Inhaltszusammenfassung zur Seite Nr. 1
W ssel i
150N
Us B
Ad Aretp
U sm ANUAl
Model 524438
INT-524438-UM-0908-03
er
re
Inhaltszusammenfassung zur Seite Nr. 2
Inhaltszusammenfassung zur Seite Nr. 3
™ Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless 150N USB Adapter, Model 524438. The Wireless 150N USB Adapter is a compact high-speed adapter that allows you to connect your notebook or desktop PC to wireless networks at faster speeds than ever before. Now you can transfer or receive digital images, videos and MP3 files faster than ever, connecting to the wireless network with link speeds of up to 150 Mbps using the latest in wireless technology. This adapter is also c
Inhaltszusammenfassung zur Seite Nr. 4
CAUTION: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference; and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC r F r tiaodnia e x p o s u r e s tementa t This equipm
Inhaltszusammenfassung zur Seite Nr. 5
t ABle of co Nte Nts section page Installation ..........................................................................................6 Configuration ....................................................................................7 Network ........................................................................................9 Profile ................................................................................................10 Profile Configuration ......................
Inhaltszusammenfassung zur Seite Nr. 6
i Nst All Aoit N Prior to connecting the Wireless N USB Adapter: • Uninstall any previously loaded versions of the driver and utility. • Install the software program from the CD. NOTE: The following Windows XP procedure is similar for Windows 98SE/Me/2000/2003/Vista. 1. Insert the setup CD in the CD-ROM drive and run the setup program. 2. Read the license agreement that displays; click “Yes” to proceed. 3. On the Setup Type screen, select “Install driver and INTELLINET WLAN Utility.” Onl
Inhaltszusammenfassung zur Seite Nr. 7
5. Once the software installation is complete, select “Yes, I want to restart my computer.” Once the reboot is complete, connect the Wireless N USB Adapter to your computer. When the Found New Hardware Wizard screen displays, select the option that allows Windows to automatically search for the correct driver. Your adapter is now installed. co Nfig Ur Atio N The configuration utility — which displays automatically once the adapter is connected — is a powerful application that helps you co
Inhaltszusammenfassung zur Seite Nr. 8
The configuration utility appears as an icon in the Windows system tray while the adapter is running. You can open it by double-clicking on the icon. In Windows XP, there is a “Windows Zero Configuration Tool” option for setting up wireless clients. If you prefer to use the configuration utility, there are two ways to switch to it instead of using the Windows tool. o ption 1 1. Right-click the utility icon in the system tray and select “Use INTELLINET Configuration utility.” o pti
Inhaltszusammenfassung zur Seite Nr. 9
3. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adapter. NOTE: If “Wireless Zero Configuration Tool” is enabled, you can only configure the advanced settings or check the link status and statistics from the configuration utility of the adapter. NETWORK When you open the configuration utility, the system scans all the channels to find access points/stations within the accessible range of the adapter and automati
Inhaltszusammenfassung zur Seite Nr. 10
Available Networks: This list shows all available wireless networks within the range of the adapter. It also displays network information: SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. To connect to a network on the list, double-click the item and the adapter will connect automatically to it. Rescan: Click “Rescan” to collect the new information of all the wireless networks nearby. Connect: Click “Connect” to connect to the selected network.
Inhaltszusammenfassung zur Seite Nr. 11
Status: This field displays the SSID and MAC ID of the network the adapter is connecting to. Extra Info: This field displays the link status. Channel: This field displays the number of the radio channel and the frequency used for the networking. Link Speed (Mbps): These fields display the transmission (Tx) and the reception (Rx) rates of the network. The maximum transmission rate is 54 Mbps. Throughput (Kbps): These fields display the speed of data being transmitted (Tx) and recei
Inhaltszusammenfassung zur Seite Nr. 12
p or File Con Figtuiron a Profile Name: Define easily recognizable profile names to identify the different networks. SSID: The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. If you specify an SSID for the adapter, then only the device with the same SSID can interconnect to the adapter. To add a nearby network to the profile list, pull down the menu to view all the networks th
Inhaltszusammenfassung zur Seite Nr. 13
RTS Threshold: This is the minimum packet size required for an RTS (request to send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. NOTE: A minor change is recommended. Fragment Threshold: This value defines the maximum size of packets; any packet size larger than the value will be fragmented. If you’ve decreased this value and experience high packet
Inhaltszusammenfassung zur Seite Nr. 14
or pre-shared key (PSK) technology. It provides a high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks. For enterprises that have already deployed IEEE 802.1x authentication, WPA offers the advantage of leveraging existing authentication databases and infrastructure. • WPA-PSK: This is a special mode designed for home and small business users who do not have access
Inhaltszusammenfassung zur Seite Nr. 15
• WEP: Enables the WEP Data Encryption. When the item is selected, you need to continue setting the WEP Encryption keys. • TKIP: The Temporal Key Integrity Protocol changes the temporal key every 10,000 packets (a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security. • AES: AES has been developed to ensure the highest degree of security and authenticity for digital information. It’s the most advanced solution defined
Inhaltszusammenfassung zur Seite Nr. 16
IEEE 802.1x RADIUS RADIUS Access Client Client Server 3 1 IEEE 802.1x Access Client RADIUS Client RADIUS Server 1 3 Access Point 2 4 2 4 Windows 2000 IAS (Internet Authentication 1 Client requests to log in to the network 3 Username and password sent to RADIUS server 2 Log in with username and password 4 User login to the LAN approved or d Service) enied (1) Client requests to login the (3) Send username, password to 80
Inhaltszusammenfassung zur Seite Nr. 17
the authentication phase. The server presents a certificate to the client and, after validating the server’s certificate, the client presents a client certificate to the server for validation. Session Resumption: Click/check the box to activate or de-activate. ID/Password: Enter the password as the identity for the server. Client Certification: A client certificate is required for TLS, but is optional for TTLS and PEAP. This forces a client certificate to be selected from the a
Inhaltszusammenfassung zur Seite Nr. 18
which contains the issuer’s public key, into the trusted root certification authority certificate store of the host computer. Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority. Server Name: Enter the authentication server name. Server name must match exactly: When selected, the server name must exactly match the server name found on the certificate. Domain name must end in specifie
Inhaltszusammenfassung zur Seite Nr. 19
to this mode. This mode is also the default setting. • 802.11 B only: Though the adapter is compatible with both 802.11g and 802.11b wireless stations, if there are only 802.11b wireless stations in the network, you can set the adapter to this mode. Ad Hoc Wireless Mode: When the adapter is set in Ad Hoc (Peer to Peer) mode, you can designate the wireless connection mode for the Ad Hoc network. • Only B: Though the adapter is compatible with both 802.11g and 802.11b wirel
Inhaltszusammenfassung zur Seite Nr. 20
Tx Rate: There are several options in the drop-down menu: “Auto” and a range of speeds from “1 Mbps” to “54 Mbps.” When “Auto” is selected, the device automatically chooses the most suitable transmission rate. The higher the data rate designated in the network, the shorter the distance allowed between the adapter and the wireless stations. Enable Tx Burst: This enables the adapter to deliver better throughput in the same period and environment. Enable TCP Window Size: The TCP window i