Hide thumbs Also See for TEW-642EC:

Advertisement

Quick Links

1

Advertisement

Table of Contents
loading

Summary of Contents for TRENDnet TEW-642EC

  • Page 2 Copyright This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author. Copyright 2008 Version 1.0 (June, 2008) Disclaimer The information in this document is subject to change without notice.
  • Page 3 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4: Ce Mark Warning

    CE Mark Warning This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
  • Page 5: Table Of Contents

    Table of Contents Federal Communications Commission (FCC) Interference statement CE Mark Warning Chapter 1 - Getting Started About Your Card Package Content System Requirement LED Definition Wireless Utility and Card Hardware Installation Using the Utility to Configure Your Network Link Information Site Survey Profile Chapter 2 –...
  • Page 6: Chapter 1 - Getting Started

    Chapter 1 - Getting Started This chapter introduces the Card and prepares you to use the Wireless Utility. About Your Card With the Card, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Card. ...
  • Page 7: Wireless Utility And Card Hardware Installation

    STATUS POWER LED LINK LED POWER OFF POWER ON Associated without traffic BLINK(SLOW) Associated with traffic BLINK(QUICK) Wireless Utility & Card Hardware Installation IF YOU HAVE CONNECTED THE CARD TO YOUR COMPUTER, PLEASE REMOVE IT FIRST. NOTE Follow the instructions below to install the Card and Utility. STEP 1 Insert the Driver and Utility CD into CD drive STEP 2...
  • Page 8 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Next STEP 6 The wizard is ready to begin installation. Click Install on it. STEP 7 At the Software Installation menu click Continue Anyway.
  • Page 9 STEP 8 Click Finish to complete the client utility installation. STEP 9 At this moment please insert your Card to your Laptop, after the following window pop up, click Next on the Fund New Hardware Wizard...
  • Page 10 STEP 10 Choose “Install the software automatically” and click Next. STEP 11 Click “Continue Anyway”. STEP 12 Click Finish to complete the installation.
  • Page 11 2.6 Windows Vista installation Important! DO NOT install the PC Adapter in the computer until instructed to. Step 1 Insert the Utility & Driver CD-ROM into your computer's CD-ROM Drive and then click Install Driver & Utility. Step 2 Shut down the computer. Step 3 Insert PC Card firmly into a notebook PC and then turn ON the computer and wait until the Windows desktop appears.
  • Page 12 Step 4 Click Locate and install driver software (recommended).
  • Page 13 Step 5 Click on Next to continue. Step 6 Click on Close to exit.
  • Page 14: Using The Utility To Configure Your Network

    2.6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and double click the left mouse button to open the Wireless Client Utility.
  • Page 15: Link Information

    2.7.1 Link Information Click the Link Information tab to see general information about the program and its operation. The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name The name of the current selected configuration profile. Set up the configuration name on the Profile tab.
  • Page 16: Site Survey

    Control Channel Channel number of the control 20MHz channel Extension Channel To locate the 40MHz channel on combination with the control channel Channel Width 20MHz only or 40/20MHz channel support Security Status Security Shows the security type – Disable, WEP, WPA/WPA2, WPA-PSK/WPA2-PSK or 802.1X Authentication Displays the authentication mode.
  • Page 17: Profile

    Click the Connect button to connect the available network. If no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network. Follow the procedures to create profile for that network. 2.7.3 Profile To add a new configuration profile, click Add on the Profile tab.
  • Page 18 Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings.
  • Page 19 Click Next to continue the profile setting. To define the security mode, select the security button of the desired security mode. And then click Next to continue. Please see following table for details of security modes. WEP This card support two modes of WEP, include: 64 Bits 128 Bits Both 64-Bit &...
  • Page 20 then protects the subsequent user authentication exchange. PEAP (EAP-MSCHAP V2) Protected Extensible To use PEAP (EAP-MSCHAP V2) Authentication Protocol) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager TTLS (Tunneled Transport Layer Security) An EAP variant that provides mutual authentication using a certificate for server authentication, and via a secure TLS tunnel for the client...
  • Page 21 Fast Power Saving  802.11b Preamble Displays the 802.11b preamble format. The options include:  Long  Short  Auto RTS Threshold Value from 0 ~ 2347 FRAG Threshold Value from 256 ~ 2346 Qos Enable/disable Qos After advance settings are finished, the following screen showed as below. You can activate the profile now or later.
  • Page 22 Using Windows Wireless Zero Configuration Step 1 Click on the balloon option “One or more wireless networks are in range of this computer”. Step 2 Choose a network from the list.
  • Page 23 Step 3 If the wireless network has wireless security, please supply the wireless security key. Enter the wireless key in twice at the security prompt. Using Windows Vista Step 1 On the bottom right-hand corner of the screen, right click the wireless network connection icon and select Connect to a network.
  • Page 24 Step 2 Select the desired network and then click Connect. Step 3 Click on Continue anyway Step 4 Click on Close.
  • Page 25: Chapter 2 - Maintenance

    Chapter 3 – Maintenance This chapter describes how to uninstall or upgrade the Wireless Utility. Uninstall the Driver Follow the steps below to remove (or uninstall) the Card driver from your computer. Step 1. To remove the driver from the OS, go to Start -> Control Panel Step 2.
  • Page 26: Glossary

    Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. AD-HOC (IBSS) Ad-hoc mode does not require an AP or a wired network. Network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other.
  • Page 27 WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the TEW-642EC and the AP or other wireless stations to keep network communications pri- vate. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.

Table of Contents