background image

18 

 

 

   

The CA Server is enabled only when TLS, TTLS or PEAP authentication is selected. The 
Client can verify if such server is reliable and then transmit Client Certificate after the 
verification is confirmed. (NOTE: Only available if 

Use Client Certificate

 is checked.) 

 

Verify CA Server -   

1. Confirm if the Server Certificate is issued by an assigned certificate issuer. If 

Allow 

Intermediate Authentication

 box is checked, the server certificate can be issued by 

one intermediate certificate issuer. 

 
2. Check that the server name of server certificate matches the name entered by the user 

or belongs to the same domain. 

 

Server Certificate –   

Check the 

Server Certificate

 box to indicate that the Client will confirm whether the CA 

server is reliable.

 

 
Certificate issuer –   

Specify the CA of a server certificate from the drop-down list. 
 

Allow Intermediate Certificates –   

When this option is checked, the certificate issuer can be an issuer recognized by a 
specific certificate issuer.   
 

Server name –   

This value can be a server name or the name of a domain where the server is located. 

 
Server name must match exactly –   

Select this option to specify that the server name of server certificate must be the same as 

Server Name

 or matches the name of domain where the server is located. 

 
Domain name must end in specified name –   

Select this option to specify that the certificate issuer must match the domain or secondary 
domain entered in 

Server Name

 

Содержание GN-WI02GM

Страница 1: ...GN WI02GM Mini PCI Wireless Adapter User s Manual http www gigabyte com tw Rev 1 0 First Edition ...

Страница 2: ...e the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interf...

Страница 3: ...ntegrator will be responsible for re evaluating the end product including the transmitter and obtaining a separate FCC authorization End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained between the antenna and users for example AP Router Motherboard The final end product must be labeled in a visible a...

Страница 4: ...ME 6 2 4 DRIVER UTILITY INSTALLATION WINDOWS 2000 8 2 5 DRIVER UTILITY INSTALLATION WINDOWS XP 10 CHAPTER 3 USING THE GIGABYTE WLAN CONFIGURATION UTILITY 12 3 1 THE PROFILE TAB 12 3 2 THE LINK STATUS TAB 19 3 3 THE SITE SURVEY TAB 20 3 4 STATISTICS SETTING 21 3 5 THE ADVANCED TAB 22 3 6 THE ABOUT TAB 23 CHAPTER 4 TROUBLESHOOTING 24 CANNOT ENABLE 802 1X WPA OR WPA PSK 24 CANNOT ESTABLISH CONNECTION...

Страница 5: ...nt to reduce battery consumption Built in diversity antenna Seamless roaming between 802 11b and 802 11g networks Supports AES Advance Encryption System enterprise class 802 1x security and multiple levels of WEP encryption 64 bit 128 bit and WPA Wi Fi Protected Access Driver supports Windows 98SE Me 2000 XP 1 3 Physical Dimensions Packaging Dimensions 59mm 44mm 4mm Please check that the package c...

Страница 6: ...2 1 4 System Requirements IBM PC AT compatible computer Windows 98SE Me 2000 XP ...

Страница 7: ...stallation section that matches your operating system 2 1 Installing the Wireless Mini PCI Adapter Step 1 Turn off your PC and disconnect the power cord Step 2 Remove the PC cover Step 3 Locate an available Mini PCI slot and remove its back plate from the PC chassis Step 4 Insert the GN WI02GM Mini PCI Adapter into the slot and fasten it to the chassis using the screws in step 3 Step 5 Power on yo...

Страница 8: ...Utility and click on it to start the utility installation program Step 4 When the Welcome screen appears click Next Step 5 The Check Setup Information screen displays the Operating System of your computer If it is correct click Next to continue Step 6 An information box screen appears Click OK to go to the next screen Step 7 After the software utility installation is complete click Finish You are ...

Страница 9: ...p 10 When the AEGIS Protocol Installation window appears click the Install button to begin installing program files Step 11 When the message AEGIS Protocol Installed Successfully appears in the dialog box click the Cancel button Windows 98 may or may not automatically reboot your PC ...

Страница 10: ...tility and click on it to start the utility installation program Step 4 When the Welcome screen appears click Next Step 5 The Check Setup Information screen displays the Operating System of your computer If it is correct click Next to continue Step 6 An information box screen appears Click OK to go to the next screen Step 7 After the software utility installation is complete click Finish You are n...

Страница 11: ...p 10 When the AEGIS Protocol Installation window appears click the Install button to begin installing program files Step 11 When the message AEGIS Protocol Installed Successfully appears in the dialog box click the Cancel button Windows ME may or may not automatically reboot your PC ...

Страница 12: ... screen appears click Next Step 5 The Check Setup Information screen displays the Operating System of your computer If it is correct click Next to continue Step 6 After the software utility installation is complete click Finish You are now ready to install 802 1x authentication software Step 7 If the screen below appears this does not mean there is a problem Click Yes to continue Step 8 Drag your ...

Страница 13: ...9 to begin installing program files Step 11 When the message Installed Successfully appears in the dialog box click the Close button Windows 2000 may or may not automatically reboot your PC ...

Страница 14: ...Utility and click on it to start the utility installation program Step 4 When the Welcome screen appears click Next Step 5 The Check Setup Information screen displays the Operating System of your computer If it is correct click Next to continue Step 6 After the software utility installation is complete click Finish You are now ready to install 802 1x authentication software Step 7 Drag your mouse ...

Страница 15: ...nstallation window appears click the Install button to begin installing program files Step 10 When the message Installed Successfully appears in the dialog box click the Close button Windows XP may or may not automatically reboot your PC ...

Страница 16: ...guration Monitor Utility Icon You may also open the Gigabyte WLAN Utility from the Windows Start menu selecting Programs and then Gigabyte WLAN Utility Note Modifications to WLAN configuration settings can be done when GN WI02GM is in use or through the network configuration tool provided by Windows when it is inactive 3 1 The Profile Tab Click on the Profile tab in the Gigabyte WLAN Configuration...

Страница 17: ... active profile Channel Displays which channel the profile is operating on Authentication Displays authentication type associated with profile Encryption Four encryption types currently used in the profile include None WEP AES and TKIP Network Type Displays the wireless mode Infrastructure or Ad Hoc associated with the profile 3 1 1 Add Profile Configuration Tab Figure 3 3 Add Profile Configuratio...

Страница 18: ...i PCI Adapter is operating in Infrastructure is the most common and is used when connecting your PC to a wireless access point or wireless router Ad Hoc mode is used to connect to another computer without the use of a wireless access point or wireless router In Ad Hoc mode the Preamble and Channel can be manually set see Figure 3 4 Figure 3 4 TX Power Allows you to define the transmit power at var...

Страница 19: ... 1X Enabled None None None WEP Key Setting YES None None Shared WEP Key YES TKIP None WPA AES None YES TKIP WPA PSK Key WPA PSK AES WPA PSK Key NO 3 1 2 1 Authentication and Security Authentication Before a station connects to a SSID the authentication type used by the SSID must be known Authentication types include OPEN SYSTEM WAP WAP PSK and SHARED Security To prevent unauthorized access to data...

Страница 20: ... up to 64 hexadecimal digits or from 8 to 63 ASCII digits in length 2 Click OK to save these settings 3 1 2 2 802 1X Setting To enable 802 1X Authentication click on the Use 802 1x button see Figure 3 5 above and the 802 1X Setting window will open From the 802 1x Setting window you can configure authentication parameters such as Tunnel Protocol ID and Password and Client Certificate or Certificat...

Страница 21: ... Tunnel with its authentication No option is need to be set for Station with WLAN card The second step is to confirm the validity of Station with assigned authentication type in the Tunnel Data needed for authentication includes Tunnel ID Tunnel Password Client Certificate or Server Authentication Protocol Use assigned authentication type in the safe tunnel Tunnel Identity Enter name of user accou...

Страница 22: ... Server Certificate Check the Server Certificate box to indicate that the Client will confirm whether the CA server is reliable Certificate issuer Specify the CA of a server certificate from the drop down list Allow Intermediate Certificates When this option is checked the certificate issuer can be an issuer recognized by a specific certificate issuer Server name This value can be a server name or...

Страница 23: ...se ONLY when GN WI02GM is configured in Ad Hoc mode Link Speed Indicates the transmission data rate between associated access point and the GN WI02GM Throughput Indicates the number of successfully transmitted Tx and received Rx data in bytes per second Link Quality Displays how well the GN WI02GM is communicating with wireless access point wireless router or another wireless device Signal Strengt...

Страница 24: ...Figure 3 10 Site Survey BSSID Displays the MAC address of the access point Signal Strength Displays the access point signal strength Channel Displays the current broadcast channel used by the access point Encryption The security method used by the access point Authentication The authentication type used by the access point Network Type Informs you if an access point infrastructure or other wireles...

Страница 25: ...21 3 4 Statistics Setting The Statistics tab shows you the number of packets sent and received by the Wireless PCI Adapter Figure 3 11 Statistics ...

Страница 26: ...for 802 11b is compatible To prevent data collision between two stations with 802 11b and 802 11g within range of the same Access Point it is necessary to set 11B G Protection This setting only functions when 802 11 B G mix is selected as Wireless Mode Three setting are available AUTO EABLE and DISABLE This is a mechanism implemented to prevent the Hidden Node problem Hidden Note is a situation in...

Страница 27: ...23 3 6 The About Tab The About tab displays information about current drivers and physical MAC address Figure 3 13 About ...

Страница 28: ...reless access point router If WEP or WPA encryption is enabled check if the WEP or WPA keys for the GN WI02GM match z Check that the MAC address of the Wireless Mini PC Adapter is included in the access point router s Authorization Table Can Connect to an Access Point but Cannot Access the Internet z Make sure the security settings are the same as that of wireless access point router If WEP or WPA...

Страница 29: ...54Mbps 21dBm 11Mbps Receive Sensitivity Targeted at 75dBm 54Mbps 88dBm 11Mbps Antenna Connector Three RF connectors for antenna Regulatory and Environmental Compliance EMC certification FCC part 15 USA Temperature Range Operating 0 40 degree C Storage 20 65 degree C Humidity 10 85 Non condensing Software Driver Windows 98SE Me 2000 XP Security 64 128 bit WEP AES WPA WPA2 TKIP 802 1x Quality of Ser...

Страница 30: ...y other antenna or transmitter 3 Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment 4 This device is for OEM installation only the End User manual shall not contain informationabout how to install the module 5 This compliance to FCC radiation exposure limits for an uncontrolled environment and ...

Отзывы: