Intel(R) PRO/Wireless 2200BG User's Guide Your Intel(R) PRO/Wireless 2200BG Network Connection adapter works with either 802.11b or 802.11g wireless standard. Operating at 2.4 GHz frequency at speeds of up to 54 Mbps you can now connect your computer to high-capacity existing 802.11b networks using multiple access points within large or small environments, and also to high-speed 802.11g networks.
trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Intel disclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows are registered trademarks of Microsoft Corporation. *Other names and brands may be claimed as the property of others.
Back to Contents Page Wireless LAN Overview: Intel(R) PRO/Wireless 2200BG User's Guide About Wireless LAN Technology ● ● ● ● ● Choosing a WLAN Configuring a WLAN Identifying a WLAN Surveying the Site of Your WLAN Factors Affecting Range A wireless network connects computers without using network cables. Computers use radio communications to send data between each other. You can communicate directly with other wireless computers, or connect to an existing network through a wireless access point.
Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. Ad Hoc Mode is only supported in 802.11b and 802.11g networks. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configuring a Wireless LAN There are three basic components that must be configured for an 802.
● locations. Security: The 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this same key to unscramble the data. If you are connecting to an existing network, use the encryption key provided by the administrator of the wireless network.
packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID. Surveying the Site of Your Wireless LAN Conducting a site survey for your wireless LAN is the most crucial step in the process of setting up a wireless network. It greatly reduces the amount of troubleshooting you will have to do once you have the wireless LAN set up and ready for connection testing.
best location for access points. Factors Affecting Range Although access points can transmit signals up to 60 feet away in an area with many walled barriers or as much as 500 feet away in a large open area, the range is affected by the following factors: ● ● ● ● Building materials, such as steel and drywall, can shorten the range of the radio signals. Physical layout of the area can interfere with the signals and cause them to be dropped.
● you need a different level of coverage in some areas, you may need to move, replace, or supplement access points and antennas. You are physically changing the site: Remodeling may introduce new sources of interference, such as motors and metal structures within the coverage area of the access point, even if it does not directly effect the sites where the access points are located. Elements of an Effective Site Survey An effective site survey requires four elements.
Back to Contents Page Please read all restrictions and disclaimers.
Back to Contents Page Software Installation: Intel(R) PRO/Wireless 2200BG User's Guide Software Installation Installing Drivers and Intel(R) PROSet for Wireless Software See the instructions for your operating system: ● ● Windows 2000 Windows XP Installation under Windows* 2000 Preliminary Notes The installation instructions in this section are based on the following assumptions: ● ● ● The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer
restarts, the driver will be automatically installed. After loading the Windows 2000 operating system, be sure to log in with administrative rights. If you log in to Windows 2000 without administrative rights, you may run into problems during the installation. During initial adapter installation and configuration, it may take up to two minutes for adapter settings to be confirmed. Driver Installation To install driver software in Windows* 2000, follow these steps: 1.
wireless configuration utility (required): Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet for Wireless installer manually using Start > Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXPT32 on the Intel CD supplied with the product.
Windows, re-boot the computer. Any current connection remains active (the profile is active) until the computer re-boots. Installation under Window* XP Preliminary Notes The installation instructions in this section are based on the following assumptions: ● ● ● The wireless adapter hardware has already been installed in the computer in accordance with the computer manufacturer's instructions. The computer has not been powered on since the hardware installation was completed.
1. Power up the computer in which the wireless adapter hardware has just been installed. 2. Log in with administrative rights if prompted by Windows XP. 3. Wait for Windows to detect the newly installed hardware and display the Found New Hardware Wizard dialog. Verify that Install the software automatically (Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD into your CD drive.
Some versions of this product do not support the Intel(R) PRO Network Connections menu screen for installation of utility software. If the Intel(R) PRO Network Connections menu screen does not appear, or if it does not have a menu item for Wireless LAN Adapters, you can start the Intel(R) PROSet for Wireless installer manually using Start > Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXP32 on the Intel CD supplied with the product. Skip Steps 13 and 14 below and continue with Step 15.
Back to Contents Page Troubleshooting: Intel(R) PRO/Wireless 2200BG User's Guide Troubleshooting ● ● ● ● ● ● ● ● ● ● ● ● ● ● LAN Utility Conflict Message Using a Profile with an incorrect WEP Encryption Key Problems with installation Users are dropped from the wireless network Range decreases as data rate increases Signal doesn't pass through a short or thin wall Signal strength drops when a cell phone is used in area Range is shorter than it should be Interference from fluorescent lights When too much ra
established to acquire an IP address from the AP to allow data transfer. Refer to the following WEP encryption and authentication settings. Open Authentication with an incorrect WEP 64 or 128-bit encryption key: ● ● A profile with an incorrect WEP encryption key will allow the wireless adapter to associate with the access point.
● ● cordless earphones, some Bluetooth devices, and similar systems can be the source of an infrequent but hard to find the problem. Some systems do not conform to wireless regulations. Shut off suspect devices or remove them from the area. If possible, remove and reinstall your new software. Conflicts with other resident software packages are always a possibility, and they are not always the fault of the newest addition. Sometimes just starting over fixes the problem. Swap units around.
motors, spot welders, and similar “electronically noisy” devices. Range is shorter than it should be Repeat some tests late in the evening, or on a weekend, when there may be less interference. However, some users leave their networks turned all the time so this test is not foolproof. By all means, try more than one channel. Your range problem may just be a nearby user whose system uses your present test channel.
channel is correct. 2. To correct these settings, click the Networks tab. 3. Select the profile being used. 4. Click the Edit button and make the changes. Check Security Settings 1. 2. 3. 4. 5. From the General page, check that the security settings are correct. To correct the security settings, click the Networks tab. Select the profile being used. Click the Edit button. Click the Security tab. Make sure that the settings for WEP encryption are correct.
Please read all restrictions and disclaimers.
Back to Contents Page Connecting to a Network: Intel(R) PRO/Wireless 2200BG User's Guide Connecting to a Network using Intel(R) PROSet for Wireless ● ● ● ● ● ● ● ● ● ● Enabling Intel(R) PROSet for Wireless to manage Your Wireless Connections How to access Advanced Settings System Wide Advanced Settings Intel(R) PROSet for Wireless Configuration Service Scanning for Available Networks Connecting to a Network Using an Access Point Connecting to a Peer-to-Peer (Ad Hoc) Network Switching the Radio Off and On
should display available networks to connect to. If no profiles have been established, refer to Creating a New Profile for more information. How to access Advanced Settings Use the Advanced Setting to configure your network connection preferences, and profile management option. To access the Advanced Settings: 1. From the General page, click the Networks tab. 2. Click the Advanced button.
displays available networks not listed in the Profile List. This method provides automatic connection to available networks in the range of your wireless adapter. The Configuration Service constantly monitors your wireless adapter's connection status. If no matching profiles are found in the Profile List for a network, a dialog automatically displays the available network access points and computers (ad hoc mode) within range of the wireless adapter.
● functioning. Task tray icon menu: Launching an ad hoc profile and applying a profile from the task tray menu is not available. Notify when Windows XP Zero Configuration is enabled: Check: If the box is checked, when Intel(R) PROSet for Wireless starts up, a message dialog displays "Windows XP is managing your profiles" if Windows XP Zero Configuration is enabled, indicating that Windows XP is currently configured to manage the wireless adapter.
● ● ● ● the access point, if a higher priority profile becomes available, no switching will occur. The Configuration Service is only available if Intel(R) PROSet for Wireless is installed. If a connection to an access point cannot be made using any of the profiles in the Profile List, a dialog will display the available networks. If there are multiple profiles listed for an available network, a dialog box will list the profiles for you to choose from.
connection will continue with the affected Intel(R) PROSet for Wireless features show below. To avoid conflicts, the Intel(R) PROSet for Wireless profile management features have been temporarily disabled. To re-enable these features, first disable the other LAN utility and then either: 1. Re-enable from Intel(R) PROSet for Wireless Advanced Settings. 2. Resume after a computer suspend. 3. Reboot the computer.
NOTE: If the buttons described above are used, the following message displays: "Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet for Wireless has temporarily disabled its Profile Management features." Scanning for Available Networks A fast way to connect to a network is to use the Scan button to search for a network access point in range of your wireless adapter.
● ● ● The selected network has WPA security settings: If the selected network has 802.1x authentication security settings, after clicking the Connect button, the Profile Wizard Advanced Security page will display. From this dialog you can enter the 802.1x settings and connect to the network. The selected network has no (Open) WEP security settings: If the selected network has no security (Open). Click the Connect button to connect to the network.
In peer-to-peer (ad hoc) mode, you can send and receive information to other computers in an ad hoc network. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information. NOTE: While scanning with an ad hoc profile set to a specific transmit channel, if an ad hoc network is found on another channel, you will be connected using the new channel.
To end an ad hoc session, click the default profile in the Profile List and click the Close button. Creating an Ad Hoc Profile Using the Profile Wizard The following describes how to create a new ad hoc profile using the Profile Wizard and connect to an ad hoc network General Settings 1. 2. 3. 4. 5. 6. 7. From the General page, click the Networks tab. Click the Add button. The General Settings dialog displays. Enter a profile name in the Profile Name field.
17. Changing the default transmit channel from the Adapter tab: Unless the other computers in the ad hoc network use a different channel from the default channel, there is no need to change the default channel. If you want to change the default channel, click the Adapter tab, and click Configure under Ad Hoc Channel Selection. Choose the operating band select a channel. Click OK to save the setting. 18. Select the Networks tab 19. After creating the new profile, click the profile in the Profile List.
Note: When your laptop is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. To switch the radio OFF: From the General page; click the Off button next to Switch Radio On/Off. ● ● The wireless adapter is not associated with the network when the radio is off. Intel(R) PROSet for Wireless can be used to edit or add profile contents when the radio is off.
6. Choose Disable from the pop-up menu. 7. Click OK. Viewing Adapter Advanced Settings in Windows The following advanced options are available in the Windows Device Manager Advanced tab if Intel(R) PROSet for Wireless is not installed. If PROSet for Wireless is installed the Advanced tab displays the Open button. Selected this button to open PROSet for Wireless. To access the Advanced options: 1. 2. 3. 4. 5. 6. From your desktop, right-click My Computer and click Properties. Click the Hardware tab.
Please read all restrictions and disclaimers.
Back to Contents Page Using PROSet Profiles: Intel(R) PRO/Wireless 2200BG User's Guide Using Intel(R) PROSet for Wireless Profiles ● ● ● ● ● ● ● ● ● ● ● ● Setting up Windows Network Profiles Profile Connection Preferences Transmit Data Rates and Access Points Creating a New Profile Importing and Exporting Profiles Setting a Profile Password Automatic Profile Distribution Editing an Existing Profile Deleting a Profile Connecting to a Network without a Profile Connecting to a Network if a Blank SSID display
To access the profile connection preference option: 1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Under the Auto-connection heading, click the one of the following options: ● ● ● Connect to available networks using profiles only (Default setting): Use the profiles in the Profile List to connect to any available network. Connect to any available network if no matching profile is found: Connect to any available network without using a profile from the Profile List.
● Connect to 802.11b only: The adapter will search for the best 11b and 11g access points using data rates of 1, 2, 5.5, or 11 Mbps. The Available Networks list displays any 11b and 11g access point. Access Point and Client Combinations The following table shows compare the adapter wireless preference mode, and the transmit date rates using a specific type of access point.
The following summarizes how the modulation settings operate using ad hoc mode. Ad Hoc Initiator Ad Hoc Joiner Action Comments 11b-only 11b-only 11b-only 11g-only 11b and 11g 11g-only 11b-only 11g-only 11b and 11g 11b and 11g 11b-only 11g-only 11b and 11g Basic rates (1, 2, 5.5, or 11 Mbps) Down scale basic rates, turn on protection* (1, 2, 5.5, or 11 Mbps) Basic rates (1, 2, 5.5, or 11 Mbps) Does not apply to Intel(R) PRO/Wireless 2200BG adapter.
A station in an ad hoc network constantly adapts itself to the current situation in the ad hoc network as far as other stations capabilities are concerned. Updating of the supported transmit data rates is done in the following way: Only the basic rates change. Supported rates of a station never change. At all times the basic rates advertised by stations in an ad hoc network should be the same, and should reflect the set of basic rates supported by every station in this ad hoc network.
(RTS/CTS or CTS-to-self) is on. 11g only mode Initiate an ad hoc network as an 11g only (1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps). Support joining and down scaling in the same way as in Mixed mode. When initiating such an ad hoc network the advertised rates are: 1, 2, 5.5, 6, 11, 12, 18, 24, 36, 48 and 54 with 1, 2, 5.5, 6, 11, 12 and 24 Mbps as basic. 11g only stations are able to join any ad hoc network they hear.
NOTE: If this is the first time you have created a profile, click the profile named Default in the Profile List, click the Edit button and rename the default profile in the Profile Name field on the General page. General Settings 1. 2. 3. 4. 5. 6. 7. From the General page, click the Networks tab. Click the Add button. The General Settings dialog displays. Enter a profile name in the Profile Name field. Enter the network SSID, in the Network Name (SSID) field.
Next to display the Password page. Password Protection Settings 21. 22. 23. 24. Click the Password protect this profile checkbox. Enter a password in the Password field. Reenter the same password in the Confirm New Password field. Click the Back button to change or verify the settings or click Finish when you have completed the profile settings and return to the Networks page. Connect to the Network 25. Click the new profile name shown in the Profile List.
3. Click the profiles to export from the export profile list. 4. Click the Browse button and select a directory to save the profiles in. Click OK to return to the previous dialog. 5. Click the Export button to start exporting the profiles. 6. Click OK twice to return to the Networks tab. 7. Click OK to close the Intel(R) PROSet for Wireless utility. Setting a Profile Password To set a password for an existing profile: 1. 2. 3. 4. 5. 6. 7.
list. If an attempt is made to edit a distributed profile that is password protected, a password prompt will appear. Automatically importing WLAN profiles is accomplished by monitoring the import folder on your hard disk for new profile files. Only profiles that have the Enable Auto-Import box checked on the Profile Wizard dialogs can be automatically imported.
5. 6. 7. 8. 9. the network profile settings: Click OK on any of the pages to save all the settings and return to the Networks tab. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. Click the Advanced button to set the network connection preferences. Click the Connect button to connect to the network. Click OK to close the Intel(R) PROSet for Wireless utility. Deleting a Profile To delete a profile: 1. 2. 3. 4.
To connect to an access point that transmits a blank network name (SSID) in the Available Networks list: 1. From the General page, click the Networks tab. 2. Click the Scan button. 3. Select the network name with a blank SSID and shown in the Available Networks list. 4. Click the Connect button. 5. The Profile Wizard dialog displays. Enter a profile name and Network Name (SSID) and security settings if required. Click Next to save the profile settings and return to the Networks tab. 6.
Back to Contents Page Security Overview: Intel(R) PRO/Wireless 2200BG User's Guide Encryption Overview WEP Encryption and Authentication 802.1x Authentication What is a RADIUS Wi-Fi Protected Access (WPA) PEAP Cisco LEAP Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP (Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key.
Wired Equivalent Privacy (WEP) encryption and shared authentication provides protection for your data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. Authentication provides an additional validation process from the adapter to the access point.
802.1x features ● 802.1x supplicant protocol support ● Support for the Extensible Authentication Protocol (EAP) - RFC 2284 ● Supported Authentication Methods: ● ● MD5 - RFC 2284 ● EAP TLS Authentication Protocol - RFC 2716 and RFC 2246 ● EAP Tunneled TLS (TTLS) ● Cisco LEAP ● PEAP Supports Windows XP, 2000 802.1x Authentication Notes ● ● ● 802.1x authentication methods, include passwords, certificates, and smart cards (plastic cards that hold data) 802.
uses for data encryption. With 802.1x authentication, an authentication method is used between the client and a Remote Authentication Dial-In User Service (RADIUS) server connected to the access point. The authentication process uses credentials, such as a user's password that are not transmitted over the wireless network. Most 802.1x types support dynamic per-user, per-session keys to strengthen the static key security. 802.
up an 802.1x profile using the Intel(R) PROSet for Wireless utility. What is a RADIUS? RADIUS is the Remote Access Dial-In User Service, an Authorization, Authentication, and Accounting (AAA) client-server protocol for when a AAA dial-up client logs in or out of a Network Access Server. Typically, a RADIUS server is used by Internet Service Providers (ISP) to performs AAA tasks. AAA phases are described as follows: ● ● ● Authentication phase: Verifies a user name and password against a local database.
and to support various authentication methods, including user's passwords and one-time passwords, and Generic Token Cards. Cisco LEAP Cisco LEAP (EAP Cisco Wireless) is a server and client 802.1x authentication via a usersupplied logon password.
mode, send all messages unencrypted. These APs broadcast that the network is not using encryption, but allow clients to join using WEP mode. When “Mixed-Cell” is enabled in a profile, it allows you to connect to access points that are configured for “optional encryption.” NOTE: Make sure to enable the Advanced Settings Mixed-Cell (Requires Cisco CCX option) when using Enable Cisco-Client eXtentions in a profile. A Cisco CCX enabled profile uses CKIP data encryption and 802.1x LEAP authentication.
Back to Contents Page Setting up Connection Security: Intel(R) PRO/Wireless 2200BG User's Guide Security and Encryption Setting up Data Encryption and Authentication Encryption Overview How to Enable WEP Encryption System Administrator Tasks Setting up the Client for WEP and MD5 authentication Setting up the Client for WPA-PSK using WEP or TKIP authentication Setting up the Client for WPA using TKIP encryption and TLS authentication Setting up the Client for WPA using TKIP encryption and TTLS or PEAP authe
schemes are Open and Shared authentication: ● ● Using Open authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station. The receiving station or AP will grant any request for authentication. Open authentication allows any device network access.
Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP (Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile. However, only one key can be used at a time. You can also choose to password protect the profile to ensure privacy. The pass phrase is used to generate a WEP key automatically.
6. Select 64-bit or 128-bit for the Encryption Level. 7. Select a key index number 1, 2, 3, or 4. 8. Select either of the following: ● ● Use pass phrase: Click Use Pass Phrase to enable. Enter a text phrase, up to five (using 64-bit) or 13 (using 128-bit) alphanumeric characters (0-9, a-z or A-Z), in the pass phrase field. Use hex Key: Click Use hex Key to enable.
Setting up the Client for TLS authentication Step 1: Getting a certificate To allow TLS authentication, you need a valid client (user) certificate in the local repository for the logged-in user’s account. You also need a trusted CA certificate in the root store.
9. To verify the installation, click Internet Explorer > Tools > Internet Options > Content > Certificates. The new certificate should be installed in "Personal" folder. Importing a certificate from a file 1. Open Internet Properties (right-click on the Internet Explorer icon on the desktop and select Properties. 2. Click the Certificates button on the Content page. This will open the list of installed certificates. 3. Click the Import button under the list of certificates.
9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Click the 802.1x Enabled checkbox. Set the authentication type to TLS to be used with this connection. Click the Configure button to open the settings dialog. Enter your user name in the User Name field. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default.
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Select Infrastructure for the operating mode. Click Next. Select Open (recommended) for the Network Authentication. Select WEP as the Data Encryption. Select either 64 or 128-bit for the Encryption Level. Select the key index 1, 2, 3 or 4. Enter the required pass phrase or hex key. Click the 802.1x Enabled checkbox. Select MD5 as the 802.1x Authentication Type.
derived from the PSK. To configure a profile using WPA-PSK: 1. 2. 3. 4. 5. 6. From the General page, click the Networks tab. Click the Add button. Enter the profile and network (SSID) name. Select Infrastructure for the operating mode. Click Next. Select WPA-PSK for the Network Authentication. You can also select authentication mode. 7. Select WEP or TKIP as the Data Encryption. 8. Select either of the following: ● Use pass phrase: Click Use Pass Phrase to enable.
7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. Select WPA for the Network Authentication. Select TKIP as the Data Encryption. Set the authentication type to TLS to be used with this connection. Click the Configure button to open the settings dialog. Enter your user name in the User Name field. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default.
response packets are sent over a non-exposed TLS encrypted channel. Using PEAP authentication: PEAP settings are required for the authentication of the client to the authentication server. In PEAP, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between client and server. The client can use another EAP mechanism, such as Microsoft Challenge Authentication Protocol (MSCHAP) Version 2, over this encrypted channel to enable server validation.
Select the appropriate option to match the server name exactly or specify the domain name. Authentication Protocol: ● PEAP: Select MS-CHAP-V2. This parameter specifies the authentication protocol operating over the PEAP tunnel. The protocols are: MS-CHAP-V2 (Default), GTC, and TLS. ● TTLS: Select PAP. This parameter specifies the authentication protocol operating over the TTLS tunnel. The protocols are: PAP (Default), CHAP, MD5, MS-CHAP and MS-CHAP-V2. Enter the user name.
Save User Credentials checkbox to save the credentials for future use with this 802.1x profile. 27. Click OK to save the settings and connect to the network. Setting up the Client for CCX using CKIP encryption and LEAP authentication Configuring LEAP using Intel(R) PROSet for Wireless NOTE: A LEAP profile can only be configured using Intel(R) PROSet for Wireless. An Intel(R) PROSet for Wireless CCX (v1.0) profile must be configured to connect to a specific ESS or Wireless LAN network.
13. 14. 15. 16. 17. 18. the credentials for future use with this 802.1x profile. Note: The user name and password do not have to be the same as the name and password of your current Windows user login. Click on the Enable Rogue AP Detection if the network is setup to account for rogue APs. This setting should also be made if only the "Network-EAP" checkbox is selected in the AP configuration settings (applies to all Cisco APs). Click Close to save the settings. Select the Networks tab.
profile, it sends 802.11 authentication with an Authentication algorithm value of 0x80. However, the supplicant sends out 0x80 only if the Rogue AP box is checked. Network-EAP, Open and Required EAP AP: If Network-EAP, Open and Required EAP boxes are checked then it would accept both types of 802.11 authentication algorithm values 0x0 and 0x80. However, once the client is associated and authenticated the AP expects an EAP handshake to take place.
When the checkbox is checked it ensures that the client implements the Rogue AP feature as required by CCX. The client makes note of APs that it failed to authenticate with and sends this information to the AP that allows it to authenticate and connect. Also, the supplicant sets the Authentication algorithm type to 0x80 when the Rogue AP box is checked. There may be some network configurations implementing and Open and Required EAP only as described above.
● LEAP support is required ● Rogue AP reporting support ● Cisco Extension: Aironet IE support – CWmin and CWmax fields ● Encapsulation Transformation Rule IE support ● Cisco Extension: AP IP address IE ● Cisco Extension: Symbol IE ● Mixed (WEP and non-WEP) cells ● AP may respond to more than one SSID – VLAN awareness ● Stealth mode support - Clients should ignore missing SSIDs in beacons ● Multiple SSID support – Client should be able to roam up to 3 SSIDs ● Client to use configured SSI
Back to Contents Page Specifications: Intel(R) PRO/Wireless 2200BG User's Guide Specifications Form Factor Mini PCI Type 3B Dimensions Width 2.34 in x Length 1.75 in x Height 0.20 in (59.45 mm x 44.45 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.
Indoor Range 100 ft (30 m) @ 11 Mbps / 300 ft (90 m) @ 1 Mbps Outdoor Range 400 ft (120 m) @ 11 Mbps / 1500 ft (460 m) @ 1 Mbps Power Transmit Output Power 16 dBm (typical) Adapter Power Consumption Transmit 1.45 W Receive 0.85 W Idle 60 mw Disable 50 mw Voltage 3.3 V General Operating Systems Windows* XP, 2000 Wi-Fi Alliance certification Wi-Fi® certification for 802.11b and 802.11g WLAN Standard IEEE 802.
Back to Contents Glossary of Terms: Intel(R) PRO/Wireless 2200BG User's Guide Numerical A B D E F I K M O P R S T U W Numerical 802.11a: The 802.11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing (OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such as WEP encryption for security. 802.11b:The 802.
supporting 128-, 192-, and 256-bit keys. B Basic Service Set Identifier (BSSID): A unique identifier for each wireless client on a wireless network. The BSSID is the Ethernet MAC address of each adapter on the network. Bit Rate: The total number of bits (ones and zeros) per second that a network connection can support. Note that this bit rate will vary, under software control, with different signal path conditions.
Extensible Authentication Protocol (EAP): An IETF standard that establishes an authentication protocol for network access. Many authentication methods, including passwords, certificates, and smart cards, work within this framework. EAP-TLS: A type of authentication method using the Extensible Authentication Protocol (EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use passwords. EAP-TLS authentication supports dynamic WEP key management.
Independent Basic Service Set Identifier (IBSSID): Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point. Independent Network: A network that provides (usually temporarily) peer-to-peer connectivity without relying on a complete network infrastructure. Infrastructure Network: A wireless network centered around an access point.
Multipath: The signal variation caused when radio signals take multiple paths from transmitter to receiver. O Orthogonal Frequency Division Multiplexing (OFDM): A modulation technique for transmitting large amounts of digital data over radio waves. 802.11a uses OFDM, as will 802.11g. P Peer-to-Peer Mode: A wireless network structure that allows wireless clients to communicate with each other without using an access point.
resources. Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure networks built around multiple access points. S Service Set Identifier (SSID): Used to identify clients on a wireless network. Shared key: An encryption key known only to the receiver and sender of data. Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot the field strength of the first unit’s transmitted signal.
transceivers. U UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference from other legal WLAN users, but the other sources of interference problems are, or legally should be, missing. W WEP64 and WEP128: Wired Equivalent Privacy, 64 bit and 128 bit (64 bit is sometimes referred to as 40 bit).
Back to Contents Please read all restrictions and disclaimers.
Back to Contents Page Customer Support: Intel(R) PRO/Wireless 2200BG User's Guide Intel support is available online or by telephone. Available services include the most upto-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com Network Product Support: http://www.intel.com/network Corporate Web Site: http://www.intel.
Back to Contents Page Please read all restrictions and disclaimers.
Back to Contents Page Regulatory Information: Intel(R) PRO/Wireless 2200BG User's Guide Information For the User Regulatory Information Information for the user Intel(R) PRO/Wireless 2200BG Network Connection adapter (model WM3B2200BG) Safety Notices The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment.
The use of wireless devices on airplanes is governed by the Federal Aviation Administration (FAA). ❍ The use of wireless devices in hospitals is restricted to the limits set forth by each hospital. Antenna use: ❍ In order to comply with FCC RF exposure limits, low gain integrated antennas should be located at a minimum distance of 20 cm (8 inches) or more from the body of all persons.
Caution: Regulations of the FCC and FAA prohibit airborne operation of radiofrequency wireless devices because their signals could interfere with critical aircraft instruments. Other Wireless Devices Safety Notices for Other Devices in the Wireless Network: Refer to the documentation supplied with wireless Ethernet adapters or other devices in the wireless network.
frequency electromagnetic energy. The level of energy emitted by this device, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones. The Intel(R) PRO/Wireless 2200BG adapter wireless device operates within the guidelines found in radio frequency safety standards and recommendations.
interference caused by such unauthorized modification, substitution or attachment is the responsibility of the user. Intel Corporation and its authorized resellers or distributors are not liable for any damage or violation of government regulations that may arise from the user failing to comply with these guidelines. NOTE—The Intel(R) PRO/Wireless 2200BG adapter transmits less than 100 mW, but more than 10 mW. USA—Federal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules.
● receiver is connected. Consult the dealer or an experienced radio/TV technician for help. NOTE—The Intel(R) PRO/Wireless 2200BG adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations. U.S. Frequency Bands 2.400 - 2.
Die Geräte erfüllen die grundlegenden Anforderungen der RTTE-Richtlinie 1999/5/EG. Questa apparecchiatura è conforme ai requisiti essenziali della Direttiva Europea R&TTE 1999/5/CE. Este equipo cumple los requisitos principales de la Directiva 1999/5/CE de la UE, "Equipos de Terminales de Radio y Telecomunicaciones". Este equipamento cumpre os requisitos essenciais da Directiva 1999/5/CE do Parlamento Europeu e do Conselho (Directiva RTT).
The wireless adapter transmits less than 100 mW, but more than 10 mW. Belgique Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enregistrement auprès de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. Italia For use in private premises: no restriction outdoor or indoor, 2.400 - 2.
Back to Contents Page Warranty: Intel(R) PRO/Wireless 2200BG User's Guide OEM Hardware Warranty Information Limited Hardware Warranty (1 year): Notwithstanding anything to the contrary, including any terms and conditions contained in the Intel CD-ROM or elsewhere, Intel warrants to the integrator/OEM that the adapter product delivered in this package will be free from defects in material and workmanship for one (1) year.