refer to the following chapters to get information regarding to the functions of this utility ...

Page 10: ...ree parts 1 2 3 1 Function Buttons on top of the window You can click each button to access each configuration window Note Click to enable disable wireless connection status 2 Configuration Column Center of the Utility window Make your changes for each function in this part 3 Link Status Information bottom of the utility window Shows the connection status and system information ...

Page 11: ...ent connection Link Speed Show current transmit rate and receive rate Throughput Display transmit and receive throughput in Mbps B HT Display current HT status in use containing BW GI MCS SNR0 and SNR1 value C Link Quality and Strength Bar Items Information Link Quality Display connection quality based on signal strength and TX RX packet error rate Signal Strength 1 Receive signal strength 1 Noise...

Page 12: ...Name The name of the selected profile SSID The SSID of the wireless system Network Type Shows Infrastructure Ad hoc to indicate the network type of the selected profile Authentication Shows the authentication mode in use There are total 8 modes Open Shared LEAP WPA WPA PSK WPA2 WPA2 PSK and WPA NONE Encryption Shows the encryption mode in use There are total 4 modes None WEP TKIP and AES Use 802 1...

Page 13: ...hree tabs on the window Settings for Profile Name SSID Network Type Tx Power Preamble Power Save Mode RTS Threshold and Fragment Threshold Settings for Authentication Encryption Preshared Key and WEP Key Settings for EAP Method Tunnel Authentication and Session Resumption For different EAP Method you also have to configure different require of ID Password Client Certificate or Server Certificate P...

Page 14: ...hat the channel field will be available for setup in Ad hoc mode Tx Power Transmit power the amount of power used by a radio transceiver to send the signal out Preamble Two selections Auto and Long Preamble This can only be set up in Ad hoc mode Channel Channel in use for Ad Hoc mode Power Save Mode Choose from CAM Constantly Awake Mode or PSM Power Saving Mode RTS Threshold For adjusting the RTS ...

Page 15: ...Open Shared LEAP WPA WPA PSK WPA2 WPA2 PSK and WPA NONE1 Please select a type from the drop down list For Vista User There are 7 types supported Open Shared WPA WPA PSK WPA2 WPA2 PSK and CCKM Please select a type from the drop down list Encryption Type For Windows 2000 User There are 4 types supported None WEP TKIP and AES The available encryption selection will differ from the authentication type...

Page 16: ...cation mode this field must be filled with characters longer than 8 and less than 32 lengths The following dialog appears if you have input invalid values WEP Key Only available when using WEP encryption algorithm The key must match AP s key Select Hex1 or ASCII2 to setup the key value The following dialog appears if you have input invalid values 1 Hexadecimal digits consist of the numbers 0 9 and...

Page 17: ... between the WLAN client and the access point TTLS Tunneled Transport Layer Security This security method provides for certificate based mutual authentication of the client and network through an encrypted channel Unlike EAP TLS EAP TTLS requires only server side certificates EAP FAST Flexible Authentication via Secure Tunneling It was developed by Cisco Instead of using a certificate mutual authe...

Page 18: ...neric Token Card TLS Smart Card no selection EAP FAST no selection LEAP no selection C Session Resumption Mark to enable this function or unmark it to disable After doing the above settings please click on the tabs below There are several tabs on the window please fill in the information gradually Click on these tabs Settings for Authentication ID Password Tunnel ID Password and Password Mode1 Set...

Page 19: ...el ID Password Identity and Password for server Password Mode Select the power save mode For Windows 2000 User There are two selections Soft Token and Static Password For Vista User There are four selections Soft Token Static Password Windows Logon and Prompt User Client Certificate Items Information Use Client certificate Client certificate for server authentication Use my smart card Client certi...

Page 20: ...ted one time to the client automatically It only supported Allow unauthenticated provision mode and use EAP MSCHAP v2 authentication to authenticate now It causes to continue with the establishment of the inner tunnel even though it is made with an unknown server Mark to enable unauthenticated provision mode Use protected authentication credential Use protected authentication credential Using PAC ...

