Contents Intel(R) PRO/Wireless 2915ABG Network Connection User Guide With your wireless network card, you can access wireless networks, share files or printers, or even share your Internet connection. All of these features can be explored using a wireless network in your home or office. This wireless LAN solution is designed for both home and business use. Additional users and features can be added as your networking needs grow and change.
Contents © 2000–2004 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497 USA The copying or reproducing of any material in this document in any manner whatsoever without the written permission of Intel Corporation is strictly forbidden. Intel(R) is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries.
Using Intel(R)PROSet/Wireless Back to Contents Using Intel PROSet/Wireless Software: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● Using Intel(R) PROSet/Wireless as your Wireless Manager Starting Intel PROSet/Wireless Launch Intel PROSet/Wireless from the task tray Task Tray Menu Options Tool Tips and Balloon Message Prompts Intel PROSet/Wireless Main Window Connection Status Icons Connection Details Profile List Available Networks Menus (Tools and Profile
Using Intel(R)PROSet/Wireless NOTE: Check that the Application Settings option Notify me when another application is using the wireless device is selected. This option prompts you when Windows XP starts to manage your network profiles. Starting Intel PROSet/Wireless Launch Intel PROSet/Wireless either from the task tray icon, the Windows Start button, or from the Windows Control Panel icon.
Using Intel(R)PROSet/Wireless The Intel PROSet/Wireless icon displays in the task tray located in the lower right corner of your Windows desktop. Right-click the status icon to display the menu options. Intel PROSet/Wireless can support multiple adapters. These wireless adapters are displayed in the task tray menu options.
Using Intel(R)PROSet/Wireless Authentication failed. Not able to authenticate with wireless network. Green icon with a yellow warning triangle Connected to a wireless network: Connected to a wireless network. Tool tip display network name, speed, and signal quality. The green icon with waves reflects signal quality. More waves mean better signal quality. NOTE: If you are using Windows* XP as your wireless manager, the task tray icon is white. It does not reflect connection status.
Using Intel(R)PROSet/Wireless Balloon Prompt "Wireless network found" Action: Double-click the Balloon Prompt to connect to the available network. Intel PROSet/Wireless Main Window The Intel PROSet/Wireless main window provides basic information about your connection. If you are associated to a network it will contain information such as SSID, profile name, speed, AP settings such as 802.11 band, channel and security mode.
Using Intel(R)PROSet/Wireless Use the Intel PROSet/Wireless to: ● ● ● ● ● ● View the current connection status (signal quality, speed and current network name) Scan for available wireless networks Manage profiles Auto-connect profiles to available networks in a specific order defined in the Profile list Connect to infrastructure and ad hoc networks Configure adapter power settings Connection Status Icons The Intel PROSet/Wireless main window displays connection status icons which indicate the current con
Using Intel(R)PROSet/Wireless Speed Displays the current date transfer rate in mega-bits-per-second (Mbps): ● ● ● 802.11g - 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 802.11b - 1, 2, 5.5, or 11 802.11a - 54, 48, 36, 24, 18, 12, 9, 6 Signal Quality The signal quality icon bars indicate the quality of the transmit and receive signals between your wireless adapter and the nearest access point or computer in peer-to-peer mode.
Using Intel(R)PROSet/Wireless The Connection Details displays the current network connection information. Network Connection Details page description Name Profile Name Network Name IP address Signal Quality Description Name of the profile. If this is a one-time connection then is displayed Network Name (SSID) of the current connection. Internet Protocol (IP) address for the current connection.
Using Intel(R)PROSet/Wireless Signal Strength Adapter MAC Address Band While adequate signal strength is required for good data communications, even more important is the quality of the signal. A strong signal of poor quality results in poor data communications. If the signal quality is low, investigate sources of noise nearby, as interference from other wireless LANs, other RF transmitters, electric motors or compressors.
Using Intel(R)PROSet/Wireless The Profiles List displays the current user and administrator profiles in the order that they are to be applied. Use the up and down arrows to arrange profiles in a specific order to automatically connect to a wireless network. The Configuration Service also uses the profiles priority list to connect to wireless networks. NOTE: IPrelogon/Common or Persistent profiles are displayed at the top of the Profiles list. These profiles have priority over user based profiles.
Using Intel(R)PROSet/Wireless Available Networks The Available Networks list displays a list of wireless networks within range of the adapter. Click Connect to launch the Profile Wizard to create a profile for the selected wireless network. Name Description The signal strength of the wireless network access point or computer (Ad hoc mode).
Using Intel(R)PROSet/Wireless Authentication Level Displays the current authentication security mode for the profile being used. Displays: ● ● ● ● ● Data Encryption Access Points in this Network <0-50> None: No encryption used. Shared WPA-Enterprise WPA-Personal Unknown Displays the 802.11 authentication used by the currently used profile. Displays the 802.1x authentication algorithm; MD5, LEAP, TLS, TTLS and PEAP. Refer to Security Settings for more information.
Using Intel(R)PROSet/Wireless Tools Application Settings: Provide system wide connection preferences. Use Ctrl+P from your keyboard as an alternative to using your mouse to access this feature. Refer to Application Settings for information. Adapter Settings: Displays Adapter Settings corresponding to the settings made in Windows Device Manager, Use Ctrl+A from your keyboard as an alternative to using your mouse to access this feature. Refer to Adapter Settings for information.
