Resumen del contenido incluido en la página 1
54Mbs Wireless PCI Adapter
GN-WPKG
User’s Manual
http://www.gigabyte.com.tw
Version 3.0
Resumen del contenido incluido en la página 2
Federal Communication Commission Interference Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio com
Resumen del contenido incluido en la página 3
Contents CHAPTER 1 PRODUCT OVERVIEW...........................................1 1.1 INTRODUCTION TO THE WPKG WIRELESS PCI ADAPTER.............................................. 1 1.2 FEATURES ................................................................................................................ 1 1.3 PHYSICAL DIMENSIONS & PACKAGING......................................................................... 1 1.4 LED INDICATOR ...................................................
Resumen del contenido incluido en la página 4
Chapter 1 Product Overview 1.1 Introduction to the GN-WPKG Wireless PCI Adapter The Gigabyte WPKG Wireless PCI Adapter installs quickly into your motherboard’s PCI slot, connecting wirelessly to your Wi-Fi Router - instantly transforming your PC into a wireless AP, broadening the range of your wireless network. The WPKG is fully 802.11b interoperable, meaning it connects seamlessly to both 11b and 11g wireless traffic, and with its dynamic speed adjustment feature, it will always
Resumen del contenido incluido en la página 5
Package Contents • GN-WPKG PCI Adapter • Low profile external antenna • Setup CD • Quick Start Guide In case of any missing or damaged accessories, please contact your local distributor or authorized reseller immediately. If you require returning the damaged product, you must pack it in the original packing material or the warranty will be voided. 1.4 LED Indicator The WPKG PCI Adapter has two LED lights located on the outward facing bracket frame. The left LED is the Activity
Resumen del contenido incluido en la página 6
Chapter 2 Installation This chapter covers the installation of the WPKG Adapter for your desktop PC. The following sections will assist you with proper installation of the PCI Adapter, and also with installing the necessary drivers and utilities. For specific information regarding your Version of Windows, please refer to the appropriate sections as indicated 2-1. Installing the Adapter (Hardware Installation) Step 1: Power off your PC. Step 2: Plug the PCI Adapter into an ope
Resumen del contenido incluido en la página 7
2-2. Installing the Driver & Utility After restarting your computer the Windows Found New Hardware wizard will open. When it does, please click Cancel to close it. GIGABYTE drivers and utilities offer more power and control over your new WPKG PCI Adapter than does Windows native Zero Configuration Utility. Step 1: At the Found New Hardware Wizard screen, click Cancel. Step 2: Insert the WPKG Setup CD into the CD-ROM drive. The WPKG Welcome screen window will automatically open.
Resumen del contenido incluido en la página 8
Step 4: InstallShield will install the WPKG drivers. Click Next to proceed. Step 5: Setup will detect your version of Windows. Click Next. 5
Resumen del contenido incluido en la página 9
Step 6: Since your card is already inserted, Click OK. Step 7: Click Finish to complete installation. 6
Resumen del contenido incluido en la página 10
Chapter 3 Using the Wireless Utility The WPKG Wireless Utility is a powerful application that helps you to configure the network card and monitor the statistics of the communication link. This application permits the configuration for parameters while the card is operating. It also offers more configuration options and supports Windows 98SE/Me/2000/XP. Switch between AP mode and Station mode with just a right click of the mouse on the icon (Windows XP/2000 users only). It appears as
Resumen del contenido incluido en la página 11
Figure 3-2. Current profile Description of items in Figure 3-2 is as follows: Profile Name: A profile can be saved for various wireless settings in different environments, i.e. home, office, and the corner coffee shop. SSID: Displays the SSID of the Adapter or Access Point. Channel: Shows the current wireless channel. Authentication: Sever authentication types. They include “OPEN”, “WPA”, “WPA-PSK” and “Shared”. Encryption: The type of encryption used in this profile: “Non
Resumen del contenido incluido en la página 12
Figure 3-3. Configuration Description of items in Figure 3-3 is as follows: Profile Name: Users can save different profiles names for different configurations. SSID: Select the AP detected by the system from the drop-down menu or input a SSID. (Default: ANY) Power Saving mode: Select “Power Saving Mode” (PSM) to turn off the Adapter’s transceiver when not in use, or select CAM to continuously turn on transceivers. (Default: OFF) Network Type: “Infrastructure” and “802.11 A
Resumen del contenido incluido en la página 13
Figure 3-4 – Configuration Screen TX Power: Select percentage of transmitted power. (Default: Auto) RTS Threshold: This is a mechanism implemented to prevent the “Hidden Node” problem, “Hidden Note” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other and can not detect each other. This mechanism is a way to prevent data collision when Adapters require transmission. (Def
Resumen del contenido incluido en la página 14
Figure 3-5. Authentication and Security Authentication: Before a station connects to a SSID, the authentication type used by the SSID must be known. Authentication types include OPEN SYSTEM, WAP, WAP-PSK and SHARED. (Default: WPA-PSK) Encryption: To prevent unauthorized access to data transmitted on the network, the Adapter and the Access Point agree on a type of data encryption. Any station that wishes to connect, must have the same password and encryption scheme to connect.
Resumen del contenido incluido en la página 15
Hex key. WPA-PSK encryption: WPA-PSK (Preshared Key) uses TKIP or AES based on your choice. You create a password (or Passphrase as its often called) and the system will use the Passphrase to create a cipher code in which it will encrypt the data. To use WPA-PSK: 1. Create a Passphrase, and key it in. Use 8~63 ASCII digits. 2. Remember this Passphrase. If you forget the Passphrase, you will have to do a hard reset of the Access Point in order to restore default settings and connect
Resumen del contenido incluido en la página 16
Identity: The Account’s User ID. Password: Passwords for users accounts can be used when LEAP and MD5-Challenge are selected as authentication types. Use Client Certificate: This certificate is necessary for TLS and an option for PEPA and TTLS. Check “Use Client Certificate” to verify the authenticity of a Client Certificate during the authentication process. Clicking More will open the Client Certificate Selection Window (shown in Figure 3-7). Users can select one suitable certif
Resumen del contenido incluido en la página 17
3-1-2-2. 802.1x Settings - CA Server Tab CA Server is used when TLS, TTLS or PEAP is in use. When Use certificate chain is checked, the Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. Figure 3-8. CA Server Setting To verify the CA server: 1. Confirm if the Server Certificate is issued by assigned certificate issuer. If “Allow Intermediate Authentication” is checked, the server certificate can be issued
Resumen del contenido incluido en la página 18
3-1-3. Advanced Screen The Advanced screen includes fields of various parameters to review or change drivers. Just click OK to apply any changes in parameters in the tab. A reboot is not needed for changes to take effect. (see Figure 3-12) Figure 3-12 Description of items in Figure 3-12 is as follows: Wireless Mode: Sets infrastructure Protocols, including 802.11 B/G mix and 802.11 B Only. (Default: 802.11 B/G mix) Ad Hoc Wireless Mode: Sets Ad Hoc Wireless Protocols, inc
Resumen del contenido incluido en la página 19
collision when WLAN equipments require transmission. TX Rate: This option adjusts settings of TX Rate according to the setting of “Infrastructure Wireless Mode”. (Default: Auto) 3.2. Link Status Tab The Link Status tab displays the current association information about the Adapters connection with a wireless network. (see Figure 3-9) Figure 3-9. Link Status Description of items in Figure 3-9 is as follows: Status: Shows current link status. “No Link” will appear on the
Resumen del contenido incluido en la página 20
3.3. Site Survey Tab The Site Survey tab shows you the list of reachable access points and/or peer-to-peer Stations. Just double click on the SSID that you want to connect or click the Connect button. (see Figure 3-9) Figure 3-10. Site Survey Description of items in Figure 3-10 is as follows: SSID: The name of the wireless network (also known as Network Name). BSSID: Displays the MAC address of the Access Point or router. Signal Strength: Displays the strength of the sig