LevelOne FreeCon WNC-0300 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung LevelOne FreeCon WNC-0300 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von LevelOne FreeCon WNC-0300, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung LevelOne FreeCon WNC-0300 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung LevelOne FreeCon WNC-0300. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung LevelOne FreeCon WNC-0300 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts LevelOne FreeCon WNC-0300
- Den Namen des Produzenten und das Produktionsjahr des Geräts LevelOne FreeCon WNC-0300
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts LevelOne FreeCon WNC-0300
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von LevelOne FreeCon WNC-0300 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von LevelOne FreeCon WNC-0300 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service LevelOne finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von LevelOne FreeCon WNC-0300 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts LevelOne FreeCon WNC-0300, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von LevelOne FreeCon WNC-0300 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    LevelOne W N C-0300 11g Wireless PC I Adapter User’s Manual Version 2.0[...]

  • Seite 2

    Manufacturer's Disclaimer Statement The information in this document is subject to change withou t notice and does not represent a commitment on the part of the vendor . No warr anty or representation, either expressed or implied, i s made with respect to the quality , accurac y or fitness for any particular purpose of this docume nt. The manu[...]

  • Seite 3

    Contents 1. Introduction ............................................................................................................ 3 1.1 Product Feature .......................................................................................... 3 1.2 System Requirement ..............................................................................[...]

  • Seite 4

    1. Introduction 1.1 Product Featur e ● Compliance with IEEE 802.11g and 802.11b standards ● Highly efficient design mechanism to provide unbeatable performance ● Achieving data rate up to 54Mbps for 802.11g and 11Mps for 802.11b with wide range coverage; high performance to de liver up to 108Mbps raw data rate for 802.11g ● Strong network s[...]

  • Seite 5

    2.2 Install the WNC-0300 11g W i r e less Network PC I Adapter 2.2.1 Utility Installation 1. Before insert PC I Adapter into the PC I slot of your co m puter, please install the Utility Prog r am f i rst. Make sure that the LevelOne 11g wirel e ss Network PC I Adapter is NOT inserted into the PCI slot. NOTE: all the snapped images of installa tion [...]

  • Seite 6

    3. InstallShield Wizard will au tomatically start. Please c lick “Next” to continue. 5[...]

  • Seite 7

    6[...]

  • Seite 8

    7 4. Please click “Finish” NOW. 1. T u r n o f f y o ur com p ute r , a n d rem o v e t h e power cord from y o ur PC. 2. Open up the c o ver of y our P C . 3. R e m o ve the PCI slot c o ver from PC case. 4. Insert the 11g Wireless Network PCI Adapter into the empty PCI slot. 5. Place the computer case back on and plug the power cord. 6. Tu r [...]

  • Seite 9

    2. Please click “Continue Anyway” 8 2.2.2 Driver Installation 1. Please select the first option and click “Next”.[...]

  • Seite 10

    4. T o make sure if the installation is successful, you coul d check it through the device management. 9 3. Please click “Finish”[...]

  • Seite 11

    5. Once the installation is successful, a utility program icon will show on your desktop. T o lunch the utility , just double click the icon. 3. Configuration 3.1 Link Information The default page is as below after you lau nch the Utility program. Status: Shows the BSSID associated, which can be used to identify the wireless network. SSID: Shows cu[...]

  • Seite 12

    Frequency: Shows the current frequency used for wireless network. Wireless Mode: Shows the current wireless m o de used for wireless communication. Encryption: Shows the current encryption m ode used for wireless network. TxRate: Shows the current data rate used for trans m itting. Channel: Shows the current channel for com m unication. Link Quali [...]

  • Seite 13

    Wireless Mode: There are two types available for selection ● Infrastructure – to establish wireless communication with LAN and other wireless clients through the use the Access Points. ● Ad-Hoc – to establish point-to-point wi reless communication di rectly with other wireless client devices such as wireless network PCI Adapter. AdHoc Band:[...]

  • Seite 14

    3.3 Advanced This is the page where you configure S ecurity settings of your 108Mbps wireless LAN P C I Adapter Encryption: 4 options are available: Disable , Enable , WPA and WPA-PSK . Select Enable or Disable for WEP data encryption featur e. If one of the two options is selected, it is required to select the Authentication mode from the next dro[...]

  • Seite 15

    If WPA is selected, configuration is enabled. Please click the configuration. The below window is pop up. Then, please select the certificate that you like to use and enter the server name and login name If WPA-PSK is selected, click the conf iguration button. The popping window is as the below. Please enter the key.(the character length is 8 ) Aut[...]

  • Seite 16

    The following will only be activated to allow for configuratio n when Encryption is enabled. Default Key: select one of the 4 keys to use. Network Key : enter values to these fields, eith er in HEX or ASCII formats. You only have to enter the key that you will use Key Length : select 64 or 128 bits as the length of the keys Key Format: ASCII or HEX[...]

  • Seite 17

    Profile – You can create and manage the created profiles for Hom e, offices or public areas. By double-clicking on one of the create d profile, the setting will adapt to the configuration such as SSID, channel, a nd WEP settings saved by that particular profile. Remove : To remove the selected the prof ile Properties: To view and change its setti[...]

  • Seite 18

    ● Maxi m u m Power Save – the device con s u m es the least power and only operates when there is wire less network activity. ● Power Save – the device consu m es the m oderate level of power ● Data Encryption – for WEP data encryption feature. If one of the two options is selected, it is required to select the Authentication mode from [...]

  • Seite 19

    3.5 About US T h is page displa y s some i n f orma t ion abo u t t h e 108 M pbs w i reless L A N PC I Adapter u t ili t y , which includes th e version numbers for Driv er, Firmware and Utility . When th ere is new version of software availab le for upgrade, you will be able to ident ify by version numbers. 4. Glossary Access Point: An internetwo[...]

  • Seite 20

    two formats that you can use for entering the values for WEP key. It represents English letters as numbers from 0 to 127. Authentication Type: Indication of an authentica tion algorithm which can be supported by the Access Point: 1. Open System: Open System authentica tion is the sim plest of the available authentication algorithm s. Essentially it[...]

  • Seite 21

    amount of time before retrying. If the netw ork is quiet and two devices access the line at exactly the same tim e, th eir signals collide. When th e collision is detected, they both back off and wait a random amount of time before retrying. DHCP: Dynamic Host Configuratio n Protocol, which is a prot ocol that lets network administrators manage and[...]

  • Seite 22

    heavy interference caused by th e big size of transmission fram e. But if the frame size is too small, it will create the overhead during th e transmission. Gateway : a device that interconnects networ ks with different, incompatible communication protocols. HEX: Hexadecimal, HEX, consists of number s from 0 – 9 and letters from A – F. IEEE: Th[...]

  • Seite 23

    PSDU: PLCP service data unit Roaming: A LAN mobile user moves around an ESS and enjoys a continuous connection to an Infrastructure network. RTS: R equest T o S end. An RS-232 signal sent f rom the transm itting station to the receiving station requesting permission to transmit. RTS Threshold: Transmitters contending for the m edium may not be awar[...]

  • Seite 24

    WNC-0300 Appendix Appendix A Networking Basis ...........................................25 Appendix B 802.1X Authentication Setup ...........................38[...]

  • Seite 25

    [...]

  • Seite 26

    25 Go to Start menu > Control Panel > Network Connections In the menu on the left side of the window , select “ Set up a home or small office network ” Click “ Next ” to procced Click “ Next ” to continue APPENDIX A : NETWORKING BASIS This chapter will help you learn the basics of home netw orking. Using the Windows XP Network Set[...]

  • Seite 27

    26 1. Enter a short description for your computer . 2. Enter a name for y o u r c o m p u t e r t o b e recognized among the network. 3. Click “ Next ” to continue. Select the option that best describes how you connect your computer to the Internet. In the case of using router in the network, choose the second option. Click “ Next ” to cont[...]

  • Seite 28

    27 Enter “ Workgr oup name ” for your home network. Click “ Next ” to continue” Click “ Next ” and wait for the wizard to apply the settings.[...]

  • Seite 29

    28 Yo u m a y c r e a t e a network setup disk which saves you the trouble of having to configure every PC s in your network. Select the first choice, and insert a floppy disk into you r disk drive Click “ Next ” to continue.[...]

  • Seite 30

    29 Click “ Forma t Disk ” if you wish to format the disk. Click “ Next ” to copy the necessary files to the disk. Click “ Next ” to continue with the Network Setup Wizard[...]