Page 21: ...n each item to pop up the information window A B C A Sorted by Click each button to sort the listing networks by SSID channel and Signal strength B Show dBm Mark the checkbox to show the signal and noise strength in dBm unmark to show in percentage C Buttons You can click on these buttons to add a new profile edit delete or activate an old profile Items Information Rescan To rescan available wirel...

Page 22: ...log while connecting to an AP with authentication Authentication Status Dialog displays the process about 802 1 x authentications Select Your Country Region Code Eight countries to choose Channel list 1 11 channels North America 1 13 channels General Europe 1 14 channels Japan IEEE802 11a 4 Channels Japan 19 Channels Europe 13 Channels USA Enable CCX Cisco Compatible extensions Select to enable CC...

Page 23: ...e ACK After All Retries Frames failed transmit after hitting retry limit RTS Frames Successfully Receive CTS Successfully receive CTS after sending RTS frame RTS Frames Fail To Receive CTS Failed to receive CTS after sending RTS Reset Counter Reset counters to zero Items Information Frames Received Successfully Frames received successfully Frames Received With CRC Error Frames received with CRC er...

Page 24: ...re configuring this function MAC Address Fill in the blanks of Direct Link with MAC Address of STA Timeout Value Time of automatically disconnect after some seconds The value is integer The integer must be between 0 65535 It represents that it always connects if the value is zero Default value of Timeout Value is 60 seconds Apply Tear Down After fill in the MAC Address and Timeout Value click Appl...

Page 25: ... Link with MAC Address of STA The STA must conform to these two conditions y Connect with an AP that supports DLS features y Ensure that DLS is enabled 4 Fill in the Timeout Value and then click 5 After configuring the DLS successfully the MAC address and Timeout Value are displayed in the DLS Status DLS Status 6 If you want to disconnect Direct Link Setup select the list in DLS Status and then cl...

Page 26: ...E and RF Bands 5 Pin Code 8 digit numbers It is required to enter PIN Code into Registrar using PIN method Each Network card has only one PIN Code of Enrollee Click on the Renew button to renew the PIN code 6 Config Mode Enrollee or an external Registrar 7 Detail Information about Security and Key in the credential 8 Connect Command to connect to the selected network inside credentials 9 Rotate Co...

Page 27: ...wing description divides into four parts A WPS Information on AP B Example of Adding to Registrar Using PIN Method C Example of Adding to Registrar Using PIN Method D Example of Configuring a Network AP Using PIN or PBC Method ...

Page 28: ...xternal Registrars a bitwise OR of values Device Password ID Indicates the method or identifies the specific password that the selected Registrar intends to use APs in PBC mode must indicate 0x0004 within two minute Walk Time Selected Registrar Indicates if the user has recently activated a Registrar to add an Enrollee The values are TRUE and FALSE State The current configuration state on AP The v...

Page 29: ...om the STA and enters the password into the Registrar Both the Enrollee and the Registrar use PIN Config method for the configuration setup Please follow the step below 1 Select Enrollee from the Config Mode drop down list 2 Click Rescan to update available WPS APs 3 Select an AP SSID BSSID that STA will join to ...

Page 30: ...ange between Step 4 and Step 5 y If you use Microsoft Window Connection Now as an External Registrar you must start PIN connection at STA first After that search out your WPS Device name and MAC address at Microsoft Registrar Add a new device and enter PIN Code of STA at Microsoft Registrar when prompted 6 The result should appear as the image below ...

Page 31: ... mode the PBC mode selected is obtained from ID 0x0004 and is found after a complete scan The Enrollee can then immediately begin running the Registration Protocol If the Enrollee discovers more than one Registrar in PBC mode it MUST abort its connection attempt at this scan and continue searching until the two minute timeout Note Before you press PBC on STA and candidate AP Make sure all APs aren...

Page 32: ...Version 2 0 30 1 Select Enrollee from the Config Mode drop down list 2 Click PBC to start the PBC connection 3 Push the PBC on AP Note Allow time for an exchange between Step 2 and Step 3 ...

