background image

 

15 

Ad Hoc: 

This mode enables interconnecting of wireless adapters without the 

presence of an AP or Router. 

Ø 

Encryption: 

There are four items for selection: Disable, WEP, TKIP, and AES. You 

can configure the encryption method based on the settings in the 

Encryption 

Setting

 field. 

Ø 

Authentication mode:

 

Auto: 

Auto switching of the authentication mode depends on the one adopted on 

wireless network that the USB adapter is connected to.     

Open system: 

In this mode, wireless stations directly associate with the access 

point without any authentication (null authentication). You can decide whether to 

employ WEP data encryption. 

Shared  key: 

In  this  mode,  wireless  stations  communicate  with  the  Access  Point 

using  the  identical  WEP  key  settings  for  authentication  and  data  encryption.  It 

always combines with WEP data encryption. 

Ø 

Change/Apply: 

Click 

Change

 will enable you to configure the parameters in the 

General Connection Setting

 field. Meanwhile, it will turn into 

Apply

 for you to 

confirm the modified settings.

 

Encryption Setting: 

You can enable/disable WEP and WPA encryption within the 

wireless network. Please refer to the Section 3.3 for detailed descriptions. 

Profile:

 

Ø 

Profile Name: 

You can save the network settings as a profile file by assigning it a 

name. 

Ø 

Load: 

Load the settings from the specified profile file in the 

Profile name

 list. The 

new settings will take effect immediately. 

Ø 

Save Current:

 Enter a profile name and click this to write the current settings to a 

profile file in the 

Profile name

 list. 

Ø 

Delete: 

Delete the profile you have selected.

 

Other: 

Ø 

Advanced Setting: 

Click this for more advanced setting. Please refer to the 

Section 3.4 for detailed descriptions.

 

Ø 

Information: 

To view the basic information of WL-U356. Please refer to the Section 

3.5 for detailed descriptions.

 

3.3 WEP and WPA Encryption 

3.31 WEP Setting 

WEP is both a data encryption method and an authentication mechanism, which ensures 

authenticated user access and secures data transfer on the wireless network. To implement WEP, 

the Authentication type and the WEP key format, length and ID must be identical on the AP and 

client side. WL-U356 supports 64/128/256-bit Hex/ASCII WEP encryption. 

Содержание WL-U356

Страница 1: ...802 11g Wireless USB 2 0 Adapter WL U356 User s Manual...

Страница 2: ...limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipmen...

Страница 3: ...Equipment As of April 8 2000 Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric sh...

Страница 4: ...tion Considerations 5 CHAPTER 2 INSTALLATION PROCEDURE 6 2 1 Configuration Utility Installation 6 2 2 Driver Installation 9 CHAPTER 3 CONFIGURATION UTILITY 12 3 1 Wireless Connection Status 12 3 2 Mor...

Страница 5: ...ables or in constant need of wireless access 1 1 Features l 2 4GHz ISM band unlicensed operation l Wireless connectivity without the hassles and cost of running cables l IEEE 802 11b g standard compli...

Страница 6: ...ability choosing an available radio channel with less interference is highly recommended Proper Access Point positioning combined with a clear radio channel will greatly enhance performance Ad Hoc Sti...

Страница 7: ...E mail file transfer and terminal service 2 Difficult to wire environments Historical or old buildings public occasions venues and open area where it is difficult to wire 3 Frequently changing environ...

Страница 8: ...Built in utility or Windows XP Server 2003 Wireless Zero Configuration utility STANDARDS COMPLIANCE Electromagnetic Compatibility FCC CE 1 4 Package Contents Before installation please check the item...

Страница 9: ...ts and clients is minimized l Building materials make a difference A solid metal door or aluminum studs may have a negative effect on signal coverage range Try to properly position Access Points and c...

Страница 10: ...stallation operates under Window XP The procedure also applies to Windows 98SE ME 2000 Server 2003 Note If you had ever installed the other Wireless Cards before please uninstall the existed drivers a...

Страница 11: ...y WL U356 setup exe where E is your CD ROM drive C You may click Browse to specify the destination folder you prefer for the installation of utility Otherwise you can keep the default setting and clic...

Страница 12: ...operating system is Windows XP Server 2003 the below window will pop up Please select Continue Anyway to continue Note If your operating system is Windows 2000 the below window will pop up Please choo...

Страница 13: ...98SE Windows will automatically detect and install the device and ask you to insert the system installation CD to complete the entire procedure Just click Yes to continue A Insert WL U356 into a vacan...

Страница 14: ...e the card has been tested thoroughly to verify the compatibility Note If your operating system is Windows 2000 the below window will pop up Please click Yes to continue D When the driver is installed...

Страница 15: ...11...

Страница 16: ...g icon in the system tray and then click Advanced in Wireless Network Connection window Uncheck Use Windows to configure my wireless network settings and click OK to exit If your operating system is W...

Страница 17: ...eless network which WL U356 is connected to The information includes Channel Type SSID TX Rate and Encryption settings Please refer to the section 3 2 for detailed descriptions of each item u More Set...

Страница 18: ...parameter is not configurable in the Infrastructure mode Tx Rate Shows the Data Transfer Rate There are Auto 1 2 5 5 11 6 9 12 18 24 36 48 54Mbps for selection If the Auto Mode is selected the device...

Страница 19: ...ified settings u Encryption Setting You can enable disable WEP and WPA encryption within the wireless network Please refer to the Section 3 3 for detailed descriptions u Profile Profile Name You can s...

Страница 20: ...CII values as the encryption keys For example 01234567890123456789abcdef 256 bit Enter 58 digit Hex values or 29 digit ASCII values as the encryption keys u Change Apply Click Change enables you to co...

Страница 21: ...preconfigured by the network administrator User name It is the setting for PEAP protocol Password It is the setting for PEAP protocol u Pre shared key It is used for WPA PSK mode Enter 8 to 63 charact...

Страница 22: ...the associated AP automatically User Select Users can select the country where they are located The available channels will vary based on the selected country u Power Consumption Setting Continuous A...

Страница 23: ...your wireless network However its implementation will cause additional overhead to your wireless network 3 5 Information This screen shows the current driver and utility version and the MAC Address of...

Страница 24: ...frames of the AP 3 7 Access Point Setting You can enter this screen by clicking the More Setting button Here you can configure the AP connection settings such as Channel Basic Rate SSID Tx Power WEP A...

Страница 25: ...length 64 128 256 bit and ID 1 4 must be identical on the AP and client side The AP supports 64 128 256 bit Hex ASCII WEP encryption About detailed descriptions please refer to the Section 3 3 u Auth...

Страница 26: ...ifies only wireless stations with the MAC addresses preconfigured in the below list will be denied access After finishing the setting press the Apply button to make the new setting into effect Filter...

Страница 27: ...ile users What is BSS ID An Infrastructure network is called a Basic Service Set BSS All the wireless stations in a BSS must share the same BSS ID What is TKIP It is another encryption method to overc...

Страница 28: ...of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being b...

Отзывы: