User Guide
WU830G
Wireless USB Adapter
Power
Link
Страница 1: ...User Guide WU830G Wireless USB Adapter Power Link ...
Страница 2: ...C Rules as a Class B digital device This device complies with Part 15 of FCC Rules Operation of the device is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference that may cause undesired operation Wireless LAN and your Health Caution Exposure to Radio Frequency Radiation To comply with the FCC RF exposure complianc...
Страница 3: ...Inc All rights reserved No part of this publication may be reproduced in any form or by any means or used to make any derivative work such as translation transformation or adaptation without written permission from Motorola Inc Motorola reserves the right to revise this publication and to make changes in content from time to time without obligation on the part of Motorola to provide notification o...
Страница 4: ...Your USB Adapter 2 5 Device Configuration Setup 2 5 Section 3 Configuration Understanding the Antenna Icons 3 2 Starting the Configuration Utility and Viewing Link Status Information 3 3 Link Status Information 3 4 Connecting to an Available Wireless Network 3 6 Creating a Network Profile 3 8 Configuring Security Settings 3 11 Setting Security for a Wireless Network or a Profile 3 12 Open Authenti...
Страница 5: ...roubleshooting Contact Us 4 1 Register the WU830G 4 1 Hardware Solutions 4 1 My computer is experiencing difficulty connecting to the wireless network 4 1 I would like to test if my Internet connection is live 4 2 Section 5 Glossary ...
Страница 6: ...rinters and more You ll need one WU830G for each computer Because your WU830G works with USB 2 0 and is backward compatible with USB 1 0 and 1 1 you ll be able to enjoy blazing fast speeds on your wireless network Since the WU830G receives its power from the USB port there is no extra power plug to overload your power strip The WU830G complies with the 802 11b and the new nearly 5 times faster 802...
Страница 7: ...r WU830G Features The WU830G has the following features CD ROM based Installation Wizard to provide easy installation Device Configuration and Status Utility Wireless security using WPA with TKIP encryption 802 1X with EAP type Authentication Compatibility with both 802 11g and 802 11b network standards Upgradeable firmware to stay current with the latest specifications as they become available fr...
Страница 8: ...nstallation Provides instructions for installing the firmware and hardware and setting up the firmware to get your adapter up and running Configuration Describes the Configuration Utility that manages your WU830G Troubleshooting Provides a list of frequently asked questions and possible solutions Glossary List of terms and acronyms Box Contents Your box contains the following CD ROM Quick Start Gu...
Страница 9: ...ple Local Area Network LAN is shown below In the example above the Internet communicates with the modem which in turn communicates with the wireless router The wireless router acts as the gateway to your network sending information to whichever device asks for information In this example the USB adapter enables your notebook computer to be part of the wireless network ...
Страница 10: ... specification transmits data rates up to 54 Mbps Both standards operate in the 2 4 GHz wireless range These are theoretical speeds so your performance may vary A Word About Data Rates Data rate is the speed at which individual bits of data flow through a channel It is not the same speed at which entire files are uploaded or downloaded These speeds will vary and are often less than the maximum dat...
Страница 11: ...tion Front of USB Adapter The following illustration shows the front of the WU830G The WU830G has the following features Feature Description 1 Power LED Indicates that the USB adapter is powered 2 Link LED Indicates the activity of the wireless network traffic ...
Страница 12: ...0G MADE IN TAIWAN PART NUMBER 512761 001 00 S N USB connector Label under WU830G The following describes the features on the back and bottom of the WU830G Feature Description USB Connector Connector for one end of the USB 2 0 cable Label Includes the model number part number serial number and MAC Address MAC Address Located on the label under the words WIRELESS MAC This is the MAC Address for the ...
Страница 13: ...ation from your network administrator Network names SSID of the specific wireless networks to which you are going to connect either WPA or WEP WPA Wi Fi Protected Access wireless network key information may include network authentication type encryption type and or network key for any WPA enabled networks to which you want to connect WEP Wired Equivalent Privacy wireless network key information ne...
Страница 14: ... Wi Fi Protected Access wireless network key information network authentication type encryption type network key from the wireless router access point Security Options The WU830G is designed for both the home user and business WPA is a powerful standards based interoperable security technology for wireless local area networks the subset of the future IEEE Std 802 11i standard that encrypts data se...
Страница 15: ... or WEP 128 bit A network key is used WPA PSK For infrastructure environments without the RADIUS infrastructure WPA PSK supports the use of a pre shared key WPA PSK is the next generation of wireless network security for home and small office environments TKIP A network key is used more secure WPA The network operates in IEEE 802 1x authentication mode This mode is for environments with a Remote A...
Страница 16: ...mple let s say you decide to enable WPA PSK on your WU830G However the slightly older wireless network you want to connect to only supports WEP which means that you cannot use WPA and should use WEP because the security protocols must match between the WU830G and the access point For additional information about the options supported by the WU830G refer to Section 3 Configuration ...
Страница 17: ...Windows to its proper location for example D WIN98 4 Locate an empty USB port on your computer 5 Connect one end of the USB 2 0 cable to the USB port on the back of the WU830G and connect the other end of the USB 2 0 cable to the USB port on your laptop or desktop computer WU830G Your computer may vary from illustration 6 Complete the installation instructions supplied on the CD ROM Device Configu...
Страница 18: ...on Utility and view link status information Connect to an available wireless network Create network profiles Configure security settings Remove a network from the profile list View product information Remove the WU830G from your computer The screenshots shown may look slightly different from the ones in your version of the software ...
Страница 19: ...reless USB Adapter Configuration Utility The following table describes the icons used by the utility Antenna Icons There are no networks available The signal strength is Very Low 0 to 20 signal strength The signal strength is Low 20 to 40 signal strength The signal strength is Good 40 to 60 signal strength The signal strength is Very Good 60 to 80 signal strength The signal strength is Excellent 8...
Страница 20: ...pter Configuration Utility provides more wireless information about the network To start the Motorola Wireless USB Adapter Configuration Utility 1 Right click the antenna icon in the system tray The Show Configuration Utility Menu is displayed 2 Select Show Config Utility The Motorola Wireless USB Adapter Configuration Utility window is displayed The WU830G automatically detects the available netw...
Страница 21: ...tus Displays the current connection status of the WU830G Re Scan Clicking this button enables you to search for the available wireless networks This is useful if the WU830G was not able to establish a connection to the specified network because the link quality was poor Channel Displays the channel that the WU830G is using The possible channels are 1 through 11 Security Displays the security used ...
Страница 22: ... possible types are Infrastructure and Ad Hoc AP MAC Address Displays the wireless MAC Address Signal Quality Displays the signal to noise ratio SNR The higher the percentage the better the wireless connection Signal Strength Displays the signal strength between the access point and the WU830G The higher the percentage the better the signal strength If the percentage is low try moving your WU830G ...
Страница 23: ... a different network from a list of available networks To connect to an available network 1 Right click the antenna icon in the system tray and select Show Config Utility The Motorola Wireless USB Adapter Configuration Utility window is displayed 2 Click the Site Monitor tab The following window is displayed This tab lists the available networks and provides information about each network The tabl...
Страница 24: ...on Network Name Displays the name of the access point Signal Displays the signal strength indicated by percent Channel Displays the channel frequency used by the access point The possible channels are 1 through 11 Security Displays the security type used by the access point The possible options are None WEP WPA PSK and WPA BSS Type Displays the network type The possible options are Infrastructure ...
Страница 25: ...ht click the antenna icon in the system tray and select Show Config Utility The Motorola Wireless USB Adapter Configuration Utility window is displayed 2 Click the Profiles tab The following window is displayed 3 In the Profile Name field select New Entry from drop down box The box displays a blinking cursor 4 Type in a name for the new profile The default profile contains the initial configuratio...
Страница 26: ...le setting enables you to save different configurations for different working environments The default profile contains the initial configuration setting for the WU830G Network Name SSID The Network Name Service Set Identifier SSID identifies and announces the wireless network to wireless devices This is a case sensitive identifier and must not exceed 32 characters The SSID any is a special SSID I...
Страница 27: ...Hoc no access point is being used When the Network Type is Infrastructure the channel of the card is automatically set to the same channel as the access point Set Security Enables you to configure the security options for this profile A security setting box is displayed For additional information refer to Configuring Security Settings ...
Страница 28: ... the wireless network the WU830G must match the security settings used by the access point To establish the security settings you must first choose the authentication option that establishes either an open or secure verification of communication with an access point The four authentication options are Open Shared WPA PSK and WPA After you choose the authentication option you then choose the data e...
Страница 29: ... Extensible Authentication Protocols EAPs are supported These may include TLS TTLS PEAP and LEAP TKIP with four EAP methods TLS TTLS PEAP LEAP A network key is used more secure Setting Security for a Wireless Network or a Profile To set up security for a selected wireless network or profile 1 Select a wireless network on the Site Monitor tab and click Connect or enter profile information on the Pr...
Страница 30: ...tication The following table describes the encryption status and the fields that become active with that encryption status Encryption Status Description Disabled Selecting this option leaves your wireless connection without any security protection It is the only option available with Open Authentication No additional fields become active ...
Страница 31: ...SECTION 3 CONFIGURATION 3 14 WU830G Shared Authentication The following window displays the Motorola Security Configuration with Shared Authentication ...
Страница 32: ...sphrase match the keys on the access point If your wireless router wireless access point is a Motorola product the same passphrase will generate the same WEP keys Transmit Key There are four available WEP keys By setting the transmit key you can specify which key 1 to 4 to use to encrypt the wireless packets This is also known as the key index on some access points Key 1 through Key 4 The key used...
Страница 33: ...d based on the encryption method used The following window displays the Motorola Security Configuration with WPA PSK Authentication The following table lists the fields displayed when WPA PSK authentication is used Field Description Encryption Status TKIP is the encryption algorithm used on the packets Passphrase Enter the same passphrase as the access point to which you want to connect The passph...
Страница 34: ...rk is authenticated to be the network you want to connect to Your identity is authenticated by the network This security method does not require you to obtain a WPA passphrase The server that authenticates your identity issues a WPA passphrase automatically once it accepts your identity There are four different Extensible Authentication Protocol EAP methods that you can select on this window EAP T...
Страница 35: ...rt different authentication methods and their associated network security policies Depending on which EAP method you select different fields are active The following example window displays the Motorola Security Configuration window with WPA Authentication and the EAP TTLS method selected ...
Страница 36: ... server to which you are connecting Together the login name and the certificate enable the RADIUS server to authenticate your identity You can also choose to authenticate the identity of the RADIUS server by enabling the Validate Server Certificate check box EAP TTLS This method requires a Login Name and Password You must also choose an additional TTLS Protocol The TTLS protocol must match the one...
Страница 37: ...EAP Protocols are MD5 Challenge EAP GTC MS CHAP v2 You can also choose to authenticate the RADIUS server identity by checking the Validate Server Certificate check box LEAP This is a Cisco based EAP method It only requires a Login Name and Password for user authentication Login Name Required for EAP TLS EAP TTLS EAP PEAP and LEAP methods Certificate Active field for EAP TLS method Password Require...
Страница 38: ...y and select Show Config Utility The Motorola Wireless USB Adapter Configuration Utility window is displayed 2 Click the Profiles tab The following window is displayed 3 In the Profile Name field click the down arrow and select the profile name for the network you want to remove 4 Click Remove The network is removed from your network list 5 Click Apply Changes or OK to save the change ...
Страница 39: ...are versions 1 Right click the antenna icon in the system tray and select Show Config Utility The Motorola Wireless USB Adapter Configuration Utility window is displayed 2 Click the Information tab The Information tab provides the firmware version number and hardware and software details about the Motorola Wireless USB Adapter ...
Страница 40: ...apter while the computer is operating To remove the adapter 1 Locate the device eject icon located in your system tray In the illustration below it is the third icon from the left the picture of a card and a left pointing arrow 2 Double click the device eject icon The Unplug or Eject Hardware window is displayed ...
Страница 41: ... to remove 4 Click Stop The Stop a Hardware device window is displayed 5 Confirm that the device listed in the window is the device you want to stop 6 Click OK After you receive a message telling you the device is stopped you can safely remove the Wireless USB Adapter ...
Страница 42: ...network Ensure that both your computer and wireless access point are powered on Ensure that your wireless USB adapter is installed correctly and is active Ensure that your wireless USB adapter and access point radio signals are enabled Review your access point s documentation for further instructions Ensure that your wireless USB adapter for your computer and the wireless access point have the sam...
Страница 43: ...type cmd Or navigate using your Start button to Programs Accessories Command Prompt 3 In the Command window type ipconfig You should see an IP address for your adapter for example Ethernet Adapter Local Area Connection Connection specific DNS Suffix Example example example com IP Address 192 168 10 10 Subnet Mask 255 255 255 0 Default Gateway 192 168 10 1 4 If using a router at home in the Command...
Страница 44: ...outer Refer to the instructions provided with your modem router If you receive a reply For example Reply from 216 109 125 72 then your connection to the Internet is live If you do NOT receive a reply repeat steps 1 5 on a different computer to verify that the first computer is not the cause of the problem 6 If you cannot determine your ISP s default gateway ping www yahoo com or another known web ...
