Abocom WU5205 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Abocom WU5205, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Abocom WU5205 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Abocom WU5205. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Abocom WU5205 should contain:
- informations concerning technical data of Abocom WU5205
- name of the manufacturer and a year of construction of the Abocom WU5205 item
- rules of operation, control and maintenance of the Abocom WU5205 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Abocom WU5205 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Abocom WU5205, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Abocom service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Abocom WU5205.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Abocom WU5205 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    802.11 b/g/n Micro Mini Wireless LAN USB2.0 Adapter User’s Manual[...]

  • Page 2

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable p rotecti on against harm ful interference in a residential installation. This equipm ent gener ates, uses and [...]

  • Page 3

    Country Code Statement For product available in the USA/Cana da market, only channel 1~ 11 can be operated. Selection of other channels is no t possible. To maintain compliance with FCC RF exposure requir ements, use only belt-clips, holsters or similar ac cessories that do not con tain metallic components in its assembly. The use of accessories th[...]

  • Page 4

    Table of Contents INTRODUCTION ................................................................................................... 1 F EATURES .............................................................................................................. 1 Windows 2000/XP In stallati on ...............................................................[...]

  • Page 5

    WPS ......................................................................................................... 30 Radio On /Off ........................................................................................... 33 About ....................................................................................................... 34 U TILITY M ENU [...]

  • Page 6

    S OFT AP MODE ..................................................................................................... 68 Config ...................................................................................................... 68 Access Cont rol......................................................................................... 71 MAC Table [...]

  • Page 7

    - 1 - INTRODUCTION The WU5205 is an IEEE802.11b /g/n USB adapter th at connects your notebook to a wireless local area. T he WU5205 fully complies with IEEE 802.11n draft 3.0 and IEEE 802.11 b/ g standards, delivers reliable, cost-effective, feature rich wireless connectiv ity at high throughput from an extended distance. The WU5205 is a very small[...]

  • Page 8

    - 2 - Windows 2000/XP Installation Install the Software Caution ! Do not insert the wireless card i nto your comput er until the In stallShield Wizard finish installing. 1. Exit all Windows programs. Insert the included CD-ROM into your computer. The CD-ROM will run automatically. 2. When the License Agreement screen appea rs, please read the conte[...]

  • Page 9

    - 3 - 3. Select the check box to choose a Configuration Tool from the listed two choices. z Configuration Tool : Choose to use our configuration utility. z Microsoft Zero Configuration Tool : Choose to use Windows XP’s built-in Zero Configuration Utility (ZCU). Click Next to conti nue. 5. When y ou are prom pted the f o llowing message, please cl[...]

  • Page 10

    - 4 - 6. When the following sc reen appears, click Finish to com plete the software installation.[...]

  • Page 11

    - 5 - Install the Hardware Note : Insert the Wireless USB card when you finished your software installation. Insert the USB Adapte r into the USB Port of your computer. The system will automatically detect the new h ardware.[...]

  • Page 12

    - 6 - Windows Vista Installation Install the Software Do not insert the wireless LAN adap ter into your comput er until the procedures in “ Driver& Utility I nstallation” have been p erformed. 1. Insert the included CD-ROM into the CD-ROM drive of your computer. 2. When the M ain Menu scree n appears, cli ck “ Driver & Utility Install[...]

  • Page 13

    - 7 - 4. When y ou are prom pted the f o llowing message, please click Install to begin the installation . 5. When the fo llowing screen app ears, c lick Finish to complete the software installation.[...]

  • Page 14

    - 8 - Install the Hardware Note : Insert the Wireless USB card when you finished your software installation. Insert the USB Adapter into the USB Port of your computer. The system will automatically detect the new h ardware. Verification To verify if the device exists i n y our computer and is en abled, go to Start > Control Panel > Sy ste m &[...]

  • Page 15

    - 9 - NETWORK CONNECTION IP Address Note : When assigning IP Addresses to the computers on the net work, remember to have the IP address for each computer set on the same subnet mask. If your Broadband Router use DHCP technology, however, i t won’t be necessary for you to assign Static IP Address for yo ur computer. 1. To configure a dynamic IP a[...]

  • Page 16

    - 10 - UTILITY CONFIGURATION FOR WINDOWS 2000/XP After the Wireles s adapter has be en successfully i nstalled, users can use the included Configuration Utili ty to set their preference. Go to Start J (All) Program J Intelligent Wireless J Intellige nt Wireless Utility . You can also open th e Configuration Utility by double clicking the icon or ri[...]

  • Page 17

    - 11 - Station Mode Notice: Under screen resolution 800 x 600 pix els, click the tr iangle button at the right down corner of the utility to expand the information of the station, the information will not be displayed completely. Profile Profile can book keep ing your favorite wireless setting among yo ur home, office, and other public hot-spot. Yo[...]

  • Page 18

    - 12 - Network Ty pe Shows the network type of the device, including Infrastructure and Ad-Hoc. Authentication Shows the authentication m ode. Encryption Shows the encryption type. Use 802.1x Whether or not use 802.1x featur e. Tx Power Transmit power, the amount of power used by a r adio transceiver to send the signal out. Channel Shows the select[...]

  • Page 19

    - 13 - SSID : The SSID is the unique name shared among all points in your wireless netw ork. The name must be identical for all devices and poin ts attempting to connect to the same network. User can use pull-down menu to select from avail able APs. Power Save Mod e : • CAM (Constantly Awake Mode) : When this m ode is selected, the power supply w[...]

  • Page 20

    - 14 - Preamble type into Auto or Long . RTS Threshold : User can adjust the RTS threshold number by sliding the bar or key in the value d irectly. The default value is 2347. RTS/CT S Threshold is a mechanism implemented to prevent the “ Hidden Node ” problem. If the “Hidden Node” problem is an issue, users have to specify the pack et size.[...]

  • Page 21

    - 15 - need to be set to the same auth entication type. • Shared : Shared key is when b oth the sender and the recipient share a secret key. • LEAP: Light Extensible Auth entication Protocol. It is an EAP authentication type use d primarily in Cisco Aironet WLANs. It encrypts da ta transmissions using dynamically genera ted WEP keys, and suppor[...]

  • Page 22

    - 16 - 802.1x Setting : When user use radius server to authenticate client c ertificate for WP A authentication mode (WPA authentication do not support EAP Method- MD5-Challenge). 802.1x tab: EAP Method : • PEAP : Protect Extensible Authentic ation Protocol. PEAP transport securely authentication data by using tunnelling between PEAP clients and [...]

  • Page 23

    - 17 - authentication and can be used to d ynamically generate user-based and session-based WEP keys to secure subsequent com munications between the WLAN client and the access point. • TTLS : Tunnelled Transport Layer Security. This security method provides for certificate-based, mutual authentication of the client and network through an encrypt[...]

  • Page 24

    - 18 - • Tunnel Passwor d : Password for tunnel. Session Resumption : Reconnect the signal while broken up, to reduce t he packet and im prove the transmitting speed. User can cli ck the box to enable or disable this function. IDPASSWORD tab: ID/ PASSWORD : Identity and password for server. • Authentication ID / Password : Identity, password a[...]

  • Page 25

    - 19 - authentication. OK : Click to sa ve settings and exit th is page. Cancel: Click to call of f the settings and ex it. Server Certification tab : Use certificate ch ain : Choose use server that issuer of certificates. Allow intimidate certificat es : It must be in the server certificate chain between the server c ertificate and the server spec[...]

  • Page 26

    - 20 - Network The Network page displays the informa tion of surrounding APs from last scan result. The tab lists the information including SSID, Network type, Channel, Wireless mode, Security-Enabled and Signal. Network Tab Sorted by Indicate that AP list are so rted by SSID, Channe l or Signal. Show dBm Check the box to show the dBm of the AP lis[...]

  • Page 27

    - 21 - Connect Select an item on the list and then cl ick to make a connection. AP Informati on When you double click on the intended AP, you can see AP's detail information that divides into four parts . Th ey are General, WPS, CCX and 802.11n information. The introdu ction is as following: General General information contain AP's SSID, [...]

  • Page 28

    - 22 - Authentication Type : There are four t ypes of authentication modes supported by RaConfig. They are Open, Shared, W PA-PSK and WPA s ystem. Encryption Ty pe : For Open and Shared authentic ation mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-P SK authentication mode, the encryption type supports both[...]

  • Page 29

    - 23 - CCX information contains CCKM, Cmic and Ckip information. Close : Click this button to exit the information sc reen. 802.11n This tab will show up if you select the AP that support 11n mode. Here shows the c onnected AP 802.11n related information. Link Status Click the triangle button at the right dow n corn er of the windows to expand the [...]

  • Page 30

    - 24 - Link Status Tab Status Shows the current connect ed AP SSID and MAC address. If there is no conn ection existing, it will show Disconnected. Extra Info Shows the link status and Tx power per centage. Channel Shows the current channel in use. Authentication Authentication mode used withi n the network, including Unknown, WPA-PSK, WPA2-PSK, WP[...]

  • Page 31

    - 25 - Network Ty pe Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network. IP Address Shows the IP address information. Sub Mask Shows the Subnet Mask information. Default Gateway Shows the default gateway information. Link Quality Shows the connection quality based on signal strength and TX/RX packet error rate. Signal Strength 1 S[...]

  • Page 32

    - 26 - Advanced Tab Wireless mode Here supports 2.4G (include d 80 2.11b/g/n) wireless mode. Enable TX Burst Check to enable this function. This function en ables the adapter to deliver better throughput during a period of time, it only takes effect when connecting with the AP that supports this function. Enable TCP Window Size Check to increase th[...]

  • Page 33

    - 27 - Apply Click to apply above settings. Statistics The Statistics screen disp lays the s ta tistics on your curren t network settings. Transmit Frames Transmitted S uccessfully Shows information of frames successfully sent. Frames Retransmitted Successfu lly Shows information of frames successfully sent with one or more reties. Frames Fail To R[...]

  • Page 34

    - 28 - Receive Statistics Frames Received S uccessfully Shows information of frames Received Successfully. Frames Received With CRC Error Shows information of frames received with CRC error. Frames Dropped Due To Out-of-Resource Shows information of fr ames dropped due to resource issue. Duplicate Frames Rece ived Shows information of frames receiv[...]

  • Page 35

    - 29 - WMM Enable Check the box to enab le Wi-Fi Multi-Media function that is meant to improve audio, video and voice applications transm itted over Wi-Fi. WMM- Power Save Enable Select which ACs you want to enable the power saving mode. AC_BK (Access Category Background) AC_BE (Access Category Bes t Effort) AC_VI (Access Category Video) AC_VO (Acc[...]

  • Page 36

    - 30 - Apply Click this button to apply the settings. Tear Down Select a direct li nk STA, then click "Tear Down" button to disconnect the STA. WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Sim ple Configuration) is to simplify the se curity setup and mana geme nt of Wi-Fi networks. The STA as an Enrollee or external R egistrar sup[...]

  • Page 37

    - 31 - network. List information included Authentication T ype, Encryption Type, Config Method s, Device Password ID, Selected Registr ar, State, Versio n, AP Setup Lock ed, UUID-E and RF Bands. PIN Code 8-digit numbers. It is required to enter PIN Code into Registrar when using PI N method. When STA is Enrollee, you can us e "Renew" butt[...]

  • Page 38

    - 32 - BSSID : The MAC address of th e connected AP. F ixed and cannot be changed. Authentication Type : The authentication type support Open, WPA-PSK and WPA2-PSK. Encryption Ty pe: For Open authentication mode, the selection of encr yption type are NONE and WEP . For WPA-PSK and WPA2-PSK authentic ation mode, the encryption type supports both TKI[...]

  • Page 39

    - 33 - Delete Delete an existing credential . And then select the next credential if ex ist. If there is an empty credentia l, the driver will select any non-security AP. PIN Start to add to R egistrar using PIN (Personal Identification Number) configuration method. If STA Registrar, remember that enter PIN Code read from your Enrollee before start[...]

  • Page 40

    - 34 - About This page displays the info rmation of th e wireless card including, Config Version/ Date, Driver Version/ Date, EEPROM Version, Firmware Version and Phy_Address.[...]

  • Page 41

    - 35 - Utility Menu List To access the utilit y menu list, please r ight click the ut ility icon on the task bar. z Launch Config Utility : Select to ope n the utility screen. z Use Zero Configuration as Configuration Utility : Select t o use the Window XP built-in utility (Zero configuration utility). z Switch to AP Mode : Select to make your wire[...]

  • Page 42

    - 36 - Soft AP mode Config Config SSID AP name of user type. Us er also can cli ck Use Mac Address button to display it. Channel Manually force the AP us ing the channel. The system default is CH 1. Wireless mode Here supports 2.4G (inclu d ed 802.11b/g/n) wireless mode. Use Mac Address Click this button to repla ce SSID by MAC address. Security Se[...]

  • Page 43

    - 37 - Authentication Type : There are several types of authentication modes inc luding Open, Shared, WPA-PSK, WPA2-PSK, a nd WPA-PS K/ WPA2-PSK. Encryption Ty pe : For Open and Shared authentication mode, the selections of en cryption type a re Not Use and WEP . For WPA-PSK , WPA2-PSK , and WPA-PSK/ WPA2-PSK authentication mode, the encryption typ[...]

  • Page 44

    - 38 - WEP Key : Only valid when using WEP encryption algorithm. The ke y must match with th e AP’s key. There are two fo rmats to enter the keys. • Hexadecimal (128bits): 26 Hex characters . • ASCII (128bits): 13 ASCII characters. Sh o w Pas swo rd : Check this box to show the password you entered. Beacon (ms) The time between two beacons. T[...]

  • Page 45

    - 39 - Access Control Access Control Access Policy User chooses whether AP start the function or not. System default is Disable. z Disable: Do not use this access control fun ction. z Allow All: Only the MAC addre ss listed in the Access List can connect with this soft AP. z Reject All: Only the MAC addr ess listed in the Access List can NOT connec[...]

  • Page 46

    - 40 - Add Add the MAC address that you would like to set. Delete Delete the Mac address that you have set. Remove All Remove all Mac address in the A ccess List. Apply Apply the above changes. MAC Table MAC Table MAC Address The station MAC address of current connection . AID Raise value by current connection. Power Saving Mode The station of curr[...]

  • Page 47

    - 41 - Event Log Event Log Event Time (yy/mm/dd-hh:mm:ss) Records the event tim e. Message Records all the event messages.[...]

  • Page 48

    - 42 - Statistics Transmit Statistics Frames Transmitted Successfu lly Frames succes sfully sent. Frames Fail To Receive ACK After All Retries Frames failed transm it after hitting retr y limit. RTS Frames Successfully Receive CTS Successfully receive CTS after sending RTS frame RTS Frames Fail To Receive CTS Failed to receive CTS after sending RTS[...]

  • Page 49

    - 43 - Receive Statistics Frames Received S uccessfully Frames Receive d Successfully Frames Received With CRC Error Frames received with CRC error. Frames Dropped Due To Out-of-Resource Frames dropped due to resource issue Duplicate Frames Rece ived Duplicate received fram es. Reset Counter Reset counters to zero. About This page displays the wir [...]

  • Page 50

    - 44 - UTILITY CONFIGURATION FOR WINDOWS VISTA After the Wireles s adapter has be en successfully i nstalled, users can use the included Configuration Utili ty to set their preference. Go to Start J (All) Program J Intelligent Wireless J Intellige nt Wireless Utility . You can also open th e Configuration Utility by double clicking the icon or righ[...]

  • Page 51

    - 45 - Station Mode Profile Profile can book keep ing your favorite wireless setting among yo ur home, office, and other public hot-spot. You m ay save multip le profiles, and activate the corr ect one at your preference. The Profile manager en ables you to Add, Edit, Delete and Activate profiles. Click this button to show th e in formation of Stat[...]

  • Page 52

    - 46 - Authentication Shows the authentication m ode. Encryption Shows the encryption type. Use 802.1x Whether use 802.1x feature or not. Tx Power Transmit power, the amount of power used by a r adio transceiver to send the signal out. Channel Shows the selected ch annel that i s currently in us e. Power Save Mode Choose from CAM (Constantly Awake [...]

  • Page 53

    - 47 - Profile Name : User can enter profile nam e, or use default name defined by system. The default is PROF# (# 1, #2, #3....). SSID : The SSID is the unique name shared among all points in your wireless netw ork. The name must be identical for all devices and poin ts attempting to connect to the same network. User can use pull-down menu to sele[...]

  • Page 54

    - 48 - Tx Power : Transmit power, the amount of power used by a radio transceiver to send the signal ou t. Select the Tx power percentage from th e pull-down list includ ing Auto, 100%, 75%, 50%, 25% , 10% and Lowest . Preamble : This function will show up when Ad-hoc network type be selected. A preamble is a signal used in wireless environment to [...]

  • Page 55

    - 49 - Authentication Type: There are six type of authentication modes including Open, Shared, WPA, WPA-PSK, WPA2 and WPA2-PSK. • Open : If your access point/ wireless router is usin g " Open” authentication, then the wireless adapt er will need to be set to the same auth entication type. • Shared : Shared key is when both the sender and[...]

  • Page 56

    - 50 - WPA Pre-shared Key : This blank is the shared s ecret between AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be f illed with character longer than 8 and less than 64 lengths. WEP Key : Only valid when using WEP encryption algorithm. T he key must mat ch with the AP’s key. Ther e are several form ats to enter the [...]

  • Page 57

    - 51 - • PEAP : Protect Extensible Authentic ation Protocol. PEAP transport securely authentication data by using tunnelling between PEAP clients and an authentication server. PEAP can auth enticate wireless LAN clients using only server-side certif icates , thus simplifying the implementation and administration of a secure wireless LAN. • TLS [...]

  • Page 58

    - 52 - ID/ PASSWORD : Identity and password for server. • Authentication ID / Password : Identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication c an key in domain nam e. Domain name can be keyed in blank space. • Tunnel ID / Password: Identity and Password for server. Sh o w Pas swo rd : Che[...]

  • Page 59

    - 53 - Certification function. OK : Click to sa ve settings and exit th is page. Cancel: Click to call of f the settings and ex it. Server Certification tab : Use certificate ch ain : Choose use server that issuer of certificates. Server name : E nter an authentication sever name. OK : Click to sa ve settings and exit th is page. Cancel: Click call[...]

  • Page 60

    - 54 - Network Tab Sorted by Indicate that AP list are so rted by SSID, Channe l or Signal. Show dBm Check the box to show the dBm of the AP list. SSID Shows the name of BSS network. Network Ty pe Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network. Channel Shows the currently us ed channel. Wireless mode AP support wireless mode. [...]

  • Page 61

    - 55 - General General information contain AP's SSID, MAC address, Authentication Type, Encryp tion T ype, Chann el, Network Type, Beacon Interval, Signal Strength and Suppo rted Rates. Close : Click this button to exit the information sc reen. WPS WPS information contains Authe ntication Type, Encr yption Type, Config Methods, Device Password[...]

  • Page 62

    - 56 - Device Password ID : Indicate the method or identifies the specific password that the selec ted Registrar intends to use . Selected Regist rar : Indicate if the user has recently activated a Reg istrar to add an Enrollee. The values are "TRUE" and "FALSE". State : The current configuration state on AP. The values are &quo[...]

  • Page 63

    - 57 - This tab will show up if you select the AP that support 11n mode. Here shows the c onnected AP 802.11n related information. Link Status Click the triangle button at the right dow n corn er of the windows to expand the link status. The link status page displa ys the detail inform ation of current connection. Click this button to show th e in [...]

  • Page 64

    - 58 - Link Status Tab Status Shows the current connect ed AP SSID and MAC address. If there is no conn ection existing, it will show Disconnected. Extra Info Shows the link status and Tx power per centage. Channel Shows the current channel in use. Authentication Authentication mode used withi n the network, including Unknown, Open, WPA-PSK, WPA2-P[...]

  • Page 65

    - 59 - Transmit Shows the current Link Speed an d Throughput of the transmit rate. Receive Shows the current Link Speed an d Throughput of receive rate. Link Speed Shows the curr ent transmitting rate and receiving rate. Throughput Shows the transmitting and re ceiving speed of da ta. Advanced This Advanced page provides ad vanced and detailed sett[...]

  • Page 66

    - 60 - time, it only takes effect when connecting with the AP that supports this function. Enable TCP Window Size Check to increase the trans mission quality. The large TCP window size the better performance. Fast Roaming at Check to set the roaming interv al, fast to roam ing, setup by transmits power. Apply Click to apply above settings. Statisti[...]

  • Page 67

    - 61 - transmit after hit ting retry limit. RTS Frames Successfu lly Receive CTS Shows information of successfully receive CTS after sending RTS frame RTS Frames Fail To Receive CTS Shows information of failed to re ceive CTS after sending RTS. Reset Counter Click this button to reset counters to zero. Receive Statistics Tab Frames Received S ucces[...]

  • Page 68

    - 62 - WMM / QoS The WMM page shows the Wi-Fi Multi-Med ia power save function and Dir ect Link Setup that ensure your wireless network q uality. WMM/QoS Tab WMM Enable Check the box to enable Wi-Fi Multi-Media function that is meant to improve audio, video and voice applications transm itted over Wi-Fi. WMM- Power Save Enable Select which ACs you [...]

  • Page 69

    - 63 - • DLS enabled. Timeout Value Timeout Value represents that it disconnect automatically after few seconds. The v alue is integer that must be between 0~65535. It represents that it always connects if the valu e is zero. Default value of Timeout Value is 60 seconds. Apply Click this button to apply the settings. Tear Down Select a direct lin[...]

  • Page 70

    - 64 - BSSID, Channel, ID (Device Password ID), Security-Enabled. Rescan Issue a rescan command to wireless NIC to update information on surrounding wireless network. Information Displa y the inform ation about WPS IE on the sel ected network. List information included Authentication T ype, Encryption Type, Config Method s, Device Password ID, Sele[...]

  • Page 71

    - 65 - If you select the AP that listed in the W PS Profile List field, you can click the Detail bu tton to see more AP information. SSID : Shows the connected AP network name. BSSID : The MAC address of th e connected AP. F ixed and cannot be changed. Authentication Type : The authentication type support Open, WPA-PSK and WPA2-PSK. Encryption Ty p[...]

  • Page 72

    - 66 - then select the la st profile at the Profile Pag e. If there is an empty profil e page, the driver will select an y non-security AP. Export Profile Export all credentials to Profile. Delete Delete an existing credential. And then select the next credential if exist. If there is an empt y credential , the driver will select any non-security A[...]

  • Page 73

    - 67 - About This page displays the information of the wireless card including, RaConfig Version/ Date, Driver Version/ Date , EEPROM Version and Phy_Address. Utility Menu List To access Windows Vista utilit y menu list, please righ t click the utilit y icon on the task bar. z Launch Config Utility : Select to ope n the utility screen. z Switch to [...]

  • Page 74

    - 68 - Soft AP mode Config Config SSID AP name of user type. Us er also can cli ck Use Mac Address button to display it. Channel Manually force t he AP using th e channel. The s ystem default is CH 1. Wireless mode Here supports 2.4G (inclu d ed 802.11b/g/n) wireless mode. Use Mac Address Click this button to repla ce SSID by MAC address. Security [...]

  • Page 75

    - 69 - Authentication Type : There are several types of authentication modes inc luding Open, Shared, WPA-PSK, WPA2-PSK, a nd WPA-PSK/WPA2-PSK. Encryption Ty pe : For Open and Shared authentication mode, the selections of en cryption type a re Not Use and WEP . For WPA-PSK, WPA2-PSK , and WPA-PSK/ WPA2-PSK authentication mode, the encryption type s[...]

  • Page 76

    - 70 - WEP Key : Only valid when using WEP encryption algorithm. The ke y must match with th e AP’s key. There are severa l formats to ente r the keys. • Hexadecimal (64bits): 10 Hex characters. • Hexadecimal (128bits): 26 Hex characters . • ASCII (64bits): 5 ASCII characters. • ASCII (128bits): 13 ASCII characters. Sh o w Pas swo rd : Ch[...]

  • Page 77

    - 71 - Access Control Access Control Access Policy User chooses whether AP start the function or not. System default is Disable. z Disable: Do not use this access control fun ction. z Allow All: Only the MAC addre ss listed in the Access List can connect with this soft AP. z Reject All: Only the MAC addr ess listed in the Access List can NOT connec[...]

  • Page 78

    - 72 - Add Add the MAC address that you would like to set. Delete Delete the MAC addre ss that you have set. Remove All Remove all MAC addre ss in the Access List. Apply Apply the above changes. MAC Table MAC Table MAC Address The station MAC address of current connection . AID Raise value by current connection. Power Saving Mode The station of cur[...]

  • Page 79

    - 73 - Event Log Event Log Event Time (yy/mm/dd-hh:mm:ss) Records the event tim e. Message Records all the event messages.[...]

  • Page 80

    - 74 - Statistics Transmit Statistics Frames Transmitted Successfu lly Frames succes sfully sent. Frames Fail To Receive ACK After All Retries Frames failed transm it after hitting retr y limit. RTS Frames Successfully Receive CTS Successfully receive CTS after sending RTS frame RTS Frames Fail To Receive CTS Failed to receive CTS after sending RTS[...]

  • Page 81

    - 75 - Receive Statistics Frames Received S uccessfully Frames Receive d Successfully Frames Received With CRC Error Frames received with CRC error. Frames Dropped Due To Out-of-Resource Frames dropped due to resource issue Duplicate Frames Rece ived Duplicate received fram es. Reset Counter Reset counters to zero. About This page displays the wir [...]

  • Page 82

    - 76 - UNINSTALLATION FOR WINDOWS 2000/XP In case you need to uninstall the Utility and driver, please refer to below steps. (As you uninstall the utilit y, the driver will be un installed as well.) 1. Go to Start Æ All Programs Æ Intelligent Wireless Æ Uninstall –Intelligent.[...]

  • Page 83

    - 77 - 2. Click Yes to complete remove the selected application and all of its features. 3. Then click Finish to complete the uninstallation .[...]

  • Page 84

    - 78 - UNINSTALLATION FOR WINDOWS VISTA In case you need to uninstall th e utility and driv er, please ref er to below steps. (As you uninstall the util ity, the dr iver will be uninsta lled as well.) 1. Go to Start Æ Progr ams Æ Intelligent Wireless Æ Uninstall –Intelligent.[...]

  • Page 85

    - 79 - 2. Click Yes to complete remove the selected application and all of its features. 3. Then click Finish to complete the uninstallation .[...]