Using Intel(R)PROSet/Wireless The Application Settings control how the Intel PROSet/Wireless behaves and displays information. Name Adapter Task Tray Description Displays the name of the installed adapter currently being managed by Intel PROSet/Wireless Show application icon in the taskbar: Select this option to display the task tray status icon. This icon resides in the Windows Task bar (Notification area). Clear the box to not display the task tray status icon.
Using Intel(R)PROSet/Wireless Notifications Show Alert Notifications: Select this option to display balloon windows next to the task tray icon. When your action is required, a message prompt displays. Only high importance events (alerts) trigger a balloon window. If the balloon window is checked, then the appropriate action is taken. Clear the box to not display balloon message prompts displayed. Refer to Tool Tip and Balloon Prompts for more information.
Using Intel(R)PROSet/Wireless Manage Exclusions OK Cancel Help? Enable automatic exclude list feature: Select this checkbox to enable the automatic exclude list feature. This feature provides a way to exclude access points from automatic connection. Refer to Manage Exclusions for more information. Enable manual exclude list feature: Select this checkbox to enable the manual exclude list feature. This feature provides a way to exclude networks from automatic connection.
Using Intel(R)PROSet/Wireless Ad Hoc Channel Value: 802.11b/g: Select this option when using 802.11b and 802.11b (2.4 GHz) ad hoc band frequency. ● Select the allowed operating channel from the list. 802.11a: Select this option when using 802.11a (5 GHz) ad hoc band frequency. ● Ad Hoc Transmit Power Select the allowed operating channel from the list. Decreasing the transmit power level reduces the radio coverage. Default setting: Highest power setting.
Using Intel(R)PROSet/Wireless Preferred Band Wireless Mode Select the operating band. The selections are: ● 802.11g ● 802.11a ● 802.11b 802.11a, 802.11b, and 802.11g: (Default) - Connect the either 802.11a, 802.11b or 802.11g wireless networks. 802.11g only: Connect the wireless adapter to 802.11g networks only. 802.11a and 802.11g only: Connect the wireless adapter to 802.11a and 802.11g networks only. 802.11b and 802.11g only: Connect the wireless adapter to 802.11b and 802.11g networks only.
Using Intel(R)PROSet/Wireless The Windows XP Wireless Zero Configuration feature provides a built-in wireless configuration utility. This feature can be enabled and disabled in Windows XP or by clicking Use Microsoft Client on the Tools menu. If XP Zero Configuration is enabled, the features in Intel PROSet/Wireless are disabled. Refer to Intel PROSet/Wireless Configuration Service for information on re-enabling Intel PROSet/Wireless.
Using Intel(R)PROSet/Wireless wireless connections. Users cannot modify Administrator settings or profiles unless they have the password for this tool. A password should be chosen that is secure and not easily guessed. You can export these settings and profiles as one package to other computers on your network. Name Administrator Settings Administrator Profiles Description Settings: Set the user control over their wireless network connections.
Using Intel(R)PROSet/Wireless These settings allow the administrator to control how users of this computer use their wireless connection. Name Cache Credentials Description Cache Credentials: ● XP Co-existence Cache the user credentials during a user session: ● Click checkbox: Cache user credentials in memory so that you are only prompted the first time before connection instead of each time you connect or disconnect to the network during the Windows log on session.
Using Intel(R)PROSet/Wireless OK Cancel Help? Save settings and close the page. Cancel settings and close the page. Displays the help information for this page. Administrator Profile Options These settings provide advanced profile connection options. Allows the Administrator to enable or disable Persistent and or Pre-Logon profiles on the computer.
Using Intel(R)PROSet/Wireless Advanced Statistics (Tools menu) Provides current adapter connection information. The following describes information for the Advanced Statistics page. Name Statistics Description Advanced Statistics - This information pertains to how the adapter is communicating with an access point. Association - If the adapter finds an access point to communicate with, the value is In range. Otherwise, the value is Out of range.
Using Intel(R)PROSet/Wireless ● ● ● ● Transmit/Receive (Tx/Rx) Statistics Received Beacons: Number beacons received by the adapter. Percent missed Beacons: Percent value for missed beacons. Percent transmit errors: The percentage of data transmissions that had errors. RSSI: Signal strength of the access point with which the adapter is communicating. Displays percent values for non-directed, and directed packets. Total host packets: The sum total number of directed and non-directed packets counts.
Using Intel(R)PROSet/Wireless Intel Wireless Troubleshooter is an application that can assist you in resolving wireless network connection issues. When a connection issue is detected, a balloon tip appears at the bottom right of your desktop screen. Once you click on the balloon tip, a diagnostic message displays the recommended steps to resolve the occurred connection issue.
Using Intel(R)PROSet/Wireless Help Intel(R) Wireless Troubleshooter Help: Displays online help on the Intel Wireless Troubleshooter. About: Displays version information for the Intel Wireless Troubleshooter. Launch Wireless Event Viewer. Wireless Event Viewer Disable Click to disable the Notification alert notifications. Enable Click to enable the Notification alert notifications if an error is detected.
Using Intel(R)PROSet/Wireless Allows you to import and export user based profiles to and from the Profiles List. Wireless Profile can be automatically imported into the Profiles List. See Import and Export Profiles for more information. To export Administrator profiles refer to Administrator Export Properties for more information. Importing Profiles into the Profile List Wireless profiles can be automatically imported into the Profiles List.
Using Intel(R)PROSet/Wireless Export profiles Select the profiles you want to export: Select individual or multiple profiles from the list. The profile mode icon indicates either infrastructure or ad hoc mode is being used, and if security is being used. Browse: Browse your hard disk for the destination directory. The directory path displays in the destination directory window. Import profiles Export: Start exporting your profiles. Imports profiles into the Profile List.
Using Intel(R)PROSet/Wireless from Intel PROSet/Wireless, or by disabling the device in Windows. NOTE: When your computer is switched on, the radio is constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. Use the following methods if you need to disable the radio and use your laptop without emitting radio signals.
Using Intel(R)PROSet/Wireless To install the software: 1. Insert the Installation CD in your CD drive. 2. Click Install Software on the Intel(R) PRO Network screen. 3. On the License Agreement screen, after reading the license agreement. Select I accept the terms in the license agreement and click Next. 4. Click Custom. 5. Select from the list of features to install: Intel PROSet/Wireless: The Intel(R) PROSet/Wireless application software. ● ● Install: Click Intel PROSet Wireless.
Using Intel(R)PROSet/Wireless ● Sign On feature is installed. Uninstall: Click Single Sign On. Select Do not install this feature. A red x displays next to the option indicating that it will not be installed. Administrator Tool: Provides administrator control over what level of control each user has over their wireless network connections. ● ● Install: Click Single Sign On. Select Install this feature and all subfeatures. Click Next and proceed to step 5.
Using Intel(R)PROSet/Wireless Back to Contents file:///C|/CX2%20Muroc%20UG/6-15-04/assist.
Setting up Profile Security Back to Contents Setting up Security: Intel PRO/Wireless 2915ABG Network Connection User Guide ● ● ● Security Settings Page Options Network Authentication: Device to Device Network Authentication (Infrastructure): Enable 802.1x Authentication From the Security Settings page you can enter the required security settings for the selected wireless network. See the Profile Wizard Overview for a description of when the Profile Wizard is launched.
Setting up Profile Security The options displayed are dependent on the Operating Mode (Device to Device or Infrastructure) selected on the General Settings page. Name Setting file:///C|/CX2%20Muroc%20UG/6-15-04/wepsetup.
Setting up Profile Security Network Authentication Open Shared WPA-Enterprise WPA2-Enterprise WPA-Personal WPA2-Personal Data Encryption None WEP CXIP Enable 802.1x (Authentication Type) MD5 Open MD5 WEP Key EAP-SIM TLS TTLS PEAP LEAP EAP-FAST Cisco Options Click to view the Cisco Compatible Extensions Options page. Note: Cisco Compatible Extensions are automatically enabled for CKIP, LEAP or EAP-FAST profiles. Back Next OK Cancel Help? View the prior page in the Profile Wizard.
Setting up Profile Security Open/None authentication/WEP encryption This ad hoc network uses no network authentication with WEP data encryption. Name Network Authentication Data Encryption Description Open: No authentication used. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication.
Setting up Profile Security Network Authentication Data Encryption Enable 802.1x Open: Open: No authentication used. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication. If no encryption is enabled on the network, any wireless device with the correct network name (SSID) can associate with the access point and gain access to the network. None: No data encryption used. Unchecked.
Setting up Profile Security Shared authentication Name Network Authentication Data Encryption Description Shared: Shared authentication is accomplished with a pre-configured WEP key. Use this mode for 802.11 Authentication. This mode can work with any 802.1x authentication protocol and with the following data encryption options; None, WEP (64-bit, or 128-bit) or CKIP (64-bit, or 128-bit). Refer to Security Overview - Open and Shared Key authentication for more information None: No data encryption used.
Setting up Profile Security NOTE: (1) Before starting, you must obtain a user name and password on the RADIUS server from your system administrator. (2) For personal/home networks use Wi-Fi Protected Access Personal (WPA/WPA2 Personal) mode. WPA-2 Enterprise requires an authentication server. Name Description Network Authentication WPA-Enterprise Data Encryption Enable 802.1x Authentication Type Refer to Security Overview - Open and Shared Key authentication for more information AES-CCMP Checked.. TLS.
Setting up Profile Security for Cisco Client eXtentions is selected. Cisco-Client eXtentions WPA Key TKIP: To improve data encryption, Wi-Fi Protected Access utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides important data encryption enhancements including a re-keying method. Refer to Security Overview for more information. Note: TKIP is enabled only when the checkbox for Cisco Client eXtentions is selected. Default is unchecked (Disabled).
Setting up Profile Security Network Authentication Open: No authentication used. Refer to Open and Shared Key authentication for more information. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication. If no encryption is enabled on the network, any wireless device with the correct network name (SSID) can associate with the access point and gain access to the network.
Setting up Profile Security Data Encryption WEP: WEP data encryption can be configured using 64-bit or 128-bit. WEP settings can be used with all Network Authentication protocols. When WEP encryption is enabled on an access point, the WEP key provides a way to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point.
Setting up Profile Security EAP-SIM Authentication Your Subscriber Identity Module (SIM) card is used to validate your credentials with the network. A SIM card is a special smart card that is used by GSM based digital cellular networks.
Setting up Profile Security Certificate Issuer Certificate Issuer: The server certificate received during TLS message exchange must have been issued by this certificate authority. Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection in the drop-down list box. If Any Trusted CA is selected, any CA in the list is acceptable.
Setting up Profile Security protocols, such as MD5 Challenge over this encrypted channel to enable server validation. The challenge and response packets are sent over a nonexposed TLS encrypted channel. Name Step 1 of 2: TTLS User Authentication Protocol Description This parameter specifies the authentication protocol operating over the TTLS tunnel. The protocols are: PAP, CHAP, MD5, MS-CHAP and MS-CHAP-V2.
Setting up Profile Security Certificate Issuer The server certificate received during the PEAP message exchange must have been issued by this certificate authority. Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection in the list box. If Any Trusted CA is selected, any CA in the list is acceptable.
Setting up Profile Security Authentication Protocol This parameter specifies the authentication protocol operating over the PEAP tunnel. The protocols are: MS-CHAP-V2, GTC, and TLS. Using MS-CHAP-V2 and GTC protocols: ● ● ● ● ● Use the Windows logon user name and password: If this feature is selected the credentials are retrieved from the Windows Logon process. Prompt for the user name and password: Selecting this feature prompts for user name and password before you connect to the wireless network.
Setting up Profile Security Step 2 of 2: PEAP Server Certificate Issuer The server certificate received during the PEAP message exchange must have been issued by this certificate authority. Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection in the list box. If Any Trusted CA is selected, any CA in the list is acceptable.
Setting up Profile Security Use the following user name and password: The user name and password must be first set in the authentication server by the system administrator. User Name: This user name must match the user name that is set in the authentication server. Password: This password must match the password that is set in the authentication server. The entered password characters display as asterisks. Allow Fast Roaming (CCKM) Confirm Password: Re-enter the user password.
Setting up Profile Security Allow automatic provisioning of Protected Access Credentials (PAC): EAP-FAST uses a Protected Access Credentials key to protect the user credentials that are exchanged. ● ● Allow Fast Roaming (CCKM) Click “Allow automatic provisioning” if you want to obtain the PAC from the server. If a PAC has already been obtained, uncheck “Allow automatic provisioning”, and click Select to choose an existing PAC on your computer.
Setting up Profile Security NOTE: Cisco Compatible Extensions are automatically enabled for CKIP, LEAP or EAP-FAST profiles. You may override this behavior by checking or un-checking options. Name Enable Cisco Compatible Options: Radio Management: Mixed Cells Mode: Description Select this feature to enable Cisco Compatible Extensions for this wireless connection profile. Enable Radio Management Support: Click to choose that your wireless adapter provides radio management to the Cisco infrastructure.
Using Intel(R)PROSet/Wireless Profiles Back to Contents Using Profiles: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide ● ● ● ● ● ● ● ● ● Profile Wizard Overview Creating a New Profile Editing an Existing Profile Removing a Profile Importing and Exporting Profiles Setting a Profile Password Administrator Profiles Automatic Profile Distribution Single Sign On Support and Windows XP Welcome Screen and Fast User Switching Profile Wizard Overview Use the Profile Wizard to create a network profil
Using Intel(R)PROSet/Wireless Profiles 2. Click Next to display the Profile Wizard Security Settings page. This starts the access point query process to determine the highest level of security required for the selected network. Refer to Setting up Security for more information on security options. 3. After the required security is determined, click Next. 4. The Security Settings page displays the required information that must be entered to connect to that particular network.
Using Intel(R)PROSet/Wireless Profiles Creating a New Profile Use the Profile Wizard to create a new profile. If you select a network from the Available Networks list and click Configure, the Profile Wizard guides you through the necessary steps to create a profile and connect to the network. During this process, the Profile Wizard attempts to detect the appropriate security settings for you. To create a new profile and connect to a wireless network: 1.
Using Intel(R)PROSet/Wireless Profiles 2. 3. 4. 5. ● ● ● Enter a profile name in the Profile Name text box. Enter the Wireless Network Name (SSID) in the text box. Select the Operating Mode: Network or Device to Device. Click Advanced for the following options: Password protect the profile. Click Password protect this profile. Type the password in the text box, then re-enter it in the Confirm Password text box. Auto-Import this profile (for network administrators only). Mandatory Access Point.
Using Intel(R)PROSet/Wireless Profiles 6. From the General Settings page, Click Next. The Security Settings page is displayed 6. The Security Settings page displays the current security status for the network access point. Click Next to set Network Authentication and Data Encryption options. file:///C|/CX2%20Muroc%20UG/6-15-04/profiles.
Using Intel(R)PROSet/Wireless Profiles 7. Select the Network Authentication and Data Encryption options. Enter the encryption key settings and configure the 802.1x settings as required. Refer to Security Settings for more information. 8. Click OK when you have completed the profile settings. The Profile Wizard ends and you are returned to Intel PROSet/Wireless main window. To change or verify the profile settings, click the Back button. 9.
Using Intel(R)PROSet/Wireless Profiles Note: A password protected profile can be imported and exported, however, before editing the profile, the password must be entered. Refer to Setting a Profile Password for more information. Export Profiles To export profiles from your profile list: 1. 2. 3. 4. 5. From the Intel PROSet/Wireless main window, click Import/Export on the Profiles menu. Select the profile or profiles from the list, Specify the destination folder on your hard drive.
Using Intel(R)PROSet/Wireless Profiles Administrator Profiles Administrator Profiles are created using the Administrator Tool. Administrator Profiles are profiles or shared profiles that are owned and managed by the network Administrator or the administrator of this computer. These profiles are common/shared by all users on this computer. However end users cannot modify these profiles, they can only be modified from the Administrator Tool which is password protected.
Using Intel(R)PROSet/Wireless Profiles Export Administrator Preferences Step 1: Select which preferences you want to export: ● ● Administrator Settings: Export all the settings. These include control of Cache Credentials and XP Co-existence. Administrator Profiles: Export all the Persistent and Pre-logon/Common Profiles. Step 2: Select the destination file: ● Browse button: Select the destination path and directory. The export destination file has a .sso extension.
Using Intel(R)PROSet/Wireless Profiles 7. Copy the exported profile from its directory to the Programs Files\Intel\Wireless\AutoImport directory. The profile is now ready to distribute to other computers. Single Sign On Support and Windows XP Welcome Screen and Fast User Switching The Fast User Switching and the Windows XP Welcome Screen are disabled when Single Sign On support is installed.
Security Overview Back to Contents Security Overview: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide ● ● ● ● WEP encryption 802.1x Authentication WPA/WPA2 Cisco Features WEP encryption Using the IEEE 802.11 Wired Equivalent Privacy (WEP) encryption can prevent unauthorized reception of wireless data. WEP encryption provides two levels of security, using a 64-bit key (sometimes referred to as 40bit) or a 128-bit key (also known as 104-bit). For better security, use a 128-bit key.
Security Overview channel. Shared key authentication requires that the client configure a static WEP key. The client access is granted only if it passed a challenge based authentication. 802.1x Authentication How 802.1x authentication works 802.1x features Overview 802.1x authentication is independent of the 802.11 authentication process. The 802.1x standard provides a framework for various authentication and key-management protocols. There are different 802.
Security Overview described as follows: ● ● ● Authentication phase: Verifies a user name and password against a local database. After the credentials are verified, the authorization process begins. Authorization phase: Determines whether a request is allowed access to a resource. An IP address is assigned for the Dial-Up client. Accounting phase: Collects information on resource usage for the purpose of trend analysis, auditing, session time billing, or cost allocation How 802.
Security Overview protection and access control to a wireless network. WPA enforces 802.1x authentication and key-exchange and only works with dynamic encryption keys. To strengthen data encryption, WPA utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides important data encryption enhancements that include a per-packet key mixing function, a message integrity check (MIC) named Michael an extended initialization vector (IV) with sequencing rules, and a also re-keying mechanism.
Security Overview ● ● Message Integrity Check (MIC) Message Sequence Number EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that EAP-FAST does not use certificates to authenticate. Provisioning in EAP-FAST is negotiated solely by the client as the first communication exchange when EAPFAST is requested from the server.
Security Overview Back to Contents file:///C|/CX2%20Muroc%20UG/6-15-04/security.
Connecting to a Network using Intel(R) PROSet/Wireless Back to Contents Connecting to a Network: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide ● ● ● ● ● ● ● Connecting to a wireless network Connect to a wireless network without security Connect to a wireless network with WEP security Connect to a wireless network using a profile Scan for available networks Configure a Linksys (EOU) Access Point Intel(R) PROSet/Wireless Configuration Service Connecting to a wireless network You can connect
Connecting to a Network using Intel(R) PROSet/Wireless 2. Select a wireless network from the list of available networks click Configure. 3. The Connect one-time to: page is displayed. 4. The Profile Wizard General Settings page displays. The Wireless Network Name (SSID) displays. The profile name uses the same name as the wireless network name (SSID). To use a different profile name, enter the new name in the Profile Name text box. 5. Click Next. The Security Settings page displays. 6.
Connecting to a Network using Intel(R) PROSet/Wireless Connect to a wireless network using a profile To connect to a wireless network using a profile: 1. Select the profile from the Profiles List. 2. Click Connect. The connection icon indicates that you are connected to the network. The network name, speed, and signal quality display the current connection status. Click the Details button to display details of the current network connection.
Connecting to a Network using Intel(R) PROSet/Wireless ● ● Setup a secure wireless network using WPA Setup your wireless network with a new network name and no security (Anyone can access my network). The Linksys Access Point is setup with factory defaults, which include no security (open authentication) and linksys-g as the network name (SSID). In this state, your wireless network is not secure and allows others to easily monitor any data transfer over the wireless link.
Connecting to a Network using Intel(R) PROSet/Wireless Enter New Configuration for Linksys Access Point - Step 3 4. To complete the configuration information, add the following network and security information. Enter Network Name (SSID): ● ● What is the Network Name: Enter a network name (SSID) that identifies this wireless network. You can use a simple pass phrase such as Jerry’s Wireless Network or OfficeWLAN or use a more secure stronger network name such as Main!$WLAN.
Connecting to a Network using Intel(R) PROSet/Wireless Intel PROSet/Wireless Configuration Service This page is displayed if an available wireless network access point or hotspot is detected within range of your computer, and there is no matching profiles found in the profile list. If balloon prompts are enabled, this page is shown when you click the Task Tray Balloon message prompt. Name Available Networks Description The available Network Names and Icons display the type of available network.
Connecting to a Network using Intel(R) PROSet/Wireless Other Wireless Managers If the Wireless Network Configuration Service detects another software application trying to communicate with the wireless device, you are notified of this behavior. Windows XP Wireless Manager To switch from Intel PROSet/Wireless to the Windows XP wireless manager use either of the following methods: ● From the Task Tray Menu: Click Use Microsoft client to switch to using Windows XP Wireless Zero Configuration.
Connecting to a Network using Intel(R) PROSet/Wireless 3rd Party Wireless Software If you are using software provided by a hotspot location (coffee shop, airport terminal), the Configuration Service notifies you and then disables itself. It cannot manage the wireless device when another wireless manager is communicating with the wireless device. To take advantage of the Intel PROSet/Wireless features you want to disable or remove this software when you leave the hotspot.