Страница 45: ...on session The clients communicate directly to each other and not through an established such as through a router Also known as IBSS Independent Basic Service Set ASCII The American Standard Code for Information Interchange refers to alphanumeric data for processing and communication compatibility among various devices normally used for asynchronous transmission B Bandwidth The transmission capaci...
Страница 46: ...s LAN a client is any host that can communicate with the access point Also called a CPE A wireless client is also called a station Also see server Coaxial Cable A type of cable consisting of a center wire surrounded by insulation and a grounded shield of braided wire The shield minimizes electrical and radio frequency interference Coaxial cable has high bandwidth and can support transmission over ...
Страница 47: ...la com to IP addresses A DNS server contains a table matching domain names such as Internetname com to IP addresses such as 192 169 9 1 When you access the world wide web a DNS server translates the URL displayed on the browser to the destination website IP address The DNS lookup table is a distributed Internet database no one DNS server lists all domain name to IP address matches Domain Name A un...
Страница 48: ... Generic Token Card EAP LEAP Extensible Authentication Protocol Lightweight Extensible Authentication Protocol is an authentication implementation of 802 1X by Cisco which provides a challenge response authentication mechanism and dynamic WEP key assignment EAP PEAP Extensible Authentication Protocol Protected EAP is an authentication protocol that requires certificate based RADIUS server authenti...
Страница 49: ...rated by a device to inform an operator or the network management system that something has occurred F Firewall A security software system on some devices that enforces an access control policy between the Internet and the LAN for protection Firmware Code written onto read only memory ROM or programmable read only memory PROM Once firmware has been written onto the ROM or PROM it is retained even ...
Страница 50: ... computer I ICMP Internet Control Message Protocol is a protocol used for error problem and informational messages sent between IP hosts and gateways ICMP messages are processed by the IP software and are not usually apparent to the end user IEEE The Institute of Electrical and Electronics Engineers Inc http www ieee org is an organization that produces standards technical papers and symposiums fo...
Страница 51: ...he most widely used LAN standard LEAP Lightweight Extensible Authentication Protocol LEAP is an authentication implementation of 802 1X by Cisco which provides a challenge response authentication mechanism and dynamic WEP key assignment M MAC Address The Media Access Control address is a unique 48 bit value permanently saved in the ROM at the factory to identify each Ethernet network device It is ...
Страница 52: ...ss Translation is an Internet standard for a LAN to use one set of IP addresses for internal traffic and a second set of IP addresses for external traffic NAT provides some security because the IP addresses of LAN computers are invisible on the Internet Network Two or more computers connected to communicate with each other Networks have traditionally been connected using some kind of wiring NIC A ...
Страница 53: ...ort other protocols typically for simple links over serial lines It is most commonly used to access the Internet with a dial up modem PPPoE Point to Point Protocol over Ethernet Used by many DSL Internet Service Providers for broadband connection PPTP Point to Point Tunneling Protocol encapsulates other protocols It is a new technology to create VPNs developed jointly by several vendors Private IP...
Страница 54: ...er AP seamlessly ROM Read Only Memory Router On IP networks a device connecting at least two networks which may or may not be similar A router is typically located at a gateway between networks A router operates on OSI network layer 3 It filters packets based on the IP address examining the source and destination IP addresses to determine the best route on which to forward them A router is often i...
Страница 55: ...hat is permanently assigned to a host Normally a static IP address must be assigned manually The opposite of Dynamic IP Address Station IEEE 802 11b term for wireless client Subscriber A user who accesses television data or other services from a service provider Subnet Mask A methodology that determines what the router will examine for the destination of an IP address A router delivers packets usi...
Страница 56: ...packet is understood by each endpoint or tunnel interface where the packet enters and exits the network VPNs rely on tunneling to create a secure network Tunneling requires the following protocol types A carrier protocol such as TCP used by the network that the data travels over An encapsulating protocol such as IPSec L2F L2TP or PPTP that is wrapped around the original data A passenger protocol s...
Страница 57: ...ure and fast connection usually to users working remotely at home or in small branch offices A VPN connection provides security and performance similar to a dedicated link for example a leased line but at much lower cost W WAN A wide area network provides a connection over a large geographic area such as a country or the whole world The bandwidth depends on need and cost but is usually much lower ...
Страница 58: ... WU830G WLAN Wireless LAN WPA Wi Fi Protected Access A security regimen developed by IEEE for protection of data on a WLAN WWW World Wide Web An interface to the Internet that you use to navigate and hyperlink to information ...
Страница 59: ...MGBI 512708 001 03 04 Visit our website at www motorola com broadband consumers ...