802.11n Long-Range USB WiFi Antenna User Manual Version: 2.0 Version: 2.
TABLE OF CONTENTS OVERVIEW ..........................................................1 UNPACKING INFORMATION ................................................................................................. 1 INTRODUCTION TO THE WiFi King WIRELESS USB ADAPTER .............................................. 1 KEY FEATURES ............................................................................................................... . 2 INSTALLATION GUIDE ........................................
Overview Thank you for purchasing this product. Read this chapter to learn about your Range Master WiFi King 802.11n Wireless USB Adapter. Unpacking Information Before getting started, please verify that your package includes the following items: 1. 2. 3. WiFi King Wireless USB Adapter. Outdoor Omnidirectional Antenna. Utility/Manual CD. Introduction to the WiFi King Wireless USB Adapter The WiFi King Wireless USB adapter is an IEEE 802.
Key Features y Complies with IEEE 802.11n wireless standards y Supports wireless data encryption 64/128-bit WEP, WPA, WPA2, TKIP, AES with y 2.4GHz frequency band, MIMO y Supports QoS: WMM, WMM-PS y Complies with USB 2.0 y Supports multiple BSSID y High speed transfer data rate up to 150 Mbps y y Supports auto-installation Supports driver for Windows 2000, XP 32/64, Vista 32/64, Windows 7, Linux (2.4.x/2.6.x), and Mac (10.3.x/10.4.x/10.5.x/10.6.
3. Select if you are going to install the driver and wireless utility; or install the driver only. 4. Select if you are going to configure your wireless network with this device or with Microsoft Zero Configuration tool. Note: This can be changed after installing this software. Version: 2.
5. Click the Install button to start installing. 6. Click the Finish button to complete installation. Version: 2.
Management Guide Read this chapter to understand the management interface of the device and how to manage the device. Making a Basic Network Connection Select a configuration tool In the following instructions for making a network connection, we use the utility we provide to configure your wireless network settings. Note: You could use either the software we provide or Microsoft Zero Configuration tool to configure this adapter. To switch between the two configuration tools, please right click on the…..
The tool shows the available wireless networks. Select the network you want to connect to. To connect to a wireless network with more security settings, please click Change advanced settings and configure to be compatible with your wireless network security settings. Version: 2.
To connect with 802.11n Wireless LAN Utility We provide this utility for users to connect to a wireless network easily. It provides more information and configuration for this adapter. As default, the utility is started automatically upon starting your computer and connects to a connectable wireless network with best signal strength icon in the system ray and select Launch and with no security setting. Right click on the Config utilities if the utility does not start.
Introduction to the 802.11n Wireless LAN Utility Note: The Utility in Linux and Mac are different from the following. Interfaces This utility basically consists of three parts: 1 2 3 1. Function Buttons: on top of the window. You can click each button to access each configuration window. Note: Click to enable/disable wireless connection status. 2. Configuration Column: Center of the Utility window. Make your changes for each function in this part. 3.
Link Status Information A C D B A. Network Information: Items Status Extra Info Channel Authentication Encryption Network Type IP Address Sub Mask Default Gateway Link Speed Throughput Information Show the connecting status. Also shows the SSID while connecting to a valid network. Display link status in use. Display current channel in use. Authentication mode in use. Encryption type in use. Network type in use. IP address of current connection. Subnet mask of current connection.
Profile The profile page allows users to save different wireless settings, which helps users to get access to wireless networks at home, office or other wireless network environments quickly. A C B A. Profile List: The list shows all the profiles you have added before. B. Buttons: You can click on these buttons to add a new profile, edit, delete or activate an old profile. Note: For Vista user, there are extra and buttons in this feature.
To add a new profile: 1. Click the Add button. The add profile window pops up. Note: you could also add a new profile quickly by selecting an available network in the Network function then click the Add to Profile button. ← Click on these tabs 2. There are three tabs on the window: Settings for: Profile Name, SSID, Network Type, Tx Power, Preamble, Power Save Mode, RTS Threshold, and Fragment Threshold. Settings for: Authentication, Encryption, Preshared Key, and WEP Key.
3. In section, fill in information for this profile: Items Profile Name Information Choose a name for this profile, or use default name defined by system. Fill in the intended SSID name or use the drop list to select from SSID available APs. There are two types, infrastructure and 802.11 Ad-hoc modes. Under Ad-hoc mode, you could also choose the preamble type; the available Network Type preamble type includes auto and long.
4. In section, select an encryption type and fill in the corresponding wireless network information: Items Information For Windows 2000 User There are 7 types supported: Open, Shared, LEAP, WPA, WPA-PSK, WPA2, Authentication WPA2-PSK, and WPA-NONE1. Please select a type from the drop down list. Type For Vista User There are 7 types supported: Open, Shared, WPA, WPA-PSK, WPA2, WPA2-PSK, and CCKM. Please select a type from the drop down list.
This checkbox appears while the environment is set to an Open authentication Use 802.1x with WEP encryption. Mark the checkbox to make the section available. The section is also available in WPA and WPA2 authentication types. This is the shared secret between AP and STA. For WPA-PSK, WPA2-PSK and WPA-NONE authentication mode, this field must be filled with characters longer Preshared Key than 8 and less than 32 lengths. The following dialog appears if you have input invalid values.
5. Specify the 802.1x information if you are using the 802.1X certification method. Users that do not use this function or connect to an open-wireless network please skip this part. A A. B C EAP Method: For Windows 2000 User: There are total 5 modes: PEAP, TLS/Smart Card, TTLS, EAP-FAST, and MD5-Challenge. For Vista User: There are total 4 modes: PEAP, TLS/Smart Card, EAP-FAST, and LEAP. Please select an EAP method from the drop down list. Items Information Protect Extensible Authentication Protocol.
B. Tunnel Authentication: The tunnel authentication will differ from the EAP method you have chosen, the result is shown below: For Windows 2000 User: EAP Method PEAP TLS/Smart Card TTLS EAP-FAST MD5-Challenge Tunnel Authentication EAP-MSCHAP v2 , EAP-TLS/Smart Card, Generic Token Card (no selection) CHP, MS-CHAP, MS-CHAP-V2, PAP, EAP-MD5 Generic Token Card (no selection) For Vista User: EAP Method PEAP TLS/Smart Card EAP-FAST LEAP C.
ID \ PASSWORD Items Authentication ID / Password Tunnel ID / Password Password Mode Information The identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication can be keyed in domain name. Blank space can be keyed in domain name. Identity and Password for server. Select the power save mode. For Windows 2000 User There are two selections: Soft Token and Static Password. For Vista User There are four selections: Soft Token, Static Password, Windows Logon and Prompt User.
Server Certificate Items Use Certificate chain Allow intimidate certificates Server name Information Mark the checkbox to enable using certification chain. Mark to allow intimidates certification. Enter an authentication sever root. EAP Fast Items Allow unauthenticated provision mode Use protected authentication credential Version: 2.0 Information During the PAC can be provisioned (distributed one time) to the client automatically.
Network This network lists the available wireless networks. The utility connects to a wireless network with the best signal strength automatically. You can change the connecting network by clicking on the network name and click the Connect button. To see detail information of each network, please double click on each item to pop up the information window. A B C A. Sorted by: Click each button to sort the listing networks by SSID, channel and Signal strength. B.
Advanced This page provides advanced configurations to this adapter. Please refer to the following chart for definitions of each item. Items Wireless mode Enable TX Burst Enable TCP Window Size Fast Roaming at dBm Show Authentication Status Dialog Select Your Country Region Code Information Select wireless mode. 2.4G/5.8G is supported. Select to enable connecting to a TX Burst supported device. Mark the checkbox to enable TCP window size, which help enhance throughput.
Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. This page translates the MIB counters into a format easier for user to understand. Items Frames Transmitted Successfully Frames Retransmitted Successfully Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS RTS Frames Fail To Receive CTS Reset Counter Information Frames successfully sent. Successfully retransmitted frames numbers. Frames failed transmit after hitting retry limit.
WMM This page allows users to activate the WMM function for this device. Please note that this function only works while connecting to a WMM compatible device. Items WMM Enable WMM - Power Save Enable Direct Link Setup Enable MAC Address Timeout Value Apply / Tear Down Version: 2.0 Information Enable Wi-Fi Multi-Media. Enable WMM Power Save. Please enable WMM before configuring this function. Enable DLS (Direct Link Setup). Please enable WMM before configuring this function.
Steps to enable Direct Link Setup function: 1. Click the "Direct Link Setup Enable" checkbox. 2. Change to "Network" function. Add an AP that supports DLS features to the Profile. 3. Fill in the blanks of Direct Link with MAC Address of STA. The STA must conform to these two conditions: y Connect with an AP that supports DLS features. y Ensure that DLS is enabled 4. Fill in the Timeout Value and then click . 5.
WPS The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. This adapter supports the configuration setup using PIN configuration method or PBC configuration method through an internal or external Registrar. 1 3 4 5 2 6 7 8 13 15 16 14 9 18 10 19 17 11 12 Items 1. WPS AP List 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19.
The following description divides into four parts: A. WPS Information on AP B. Example of Adding to Registrar Using PIN Method C. Example of Adding to Registrar Using PIN Method D. Example of Configuring a Network/AP Using PIN or PBC Method Version: 2.
A. WPS Information on AP: On Network AP list, double click on the AP then you can see the information appears below. Items Information Authentication Type There are three authentication modes supported by this utility. They are open, Shared, WPA-PSK and WPA system. For open and shared authentication mode, the selection of encryption Encryption Type type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
B. Example of Adding to Registrar Using PIN Method The user obtains a device password (PIN Code) from the STA and enters the password into the Registrar. Both the Enrollee and the Registrar use PIN Config method for the configuration setup. Please follow the step below. 1. Select "Enrollee" from the Config Mode drop-down list. 2. Click "Rescan" to update available WPS APs. 3. Select an AP (SSID/BSSID) that STA will join to. Version: 2.
4. Click "PIN" to enter the PIN. 5. Enter the PIN Code of the STA into the Registrar when prompted by the Registrar. Note: y Allow of an exchange between Step 4 and Step 5. y If you use Microsoft Window Connection Now as an External Registrar, you must start PIN connection at STA first. After that, search out your WPS Device name and MAC address at Microsoft Registrar. Add a new device and enter PIN Code of STA at Microsoft Registrar when prompted. 6. The result should appear as the image below.
7. Configure one or more credentials. Then connect successfully. 8. Click "Detail." You can see the figure below. C. Example of Adding to the Registrar Using the PBC Method The PBC method requires the user to press a PBC button on both the Enrollee and the Registrar within a two-minute interval called the Walk Time. If there is only one Registrar in PBC mode, the PBC mode selected is obtained from ID 0x0004, and is found after a complete scan.
1. Select "Enrollee" from the Config Mode drop-down list. 2. Click PBC to start the PBC connection. 3. Push the PBC on AP. Note: Allow time for an exchange between Step 2 and Step 3. Version: 2.
4. The progress bar as shown in the figure below indicates that scanning progress. 5. When one AP is found, join it. Version: 2.
6. Check WPS Information on the available WPS APs. 7. Configure and receive one or more credential(s).Then connect successfully. The result will be displayed as it is in the figure below. Version: 2.
D. Example of Configuring a Network/AP Using PIN or PBC Method 1. Select "Registrar" from the Config Mode drop-down list. 2. Enter the details of the credential and change configurations (SSID, Authentication, Encryption and Key) manually if needed. 3. If the PIN configuration is setup, enter the PIN sent from the Enrollee. 4. Start PIN or PBC. The following procedures are as similar as section PIN Enrollee Setup or PBC Enrollee Setup. Version: 2.
5. If your AP Enrollee has been configured before the WPS process, the credential you set in advance will be updated to the AP itself. Otherwise, after a successful registration, the AP Enrollee will be re-configured with the new parameters, and the STA Registrar will connect to the AP Enrollee with these new parameters. Version: 2.
CCX This page is available for Vista user only. It provides CCX configurations to this adapter. Please refer to the following chart for definitions of each item. Items Enable CCX (Cisco Compatible extensions) Turn on CCKM Enable Radio Measurements Non-Serving Channel Measurements limit Network EAP Enable RF Roaming Enable CAC (Tolerance) CAC Diagnosis Information Select to enable CCX. This function can only be applied when connecting to a Cisco compatible device. Mark to enable CCKM.
AP mode management guide for Windows 2000/XP/Vista If you wish to share the Internet access with the wireless stations in your environment, you can configure this wireless adapter as a software access point (Soft AP). In this mode, this wireless adapter becomes the wireless access point that provides local area network and Internet access for your wireless stations. To use this adapter as an access point, please right click the icon on system tray and select Switch to AP mode.
Software Access Point (Soft AP) Application Version: 2.
Config This page provides overall configuration to this adapter. Please find the following items for identification to each field. 1 7 2 9 8 3 10 11 12 4 5 6 13 14 15 1. SSID: AP name of user type. User also can select [Use Mac Address] to display it. 2. Wireless Mode: Select wireless mode. Only 2.4G is supported. Version: 2.
3. Country Region Code: eight countries to choose. Country channel list: Classification Range 0: FCC (Canada) CH1 ~ CH11 1: ETSI CH1 ~ CH13 2: SPAIN CH10 ~ CH11 3: FRANCE CH10 ~ CH13 4: MKK CH14 ~ CH14 5: MKKI (TELEC) CH1 ~ CH14 6: ISRAEL CH3 ~ CH9 7: ISRAEL CH5 ~ CH13 Note: Country Region code is not support for Vista. 4. Beacon (ms): The time between two beacons. System default is 100 ms. 5. TX Power: Manually force the AP transmits power. System default is 100%. 6.
Security Setting This page pops up after clicking the Security Setting button. Please follow the instructions below: 1 2 3 4 5 1. Authentication Type: Select to be open, shared, WPA-PSK, WPA2-PSK, or WPA PSK/WPA2-PSK system. 2. Encryption Type: Select an encryption type from the drop list. 3. WPA Pre-shared Key: A shared string between AP and STA. For WPA-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 lengths. 4.
Access Control This function filters users to use this device by designating MAC address. Please refer to the following chart for introduction. 1 2 3 4 5 6 1. Access Policy: Choose a method to process access control from the drop list to determine the MAC addresses that you designated are allowed to access the AP or not. 2. MAC Address: Add allowed (or denied) MAC addresses to the MAC address list. 3. Access List: Display all Mac Addresses that you designated. 4.
MAC Table This page displays the station detail information of current connection. Items MAC Address AID Power Saving Mode Status Version: 2.0 Information The station MAC address of current connection. Raise value by current connection. Check if the connected station supports power saving. The connection status.
Event Log Record Soft AP all event time and message. Items Event Time (yy/mm/dd-hh:mm:ss) Message Version: 2.0 43 Information Record event time. All event messages.
Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. 1 2 3 1. Transmit Statistics Items Frames Transmitted Successfully Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS RTS Frames Fail To Receive CTS Frames Retransmitted Successfully Information Frames that successfully sent. Frames that failed to transmit after hitting retry limit. Counts of CTS that successfully received after sending RTS frame.
FCC Certifications Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
CE Mark Warning This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022 Class B for ITE, the essential protection requirement of Council Directive 89/336/EEC on the approximation of the laws of the Member States relating to electromagnetic compatibility. Company has an on-going policy of upgrading its products and it may be possible that information in this document is not up-to-date. Please check with your local distributors for the latest information.