Connecting to a Network using Intel(R) PROSet/Wireless Back to Contents Trademarks and Disclaimers file:///C|/CX2%20Muroc%20UG/6-15-04/connect.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm Back to Contents Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User Guide ● ● ● Intel Wireless Troubleshooter Event Viewer Resolving Errors Intel Wireless Troubleshooter Intel Wireless Troubleshooter is an application that can assist you in resolving wireless network connection issues. When a connection issue is detected, a balloon tip appears at the bottom right of your desktop screen.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm Intel Wireless Troubleshooter Description Intel Wireless Troubleshooter page contains two panes. The left pane displays a list of available tools that can be started using your left mouse button. The right pane displays the current connection issue in a section. Each section has two parts: the error message and the hint text parts. The error message and time stamp are preceded by an icon.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm The Wireless Event Viewer program displays a list of error log records. You can save all available log records to a binary format file for sending to customer support. In addition, you can email the binary format log file to an email address (pre-configured with a default email address) when network connection is available. Wireless Event Viewer is supported under Windows XP and 2000.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm Save As Save the available logs to the pre-defined file name. Everything in the log shall be saved to the predefined file name. The default file name is: Product_Name_Month_Day_Year_HH_MM_SS.binary_file_ext The default file name format can be changed to another name. Clear Help? Removes the information in the Wireless Event Viewer. Displays the help information for this dialog.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm 6. Verify the User Name, Domain, and password information. ● 7. If Use Windows logon or Prompt each time I connect is selected make sure that the correct user credentials information is used when you connect to the wireless network. Click the OK button to save the settings. Authentication failed due to invalid username - Re-enter username This authentication error can be caused by an invalid user name when using either a TTLS, PEAP or LEAP profile.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm 4. Select the appropriate 802.1x Authentication Type. ● ● 5. For TTLS and PEAP profiles: Select the Use the following option for User Credentials. ● Verify the password information. ● If Use Windows logon or Prompt each time I connect is selected make sure that the correct user credentials information is used when you connect to the wireless network.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm 1. Select the appropriate profile from the profiles list. 2. Click Properties. 3. Click Next. 4. Select the appropriate 802.1x Authentication Type. ● ● 5. For TTLS and PEAP profiles: Select the Use the following option for User Credentials. ● Verify the Domain information. ● If Use Windows logon or Prompt each time I connect is selected make sure that the correct Domain credentials information is used when you connect to the wireless network.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm 3. Click Next. 4. Select the appropriate 802.1x Authentication Type. ● For TTLS and PEAP profiles: Verify that the correct Authentication Type is selected from the drop-down list, then click the Select button and select another certificate from the list of installed certificates and click OK. ● For TLS profiles: Click the Select button and select another certificate from the list of installed certificates and click OK.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm Authentication failed because timer expired Authentication failed because timer expires while this mobile station authenticating against a possible rogue AP. The Rogue AP timed out, possibly because of a problem with the RADIUS server. Recommended action: 1. To prevent the wireless adapter from connecting with this possible Rogue AP, consider adding this Rogue AP to the excluded access point list. 2.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm 1. 2. 3. 4. Re-insert the GSM adapter. Double click the Intel PROSet/Wireless icon at the bottom right of the screen. Select the associated or last used profile from the profiles list. Click Connect. The profile is now re-applied. Intel PROSet/Wireless attempts to connect to the wireless network. The AAA Server Rejected the EAP Method This error occurs when the AAA Server does not accept the configured authentication type.
file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.htm Back to Contents Trademarks and Disclaimers file:///C|/CX2%20Muroc%20UG/6-15-04/trouble.
Wireless Network Overview Back to Contents Wireless Network Overview: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide About Wireless Network Technology ● ● ● Choosing a Wireless Network Configuring a Wireless Network Identifying a Wireless Network A wireless network connects computers without using network cables. Computers use radio communications to send data between each other.
Wireless Network Overview Device-to-Device mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configuring a Wireless Network There are three basic components that must be configured for an 802.
Wireless Network Overview Identifying a Wireless Network Depending on the size and components of a wireless network, there are many ways to identify a wireless network: ● ● ● ● ● The Network Name or Service Set Identifier (SSID)—Identifies a wireless network. All wireless devices on the network must use the same SSID. >Extended Service Set Identifier (ESSID)—A special case of SSID used to identify a wireless network that includes access points.
Specifications Back to Contents Specifications: Intel PRO/Wireless 2915ABG Network Connection User Guide ● ● Intel PROSet/Wireless 2915ABG Network Connection Intel PROSet/Wireless 2200BG Network Connection Specifications: Intel PROSet/Wireless 2915ABG Network Connection Form Factor Mini PCI Type 3A Dimensions Width 2.85 in x Length 1.75 in x Height 0.20 in (59.75 mm x 50.95 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.
Specifications Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSK Wireless Medium 5 GHz UNII: Orthogonal Frequency Division Multiplexing (OFDM) 2.4 GHz ISM: Orthogonal Frequency Division Multiplexing (OFDM) Channels 4 to 12 nonoverlapping, dependent on country Channel 1-11 (US only) Channel 1-13 (Japan, Europe) Data Rates 54, 48, 36, 24, 18, 12, 9, 11, 5.5, 2, 1 Mbps 6 Mbps General Operating Systems Windows XP, Windows 2000 Wi-Fi® Alliance certification Wi-Fi® certification for 802.
Specifications Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066 Dual Diversity Antenna On-board dual diversity switching Connector Interface 124-pin SO-DIMM edge connector Voltage 3.3 Volt Operating Temperature 0 to +80 degrees Celsius Humidity 50 to 85% non-condensing 2.4 GHz Band (802.11b/g Most of the World (United States) Rest of World (Europe, Japan) Frequency ranges 2.412 - 2.462 GHz 2.412 - 2.
Specifications Back to Contents Trademarks and Disclaimers file:///C|/CX2%20Muroc%20UG/6-15-04/specs.
Glossary Back to Contents Glossary of Terms: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide Glossary Numerical A B D E F I K M O P R S T U W Numerical 802.11a: The 802.11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing (OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such as WEP encryption for security. 802.11b: The 802.
Glossary include cordless earphones and similar devices. It uses the 2.4 GHz ISM band, and “co-exists” with 802.11b. Here the term, “co-exist” means that not all researchers agree on the amount of mutual interference generated when both systems operate in the same location. Broadcast SSID: Used to allow an access point to respond to clients on a wireless network by sending probes. D Data Rate (Information Rate): Not all bits carry user information.
Glossary Encryption: Scrambling data so that only the authorized recipient can read it. Usually a key is needed to decrypt the data. Extended Service Set IDentifier (ESSID): A type of unique identifier applied to both the AP and the wireless PC Card that is attached to each packet. This allows the AP to recognize each wireless client and its traffic.
Glossary ISM Bands: A series of frequency bands, set aside by the FCC for Industrial, Scientific and Medical applications. Users of these bands operate equipment on a shared basis, meaning that they must expect, and accept interference from other legal users. Products manufactured for ISM Band use must be approved by the FCC, but the user does not have to be licensed.
Glossary AM broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens typically operate at 2.45 GHz. Range: The distance over which a given system can communicate. RC4: An encryption algorithm designed at RSA Laboratories; specifically, a stream cipher of pseudo-random bytes that is used in WEP encryption.
Glossary W WEP64 and WEP128: Wired Equivalent Privacy, 64-bit and 128-bit (64-bit is sometimes referred to as 40-bit). This is a low-level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN. It is recommended to use the 128-bit option at all possible times. Remember that 802.11 devices transmit (broadcast) in all directions, and that it is possible, with very complex software, to copy and decode WEP transmissions.
Customer Support Back to Contents Customer Support: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide Customer Support Intel support is available online or by telephone. Available services include the most up-to-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com Network Product Support: http://www.intel.com/network Corporate Web Site: http://www.intel.
Customer Support Back to Contents file:///C|/CX2%20Muroc%20UG/6-15-04/support.
Regulatory Information Back to Contents Regulatory Information: Intel(R)PRO/Wireless 2915ABG Network Connection User Guide Supported on the Intel(R) PRO/Wireless 2915ABG Network Connection and Intel(R) PRO/Wireless 2200BG Network Connection Hardware Intel(R) PRO/Wireless 2915ABG Network Connection Information for the User Regulatory Information Intel(R) PRO/Wireless 2200BG Network Connection Information for the User Regulatory Information Intel(R) PRO/Wireless 2915ABG Network Connection The information
Regulatory Information 2915ABG Network Connection adapter meets the Human Exposure limits found in OET Bulletin 65, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCC’s recommended limits. The following safety precautions should be observed: ● ● ● ● ● ● ● ● ● ● Do not touch or move antenna while the unit is transmitting or receiving.
Regulatory Information antennas. Use of such antennas with these products is illegal. Use On Aircraft Caution Caution: Regulations of the FCC and FAA prohibit airborne operation of radio-frequency wireless devices because their signals could interfere with critical aircraft instruments. Other Wireless Devices Safety Notices for Other Devices in the Wireless Network: Refer to the documentation supplied with wireless Ethernet adapters or other devices in the wireless network. Local Restrictions on 802.
Regulatory Information PRO/Wireless 2915ABG Network Connection adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization.
Regulatory Information The following statement on local restrictions must be published as part of the compliance documentation for all 802.11a and 802.11b products. Caution: Due to the fact that the frequencies used by 802.11a and 802.11b wireless LAN devices may not yet be harmonized in all countries, 802.11a and 802.11b products are designed for use only in specific countries, and are not allowed to be operated in countries other than those of designated use.
Regulatory Information reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct the interference by taking one or more of the following measures: ● ● ● ● Reorient or relocate the receiving antenna. Increase the distance between the equipment and the receiver. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
Regulatory Information English Hereby, Intel(R) Corporation, declares that this Intel(R) PRO/Wireless 2915ABG Network Connection is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Finnish Intel(R) Corporation vakuuttaa täten että Intel(R) PRO/Wireless 2915ABG Network Connection tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Regulatory Information German Hiermit erklärt Intel(R) Corporation, dass sich dieser/diese/dieses Intel(R) PRO/Wireless 2915ABG Network Connection in Übereinstimmung mit den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie 1999/5/EG befindet". (BMWi) Hiermit erklärt Intel(R) Corporation die Übereinstimmung des Gerätes Intel(R) PRO/Wireless 2915ABG Network Connection mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EG.
Regulatory Information Estonian Käesolevaga kinnitab Intel(R) Corporation seadme Intel(R) PRO/Wireless 2915ABG Network Connection vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
Regulatory Information Polish Niniejszym, Intel(R) Corporation, deklaruj•, •e Intel(R) PRO/Wireless 2915ABG Network Connection spełnia wymagania zasadnicze oraz stosowne postanowienia zawarte Dyrektywie 1999/5/EC. France For Metropolitan departments 2.400 - 2.4835 GHz for indoor use 2.400 -2.454 GHz (channels 1 to 7) for outdoor use Some areas of France have a restricted frequency band. The worst case maximum authorized power indoors is: ● ● 10 mW for the entire 2.4 GHz band (2400 MHz–2483.
