Go to page of
Similar user manuals
-
Network Card
Edimax USB VoIP Gateway Box None
7 pages 0.41 mb -
Network Card
Edimax EN-9130TX
9 pages 0.07 mb -
Network Card
Edimax EW-7206GAb
42 pages 1.12 mb -
Network Card
Edimax EW-7205AP
36 pages 1.35 mb -
Network card
Edimax EW-7711UAn
79 pages -
Network Card
Edimax EW-7126
24 pages 0.6 mb -
Network Card
Edimax EW-7317LDg
2 pages 0.07 mb -
Network card
Edimax EN-9260TX-E
13 pages
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Edimax EW-7612UAn V2, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Edimax EW-7612UAn V2 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Edimax EW-7612UAn V2. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Edimax EW-7612UAn V2 should contain:
- informations concerning technical data of Edimax EW-7612UAn V2
- name of the manufacturer and a year of construction of the Edimax EW-7612UAn V2 item
- rules of operation, control and maintenance of the Edimax EW-7612UAn V2 item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Edimax EW-7612UAn V2 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Edimax EW-7612UAn V2, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Edimax service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Edimax EW-7612UAn V2.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Edimax EW-7612UAn V2 item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
EW -7722 UTn V2 EW -7612 UAn V2 User Manual 10 -2011 / v1.0[...]
-
Page 2
Copyright by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transc ribed , stored in a retrieval system, or tran slated into any language or computer language, in any form o r by any m eans, electronic, m echanical, m agnetic, optica l, chemical, manual or otherwise, without the pri[...]
-
Page 3
Federal Communication Commission Interference Statement This equipment has been tested and found to comply w ith the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are desig ned to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses, and can r[...]
-
Page 4
R&TTE Compliance Statement This equipment complies with all t he requirements o f DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 9[...]
-
Page 5
CONTENTS 1 I N T R O D U C T I O N .................................................................................... 1 1.1 Features ......................................................................................................... 1 1.2 S pecifications .......................................................................................[...]
-
Page 6
1 1 Introduction Thank you for purchasing this high-speed wireless network card! Excepting common wireless standards 802.11b/g, this wireless netw ork card is also able to access 802.11n wireless networks - data transfer rate is 3 00Mbps ! For WLAN security issues, this adapter supports 64/128-bit WEP data encryption that protects your wireless net[...]
-
Page 7
2 Antenna: Chip Antenna (EW -7722UTn V2) High-Gain 3dBi Antenna (EW -7612UAn V2) Hardware W PS button Drivers: W indows XP /Vista /7 LEDs: Link/Activity Temperature: Operating 32~1 04 ° F (0 ~ 40 ° C) , Storage -13~149 ° F (-25~65 ° C) Humidity: Max. 95% (Non-Condensing) 1.3 Package Contents Before you begin the installa[...]
-
Page 8
3 2 Install ation Procedure Before you proceed with the installatio n, please notice follow ing descriptions. Note1: The following installation was operated under Windows XP . (Procedures are similar for Windows Vista /7 .) Note2: If you have install ed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Har[...]
-
Page 9
4 EW -76 12UA n V2 1. USB connector 2. Link/Activity LED (Under the case) 3. WPS Button LED N ame Light S tatus Description Link/ Activity Of f No wireless netw ork card is installed. On Solid light 5 sec o nds means WPS connection is establishe d successfully . Blinking W ireless netw ork card is n ormally inst alled /Linked to a wi reless access [...]
-
Page 10
5 Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on . EW -7722UTn V2 EW -7612UAn V2 Never use force to insert the card, if you feel it’ s stuck, flip the card over and try again.[...]
-
Page 11
6 The following message will appear on your compute r , click „Cancel‟ Software Installation This wizard can be run in W indows XP/V ista /7 . Y ou ca n inst all the W ireless Adapter by EZMAX Setup W izard in the CD-ROM including in the package. The wizard is an easy and quick configuration tool for internet connection with series process. W h[...]
-
Page 12
7 I. Inst a ll the Driver and Utility If you prefer the traditional setup procedure. Please insert the installation CD to y our CD -ROM Drive, and click “ Exit “ to disable EZmax W izard. If your OS is W indows V ista/7. Please execute the “ Utility Setup.exe “ program a s follows.[...]
-
Page 13
8 Click “ Next ” to go to the next step.[...]
-
Page 14
9 Now you ‟ ll see the following message, please click „ Install ‟ to begin the installation. The system start s to inst all the driver and utility . Click “ Finish ” to complete the driver and utility installation.[...]
-
Page 15
10 II. Conn ect to Wire less Access Point A. T o st art configuring the adapter , double click the icon in th e system tray or right click the icon and select open configuration utility . B. The utility of the adapter is displayed. Click “ Available Network ” and double-click on the wireless access point you want to connect to. If the wireless [...]
-
Page 16
11 NOTE: Network security type ( ‘ Network Auth entication ’ and ‘ Data encryption ’ ) will be selected automatically based on wir eless access point ’ s security setting. It ’ s not r equir ed to change these settings by yourself. C. Input the security setting (WEP key) and click “ OK ” to st art network connection. All opti ons i [...]
-
Page 17
12 hoc connection. Network Authentication Select the network authentication type from drop-down menu. This setting must be identical with the setting of wireless access point you w ith to connect. Data encryption Select the data encry ption t ype from drop-down menu. This setting must be identical with the setting of wireless access point you with [...]
-
Page 18
13 NOTE: If you connected to an access point but the connection has been dr opped soon, please check security settings and r e-check passwor d spelling.[...]
-
Page 19
14 * Use Win dows Z ero Configurati on on Win dows V ista: A. For Windows V ista user , you can use W indows Zero Configuration to con nect to wireless access point. Click „ S tart ‟ button, the n click „ Contr o l P anel. Click „ Netw ork and In tern et ‟ in C ontrol Panel. B. Click „Connect to a network‟ u nder „Network and Sharin[...]
-
Page 20
15 C. Click the access point you want to use if it‟ s shown, then click „Connect‟. D. If it‟s an un named access point (i.e. the SSID of this wir eless access point is hidden), you‟ll be prompted to input it‟ s name, and the name must be identical to the SSID setting of the wireless access point y ou‟re connecting to.[...]
-
Page 21
16 E. If the access point is protected by encryption method, y ou have to input its sec urity or passphrase here. It must match the encryption setting on the access point. F. If you can see this image, the connection betw e en your computer and wireless ac cess point is successfully est ablished. Click „Close‟ to start netw ork connection.[...]
-
Page 22
17 3 Configuration Utility The Configuration Utility is a powerful application that helps you config ure the W ireless L AN Mini USB Adapter and monitor the link status and th e statistics during the communication process. The Configuration Utility appears as an icon on the sy stem tray and desktop of W ind ows. You can open it by double-click on t[...]
-
Page 23
18 3.1 Utilit y Overvie w There are several parts in the utility screen. Please refer to the follow ing tabl e fo r the description. Parameter Description Refresh – Refresh adapter list in the “ B “ block. Mode – There are two modes: S tation and Access Point. If “ S tation “ is selected, the adapter works as a wireless adapter . If “[...]
-
Page 24
19 W ind ows XP Zero Co nfiguration, check the item. Radio Off – This function is for you to turn of f or turn on the radio of the adapter . If the radio is turned of f, the adapter will not work. It is the stat us bar that displays the curr ent st atus of t he utility . T o close it, please disable the “ S tatus Bar “ in the “ View “ ite[...]
-
Page 25
20 3.2 Available Netw ork W hen y ou open the Configuration Utility, the system wil l sca n all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wir eless network with the highest signal s trength . From the “ Available Netw o rk ” tab, all the networks nearby w ill[...]
-
Page 26
21 3.3 Ge neral To check the connection status of the adapter, select “ General “ . This screen shows the information of Link Speed, Network Type, Encry ption Method, SSID, Signal Strength, Link Quality and Network Address of the adapter. Paramet er Description S tatus It will show the connection status of th e adapter . S peed It shows the cur[...]
-
Page 27
22 connection including None, WEP , TKIP or AES. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. Th e ID prevents the unintentional merging of two co-located WLANs. Signal S trength It indicates the wireless signal strength. Link Quality It indicates the wireless link quality . Network Address It shows [...]
-
Page 28
23 3.4 Profile The “ Profiles List ” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set De fault to manage a profile. Parameter Description Av a ilable Profile(s) This list shows the preferred networks for the w ireless connection. Y o u can add, remove, edit, duplicate the preferred netwo[...]
-
Page 29
24 3 . 4 . 1 C o n f i g u r e t h e P r o f i l e Parameter Description Profile Name Define a recognizable profile name for you to identify the different netw o rks ( Acce ss Point ). Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID p revents the unintentional merging of two co-loc[...]
-
Page 30
25 or Router . If this item is selected, the adapter will work in Ad Ho c mode. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to. Network Authentication This setting has to be consistent with the wirel[...]
-
Page 31
26 WP A2 802.1X – Like W P A , W P A2 support s IEEE 802.1x/EAP authentication or PSK technology . It also includes a new advanced encryption mechanism using the A dvanced Encry ption S tandard (AES). AES is required to the corporate user or government users. The difference betw e en WP A and WP A2 is that W P A 2 provides data encryption via the[...]
-
Page 32
27 computers within the network. Key Length W hen y ou select the “ W EP an d “ PASSPHRASE “ and this function will display in the current status of the utility. The keys are used to encrypt dat a transmitted in the wireless network. Fill the tex t box by following the rules below . 64 -bit – Input 10-digit Hex values as the encryption keys[...]
-
Page 33
28 including CHAP , MSCHAP , MSCHAPv2 and P AP . PEAP speci fies that an EAP -compliant authentication protocol must be used; this adaptor supports MD5, TLS, GTC (Generic T oken Card) and MSCHAPv2. T he client certificate is optional required for the authentication. T unnel Includes MD5, GTC, TLS, MSCHAP-v2. Username The certificate username in the[...]
-
Page 34
29 3.5 Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you don ‟ t ensure the status of th e adapter and the network y ou are connecting, please go to the screen for more details.[...]
-
Page 35
30 3.6 Statis tics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o recount the statistics value, please click “ Reset “ .[...]
-
Page 36
31 3.7 Wi -Fi Protect Setup (WPS) Wi -Fi Protected Setup ( W PS) is the latest wireless network technolo gy which makes wireless network setup become very simple. If you have W PS -enabled wireless access point, and you want to establish a secure connection to it, yo u don ‟ t have to configure the wireless access point and setup data encry ption[...]
-
Page 37
32 3. If you click „ Yes ‟ , and the following message will appear on your computer, please select the SSID of wireless access point that you wish to con nect and click „ Select ‟ . 4. Please wait while the install procedure is running and wait for few seconds to two minutes. If a wireless access point with correct PIN code is found, you ?[...]
-
Page 38
33 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point ‟ s manufacturer), then click „ PBC ‟ button in wireless configuration utility to start to establish wireless connection by W PS. Please be patient (This may req uire several seconds to one minute to [...]
-
Page 39
34 2. W hen t he connection between this wireless netw ork card and access point is successfully established by W PS, and t he in formation about access point you connected to will be displayed.[...]
-
Page 40
35 3.8 So ftwa re A P Excepting become a wireless client of other wir eless access points, this w ireless card can act as a wireless service provider also! Y ou can switch this w ireless card‟s operating mode to „AP‟ mode to simulate the function of a real wireless access point by software, and all other computers and w ireless devices can co[...]
-
Page 41
36 Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID prevent s th e unintentional merging of two co-located WLANs. The default SSID of the AP is Full Computer Name + “ _AP “ . W ireless adapters connect to the AP should set up the same SSID as the AP . BSSID Display the MA[...]
-
Page 42
37 3 . 8 . 1 AP P r o p e r t i e s S e t t i n g To configure software AP, please click “ Config ” button.[...]
-
Page 43
38 Please note that Ad -Hoc mode is not available w hen network card is in AP mode. The description of major setup items are listed below: Network Name (SSID) Please input the SSID (the name use d t o ide ntify th is wireless access point) here. Up to 32 numerical characters can be accepted here, excepting spac e . Channel Please select the wireles[...]
-
Page 44
39 menu. ASCII / P ASSPHRASE If the encryption method is W EP , check either „ASCII‟ or „P ASSPHRASE‟ box and input it in the box as W EP passphrase. Key Index Select WEP key index (1- 4). If you don‟t know which one you should use, select 1. Network key / Confirm network key IF netw ork au thentication m ode is W P A, please input W P A [...]
-
Page 45
40 3 . 8 . 2 AP Ad v a n c e d If you want to setup adv anced settings of software access point, select „Advanced‟ menu. If you don‟t know the meaning and affects of these settings, keep them untouched. Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packet s (milliseconds). The range for the b[...]
-
Page 46
41 3 . 8 . 3 AP S ta t i s t i c s You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o recount the statistics value, please click “ Reset “ .[...]
-
Page 47
42 3 . 8 . 4 I C S In this page, y ou can assign a network card on your computer as the path for all wireless clients to get connected to Internet. If you have only one network card (except this softw are access point), you don‟t have to select network card here; if you have more than one network card, select the one you wish to be used as Intern[...]
-
Page 48
43 4 Troubles hooting & Glossary This chapter provides solutions to problems usually encountered during the installation and operati on of the adapter . If you encounter any problem when you‟re using this w ireless network card, don‟t panic! Before you call y our dealer of purch ase for help, please check this troubleshooting table, t he so[...]
-
Page 49
44 he / she can add the MAC address of y our network card to his / her access point‟ s l ist. The network is slow / having problem when transferring large files 1. Move closer to the place where access point is located. 2. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number .[...]
-
Page 50
45 4. What is A d - hoc ? An Ad -hoc integrated w ireless LAN is a group of computers, each has a W ireless LAN adapt er , Con nected as an independent wir eless LAN. A d hoc wireless LAN is applicable at a departmental sca le for a branch or SOHO operation. 5. What is Infrastructure ? An integrated wireless and wireless and wired LAN is called[...]
-
Page 51
46 12. What i s DSSS ? What is FHSS ? And what are their differences ? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a p attern that is known to both transmitter and receiver . Properly synchronized, the net ef fe ct is to maintai n a single logical channel. T o an unintended receiver , FHSS appe[...]
-
Page 52
47 Federal Communication Commission Interference St atement This equipment has been tested and found to comply w ith the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are desig ned to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and ca[...]
-
Page 53
48 R&TTE Compliance St a tement This equipment complies with all t he requirements o f DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mu tual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the direc[...]