Page 33: ...Version 2 0 31 4 The progress bar as shown in the figure below indicates that scanning progress 5 When one AP is found join it ...

Page 34: ...Version 2 0 32 6 Check WPS Information on the available WPS APs 7 Configure and receive one or more credential s Then connect successfully The result will be displayed as it is in the figure below ...

Page 35: ...rop down list 2 Enter the details of the credential and change configurations SSID Authentication Encryption and Key manually if needed 3 If the PIN configuration is setup enter the PIN sent from the Enrollee 4 Start PIN or PBC The following procedures are as similar as section PIN Enrollee Setup or PBC Enrollee Setup ...

Page 36: ...the WPS process the credential you set in advance will be updated to the AP itself Otherwise after a successful registration the AP Enrollee will be re configured with the new parameters and the STA Registrar will connect to the AP Enrollee with these new parameters ...

Page 37: ...ent every 0 2000 milliseconds Non Serving Channel Measurements limit Mark to revise the channel measurement Network EAP Enable the NetwrokEAP authentication algorithm Enable RF Roaming Enable RF roaming function Enable CAC Tolerance Enable the call admission control CAC There are four selections ADDTS Directly send TS DELTS and RESET Select an item from the drop down list and then click on the but...

Page 38: ...nternet access for your wireless stations To use this adapter as an access point please right click the icon on system tray and select Switch to AP mode Please refer to the following introduction and information about this AP mode utility Note In windows XP it provides WPA support at hotfix Q815485 However you have to make sure that hotfix Q815485 require XP SP1 installed has been installed in you...

Page 39: ...Software Access Point Soft AP Application Version 2 0 37 ...

Page 40: ...tion to this adapter Please find the following items for identification to each field 1 7 2 8 9 3 10 11 12 4 5 6 13 14 15 1 SSID AP name of user type User also can select Use Mac Address to display it 2 Wireless Mode Select wireless mode Only 2 4G is supported ...

Page 41: ...300 7 Channel Manually force the AP using the channel System default is channel 1 8 Use Mac Address Use MAC address of used wireless card to be AP name System default is APX X is last number of Mac Address 9 Security Setting Authentication mode and encryption algorithm used within the AP System default is no authentication and encryption 10 No forwarding among wireless clients If there is no beaco...

Page 42: ...and STA For WPA PSK authentication mode this field must be filled with character longer than 8 and less than 32 lengths 4 Group Rekey Interval Only valid when using WPA PSK encryption algorithm The key will change compliance with seconds or beacon that user set 5 WEP Key Only valid when using WEP encryption algorithm The key must match the key on AP There are several formats to enter the keys a He...

Page 43: ... method to process access control from the drop list to determine the MAC addresses that you designated are allowed to access the AP or not 2 MAC Address Add allowed or denied MAC addresses to the MAC address list 3 Access List Display all Mac Addresses that you designated 4 Delete Delete Mac addresses that you selected 5 Remove All Remove all Mac address in Access List 6 Apply Apply changes ...

Page 44: ...n detail information of current connection Items Information MAC Address The station MAC address of current connection AID Raise value by current connection Power Saving Mode Check if the connected station supports power saving Status The connection status ...

Page 45: ...Version 2 0 43 Event Log Record Soft AP all event time and message Items Information Event Time yy mm dd hh mm ss Record event time Message All event messages ...

Page 46: ...of CTS that successfully received after sending RTS frame RTS Frames Fail To Receive CTS Counts of CTS that fail to be received after sending RTS frame Frames Retransmitted Successfully Successfully retransmitted frames numbers 2 Receive Statistics Items Information Frames Received Successfully Frames received successfully Frames Received With CRC Error Frames received with CRC error Frames Droppe...

Page 47: ... or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause har...

Page 48: ...ing to electromagnetic compatibility Company has an on going policy of upgrading its products and it may be possible that information in this document is not up to date Please check with your local distributors for the latest information No part of this document can be copied or reproduced in any form without written consent from the company Trademarks All trade names and trademarks are the proper...

Reviews: