Streszczenie treści zawartej na stronie nr. 1
54Mbs Wireless PCI Adapter
GN-WPKG
User’s Manual
http://www.gigabyte.com.tw
Version 3.0
Streszczenie treści zawartej na stronie nr. 2
Federal Communication Commission Interference Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio com
Streszczenie treści zawartej na stronie nr. 3
Contents CHAPTER 1 PRODUCT OVERVIEW...........................................1 1.1 INTRODUCTION TO THE WPKG WIRELESS PCI ADAPTER.............................................. 1 1.2 FEATURES ................................................................................................................ 1 1.3 PHYSICAL DIMENSIONS & PACKAGING......................................................................... 1 1.4 LED INDICATOR ...................................................
Streszczenie treści zawartej na stronie nr. 4
Chapter 1 Product Overview 1.1 Introduction to the GN-WPKG Wireless PCI Adapter The Gigabyte WPKG Wireless PCI Adapter installs quickly into your motherboard’s PCI slot, connecting wirelessly to your Wi-Fi Router - instantly transforming your PC into a wireless AP, broadening the range of your wireless network. The WPKG is fully 802.11b interoperable, meaning it connects seamlessly to both 11b and 11g wireless traffic, and with its dynamic speed adjustment feature, it will always
Streszczenie treści zawartej na stronie nr. 5
Package Contents • GN-WPKG PCI Adapter • Low profile external antenna • Setup CD • Quick Start Guide In case of any missing or damaged accessories, please contact your local distributor or authorized reseller immediately. If you require returning the damaged product, you must pack it in the original packing material or the warranty will be voided. 1.4 LED Indicator The WPKG PCI Adapter has two LED lights located on the outward facing bracket frame. The left LED is the Activity
Streszczenie treści zawartej na stronie nr. 6
Chapter 2 Installation This chapter covers the installation of the WPKG Adapter for your desktop PC. The following sections will assist you with proper installation of the PCI Adapter, and also with installing the necessary drivers and utilities. For specific information regarding your Version of Windows, please refer to the appropriate sections as indicated 2-1. Installing the Adapter (Hardware Installation) Step 1: Power off your PC. Step 2: Plug the PCI Adapter into an ope
Streszczenie treści zawartej na stronie nr. 7
2-2. Installing the Driver & Utility After restarting your computer the Windows Found New Hardware wizard will open. When it does, please click Cancel to close it. GIGABYTE drivers and utilities offer more power and control over your new WPKG PCI Adapter than does Windows native Zero Configuration Utility. Step 1: At the Found New Hardware Wizard screen, click Cancel. Step 2: Insert the WPKG Setup CD into the CD-ROM drive. The WPKG Welcome screen window will automatically open.
Streszczenie treści zawartej na stronie nr. 8
Step 4: InstallShield will install the WPKG drivers. Click Next to proceed. Step 5: Setup will detect your version of Windows. Click Next. 5
Streszczenie treści zawartej na stronie nr. 9
Step 6: Since your card is already inserted, Click OK. Step 7: Click Finish to complete installation. 6
Streszczenie treści zawartej na stronie nr. 10
Chapter 3 Using the Wireless Utility The WPKG Wireless Utility is a powerful application that helps you to configure the network card and monitor the statistics of the communication link. This application permits the configuration for parameters while the card is operating. It also offers more configuration options and supports Windows 98SE/Me/2000/XP. Switch between AP mode and Station mode with just a right click of the mouse on the icon (Windows XP/2000 users only). It appears as
Streszczenie treści zawartej na stronie nr. 11
Figure 3-2. Current profile Description of items in Figure 3-2 is as follows: Profile Name: A profile can be saved for various wireless settings in different environments, i.e. home, office, and the corner coffee shop. SSID: Displays the SSID of the Adapter or Access Point. Channel: Shows the current wireless channel. Authentication: Sever authentication types. They include “OPEN”, “WPA”, “WPA-PSK” and “Shared”. Encryption: The type of encryption used in this profile: “Non
Streszczenie treści zawartej na stronie nr. 12
Figure 3-3. Configuration Description of items in Figure 3-3 is as follows: Profile Name: Users can save different profiles names for different configurations. SSID: Select the AP detected by the system from the drop-down menu or input a SSID. (Default: ANY) Power Saving mode: Select “Power Saving Mode” (PSM) to turn off the Adapter’s transceiver when not in use, or select CAM to continuously turn on transceivers. (Default: OFF) Network Type: “Infrastructure” and “802.11 A
Streszczenie treści zawartej na stronie nr. 13
Figure 3-4 – Configuration Screen TX Power: Select percentage of transmitted power. (Default: Auto) RTS Threshold: This is a mechanism implemented to prevent the “Hidden Node” problem, “Hidden Note” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other and can not detect each other. This mechanism is a way to prevent data collision when Adapters require transmission. (Def
Streszczenie treści zawartej na stronie nr. 14
Figure 3-5. Authentication and Security Authentication: Before a station connects to a SSID, the authentication type used by the SSID must be known. Authentication types include OPEN SYSTEM, WAP, WAP-PSK and SHARED. (Default: WPA-PSK) Encryption: To prevent unauthorized access to data transmitted on the network, the Adapter and the Access Point agree on a type of data encryption. Any station that wishes to connect, must have the same password and encryption scheme to connect.
Streszczenie treści zawartej na stronie nr. 15
Hex key. WPA-PSK encryption: WPA-PSK (Preshared Key) uses TKIP or AES based on your choice. You create a password (or Passphrase as its often called) and the system will use the Passphrase to create a cipher code in which it will encrypt the data. To use WPA-PSK: 1. Create a Passphrase, and key it in. Use 8~63 ASCII digits. 2. Remember this Passphrase. If you forget the Passphrase, you will have to do a hard reset of the Access Point in order to restore default settings and connect
Streszczenie treści zawartej na stronie nr. 16
Identity: The Account’s User ID. Password: Passwords for users accounts can be used when LEAP and MD5-Challenge are selected as authentication types. Use Client Certificate: This certificate is necessary for TLS and an option for PEPA and TTLS. Check “Use Client Certificate” to verify the authenticity of a Client Certificate during the authentication process. Clicking More will open the Client Certificate Selection Window (shown in Figure 3-7). Users can select one suitable certif
Streszczenie treści zawartej na stronie nr. 17
3-1-2-2. 802.1x Settings - CA Server Tab CA Server is used when TLS, TTLS or PEAP is in use. When Use certificate chain is checked, the Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. Figure 3-8. CA Server Setting To verify the CA server: 1. Confirm if the Server Certificate is issued by assigned certificate issuer. If “Allow Intermediate Authentication” is checked, the server certificate can be issued
Streszczenie treści zawartej na stronie nr. 18
3-1-3. Advanced Screen The Advanced screen includes fields of various parameters to review or change drivers. Just click OK to apply any changes in parameters in the tab. A reboot is not needed for changes to take effect. (see Figure 3-12) Figure 3-12 Description of items in Figure 3-12 is as follows: Wireless Mode: Sets infrastructure Protocols, including 802.11 B/G mix and 802.11 B Only. (Default: 802.11 B/G mix) Ad Hoc Wireless Mode: Sets Ad Hoc Wireless Protocols, inc
Streszczenie treści zawartej na stronie nr. 19
collision when WLAN equipments require transmission. TX Rate: This option adjusts settings of TX Rate according to the setting of “Infrastructure Wireless Mode”. (Default: Auto) 3.2. Link Status Tab The Link Status tab displays the current association information about the Adapters connection with a wireless network. (see Figure 3-9) Figure 3-9. Link Status Description of items in Figure 3-9 is as follows: Status: Shows current link status. “No Link” will appear on the
Streszczenie treści zawartej na stronie nr. 20
3.3. Site Survey Tab The Site Survey tab shows you the list of reachable access points and/or peer-to-peer Stations. Just double click on the SSID that you want to connect or click the Connect button. (see Figure 3-9) Figure 3-10. Site Survey Description of items in Figure 3-10 is as follows: SSID: The name of the wireless network (also known as Network Name). BSSID: Displays the MAC address of the Access Point or router. Signal Strength: Displays the strength of the sig