  • Seite 31

    30 NOTE: Now you ma y use the Network Setup Di sk you just created in any PCs in your network that you wish to setu p. Simply insert the Network Setup Disk into t he disk drive of a PC, and open to browse the conte nt of the disk with “My Computer” or “Windows File Man ager” . Double-click and run the file “netsetup” f or the program to[...]

  • Seite 32

    31 Checking IP Address of Your Computer in Windows XP Sometimes you will need to know the IP address of th e computer that you are using. For example, when you w ant to make sure that your computer is in the same network domain as that of your Access Point for you can configure and access the AP . When the command prompt window appear s, type comma[...]

  • Seite 33

    32 If the IP address is assigned by DHCP se rver o n the network, there are chances you might have to release the IP and acquire it from DHCP server again. Here is how you do it. T ype command, “ipconfig /renew” in the co mmand prompt window a nd press Enter . This command releases the cu rrent IP address and acquire it from th e network, i.e. [...]

  • Seite 34

    33 Dynamic IP Address V.S. Static IP Address By definition Dynamic IP addresses are the IP addresses that are being automatically assigned to a network devi ce on the network. These dynamically assigned IP addresses will expire and may be changed o ver time. Static IP addresses are the IP addresses th at users manually enter for each of the network[...]

  • Seite 35

    34 Dynamically Assigned IP Address Static IP Address The TCP/IP Properties window appears. Select “ Obtai n an I P addr ess automatically ” if you are on a DHCP enabled network. Click “ OK ” to close the window with the changes made Select “ Use the following IP address ” Enter the IP addre ss and subnet mask fields. Enter the IP addres[...]

  • Seite 36

    35 NOTE: The IP address must be within the same r a nge as the wireless route or Access P oint. Wireless Network in Windows 2000 The TCP/IP Properties window appears. Select “ Obtain an IP address automatically ” if you are on a DHCP enabled network. Click “ OK ” to close the window with the changes made Go to Start menu > Settings > [...]

  • Seite 37

    36 Wireless Network In Wind o ws 98 SE and Windows M E Go to Start menu > Settings > Control Panel > Doubl e-click on Network Select TCP/IP of the network device Click “ Properties ” to continue Select “ Use the following IP address ” Enter the IP addre ss and subnet mask fields. Enter the IP address of the Router in the Default ga[...]

  • Seite 38

    37 The TCP/IP Properties window appears. Select “ Obtain an IP address automatically ” if you are on a DHCP enabled network. Click “ OK ” to close the window with the changes made Select “ Specify an IP address ” Enter the IP addre ss and subnet mask fields. In the DNS Configuration Ta b Page, (1 ) enter the IP address o f the Ro uter i[...]

  • Seite 39

    38 APPENDIX B : 802.1x Authentication Setup There are three essential components to th e 802.1x infras tructure: (1) Suppl icant, (2) Authenticator and (3) Server . The 802. 1x security supports both MD5 and TLS Extensive Authentication Protoco l (EAP ). The 802.1x Authentication is a complement to the current WEP encryption used in wireless networ[...]

  • Seite 40

    39 infrastructure, each of these wireless client s would have to be authenticated by the Radius serv er , which would grant the author ized client and notified the Access P oint to open up a communi cation port to be used for the gr anted client. There are 2 Extensive A uthentication Protocol (EAP) methods supporte d: (1) MD5 and (2) TLS . MD5 auth[...]

  • Seite 41

    40 Supplicant: Wireless Network PC Card Here is the setup for the Wireless Network PC Card under Windows XP , which is the only Operating S ystem that our driver supports for 802.1x. Microsoft is planning on supporting 802.1x securi ty in all common Windows Op er ating System including Win98SE/ME/2000 by releasing Service P ack in 2003. P l ease n [...]

  • Seite 42

    41 5. Click on the “ Wireless Network ” tab. 108 M b p s Hi g h S pe e d Ne t w ork Adapter[...]

  • Seite 43

    42 6. Click “ Properties ” of the available wireless network, which you wish to connect or configure. Please note that if you are goin g to ch ange to a different 802.1x authenticati on EAP method, i. e. switch from u sing MD5 to TL S, , you must remove the current existing wireless netw ork from your Preferred network s first, and add it in ag[...]

  • Seite 44

    43 TLS Authentication 7. Select “ The key is provided for me automatically ” option 8. Click “ OK ” to close the Wireless Ne twork Properties window .[...]

  • Seite 45

    44 9. Click “ Authentication ” tab 10. Select “ Enable network access control using IEEE 802.1x ” option to enable 802.1x authentication. 11. Select “ Smart Card or other Certificat e ” from the drop-down list bo x for EAP type. 12. Click “ OK ” to close the Wireless Network Co nnection Properties window, thus make the changes e ffe[...]

  • Seite 46

    45 TLS Authentication – Download Digital Certificate from Server In most corporations, it requires internal IT or MIS staff ’s help to have the certificated downloaded to your local comp uter . One of the main reasons is that each corporation uses its own server systems, and you will need t he assistance from your IT or MIS for account/password[...]

  • Seite 47

    46 16. Now we are connecte d to the Certificate Service. Select “ Request a certificate ” , and click “ Next ” to continue. 17. Select “ User Certificate request ” , and click “ Next ” to co ntinue.[...]

  • Seite 48

    47 18. Click “ Submit >” to continue. 19. The Certificate Service is now pr ocessing the certificate request.[...]

  • Seite 49

    48 20. The certificate is issu ed by the server , click “ Install this certif icate” to down load and store the certificate to your local computer . 21. Click “ Yes ” to store the certificate t o your local computer .[...]

  • Seite 50

    49 22. Certificate is now installed. All the configuration and certificate down load are now complete. Let ’ s try to connect to the Access P oint us ing 8 02.1x TLS Authentication. 23. Windows XP will prompt you to select a certificate f or wireless network connection. Click on the network con nection icon in th e system tray to continue.[...]

  • Seite 51

    50 24. Select the certificate that was issued by the server (WirelessC A), and click “ OK ” to continue. 25. Check the server to make sure that it’s the serv er that issu es certificate, and click “ OK ” to complete the authenticati on process.[...]

  • Seite 52

    51 MD5 Authentication 26. Select “ Dat a encryption (WEP enabled) ” option, but leave othe r option unselected. 27. Select the key format that y ou wa nt to use to k ey in your Network ke y . ASCII characters: 0 ~9, a~z and A~Z HEX char acters: 0~9, a~f 28. Select the key length that you wish to use 40 bits (5 char acters for ASCII, 10 char act[...]

  • Seite 53

    52 30. Click “ OK ” to close the Wirele ss Network Properties window , thus make the changes effective. 31. Select “ Authentication ” tab. 32. Select “ Enable network access control using IEEE 802.1X ” to enable 802.1x authentication. 33. Select “ MD-5 Challenge ” from the drop-down list bo x for EAP type. 34. Click “ OK ” to cl[...]

  • Seite 54

    53 Unlike TLS, which uses digit al certificat e for validation, the M D-5 Authentication is based on the user account/password. Ther efore, you must have a valid account used by the server for validation. 35. WindowsXP will prompt y ou to enter y our user name and password. Click on the network connection icon in the system tr ay to continue. 36. E[...]

  • Seite 55

    54 Authenticator: Wireless Network Access Point This is the web page conf iguration in the Access Point that we use. 1. Enable 802.1x secu rity by selecting “ Enable ”. 2. If MD5 EAP methods is used then you can skip step 3 and go to step 4. 3. Select the Encryption Key L ength Size rang ing from 64 to 256 Bits tha t you would like to use. Sele[...]

  • Seite 56

    55 Radius Server: Window2000 Server This section to help those w ho has Windows 2000 Server installed an d wants to setup Windows2000 Server for 802.1x a uthen tication, which incl udes setting up Certificate Service for T LS Authentication, and en able EAP-methods. 1. Login into y our Windows 2000 Server as Administrator , or account that has Admi[...]

  • Seite 57

    56 5. Select “ Enterprise root CA ” , an d click “ Next ” to continue. 6. Enter the information th at you want for your Certificate Service, and click “ Next ” to continue.[...]

  • Seite 58

    57 7. Go to Start > Program > Administrative Tools > Certificate Authority 8. Right-click on the “ Policy Setting ” , select “ new ” 9. Select “ Certificate to Issue ” 10. Select “ Authenticated Session ” and “ Smartc ard Logon ” by holding down to the Ctrl key , an d click “ OK ” to continue.[...]

