TRENDnet TEW-621PC User Manual
Hide thumbs Also See for TEW-621PC:

Advertisement

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-621PC

  • Page 2 Copyright This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author. Copyright 2006 Version 1.0 (June, 2006) Disclaimer The information in this document is subject to change without notice.
  • Page 3: Federal Communications Commission (Fcc) Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4: Ce Mark Warning

    CE Mark Warning This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
  • Page 5: Table Of Contents

    Table of Contents Federal Communications Commission (FCC) Interference statement CE Mark Warning Chapter 1 – Wireless LAN Networking Transmission Rate Type of Wireless Networks Ad-Hoc (IBSS) Network Infrastructure (BSS) Network Wireless LAN Security Data Encryption with WEP Chapter 2 - Getting Started About Your Card Package Content System Requirement...
  • Page 6: Chapter 1- Wireless Lan Networking

    Chapter 1- Wireless LAN Networking This section provides background information on wireless LAN networking technology. HE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. HANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The card provides various transmission (data) rate options for you to select.
  • Page 7: Infrastructure (Bss) Network

    When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS).
  • Page 8 In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
  • Page 9 In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the card automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram...
  • Page 11: Wireless Lan Security

    LAN S IRELESS ECURITY Because wireless networks are not as secure as wired networks, its vital that security settings are clearly understood and applied. O NOT ATTEMPT TO CONFIGURE OR CHANGE SECURITY SETTTINGS FOR A NETWORK WITHOUT AUTHORIZATION AND WITHOUT CLEARLY UNDERSTANDING THE SETTINGS YOU ARE APPLING.
  • Page 12: Chapter 2 - Getting Started

    Supports IEEE802.1x and WPA (Wi-Fi Protected Access). Multiple antennas design. Driver support for Windows XP/2000/Vista. Package Content TEW-621PC Wireless N PC Card Multi-Language Quick Installation Guide Driver CD-ROM System Requirement 32-bit CardBus Type II Card slot Microsoft Windows Vista, XP or 2000...
  • Page 13: Wireless Utility And Card Hardware Installation

    Wireless Utility & Card Hardware Installation IF YOU HAVE CONNECTED THE CARD TO YOUR COMPUTER, PLEASE REMOVE IT FIRST. NOTE Follow the instructions below to install the Card and Utility. Windows Vista STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 Insert your Card to an available slot on your Laptop, After the following window pop up, click Locate and install driver software (recommended).
  • Page 14 Click Install this driver software anyways. STEP 5 Click close. Windows XP STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 If your CD Autorun is enabled, the installation procedures will be started. Then click Install Driver &...
  • Page 15 STEP 3 The InstallShield Wizard prepares for installation. STEP 4 The InstallShield Wizard prompts you for confirmation. Click Next on the following menu. STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software.
  • Page 16 STEP 6 The wizard is ready to begin installation. Click Install on it. STEP 7 At the Software Installation menu click Continue Anyway.
  • Page 17 STEP 8 Click Finish to complete the client utility installation. STEP 9 Insert your Card to an available slot on your Laptop. The following window pop up, Select No, not this time and then click Next. STEP 10 Choose “Install the software automatically”, and click Next.
  • Page 18 STEP 11 Click “Continue Anyway”. STEP 12 Click Finish to complete the installation.
  • Page 19 Windows 2000 STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 If your CD Autorun is enabled, the installation procedures will be started. Then click Install Driver & Utility. (Otherwise open your CD folder and double-click on the “setup.exe” file) STEP 3 The InstallShield Wizard prepares for installation.
  • Page 20 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Next STEP 6 The wizard is ready to begin installation. Click Install on it.
  • Page 21 STEP 7 Click Yes. STEP 8 Click Finish to complete the client utility installation. STEP 9 Insert your Card to an available slot on your Laptop. Drivers will install automatically.
  • Page 22: Using The Utility To Configure Your Network

    2.6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and double click the left mouse button to open the Wireless Client Utility.
  • Page 23 The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile tab. SSID Displays the wireless network name. Link Status Shows whether the station is associated to the wireless network.
  • Page 24: Site Survey

    Security Status Security Shows the security type – Disable, WEP, WPA/WPA2, WAP-PSK/WAP2-PSK or 802.1X Authentication Displays the authentication mode. TCP/IP Status IP Address Displays the computer's IP address. Subnet Mask Displays subnet mask Gateway Displays gateway address 2.6.2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks.
  • Page 25: Profile

    Click the Connect button to connect the available network. If no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network. Follow the procedures to create profile for that network. 2.6.3 Profile To add a new configuration profile, click Add on the Profile tab.
  • Page 26: Scan Available Networks

    Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings.
  • Page 27 Click Next to continue the profile setting. To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WEP This card support three modes of WEP, include: 64 Bits 128 Bits Both 64-Bit &...
  • Page 28 tunnel between the client and the authentication server. The tunnel then protects the subsequent user authentication exchange. PEAP (EAP-MSCHAP V2) Protected Extensible To use PEAP (EAP-MSCHAP V2) Authentication Protocol) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager TTLS (Tunneled Transport Layer Security) An EAP variant that...
  • Page 29 Maximum Power Saving Fast Power Saving 802.11b Preamble Displays the 802.11b preamble format. The options include: Long Short Auto RTS Threshold Value from 0 ~ 2347 FRAG Threshold Value from 256 ~ 2346 Wireless Mode Enable or disable 802.11n mode. After advance settings are finished, the following screen showed as below.
  • Page 30 Select the desired network and then click Connect. Click Connect Anyway. Click Close.
  • Page 31 Connecting to a Secured Wireless Connection (WEP-PSK and WPA-PSK) Note: Make sure you know the wireless encryption key before proceeding. If you are not sure, contact the network administrator or log on to your wireless router. On the bottom right-hand corner of the screen, right click the wireless network connection icon and select Connect to a network.
  • Page 32 Click Close.
  • Page 33: Chapter 3 - Maintenance

    Chapter 3 – Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. Uninstall the Driver Follow the steps below to remove (or uninstall) the Card driver from your computer. Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2.
  • Page 34: Glossary

    Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. AD-HOC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other.
  • Page 35 ROAMING In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connection to the network. This is roaming. As the wireless station moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization among other factors.
  • Page 36: Limited Warranty

    TRENDnet shall not be responsible for any software, firmware, information, or memory data of customer contained in, stored on, or integrated with any products returned to TRENDnet pursuant to any warranty. There are no user serviceable parts inside the product. Do not remove or attempt to service the product through any unauthorized service center.
  • Page 37 LIABILITY TO REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT TRENDNET’S OPTION. THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE. Governing Law: This Limited Warranty shall be governed by the laws of the state of California.

Table of Contents