Regulatory Information 24 Dordogne 25 Doubs 26 Drôme 32 Gers 60 Oise 89 Yonne 61 Orne 90 Territoire de Belfort 63 Puy du Dôme 94 Val de Marne 64 Pyrénées Atlantique This requirement is likely to change over time, allowing the use your Network Connection card in more areas within France. Please check with ART for the latest information (www.art-telecom.co.fr) For Guadeloupe, Martinique, St Pierre et Miquelon, Mayotte: 2.400 - 2.4835 GHz for indoor and outdoor use. For Reunion, Guyane: 2.400 - 2.
Regulatory Information Underwriters Laboratories Inc. (UL) Regulatory Warning For use in (or with) UL Listed personal computers or compatible. Regulatory Information: Intel(R) PRO/Wireless 2200BG Network Connection Information for the User Regulatory Information Information for the user Safety Notices The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment.
Regulatory Information ● Power Supply (Access Point) (see below) Explosive Device Proximity Warning Warning: Do not operate a portable transmitter (such as a wireless network device) near unshielded blasting caps or in an explosive environment unless the device has been modified to be qualified for such use. Antenna Warnings Warning: To comply with the FCC and ANSI C95.
Regulatory Information ● ● ● IEEE Std. 802.11b-1999. Standard on Wireless LAN. IEEE Std. 802.11g compliant. Standard on Wireless LAN. Wireless Fidelity (WiFi(R)) certification, as defined by the WECA (Wireless Ethernet Compatibility Alliance). The Intel(R) PRO/Wireless LAN 2200 3A Mini PCI adapter and your health The Intel(R) PRO/Wireless 2200BG Network Connection adapter, like other radio devices, emits radio frequency electromagnetic energy.
Regulatory Information This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions: ● ● This device may not cause harmful interference. This device must accept any interference that may cause undesired operation. NOTE: The radiated output power of the Intel(R) PROSet/Wireless 2915ABG Network Connection adapter wireless network device is far below the FCC radio frequency exposure limits.
Regulatory Information "To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its trasmit antenna) that is installed outdoors is subject to licensing." « Pour empêcher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit être utilisé a l'intérieur et devrait être placé loin des fenêtres afinde fournir un écran de blindage maximal.
Regulatory Information Some areas of France have a restricted frequency band. The worst case maximum authorized power indoors is: ● 10 mW for the entire 2.4 GHz band (2400 MHz–2483.5 MHz) ● 100 mW for frequencies between 2446.5 MHz and 2483.5 MHz (NOTE—Channels 10 through 13 inclusive operate in the band 2446.6 MHz to 2483.
Regulatory Information France. Please check with ART for the latest information (http://www.telecom.co.fr/) Belgique Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enregistrement auprès de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. Italia For use in private premises: no restriction outdoor or indoor, 2.
Warranty Information Back to Contents Warranty: Intel(R) PRO/Wireless 2915ABG Network Connection User Guide Product Warranty Information One-Year Limited Hardware Warranty Limited Warranty Intel warrants to the purchaser of the Intel® PROSet/Wireless 2915ABG Network Connection PCI Card (the “Product”), and software delivered with or as part of the Product, including without limitation, the Intel Wireless Connect Technology, unmodified and in its original sealed packaging ("Original Purchaser"), that the P
Warranty Information Intel for replacement or alternative delivery of the software at Intel's discretion and without charge. Intel does not warrant or assume responsibility for the accuracy or completeness of any information, text, graphics, links or other items contained within the software.
Warranty Information costs incurred by you, and in particular, any costs relating to the removal or replacement of any Product soldered or otherwise permanently affixed to any printed circuit board or integrated with other products; (ii) damage to the Product due to external causes, including accident, problems with electrical power, abnormal, mechanical or environmental conditions, usage not in accordance with product instructions, misuse, neglect, accident, abuse, alteration, repair, improper or unauthor
Warranty Information Product to the ICS center, you must include the RMA number on the outside of the package. Intel will not accept any returned Product without an RMA number, or that has an invalid RMA number, on the package. You must deliver the returned Product to the designated ICS center in the original or equivalent packaging, with shipping charges pre-paid (within the USA), and assume the risk of damage or loss during shipment.
Warranty Information LIMITATIONS OF LIABILITY INTEL’S RESPONSIBILITY UNDER THIS OR ANY OTHER WARRANTY, IMPLIED OR EXPRESS, IS LIMITED TO REPAIR, REPLACEMENT OR REFUND, AS SET FORTH ABOVE. THESE REMEDIES ARE THE SOLE AND EXCLUSIVE REMEDIES FOR ANY BREACH OF WARRANTY.
Warranty Information SINGAPORE AND THE APPLICABLE LAW SHALL BE THAT OF SINGAPORE. FOR EUROPE AND THE REST OF THE WORLD, THE FORUM SHALL BE LONDON AND THE APPLICABLE LAW SHALL BE THAT OF ENGLAND AND WALES IN THE EVENT OF ANY CONFLICT BETWEEN THE ENGLISH LANGUAGE VERSION AND ANY OTHER TRANSLATED VERSION(S) OF THIS LIMITED WARRANTY (WITH THE EXCEPTION OF THE SIMPLIFIED CHINESE VERSION), THE ENGLISH LANGUAGE VERSION SHALL CONTROL.