  • Seite 59

    58 11. Go to Start > Program > Administrative Tools > Active Direct ory Users and Computers . 12. Right -click on domain, and select ” Properties ” to continue. 13. Select “ Group Policy ” tab and click “ Properties ” to continue.[...]

  • Seite 60

    59 14. Go to “Computer Configur ation” > “Securi ty Settings” > “ Public Key Policies ” 15. Right-click “ Automatic Certificate Request Setting ” , and select “ New ” 16. Click “ Automatic Certificate Request ... ”[...]

  • Seite 61

    60 17. The Automatic Certificate Request Setup Wizard will guide you through the Automatic Certificate Request setup, simply click “ Next ” through to the last step. 18. Click “ Finish ” to complete the A utomatic Certificate R equest Setup 19. Go to Start > Run , an d type “ command ” an d click “ Enter ” to open Command Prompt.[...]

  • Seite 62

    61 Adding Internet Authentication Service 21. Go to Start > Control Panel > Add or Remove Program s 22. Select “ Add/Remove Windows Co mponents ” from th e panel on the left. 23. Select “I nternet Authentication Service ” , and click “OK” to install.[...]

  • Seite 63

    62 Setting Internet Authentication Service 24. Go to Start > Program > Administr ative T ools > Int ernet Authentication Service 25. Right-click “ Client ” , and select “ New Client ” 26. Enter the IP address of the Access P oint in the Client address text field, a memorable name for the Access P oint in the Client-Vendor text fiel[...]

  • Seite 64

    63 27. Click “ Finish ” to complete adding of the Access P oint. 28. In the Internet Authentication Service, right -click “ Remote Access Policies ” 29. Select “New Remote Access Policy” .[...]

  • Seite 65

    64 30. Select “ Day-And-Time-Restriction ” , and click “ Add ” to continue. 31. Unless you want to specify the active d uration for 802.1x authentication, click “ OK ” to accept to have 802.1x authen tication enabled at all times.[...]

  • Seite 66

    65 32. Select “ Grant remote access permission ” , and click “ Next ” to continue. 33. Click “ Edit Profile ” to open up[...]

  • Seite 67

    66 For TLS Authentication Setup (Steps 34 ~ 38) 34. Select “ Authentication ” T ab 35. Enable “ Extensible Authentication Prot ocol ” , and select “ Sm art Card or other Certificate ” for TLS authen tication[...]

  • Seite 68

    67 36. Go to Start > Program > Administr ative T ools > Active Directory Us ers and Computers 37. Select “ Users ” , and double-cl ick on the user that can be newly created or currently existing , who will be configured t o have the rights to obtain digital certificate remotely . Please note that in this case, we ha ve a user called, t[...]

  • Seite 69

    68 38. Go to the “ Dial-in ” tab, and check “ Allow access ” o ption for Re mote Access Permission and “ No Callback ” for Callback Options.[...]

  • Seite 70

    69 For MD5 Authentication (Steps 39 ~ 54) 39. Go to Start > Program > Administr ative T ools > Active Directory Us ers and Computers . 40. Right-click on the domain, and select “ Properties ” 41. Select “ Group Policy ” tab, and click “ Edit ” to edit the Group Policy .[...]

  • Seite 71

    70 42. Go to “Computer Configuration” > “W indo ws Settings” > “Security Setti ngs” > “ Account Policies” > “ Password Policies ” 43. Click “ Define this policy setting ” , select “ Enabled ” , and click “ OK ” to continue.[...]

  • Seite 72

    71 44. Go to Start > Program > Administr ative T ools > Active Directory Us ers and Computers . 45. Go to Users . Right-click on the user that yo u are granting access, and select “ Properties ” 46. Go to “ Account ” tab, and enable “ Store pas sword using re versible encryption ” 47. Click “ OK ” to continue.[...]

  • Seite 73

    72 48. Go to Start > Program > Administr ative T ools > Int ernet Authentication Service . 49. Go to Remote Access Policies 50. Make sure that MD 5 is moved up to Order 1 51. Right-click “ MD5 ” , and select “Properties”[...]

  • Seite 74

    73 52. Go to “ Authentication ” tab 53. Enable “ Extensible Authentication Prot ocol ” 54. Select “ MD5-Challenge ” for EAP type list.[...]