802.11g Wireless LAN Cardbus Adapter User Manual Version: 1.
COPYRIGHT Copyright © 2005/2006 by this company. All rights reserved.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
CONTENTS 1 INTRODUCTION ...................................................................... 1 1.1 1.2 1.3 F EATURES .......................................................................................... 1 S PECIFICATIONS .................................................................................. 1 P ACKAGE C ONTENTS ........................................................................... 2 2 INSTALLATION PROCEDURE.................................................
1 Introduction Thank you for purchasing the 802.11g Wireless LAN Carbus Adapter. This Adapter is designed to comply with IEEE 802.11g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Laptop or Desktop computers. This adapter supports 64/128/152-bit WEP data encryption that protects your wireless network from eavesdropping. It also supports WPA (Wi-Fi Protected Access) feature that combines IEEE 802.1x and TKIP (Temporal Key Integrity Protocol) technologies.
• • • • 1.3 Dimension: 8(H) x 118(W) x 54(D) mm Temperature: 32~131°F (0 ~55°C) Humidity: 0-95% (NonCondensing) Certification: FCC, CE Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: • One PC Card • One CD (Driver/Utility/User’s Manual.) • One Quick Guide If any of the above items is missing, contact your supplier as soon as possible.
2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: The following installation was operated in Windows XP. (Procedures are similar for Windows 98SE/Me/2000/2003 Server.) Note2: If you have installed the Wireless PC Card driver & utility before, please uninstall the old version first. Th i s ch ap t er d escr i b es u si n g t h e At h er os in st aller t o in st all t h e At h er os w i r eless n et w or k ad ap t er d r iv er .
Install Driver Only Installs only the driver without installing the client utilities. Make Driver Installation Diskette(s) Creates driver installation diskettes. 6 . A p r om p t ap p ear s w ar n i n g t h at t h e i n st al l r eq u ir es t h e sy st em t o b e r eb o o t ed at t h e en d of t h e in st allat ion p r ocess. Cl ick Yes t o co n t in u e. 7 . Ch oose t h e set u p d ir ect or y . Th e d ef au lt is C: \ P r o g r a m Fi l e s \ A t h e r o s. Cl ick Nex t . 8 .
Th e in st aller con t in u es in st allat ion . 1 3 . Win d ow s m ay d isp l ay a Win d ow s Log o er r or f or t h e WLAN d r iv er . Cl ick Cl ick Con t in u e An y w ay . Th e in st aller con t in u es in st allat ion . 1 4 . Cl ick OK at t h e p r om p t t o r eb oot an d com p l et e t h e in st al l at ion .
I n st a llin g t h e At h e r o s W ir e le ss N e t w o r k Ad a p t e r To in st al l t h e d r iv er an d t h e At h er os Cl i en t Ut i l it y , see “ To in st al l t h e ACU an d d ev ice d r iv er : ” on p ag e 2 - 1 . To in st al l t h e Dev ice Dr iv er sep ar at ely : 1 . I n ser t t h e d ev ice in t o t h e co m p u t er : Th e Fou n d New Har d w ar e Wizar d op en s. Ch oose ad v an ced in st al l at ion an d cl ick Nex t . 2 . Ch oose Sear ch f o r d r iv er in t h ese l ocat i on s.
Th e in st al l er con t i n u es i n st al l at i on . 4 . Cl ick Fi n ish t o cl ose t h e Fou n d New Har d w ar e Wizar d an d co m p let e in st allat ion of t h e USB d ev ice b oot l oad er . 5 . Th e Fou n d New Har d w ar e Wizar d op en s t o in st al l so f t w ar e f o r t h e d ev ice. Cl ick Nex t t o con t in u e. 6 . Ch oose Sear ch f o r d r iv er in t h ese locat i on s. Th e d r iv er is locat ed in t h e NDI S5 x d i r ect or y . 7 .
Th e in st al l er con t i n u es i n st al l at i on . 8 . Cl ick Fi n ish t o cl ose t h e Fou n d New Har d w ar e Wizar d an d co m p let e in st allat ion of t h e At h er os Net w or k Ad ap t er . Use t h e ACU t o con f ig u r e t h e d ev ice d r iv er . Th e ACU p r ov id es ex t en siv e o n lin e h el p t o aid in con f ig u r in g t h e d ev ice. Access t h e ACU b y r ig h t - cl i ck in g t h e t r ay icon an d ch oosin g At h er os Cl i en t Ut i l it y . III.
A. Double-click the icon. B. Click “Advance”. C. Uncheck “Use Windows to configure my wireless network settings”.
3 Configuration Utility The Client Utility is a user-mode utility designed to edit and add profiles for, as well as display and diagnostics pertaining to a selected wireless adapter. 3.1 Wireless Connection Status When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength.
Parameter Description New To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button. Modify In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs.
location. Order Profiles 3.3 Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. Diagnostics The client utility includes a number of tools to display current diagnostics and status information.
3.4 Security Th is Ch ap t er d escr ib es set t in g u p secu r it y u sin g t h e At h er os Cl i en t Ut i l it y ( ACU) . Wh i l e u sin g t h e At h er os w ir el ess n et w or k ad ap t er , en cr y p t ion d at a can p r ot ect it s as it is t r an sm it t ed t h r ou g h t h e w ir eless n et w or k . Radio Button WPA Description Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA opens the WPA EAP drop-down menu.
• PEAP (EAP-MSCHAP V2) • LEAP If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Pre-Shared Key(Static WEP) Enables the use of pre-shared keys that are defined on both the access point and the station.
1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2. Choose EAP-TLS from the drop-down menu. Enabling EAP-TLS security: To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate authority from the list.
1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right, then click the Configure button. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication: 4. o Check Use Windows User Name to use the Windows user name as the EAP user name. o OR: Enter a EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process.
2. Select the appropriate network certificate authority from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication: 4. o Check Use Windows User Name to use the Windows user name as the PEAP user name. o OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. Choose Token or Static Password, depending on the user database.
1. Click the Configure button. 2. Select the appropriate certificate from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication: 4. o Check Use Windows User Name to use the Windows user name as the PEAP user name. o OR: Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process.
• On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-down menu. • OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-down menu. 1. Click the Configure button. 2. Specify a user name and password: Select to Use Temporary User Name and Password by choosing the radio button: o Check Use Windows User Name to use the Windows user name as the LEAP user name.
8. Click OK. 9. Enable the profile. 3.4.2 Using WPA Passphrase Security To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA Passphrase radio button. 2. Click on the Configure button. 3. Fill in the WPA Passphrase. 4. Click OK. 3.4.3 Pre-Shared Encryption Keys Defining pre-shared encryption keys: 1. Click the Define Pre-Shared Keys radio button on the Security tab. 2. Click on Configure.
Key Button Description Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F), or ASCII text (all keyboard characters except spaces). Encryption Keys Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed. WEP Keys (1-4) Defines a set of shared encryption keys for network configuration security.
5. Enter a new key. 6. Make sure to select the Transmit Key button to the left of this key is selected for the key to transmit packets. 7. Click OK. Disabling Static WEP • To disable static WEP for a particular profile, choose None on the Profile Management tab and click OK. • OR: Select any other security option on the Profile Management tab to automatically disable static WEP.
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks. 802.11g defines the use of the same OFDM modulation technique specified in IEEE 802.
5. What is Infrastructure? An integrated wireless and wireless and wired LAN is called an Infrastructure configuration. Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 6. What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7.
12. What is DSSS?What is FHSS?And what are their differences? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct-sequence spreadspectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted.