Wireless 150N USB Adapter user manual Model 524698 INT-524698-UM-0809-02
WASTE ELECTRICAL & ELECTRONIC EQUIPMENT Disposal of Electric and Electronic Equipment (applicable in the European Union and other European countries with separate collection systems) ENGLISH This symbol on the product or its packaging indicates that this product shall not be treated as household waste. Instead, it should be taken to an applicable collection point for the recycling of electrical and electronic equipment.
Thank you for purchasing the INTELLINET NETWORK SOLUTIONS™ Wireless 150N USB Adapter, Model 524698. The Wireless 150N USB Adapter is a compact high-speed adapter that allows you to connect your notebook or desktop PC to wireless networks at faster speeds than ever before. Transfer or receive digital images, videos and MP3 files by connecting to the wireless network with link speeds of up to 150 Mbps using the latest in wireless technology. This adapter is also compatible with 802.11b and 802.
CAUTION: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference; and (2) this device must accept any interference received, including interference that may cause undesired operation.
table of contents section page Installation...........................................................................................6 Configuration .....................................................................................7 Network.........................................................................................9 Profile.................................................................................................10 Profile Configuration.....................................
installation 1. Remove the adapter’s protective cap and attach the antenna by securely screwing it onto the antenna connector. 2. With your computer on, gently insert the adapter into a USB 2.0 port. NOTE: If the adapter doesn’t easily slide into the port, flip the adapter over and try again. 3. The Welcome to the Found New Hardware Wizard screen will display automatically. Click “Cancel” to continue. 4. Insert the included setup CD and run the “Setup.exe” program.
. Once the software installation is complete, select “Yes, I want to restart my computer.” Once the reboot is complete, connect the Wireless N USB Adapter to your computer. When the Found New Hardware Wizard screen displays, select the option that allows Windows to automatically search for the correct driver. Your adapter is now installed.
The configuration utility appears as an icon in the Windows system tray while the adapter is running. You can open it by double-clicking on the icon. In Windows XP, there is a “Windows Zero Configuration Tool” option for setting up wireless clients. If you prefer to use the configuration utility, there are two ways to switch to it instead of using the Windows tool. Option 1 1. Right-click the utility icon in the system tray and select “Use INTELLINET Configuration utility.” Option 2 1.
3. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adapter. NOTE: If “Wireless Zero Configuration Tool” is enabled, you can only configure the advanced settings or check the link status and statistics from the configuration utility of the adapter.
Available Networks: This list shows all available wireless networks within the range of the adapter. It also displays network information: SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. To connect to a network on the list, double-click the item and the adapter will connect automatically to it. Rescan: Click “Rescan” to collect the new information of all the wireless networks nearby. Connect: Click “Connect” to connect to the selected network.
Status: This field displays the SSID and MAC ID of the network the adapter is connecting to. Extra Info: This field displays the link status. Channel: This field displays the number of the radio channel and the frequency used for the networking. Link Speed (Mbps): These fields display the transmission (Tx) and the reception (Rx) rates of the network. The maximum transmission rate is 54 Mbps. Throughput (Kbps): These fields display the speed of data being transmitted (Tx) and received (Rx).
Profile Configuration Profile Name: Define easily recognizable profile names to identify the different networks. SSID: The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. If you specify an SSID for the adapter, then only the device with the same SSID can interconnect to the adapter. To add a nearby network to the profile list, pull down the menu to view all the networks that can be selected.
RTS Threshold: This is the minimum packet size required for an RTS (request to send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. NOTE: A minor change is recommended. Fragment Threshold: This value defines the maximum size of packets; any packet size larger than the value will be fragmented.
or pre-shared key (PSK) technology. It provides a high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks. For enterprises that have already deployed IEEE 802.1x authentication, WPA offers the advantage of leveraging existing authentication databases and infrastructure.
• WEP: Enables the WEP Data Encryption. When the item is selected, . you need to continue setting the WEP Encryption keys. • TKIP: The Temporal Key Integrity Protocol changes the temporal key every 10,000 packets (a kind of message transmitted over a network.) . This ensures much greater security than the standard WEP security. • AES: AES has been developed to ensure the highest degree of security and authenticity for digital information. It’s the most advanced solution defined by IEEE 802.
IEEE 802.1x Access Client IEEE 802.1x Access Client RADIUS Client RADIUS Client 1 1 22 3 RADIUS Server RADIUS Server 3 Access Point 44 Windows 2000 IAS 1 Client requests to log in to the network 2 Log in with username and password (Internet Authentication 3 Username and password sent to RADIUS server 4 User login to the LAN approved orService) denied (1) Client requests to login the (3) Send username, password to 802.1 x Setting/Certification network. RADIUS server.
the authentication phase. The server presents a certificate to the client and, after validating the server’s certificate, the client presents a client certificate to the server for validation. Session Resumption: Click/check the box to activate or de-activate. ID/Password: Enter the password as the identity for the server. Client Certification: A client certificate is required for TLS, but is optional for TTLS and PEAP.
which contains the issuer’s public key, into the trusted root certification authority certificate store of the host computer. Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority. Server Name: Enter the authentication server name. Server name must match exactly: When selected, the server name must exactly match the server name found on the certificate.
to this mode. This mode is also the default setting. • 802.11 B only: Though the adapter is compatible with both 802.11g and 802.11b wireless stations, if there are only 802.11b wireless stations in the network, you can set the adapter to this mode. Ad Hoc Wireless Mode: When the adapter is set in Ad Hoc (Peer to Peer) mode, you can designate the wireless connection mode for the Ad Hoc network. • Only B: Though the adapter is compatible with both 802.11g and 802.
Tx Rate: There are several options in the drop-down menu: “Auto” and a range of speeds from “1 Mbps” to “54 Mbps.” When “Auto” is selected, the device automatically chooses the most suitable transmission rate. The higher the data rate designated in the network, the shorter the distance allowed between the adapter and the wireless stations. Enable Tx Burst: This enables the adapter to deliver better throughput in the same period and environment.
AP can run the radio monitoring through the associated CCX-compliant clients to continuously monitor the WLAN radio environment and discover any new APs that are transmitting beacons. Non-Serving Channel Measurements: The Cisco access point can perform monitoring measurements through the CCX-compliant clients on the non-serving channels when this parameter is enabled. Limit [xxx] milliseconds (0-2000): This setting limits the channel measurement time. The default value is 250 milliseconds.
want to direct link to and click “Apply” to add to the DLS Status table (below). - Timeout Value: Specify the timeout value for the direct link being set up. about On this screen, you can click the hyperlink for information on the wireless chipset manufacturer. Basic information about the utility (driver, EEPROM version, etc.) also displays, as do various addresses for quick reference. NOTE: This adapter features Turbo Mode, which delivers a higher throughput than IEEE 802.
PBC (Push-Button Configuration) 1. From the “Config Mode” drop-down menu, select “Enrollee,” then press the WPS button (or whichever button is used to activate the WPS Standby mode) on your wireless access point. NOTE: Refer to your wireless access point’s user manual for the specific procedure(s). Alternatively, you can select “Registrar,” in which case this adapter will wait for other WPS-enabled access points to send WPS pairing requests.
4. Should the WPS function fail (as indicated on the following screen, which shows that WPS pairing failed because no WPS-enabled AP was found), you may find that clicking “PBC” a few more times will result in a connection. When an access point is connected, you can click “Disconnect” to break the connection, or you can highlight/select another WPS-enabled wireless access point when more than one is found, then click “Connect” to establish that connection.
PIN Code 1. Enter the 8-digit PIN code of the adapter (highlighted below) in your wireless access point as the WPS PIN code. NOTE: Refer to your wireless access point’s user manual for instructions. If you have a problem with the PIN code provided here, click “Renew” to get a new PIN code. 2. Click “PIN.” After a short period (up to a minute), if a wireless access point with the correct PIN code is found, you’ll be connected to that access point.
This is optional: You can use the default value if you don’t know what will be affected. Auto: When selected, the wireless access point to be connected will be selected automatically. softAP This adapter can run as a wireless access point (AP). Right-click the configuration utility icon on the Windows system tray and select “Switch to AP Mode” to activate the SoftAP function. configuration This screen enables you to configure the AP connection setting, the Country Region Code and other advanced functions.
name identified in a wireless LAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the AP is “SoftAP-X.” (“X” is the last number of this adapter’s MAC address). Wireless adapters connected to the access point should be set up with the same SSID as the AP. Channel: Select the number of the radio channel used by the access point. Any wireless adapters connected to the AP should be set up with the same channel. Wireless Mode: Selects the wireless mode supported by the AP.
security setting This screen — accessed by clicking “Security Setting” on the previous SoftAP Configuration screen — lets you to configure the authentication mode and encryption algorithm used within the AP. Pre-Shared Key Authentication Type: Four types of authentication mode are supported and presented in the drop-down menu. • Open: No authentication is needed within the wireless network.
have the matching password from joining the network, while encrypting the data traveling between authorized devices. • WPA2-PSK: This is also for home and small business use. • WPA-PSK/WPA2-PSK: When selecting this mode, the AP supports both WPA-PSK and WPA2-PSK. Encryption Type: Five options are available in the drop-down menu. • Not Use: Disables the encryption mode. • WEP: Enables WEP Data Encryption. When the item is selected, continue setting the WEP Key.
access control This screen lets you configure the access control policy used within the access point. MAC Table Access Policy: Select from the drop-down menu. • Disable: Disables the MAC address filtering function. • Allow All: Only wireless adapters with a MAC address on the access list can connect to the AP. • Reject All: Wireless adapters with a MAC address on the access . list will be prevented from connecting to the AP.
mac table This screen displays details of the wireless adapters connected to the AP. MAC Table MAC Address: The addresses of wireless adapters connected to the AP. AID: The Association ID of the current connection. Power Saving Mode: The supporting status of the power saving mode of the connected wireless adapter. event log This screen displays event times and messages. Click “Clear” to remove displayed information.
statistics This screen displays the transmit and receive statistical information of the AP. Click “Reset Counters” to clear the data. about This screen displays basic information about the utility, including the MAC address.
specifications Standards • IEEE 802.11b (11 Mbps Wireless LAN) • IEEE 802.11g (54 Mbps Wireless LAN) • Upward compatible to IEEE 802.11n draft 2.0 (150 Mbps Wireless LAN) General • Interface: Hi-Speed USB 2.0 • Chipset: Ralink RT3070 • Frequency band: 2.4000 – 2.4835 GHz (Industrial Scientific Medical Band) • Modulation technologies: - 802.11b: Direct Sequence Spread Spectrum (DSSS): DBPSK, DQPSK, CCK - 802.11g: Orthogonal Frequency Division Multiplexing (OFDM): BPSK, QPSK, 16QAM, 64QAM - 802.
INTELLINET NETWORK SOLUTIONS™ offers a complete line of active and passive networking products. Ask your local computer dealer for more information or visit www.intellinet-network.com. Copyright © INTELLINET NETWORK SOLUTIONS All products mentioned are trademarks or registered trademarks of their respective owners.