background image

 

The difference between WPA-PSK and WPA2-PSK is that 

WPA2-PSK provides data encryption via the AES. In contrast, 

WPA-PSK uses Temporal Key Integrity Protocol (TKIP). 

 

802.1x Setting 

When you have set the Authentication Type to Open, Shared, 

WPA or WPA2, you can also enable IEEE 802.1x setting to use 

the authentication server or certification server to authenticate 

client users. 

 

 
 
 
 
 

Parameter Description 

Encryption Mode 

None

 – Disable the WEP Data Encryption. 

 

WEP

 – Enable the WEP Data Encryption. When the item is 

selected, you have to continue setting the WEP Encryption keys. 

 

TKIP

 – TKIP (Temporal Key Integrity Protocol) changes the 

temporal key every 10,000 packets (a packet is a kind of message 

transmitted over a network.) This insures much greater security 

than the standard WEP security. 

 

AES

 – AES has been developed to ensure the highest degree of 

security and authenticity for digital information and it is the most 

advanced solution defined by IEEE 802.11i for the security in the 

wireless network. 

 

Note: All devices in the network should use the same encryption 

method to ensure the communication. 

 

 

WPA Pre-Shared Key 

The WPA-PSK key can be from eight to 64 characters and can be 

letters or numbers. This same key must be used on all of the 

wireless stations in the network. 

 

 

WEP Key 

(Key1 ~ Key4) 

The WEP keys are used to encrypt data transmitted in the 

wireless network. There are two types of key length: 64-bit and 

128-bit. Select the default encryption key from Key 1 to Key 4 by 

selected the radio button. 

 

Fill the text box by following the rules below. 

64-bit

 – Input 10-digit Hex values (in the “A-F”, “a-f” and “0-9” 

range) or 5-digit ASCII characters (including “a-z” and “0-9”) as 

the encryption keys. For example: “0123456aef“ or “test1”. 

 

16

 

Содержание HWPG1

Страница 1: ......

Страница 2: ...ipment must be installed and operated in accordance with provided instructions and a minimum 20 cm spacing must be provided between computer mounted antenna and person s body excluding extremities of...

Страница 3: ...r to obtain a Return Authorization number Warranty is for repair or replacement only Hawking Technology does not issue any refunds BE SURE TO HAVE YOUR PROOF OF PURCHASE RETURN REQUESTS CAN NOT BE PRO...

Страница 4: ...y 10 3 2 Profile 11 3 2 1 Configure the Profile 12 3 2 1 0 Configuration 12 3 2 1 1 Authentication vs Security 15 3 2 1 2 802 1x Setting Certification 18 3 2 1 3 802 1x Setting CA Server 20 3 3 Link S...

Страница 5: ...dvanced solution defined by IEEE 802 11i for security in wireless networks The power consumption of the card is also very low Furthermore this card provides several levels of power saving modes allowi...

Страница 6: ...Bm 1Mbps BPSK 8 PER 92dBm Dimension 19 H x 130 W x 121 D mm Temperature 32 131 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE IC 1 3 Package Contents Before you begin the installation ple...

Страница 7: ...Windows 98SE Me 2000 Note2 If you have installed a Wireless PCI Card driver utility before please uninstall them first before continuing with the HWPG1 software installation Software Installation A I...

Страница 8: ...C Click Yes to process the installation if you accept the license agreement D Choose Hawking Configuration Tool and click next 4...

Страница 9: ...E The system will automatically detect the card and display Hardware Installation screen Click Continue Anyway to continue F Please wait while the HWPG1 is configuring your software installation 5...

Страница 10: ...re this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Restart your computer Software Installation Continue A After you hav...

Страница 11: ...C Now you have completed the software installation Select Finish 7...

Страница 12: ...utomatically This card will auto connect to wireless device which has better signal strength and no wireless security setting The Configuration Utility appears as an icon on the system tray of Windows...

Страница 13: ...ect Exit to close the Configuration Utility tool In Windows XP there is a Windows Zero Configuration Tool for you to setup wireless clients By default this Windows Zero Configuration Tool is enabled I...

Страница 14: ...Configuration Utility the system will scan all wireless channels to find all access points stations within the accessible range of your card and automatically connect to the wireless device with the...

Страница 15: ...etworks on the list double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan button to collect the information of all the wireless n...

Страница 16: ...escription Profile Name Define a recognizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID p...

Страница 17: ...nother wireless station in the Wireless LAN network without going through an Access Point or Router Peer to Peer Transmit Power If you wish to lower the transmit power of the card to save the power of...

Страница 18: ...t is transmitted directly to the wireless network Select a setting within a range of 0 to 2312 bytes Minor change is recommended Fragment Threshold The value defines the maximum size of packets any pa...

Страница 19: ...prises small businesses and home users that data will remain protected and that only authorized users may access their networks For enterprises that have already deployed IEEE 802 1x authentication WP...

Страница 20: ...tandard WEP security AES AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802 11i for the s...

Страница 21: ...n Protocol EAP a method of authentication that has been in use for a number of years on networks that provide Point to Point Protocol PPP support as many internet service providers and enterprises do...

Страница 22: ...APv2 PAP and EAP MD5 PEAP specifies that an EAP compliant authentication protocol must be used this card supports EAP MSCHAP v2 EAP TLS Smart card and Generic Token Card The client certificate is opti...

Страница 23: ...ficate Store and made available to the RADIUS server for certification Parameter Description Tunnelled Authentication Protocol When the authentication type is PEAP or TTLS select a protocol to be used...

Страница 24: ...3 2 1 3 802 1x Setting CA Server 3 3 Link Status From the Link Status option you can view all the information of the network you are connecting to 20...

Страница 25: ...Status from the system tray The icon in your system tray will display different colors to help you distinguish the status of your wireless network Follow the table to the right to understand what eac...

Страница 26: ...with its Tx counts Tx success Tx error RTS Success and RTS Failed and its Rx counts Rx success Rx error You may reset the counters by clicking Reset Counter 3 5 Advanced This option enables you to con...

Страница 27: ...Turbo Mode Turbo Mode enables the card to deliver the better throughput in the same period and environment 23...

Страница 28: ...24...

Страница 29: ...l 3 7 Setting Up A Static IP Address Generally your IP settings will be assigned automatically However if your network doesn t support this capability please enter in the appropriate IP settings The I...

Страница 30: ...b Go to your Control Panel Select Network Connections Right click on the Wireless Connection Properties 2 Select Internet Protocol TCP IP and Properties 26...

Страница 31: ...ress 3 8 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this featu...

Страница 32: ...rofile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connect...

Страница 33: ...B Click Configure C Select Advanced page enable the WMM Capable 29...

Страница 34: ...es the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 80...

Страница 35: ...h Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security...

Страница 36: ...her words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows...

Отзывы: