WLU108AG-MC User manual
© Copyright 2007 Compex Systems Pte Ltd All Rights Reserved This document contains information, which is protected by copyright. Reproduction, adaptation or translation without prior permission is prohibited, except as allowed under the copyright laws. Trademark Information Compex® is a registered trademark of Compex, Inc. Microsoft Windows and the Windows logo are the trademarks of Microsoft Corp. NetWare is the registered trademark of Novell Inc.
FCC NOTICE This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Outdoor operations in the 5.15-5.25GHz band is prohibited. This device has no Ad-hoc capability or peer-to-peer operations for 5250~5350 and 5470~5725 MHz. IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
Compliance with this directive implies conformity to the following European Norms (in brackets are the equivalent international standards.) Electromagnetic Interference (Conduction and Radiation): EN 55022 (CISPR 22) EMC Standards: FCC Part 15: Subpart B, Subpart C, Subpart E; Low Voltage Directive: EN 60 950-1: 2001.
Technical Support Information The warranty information and registration form are found in the Quick Install Guide. For technical support, you may contact Compex or its subsidiaries. For your convenience, you may also seek technical assistance from the local distributor, or from the authorized dealer/reseller that you have purchased this product from. For technical support by email, write to support@compex.com.sg.
Table of Contents About This Document The product described in this document, Compex Wireless 108Mbps USB 2.0 Adapter, Compex WLU108 is a licensed product of Compex Systems Pte Ltd. This document contains instructions for installing, configuring and using Compex WLU108. It also gives an overview of the key applications and the networking concepts with respect to the product.
Table of Contents Conventions In this document, special conventions are used to help and present the information clearly. The Compex Wireless 108Mbps USB 2.0 Adapter is often referred to as Compex WLU108 in this document. Below is a list of conventions used throughout. NOTE This section will consist of important features or instructions References on Menu Command, Push Button, Radio Button, LED and Label appear in Bold. For example, “Click on Ok.
Chapter 1 Product Overview Chapter 1 Product Overview 1.1 Introduction The Wireless 108Mbps USB 2.0 Adapter delivers the performance and capabilities that every mobile user is looking for. Embedded with Atheros chipset, it boasts network robustness, stability and wider coverage for longrange connectivity. Despite its small size, the USB adapter is big on features; compatibility with wireless 802.11 networks ensures that you can be connected easily.
Chapter 1 1.2 Product Overview Features and Benefits • Compact and Mobile The USB adapter is designed especially for the mobile generation. The casing is compact and sleek, and the antenna is built-in to further preserve the miniature footprint. Weighing just 20 grams, the device is light enough to be carried around! • Fast and Reliable Transmission The USB adapter can deliver up to 108Mbps wireless throughput.
Chapter 2 Getting Started Chapter 2 Getting Started This chapter outlines the basic configuration on the USB adapter. 2.1 requirement for any installation and Overall Setup Procedures Here are some of the basic steps to guide you along: 1. Hardware Installation Please refer to Section 3.1 “Hardware Installation”. 2. Drivers and Utility Installation Please refer to Section 3.2 “Drivers and Utility Installation”. 3.
Chapter 3 Wireless Adapter Installation Chapter 3 Wireless Adapter Installation The USB adapter is a plug-and-play device. You can plug it into the USB slot of your PC/notebook for auto-detection. 3.1 Hardware Installation 1. 3.2 Insert the USB adapter directly into the USB slot of your PC/notebook. Drivers & Utility Installation 1. Insert the Product CD into your computer CD-ROM drive. Click on Utilities and the system will run the setup.exe automatically. 2.
Chapter 3 Wireless Adapter Installation 4. When the License Agreement screen appears, you are required to read and accept the agreement to continue. Click on the Next> button to proceed. 5. Select your preferred setup: Install Client Utilities and Driver (Recommended) option You are recommended to select this setup type. This option will install both the drivers and utility that support your USB adapter.
Chapter 3 Wireless Adapter Installation Select this option if you are going to use the Wireless Zero Configuration Utility to configure your USB adapter. Note that only Windows XP comes with the Wireless Zero Configuration Utility. Make Driver Installation Diskette(s) Select this option if you wish to make a duplicate copy of the drivers and store in the diskette/s. 6. Click on the Next> button and follow the instructions stated on the screen.
Chapter 3 Wireless Adapter Installation For Windows XP users 7. If you are using Windows XP as operating system, the following screen will appear. Read the notice carefully and click on the Next> button to proceed. 8. Select your choice of tool to assist you in configuring your USB adapter. Click on the Next> button to proceed.
Chapter 3 Wireless Adapter Installation Atheros Client Utility (ACU) and Supplicant option Select this option to install your USB adapter’s (Recommended) utility. Third Party Supplicant option Select this option if you decide to use Wireless Zero Configuration Utility to configure your wireless device. Installing this tool will only allow you to view the status of the connected wireless device/s through the USB adapter’s utility; configuration using the USB adapter’s utility will not be allowed.
Chapter 3 Wireless Adapter Installation Cancel the Found New Hardware Wizard if it appears and click on the OK button to begin the installation. 11. Click on the OK button to reboot your system and this will complete the installation.
Chapter 3 Wireless Adapter Installation To confirm if the driver has been successfully installed on your system, 1. Proceed to your desktop, right click on My Computer and select Properties. 2. Select the Hardware tab and click on Device Manager.
Chapter 3 Wireless Adapter Installation The folder name, Atheros USB 2.0 Wireless Network Adapter will appear in the Network Adapters section. This indicates that the driver for the USB adapter has been successfully installed on your system! To activate the utility program, double click on the icon shown in the system tray. If you have double-click on the utility option, the following screen will appear to give you a glimpse of your connection status. To exit it, click on the OK button.
Chapter 3 Wireless Adapter Installation To use the Atheros Client Utility, go to the Start Menu followed by Programs. Then select Atheros. From Atheros, select Atheros Client Utility. You may now start to configure your USB adapter.
Chapter 4 Using the System Tray Utility Chapter 4 Using the System Tray Utility This chapter will elaborate on the Atheros system tray utility found at the right bottom corner of your screen. Right click on the utility icon and the menu will appear. The following explains the different options available on the menu: Help Open the online help. Exit Exit the Atheros Client Utility application. Once you exit, the icon will disappear from the system tray.
Chapter 4 Using the System Tray Utility Preferences This option allows you to set the startup and menu options for the utility. You can decide whether the program should start automatically when Windows starts, and which menu items should appear on the pop up menu. Disable/Enable Radio If you are unable to detect the RF signal, disable and enable the radio again. Once the radio is enabled, the system will prompt you that the RF signals have been successfully enabled. Click on the OK button to proceed.
Chapter 4 Using the System Tray Utility Manual LEAP Login If you select this option, you will have to manually start the LEAP authentication process to login to the network instead of being prompted for your LEAP username and password during your windows logon. (Optional) Enter the domain name that you wish to logon to. Reauthenticate Reauthenticate to a LEAP-configured access point each time you login to a LEAP network.
Chapter 4 Using the System Tray Utility Connection Status To view the connection status of your wireless USB adapter. Alternatively, you may also double click on the utility icon in the system tray. Active Profile Displays the name of the active configuration profile. Auto Profile Selection Shows whether auto profile selection is enabled. Connection Status Displays whether the adapter is connected to a wireless network. Link Quality States the quality of the link connection.
Chapter 5 Wireless Adapter Utility Features Chapter 5 Wireless Adapter Utility Features This chapter shows you how to make use of the utility to view the status of your wireless connection; to change your settings and also to monitor your wireless performance via the statistics. NOTE It is advisable to activate only one of the utilities: Either the Wireless Zero Configuration Utility OR the Atheros Utility. 5.1 Current Status Tab Displays the performance of the USB adapter in the wireless network.
Chapter 5 5.2 Wireless Adapter Utility Features Profile Management Tab This option allows you to manage your profile, set your security options, and scan for other wireless networks.
Chapter 5 Wireless Adapter Utility Features Click on New button to create a new profile. Enter the profile name (a unique name to identify this profile), a client name and the SSID of the wireless network to connect to. Note that the Client name refers to the name that is registered to your PC/notebook. You can enter up to 3 different SSIDs in order of preference, per profile. We are using ABC as the profile name and APP as the SSID1.
Chapter 5 Wireless Adapter Utility Features To modify an existing profile, select the profile that you wish to modify and click on this button. We are using profile: Any as an example. To delete an existing profile, select the particular profile that you wish to delete and click on this button. We are using profile: default as an example.
Chapter 5 Wireless Adapter Utility Features To activate a profile, select the profile and click on this button. We are using profile: wireless-AP as an example. Once a profile is activated, this name: wireless-AP.
Chapter 5 Wireless Adapter Utility Features This function allows you to save the settings of your profile onto disk. Select the profile that you wish to save and click on this button. We are using profile: ESSID as an example. Choose the folder to save to, enter the name under which to save the profile and click on the Save button. Now, your profile is saved to your selected folder.
Chapter 5 Wireless Adapter Utility Features This function allows you to retrieve a saved profile from disk. We are using profile: ESSID as an example. Go to the folder where you have saved your profile, select ESSID.prf and click on the Open button. Notice that the profile: ESSID has been imported to the list of profiles.
Chapter 5 Wireless Adapter Utility Features This function allows you to scan for wireless networks detected by the adapter.
Chapter 5 Wireless Adapter Utility Features The icons shown beside the Network Name (SSID) indicate the type of WLAN detected. Connected to Infrastructure (AP) Encryption Active Notice that if there is a icon appearing in the Super column, this shows that the wireless network supports Super-AG technology (108Mbps). Click on the Refresh button to renew the list of wireless networks detected. Click on the OK button to exit the window.
Chapter 5 Wireless Adapter Utility Features If you have created several profiles, this function allows you to establish the priority order in which the USB adapter should try to connect to a WLAN. If the USB adapter is unable to connect to the 1st profile, it will then try to connect to the 2nd profile and so on. Notice that if this function is disabled, this means that you have not added any profile in the Auto Selected Profiles list.
Chapter 5 Wireless Adapter Utility Features Notice that when a selected profile has been added, it will be transferred to the Auto Selected Profiles list. Select and click on the Add button to transfer another profile. You need to transfer at least two profiles to the Auto Selected Profiles list to activate the Auto Select Profile function.
Chapter 5 5.2.1 Wireless Adapter Utility Features Security Tab Please refer to Chapter 7 “Types of Authentication and Encryption mode” 5.2.2 Advanced Tab This option allows you to configure the more advanced connection settings of your wireless client.
Chapter 5 Wireless Adapter Utility Features Only applicable to Infrastructure mode. You may key in the MAC address of at most four access points to which you would prefer to connect. Transmit Power Level Specifies the wireless transmit power to be used. Reducing the power level lowers the risk of interference with other nearby wireless devices and conserves battery power but decreases radio range.
Chapter 5 Wireless Adapter Utility Features The guideline for choosing between the Normal and Maximum options: The USB adapter wakes up more often and responds sooner to network requests in Normal mode than in Maximum mode; and the Maximum mode consumes less power than Normal mode. Network Type Select either Infrastructure if you are connecting to the WLAN using an access point or Ad-hoc if you are connecting directly to another computer equipped with a wireless adapter. 802.
Chapter 5 • • • Wireless Adapter Utility Features Auto Causes the adapter to attempt authentication using shared authentication. It then switches to open authentication if shared authentication fails. Open Enables an adapter to attempt authentication regardless of its WEP settings. It will only associate with the access point if the WEP key of the adapter matches that of the access point. Shared only Allows the adapter to authenticate and associate only with access points that have the same WEP key.
Chapter 5 Wireless Adapter Utility Features This button contains general information about the network interface card (the wireless USB adapter) and the network driver interface specification (NDIS).
Chapter 5 Wireless Adapter Utility Features 33
Chapter 6 Wireless Adapter Utility Configuration Chapter 6 Wireless Adapter Utility Configuration This chapter will elaborate on the Client Manager configuration of the USB adapter using some simple examples. 6.1 Infrastructure Mode In infrastructure architecture, the wireless clients communicate through access points that are devices that act as base station for all wireless communication.
Chapter 6 6.1.1 Wireless Adapter Utility Configuration Configuration on Infrastructure Mode In this example, two notebooks and PC2 act as wireless clients to communicate with the wireless AP. Once all configuration has been done, wireless clients with the same SSID as the AP will be able to access wirelessly to PC1 via the wireless AP.
Chapter 6 Wireless Adapter Utility Configuration For PC 2 1. Activate your USB adapter’s utility. 2. Go to the Profile Management tab, click on the Scan button to look for the wireless AP. 3. Click on the Refresh button if your system is unable to detect your wireless AP. Once found, select the Network Name (SSID) used by the AP: Wireless-AP and click on the Activate button to add it to your profile list.
Chapter 6 Wireless Adapter Utility Configuration Notice that the SSID has already been pre-configured in this profile. The SSID of both the wireless AP and the wireless client must be the same for them to communicate with one another. 4. Enter the Profile Name, e.g. Workstation 2 for easy identification. 5. Next, proceed to the Security tab. The wireless client must use the same security mode as the AP. In our example, select WPA Passphrase and click on the Configure… button.
Chapter 6 Wireless Adapter Utility Configuration 6. Enter the encryption key in the field provided. Please note that this key must be the same as the one that you had configured for your access point. 7. Click on the OK button to update the changes. Proceed to your Current Status tab to monitor the connection between the access point and the wireless client (PC2).
Chapter 6 Wireless Adapter Utility Configuration Alternatively, you can also check the connection from the MS-DOS Prompt. From PC2, simply proceed to the Start Menu, Run… and type in cmd. Click on the OK button. In the MS-DOS Prompt window, type ping 192.168.168.1 –t, whereby this IP address belongs to your access point. When the screen appears: Pinging 192.168.168.1: bytes=32 time=2ms TTL=128 Pinging 192.168.168.1: bytes=32 time=2ms TTL=128 Pinging 192.168.168.1: bytes=32 time=2ms TTL=128 …….
Chapter 6 Wireless Adapter Utility Configuration For the rest of the workstations Refer to the steps for configuring PC2. If your other wireless clients are not using the USB adapter, you may refer to the manual of these other adapters for details on Ad-hoc configuration.
Chapter 7 Types of Authentication and Encryption mode Chapter 7 Types of Authentication and Encryption mode This chapter illustrates the different types of authentication and encryption that can be used in the wireless LAN. 7.1 Infrastructure Network Security Extensible Authentication Protocol (EAP) is used to authenticate network clients before letting them access the enterprise network.
Chapter 7 Types of Authentication and Encryption mode 2. Choose EAP-TLS from the drop-down menu and click on the Configure… button. NOTE To enable this security, you must ensure that your PC/notebook has already downloaded its EAP-TLS certificates. Check with your system administrator for details. 3. If your system does not support EAP-TLS, the following message will pop up: If EAP-TLS is supported, select the appropriate certificate authority from the list.
Chapter 7 Types of Authentication and Encryption mode To use EAP-TTLS security, access the Security tab in the Profile Management window. 1. You can select WPA radio button Or 802.1x radio button 2. Choose EAP-TTLS from the drop-down menu and click on the Configure… button. 3. Select the appropriate certification authority (CA) from which the server certificate will be downloaded from the Trusted Root Certification Authorities drop-down list. 4.
Chapter 7 Types of Authentication and Encryption mode server) for EAP authentication. Enter your password in both the Password and Confirm Password fields. 5. Click on the Advanced… button. 6. Leave the specification server/domain field blank to allow the client to accept a certificate from any server that supplies a certificate signed by the CA listed previously. The login name is pre-defined in the Login name field. 7. Click the OK button.
Chapter 7 7.1.3 Types of Authentication and Encryption mode PEAP (EAP-GTC) The PEAP (EAP-Generic Token Card) method is intended for use with Token Cards supporting challenge/response authentication and MUST NOT be used to provide support for clear text passwords in the absence of a protected tunnel with server authentication. To use PEAP-GTC security, access the Security tab in the Profile Management window. 1. You can select WPA radio button Or 802.
Chapter 7 Types of Authentication and Encryption mode 2. Choose PEAP-GTC from the drop-down menu and click on the Configure… button. NOTE To enable this security, you must ensure that your PC/notebook has already downloaded WPA-PEAP certificates; and the server properties must already be set. Check with your system administrator for details. 3. Select the appropriate certificate authority (CA) from which the server certificate is downloaded from the drop-down list. 4.
Chapter 7 Types of Authentication and Encryption mode change the login name if needed. Click on the OK button to save your settings. 7.1.4 PEAP (EAP-MSCHAP V2) Microsoft-Challenge Handshake Authentication Protocol V2 (MSCHAP V2) is a mutual authentication protocol that requires both the client and server’s identities to be proven.
Chapter 7 Types of Authentication and Encryption mode 2. Choose PEAP (MS-CHAPV2) from the drop-down menu and click on the Configure… button. NOTE To enable this security, you must ensure that your PC/notebook has already downloaded WPA-PEAP certificates; and the server properties must already be set. Check with your system administrator for details. 3. Enter your PEAP username and password (which are registered with the server) in the User Name and Password field respectively.
Chapter 7 7.1.5 Types of Authentication and Encryption mode LEAP Lightweight Extensible Authentication Protocol (LEAP) security requires all infrastructure devices (e.g. access points and servers) to be configured for LEAP authentication. To use LEAP security, access the Security tab in the Profile Management window. 1. You can select WPA radio button Or 802.
Chapter 7 Types of Authentication and Encryption mode 2. Choose LEAP from the drop-down menu and click on the Configure… button. 3. You may set your username and password to: - Use Temporary User Name and Password Each time your PC reboots, you will be require to enter your LEAP username and password in order to be authenticated and obtain access to the network. - Use Saved User Name and Password.
Chapter 7 Types of Authentication and Encryption mode Saved User Name and Password 1. Enter the username, password and re-enter password in Confirm Password field. (Optional) You may enter a specific domain name, which will be passed to the server. 2. Enter the LEAP authentication timeout (between 30 and 500 seconds) to specify how long LEAP should wait before considering an authentication as failed, and sending an error message. The default is 90 seconds. 3. Click on the OK button.
Chapter 7 Types of Authentication and Encryption mode Check the Include Windows Logon Domain with User Name option to automatically send your Windows login domain together with your user name to the RADIUS server. (Default) Check the No Network Connection Unless User Is Logged In option to force the wireless adapter to disassociate after you log off. 7.1.6 WPA Passphrase WPA Passphrase is also known as WPA-PSK (Pre-shared Key).
Chapter 7 Types of Authentication and Encryption mode 2. Enter the password and click on the OK button. Note: The WPA Passphrase must match that used by the AP/other wireless clients in the network. 7.1.7 Pre-shared Key (Static WEP) Wired Equivalent Privacy is a security protocol that allows the wireless client adapter to communicate ONLY with access points or other wireless clients that have the same WEP key. WEP Key is categorized into two types: Hexadecimal and ASCII.
Chapter 7 Types of Authentication and Encryption mode To define pre-shared encryption keys, 1. Choose the Pre-shared Key (Static WEP) radio button and click the Configure… button to fill in the encryption key. If the access point that the wireless adapter is associating to has WEP set to Optional while the wireless adapter has WEP enabled, ensure that Allow Association to Mixed Cells is checked to allow association. Note that this option is available only in 802.1x and Pre-Shared Key (Static WEP). 2.
Chapter 7 Types of Authentication and Encryption mode WEP Key size - 64-bit WEP: 10 hexadecimal or 5 ASCII Text - 128-bit WEP: 26 hexadecimal or 13 ASCII Text - 152-bit WEP: 13 hexadecimal or 16 ASCII Text 55
Appendix I Remove USB Adapter from the System Appendix I Remove USB Adapter from the System To safely remove your USB adapter from your system, 1. From the system tray, go to Safely Remove Hardware icon and click Safely Remove Hardware. 2. Select Atheros USB 2.0 Wireless Network Adapter and click on the Stop button to terminate all activities.
Appendix I Remove USB Adapter from the System 3. Next, select Atheros USB 2.0 Wireless Network Adapter to confirm you will be removing it from the USB port and click on the OK button. 4. The system will then inform you that the device can now be safely removed from the system. 5. Click on the Close button to exit this window.
Appendix II Un-install Wireless Adapter Appendix II Un-install Wireless Adapter Please note that in case there is a software upgrade for the wireless adapter, you will need to un-install the current software version before installing the new software. When you un-install the USB adapter’s software, any existing profiles will be removed. If you want to re-use your profiles, please refer to Section 5.2 Profile Management Tab for further details on how to export a profile to disk.
Appendix II Un-install Wireless Adapter 3. Wait until you see the Atheros Client Installation Program screen. Select Uninstall the previous installation. Then click on the Next> button to proceed. 4. The prompt screen appears to notify you that the uninstall option requires the system to be rebooted at the end of the uninstall process. Click on the Yes button to proceed. 5. Your system will prompt you to confirm whether you want to remove the application completely. Click OK to proceed.
Appendix II Un-install Wireless Adapter 6. You will be asked to decide whether to remove the device driver or not. Click on the Yes button to accept. 7. The uninstall process will then begin. Soon the prompt screen will appear informing you that the uninstall process is successful, and that your system needs to be rebooted. 8. Click OK to reboot the system.
Appendix III Certificate Application for WPA mode Appendix III Certificate Application for WPA mode The USB adapter supports WPA and WPA-PSK mode in Windows 2000/XP. WPA is a specification of standards-based, interoperable security enhancement that strongly increases the level of data protection (encryption) and access control (authentication) in your wireless network. The technical components of WPA include Temporal Key Integrity Protocol (TKIP) for dynamic key exchange, and 802.1x for authentication.
Appendix III Certificate Application for WPA mode AIII.I Installing Window XP Service Pack Patch File (For Windows XP users) To check whether you have already installed Windows XP SP2, go to My Computer, right click and select Properties. If you are using the Windows XP SP1 and do not intend to upgrade to SP2, you will need to install the two patch files provided in the Product CD. 1.
Appendix III Certificate Application for WPA mode AIII.2 Installing certificate on your server If you are using Microsoft Certificates services, 1. Click on the Install this certificate link in the window to start the installation. Chapter 8 Click on the Yes button on the pop up window to continue with the installation. Chapter 9 To add the certificate to the Root Store, click on the Yes button.
Appendix III Certificate Application for WPA mode Chapter 10 The following window will appear showing that the certificate has been successfully installed into your PC. AIII.3 Applying for Client Certifications If you have installed Microsoft SP2 or Microsoft XP SP1 with the 2 patch files provided on the Product CD, you are now ready to apply for a certificate for your wireless client. At this stage, ensure that your wireless client has connectivity to the CA server.
Appendix III Certificate Application for WPA mode Chapter 11 Next, you need to connect to your server in order to get a certification. Enter the username and password that are provided by your system administrator. Chapter 12 Once you get connected to your server, the following screen shot will appear. Select the Request a certificate radio button and click on the Next> button. Follow the instructions shown on the screen.
Appendix III Certificate Application for WPA mode Chapter 13 To confirm whether you have received your certificate, go to your web browser and select Internet Options… from your Tools pull down menu. Chapter 14 Go to the Content tab and click on the Certificates… button. Notice that your username is in the listing. This shows that the certificate has been issued to you.
Appendix III Certificate Application for WPA mode AIII.4 Becoming a domain member Next, you need to add your username in the domain so that you can communicate with the access point connected to your server. 1. From the My Computer icon on your desktop, right click and go to Properties. Chapter 15 Go to the Computer Name tab and select Change… button as shown in the screen on the right. Chapter 16 From the Member of section, select the Domain: radio button and enter the name of your domain.
Appendix III Certificate Application for WPA mode this example, we are using test as the domain name. Chapter 17 Next, you need to enter your username and password again for verification. Please note that your system administrator provides this information. Chapter 18 Click on the OK button to proceed.
Appendix III Certificate Application for WPA mode Chapter 19 When done, a message will appear as shown below. You may need to restart your computer for the changes to take effect.
Appendix IV Wireless Zero Configuration Utility Appendix IV Wireless Zero Configuration Utility If your computer is running under the Windows XP operating system, you can opt to configure the Wireless Network Connection from your Windows XP operating system, instead of the Atheros Utility. You need to exit from the Atheros Utility before accessing to Windows XP’s Wireless Zero Configuration Utility. AIV.
Appendix IV Wireless Zero Configuration Utility Chapter 20 Select the check box Use Windows to configure my wireless network settings to activate Wireless Zero Configuration Utility.
Appendix IV Wireless Zero Configuration Utility When the Wireless Zero Configuration Utility is in use, a pop-up message is displayed on the Utility when you attempt to create or edit a configuration profile from the Profile Management tab of the utility. CAUTION If you activate BOTH (not recommended) the Wireless Zero Configuration Utility and the Atheros Utility simultaneously, the Profile setting configured by the Atheros Utility will be overridden by those of the Wireless Zero Configuration Utility.
Appendix V Panel Views and Descriptions Appendix V Panel Views and Descriptions Components Indications & Descriptions 1 Power Green 2 USB Connector Connect this end to the USB port of your PC/notebook. 3 MC Connector (Version MC) Hook Connect the testing line to the MC connector. 4 Indicates that power is being supplied to the USB adapter. As a strap holder to prevent the USB adapter form being lost or carelessly dropped.
Appendix VI Technical Specifications Appendix VI Technical Specifications Network Protocol, Standards and Electrical Emissions Industry Standards • • • IEEE 802.11b/g IEEE 802.11b/g/A (Version AG) USB 2.0 Performance Frequency Band IEEE 802.11g: IEEE 802.11b: IEEE 802.11a (Version AG): 2.400 ~ 2.4835GHz (US, Canada) 5.15-5.35GHz;5.725-5.85GHz Data Rates (with automatic fallback) 108Mbps, 54Mbps, 48Mbps, 36Mbps, 24Mbps, 18Mbps, 12Mbps, 11Mbps, 9Mbps, 6Mbps, 5.
Appendix VI Technical Specifications Receiver Sensitivity -95 dBm at 1Mbps (typical) -92 dBm at 6Mbps (typical) -90 dBm at 11Mbps (typical) -73 dBm at 54Mbps (typical) Host Interface USB 2.0 Security • • • 64/128/152-bit WEP encryption IEEE 802.