background image

 

Fig 5-11   

 
     

1

. Certificate issuer: Choose to use server that is the issuer of certificates. 

 
     

2

. Allow intermidiate certificates: It must be in the server certificate chain between the server   

certificate and the server specified in the certificate issuer must be field. 

 
     

3

. Server name: Enter the authentication server’s Name.. 

 
      4.

 Please click “OK” to save the profile. 

 

 
5.5 Link Status                                                                                               
 

The Link Status (Fig 5-12) provides the link information of the Wireless-G USB Dongle. 
 

The 

Status

 displays current connection status. If no connection, it will show 

Disconnected. Otherwise, the SSID and BSSID will show here. 
 
The 

Extra Info

 displays link status and current channel in use. 

 

Содержание CWD-854

Страница 1: ...Wireless G USB Dongle User s Manual...

Страница 2: ...ructure Mode 3 Getting to Know the Wireless G USB Dongle 4 Installing Driver Configuration Utility and Hardware for Windows 98SE ME 2000 XP 5 Using the Configuration Utility in Windows 98SE ME 2000 XP...

Страница 3: ...age with other computers on the network The Wireless G USB Dongle not only connects with Wireless G networks at an incredible speed of 54Mbps it can also interoperate with all the existing 11Mbps Wire...

Страница 4: ...s LAN is a group of computers each equipped with one WLAN adapter connected as an independent wireless LAN Computers in a specific Ad Hoc wireless LAN must be configured to share the same radio channe...

Страница 5: ...he Wireless G USB Dongle Wireless G USB Dongle will install into your PC or Notebook like any other USB adapter using an existing USB port ACT LED Green The ACT LED will blink when the Dongle transfer...

Страница 6: ...ctivated the auto run feature of Windows the screen in Fig 4 1 should appear automatically If the screen doesn t appear automatically you can access the installation by clicking the Start button and c...

Страница 7: ...Fig 4 2 3 In Windows XP you will see Fig 4 3 Please click Continue Anyway If you use Windows 2000 you will see the Fig 4 4 Please click Yes Fig 4 3...

Страница 8: ...Fig 4 4 4 Click Finish on the Setup Page Fig 4 5 Fig 4 5 4 1 2 Hardware Installation 1 To install the Wireless G USB Dongle in a Desktop or Notebook...

Страница 9: ...Wireless G USB Dongle into the USB port 2 Windows will automatically detect the Dongle In Windows XP you will see Fig 4 6 Please click Next for drivers to automatically load Fig 4 7 is the screen in...

Страница 10: ...Fig 4 7 3 Please reboot the computer after the installation of hardware drivers and utility...

Страница 11: ...n Fig 5 1 Fig 5 1 The utility is divided into six parts Profile Link Status Site Survey Statistics Advance and About You should change all your configuration settings for Wireless G USB Dongle by usin...

Страница 12: ...into its properties Fig 5 4 For Startup type choose Disable to disable the Wireless Zero Configuration then click Apply and OK to make the changes effective Now you can use our Configuration Utility...

Страница 13: ...Fig 5 4 5 3 Profile The Profile screen Fig 5 5 lets you save different configuration profiles for different network setups...

Страница 14: ...pe The Network type used for this profile Add Click the Add button to create a new profile Please refer to 5 4 Create a New Profile Delete Click the Delete button to delete a profile Edit Select a pro...

Страница 15: ...ere are two wireless modes A Infrastructure This mode allows wireless and wired networks to communicate through an access point B Ad Hoc This mode allows wireless equipped computers to communicate dir...

Страница 16: ...Enter Identity 2 Enter Password 3 Click OK to save the profile B Open System or Shared Key 1 Select Authentication type Open System or Shared Key 2 Select Encrytion WEP 3 Select the key number that wi...

Страница 17: ...n type WPA WPA PSK WPA2 or WPA2 PSK 2 Select Encryption type TKIP or AES Please see Fig 5 9 3 Enter WPA Preshared Key only valid for WPA PSK and WPA2 PSK This key should be between 8 and 32 characters...

Страница 18: ...Fig 5 9 4 802 1x Setting A Click 802 1x Setting button Please see the Fig 5 10...

Страница 19: ...he WLAN client and the access point 3 TTLS Tunneled Transport Layer Security this security method provides for certificate based mutual authentication of the client and network through an encrypted ch...

Страница 20: ...he certificate issuer must be field 3 Server name Enter the authentication server s Name 4 Please click OK to save the profile 5 5 Link Status The Link Status Fig 5 12 provides the link information of...

Страница 21: ...amount of data moved successfully form one place to another in a given time period The Link Quality field will display a bar indicating percentage between 0 and 100 percent The Signal Strength field w...

Страница 22: ...Network mode Rescan Click the Rescan button to search for wireless networks Connect Select one of the networks on the list and click the Connect button Please note that if the wireless network has en...

Страница 23: ...s You can reset counters if you need otherwise click OK Fig 5 14 5 8 Advance The Advanced screen Fig 5 15 allows you to set Wireless Mode Ad hoc wireless mode TX BURST B G Protection Tx Rate and Anten...

Страница 24: ...ays send frame without protection 3 Tx Rate Manually selected the transmit rate Default is auto 4 Tx Burst proprietary frame burst mode which can improve transmission speed 5 Fast Roaming at fast to r...

Страница 25: ...9 If you finished the changes please click the Apply button 5 9 About The About screen shows release dates as well as driver utility versions and the MAC IP address of the card Fig 5 16...

Отзывы: