Intel 2200BG User Manual

Intel 2200BG User Manual

Pro/wireless network connection adapter

Advertisement

Quick Links

User's Guide
PRO/Wireless 2200BG Network Connection
Model
WM3B2200BG

Advertisement

Table of Contents
loading

Summary of Contents for Intel 2200BG

  • Page 1 User’s Guide PRO/Wireless 2200BG Network Connection Model WM3B2200BG...
  • Page 2 802.11g networks. Your wireless adapter maintains automatic data rate control according to access point location to achieve the fastest possible connection. All your wireless client connections can be easily managed by the Intel(R) PROSet for Wireless utility. Using the PROSet Profile Wizard, you can create profiles automatically to suite your specific connection requirements.
  • Page 3 States and other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Intel disclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows are registered trademarks of Microsoft Corporation.
  • Page 4 Back to Contents Page Wireless LAN Overview: Intel(R) PRO/Wireless 2200BG User's Guide About Wireless LAN Technology Choosing a WLAN Configuring a WLAN Identifying a WLAN Surveying the Site of Your WLAN Factors Affecting Range A wireless network connects computers without using network cables. Computers use radio communications to send data between each other.
  • Page 5 Peer-to-Peer mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. Ad Hoc Mode is only supported in 802.11b and 802.11g networks. You can use Peer-to-Peer mode to network computers in a home or small office or to set up a temporary wireless network for a meeting.
  • Page 6 locations. Security: The 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64-bit or 128-bit shared encryption key to scramble data. Before a computer transmits data, it scrambles the data using the secret encryption key. The receiving computer uses this same key to unscramble the data.
  • Page 7 packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID. Surveying the Site of Your Wireless LAN Conducting a site survey for your wireless LAN is the most crucial step in the process of setting up a wireless network.
  • Page 8 Some of the steps involve taking measurements, but most involve experience, trial and error, and a little guesswork rather than numbers and figures. When to Perform a Site Survey Intel® recommends that you perform a site survey prior to installing a wireless LAN. Site surveys are especially important when: You are installing a new site: Evaluate the placement of the access points and antennas throughout the proposed site.
  • Page 9 you need a different level of coverage in some areas, you may need to move, replace, or supplement access points and antennas. You are physically changing the site: Remodeling may introduce new sources of interference, such as motors and metal structures within the coverage area of the access point, even if it does not directly effect the sites where the access points are located.
  • Page 10 Back to Contents Page Please read all restrictions and disclaimers.
  • Page 11: Software Installation

    No other wireless LAN card is installed in this computer. To install the driver before installing hardware, use Start > Run and browse to the file SetupWLD.exe in the path PROW2200\WIN2K on the Intel CD. After running SetupWLD.exe, shut down the computer and install the hardware. When the computer...
  • Page 12: Driver Installation

    New Hardware Wizard dialog. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD-ROM into your CD-ROM drive. If the Intel(R) PRO Network Connections menu screen appears, leave it open and click the Found New Hardware Wizard dialog to make that the active window.
  • Page 13 > Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXPT32 on the Intel CD supplied with the product. Skip Steps 11 and 12 below and continue with Step 11. On the Intel(R) PRO Network Connections screen, click Wireless LAN Adapters.
  • Page 14 Intel(R) PROSet utility and for turning off the Windows XP configuration feature. If you do not turn off the Windows XP feature, you will not be able to use Intel(R) PROSet to configure wireless network settings. For information on how to use the Windows XP feature, see your Windows XP documentation.
  • Page 15 (Recommended) is selected. If Windows does not detect the new hardware, see Troubleshooting. 4. Insert the Intel CD into your CD drive. The New Hardware Found Wizard searches for the correct driver files and copies them to your hard drive.
  • Page 16 > Run and browsing to the file iSetup.exe in the path APPS/PROSET/WINXP32 on the Intel CD supplied with the product. Skip Steps 13 and 14 below and continue with Step 13. Display the Intel(R) PRO Network Connections screen by removing and re- inserting the Intel CD, or by running autorun.exe from the CD.
  • Page 17 Problems with network connectivity Checking Adapter Statistics LAN Utility Conflict Message Message dialog "Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features" is displayed. Refer to...
  • Page 18: Problems With Installation

    established to acquire an IP address from the AP to allow data transfer. Refer to the following WEP encryption and authentication settings. Open Authentication with an incorrect WEP 64 or 128-bit encryption key: A profile with an incorrect WEP encryption key will allow the wireless adapter to associate with the access point.
  • Page 19 What construction materials are used in wall and floors? Users are dropped from the wireless network Suggested causes and solutions: Find out if a person or workgroup moved or if the building has been rearranged. If two or more users are seated too close to each other, performance can suffer. Instruct your users to space themselves a small distance apart to keep receivers from being overloaded.
  • Page 20 a “typical” office building, where the walls may be simple drywall (which is almost transparent to microwaves), or could be plaster with metal underneath. Most sites are somewhere between these two extremes, and consist of a mixture of surfaces. You can’t tell what is inside a wall by just looking at it, and we can’t tell you exactly what distance you will achieve.
  • Page 21 Help Prevent access to wireless networks from outside the building Excess transmit range presents a special reverse problem. For example, putting an access point adjacent to a second floor bay window invites anyone with the right software on the street below to pick up and enjoy all network transmissions. We discuss some possible solutions to this problem further on.
  • Page 22 If the adapter is communicating with an access point (infrastructure mode) or other computers in peer-to-peer mode, click the Statistics button in the Troubleshooting tab to display the current information about how well the adapter is transmitting and receiving information. Back to Contents Page Please read all restrictions and disclaimers.
  • Page 23 Connecting to a Network: Intel(R) PRO/Wireless 2200BG User's Guide Connecting to a Network using Intel(R) PROSet Enabling Intel(R) PROSet to manage Your Wireless Connections System Wide Advanced Settings Intel(R) PROSet Configuration Service Scanning for Available Networks Connecting to a Network Using an Access Point...
  • Page 24 The following Profile Management options can be found in Advanced Settings. Display available networks when not associated: When cleared, disables the Intel(R) PROSet wireless manager dialog listing the available networks. When checked, the Intel Configuration Service running in the background automatically displays available networks not listed in the Profile List.
  • Page 25 Select yes, Intel(R) PROSet will manage the wireless adapter. Select No, Windows XP will manage the wireless adapter. Enable Profile Management Features: If the box is checked, it indicates that Intel(R) PROSet is the default wireless network manager. If cleared, Windows XP is the wireless network manager.
  • Page 26 The Configuration Service is only available if Intel(R) PROSet is installed. If a connection to an access point cannot be made using any of the profiles in the Profile List, a dialog will display the available networks.
  • Page 27 For AAA Client: Select OK, and the AAA Client application will manage the adapter. The current connection will continue with the affected Intel(R) PROSet features show below. To avoid conflicts, the Intel(R) PROSet profile management features have been temporarily disabled. To re-enable these features, first disable the other LAN utility and then either: 1.
  • Page 28: Scanning For Available Networks

    NOTE: If the buttons described above are used, the following message displays: "Another wireless LAN utility is communicating with the Intel(R) PRO/Wireless LAN adapter. To avoid conflicts, Intel(R) PROSet has temporarily disabled its Profile Management features." Scanning for Available Networks A fast way to connect to a network is to use the Scan button to search for a network access point in range of your wireless adapter.
  • Page 29 NOTE: If the selected network has 802.11x authentication, you must first create a profile using the Profile Wizard. However, if the network has no WEP security (Open), WEP 64 or 128-bit encryption, or WPA-PSK, you can enter the required security settings in the dialog that displays after clicking the Connect button. Then a one time connection without a profile can be made.
  • Page 30 In peer-to-peer (ad hoc) mode, you can send and receive information to other computers in an ad hoc network. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information.
  • Page 31 5. Click Ad hoc operating mode. 6. Click Password protect this profile to set a profile password. 7. Click Next. Security Settings 8. Select either None, WEP for the data encryption. 9. If WEP is selected, select either 64 or 128-bit for the Encryption Level. 10.
  • Page 32 Using Intel(R) PROSet to switch the radio on/off The radio can be switched on or off from General page in Intel(R) PROSet. The current state of the radio is displayed in the wireless adapter task tray menu option. The General page also displays the current state of the radio if the hardware option is installed.
  • Page 33 The following advanced options are available in the Windows Device Manager Advanced tab if Intel(R) PROset is not installed. If PROSet is installed the Advanced tab displays the Open button. Selected this button to open PROSet. Some of the options are also available in Intel(R) PROSet.
  • Page 34 the battery. Wireless Mode - Select the wireless mode (modulation type) for date rate. Default setting: "Connect to 802.11g and 802.11b." This option uses both 11 Mbps and 54 Mbps date rate. Other options are, "Connect to 802.11g only" and "Connect to 802.11b only."...
  • Page 35 8. Select Long Only from the drop-down box. 9. Click OK to save and exit the dialog. Advanced Tab Preamble Description Property Value Preamble Auto (Default): This option allows automatic detection of the preamble setting received from the access point to enable the appropriate preamble option.
  • Page 36 Back to Contents Page Using PROSet Profiles: Intel(R) PRO/Wireless 2200BG User's Guide Using Intel(R) PROSet Wireless Profiles Setting up Windows Network Profiles Profile Connection Preferences Creating a New Profile Importing and Exporting Profiles Setting a Profile Password Automatic Profile Distribution...
  • Page 37: Creating A New Profile

    Profile Connection Preferences To access the profile connection preference option: 1. From the General page, click the Networks tab. 2. Click the Advanced button. 3. Under the Auto-connection heading, click the one of the following options: Connect to available networks using profiles only (Default setting): Use the profiles in the Profile List to connect to any available network.
  • Page 38 4. Enter the network SSID, in the Network Name (SSID) field. 5. Click Infrastructure or Ad hoc for the operating mode. 6. Click Password protect this profile to set a password for the profile. 7. The Mandatory AP option is only used if Infrastructure mode is selected. Use this option to connect to a specific access point.
  • Page 39: Importing And Exporting Profiles

    26. Click the Advanced button to set the network connection preferences. 27. Click the Connect button to connect to the network. 28. Click OK to close the Intel(R) PROSet dialog. Importing and Exporting Profiles NOTE: A password protected profile can be imported and exported, however, before editing the profile, the password must be entered.
  • Page 40 Setting a Profile Password To set a password for an existing profile: 1. Select the profile from the Profile List in the Networks page, and click the Edit button. 2. Click the Password tab. 3. Click the check box next to "Password protect this profile" to enable profile password.
  • Page 41 4. Export the profile from the profile list. Refer to Importing and Exporting Profiles details. 5. Copy the exported profile from its directory to the Programs Files\Intel\PROSet\Import directory. The profile is now ready to distribute to other computers. Editing an Existing Profile To edit an existing profile: 1.
  • Page 42: Deleting A Profile

    5. Click the new profile name shown in the Profile List. Use the up and down arrows to position the priority of new profile in the priority list. 6. Click the Advanced button to set the network connection preferences. 7. Click the Connect button to connect to the network. Deleting a Profile To delete a profile: 1.
  • Page 43 Loading a Profile from the Task Tray To load a profile from the Task Tray: 1. Right-click Intel(R) PROSet icon in the task tray. 2. Select the Intel PRO/Wireless 2200BG adapter. 3. Click Select Profile and select the profile to be launched.
  • Page 44 Back to Contents Page Security Overview: Intel(R) PRO/Wireless 2200BG User's Guide WEP Encryption and Authentication Encryption Overview Protecting Your Network Authentication Types 802.1x Authentication What is a RADIUS Wi-Fi Protected Access (WPA) PEAP Cisco LEAP WEP Encryption and Authentication Wired Equivalent Privacy (WEP) encryption and shared authentication provides protect for your data on the network.
  • Page 45 encryption. A network key can be provided for you automatically (for example, it might be provided on your wireless network adapter, or enter it yourself and specify the key length (64-bits or 128-bit), key format (ASCII characters or hexadecimal digits), and key index (the location where a specific key is stored).
  • Page 46: Protecting Your Network

    encryption must be disabled. Protecting Your Network Authentication Types 802.1x Authentication What is a RADIUS Wi-Fi Protected Access (WPA) PEAP Cisco LEAP Authentication Types The IEEE 802.1x standard provides a general authentication framework for 802 LANs and specifies an extensible authentication protocol (EAP) to enable LAN transport for many different types of authentication protocols.
  • Page 47 802.1x supplicant protocol support Support for the Extensible Authentication Protocol (EAP) - RFC 2284 Supported Authentication Methods: MD5 - RFC 2284 EAP TLS Authentication Protocol - RFC 2716 and RFC 2246 EAP Tunneled TLS (TTLS) Cisco LEAP PEAP Supports Windows XP, 2000 802.1x Authentication Notes 802.1x authentication methods, include passwords, certificates, and smart cards (plastic cards that hold data)
  • Page 48 Remote Authentication Dial-In User Service (RADIUS) server connected to the access point. The authentication process uses credentials, such as a user's password that are not transmitted over the wireless network. Most 802.1x types support dynamic per-user, per-session keys to strengthen the static key security. 802.1x benefits from the use of an existing authentication protocol known as the Extensible Authentication Protocol (EAP).
  • Page 49: Wi-Fi Protected Access (Wpa)

    RADIUS is the Remote Access Dial-In User Service, an Authorization, Authentication, and Accounting (AAA) client-server protocol for when a AAA dial-up client logs in or out of a Network Access Server. Typically, a RADIUS server is used by Internet Service Providers (ISP) to performs AAA tasks.
  • Page 50 Cisco LEAP (EAP Cisco Wireless) is a server and client 802.1x authentication via a user- supplied logon password. When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access Control Server (ACS) server), Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network and provides dynamic, individual user encryption keys to help protect the privacy of transmitted data.
  • Page 51: Security And Encryption

    Back to Contents Page Security and Encryption: Intel(R) PRO/Wireless 2200BG User's Guide Security and Encryption Setting up Data Encryption and Authentication Encryption Overview How to Enable WEP Encryption System Administrator Tasks Setting up the Client for WEP and MD5 authentication...
  • Page 52 Using Open authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an authentication management frame that contains the identity of the sending station. The receiving station or AP will grant any request for authentication. Open authentication allows any device network access.
  • Page 53: Encryption Overview

    Encryption Overview Security in the WLAN can be supplemented by enabling data encryption using WEP (Wireless Encryption Protocol). You can choose a 64 or 128 bit level encryption. Also, the data can then be encrypted with a key. Another parameter called the key index is provides the option to create multiple keys for that profile.
  • Page 54 phrase, up to five (using 64-bit) or 13 (using 128-bit) alphanumeric characters ((0-9, a-z or A-Z), in the pass phrase field. Use hex Key: Click Use hex Key to enable. Enter up to ten (using 64- bit) alphanumeric characters, 0-9, A-F, or twenty-six (using 128-bit) alphanumeric characters, 0-9, A-F in the hex key field.
  • Page 55 Step 1: Getting a certificate To allow TLS authentication, you need a valid client (user) certificate in the local repository for the logged-in user’s account. You also need a trusted CA certificate in the root store. The following information provides two methods for getting a certificate; from a corporate certification authority implemented on a Windows 2000 Server using Internet Explorer’s certificate import wizard to import a certificate from a file Getting a certificate from a Windows 2000 CA:...
  • Page 56 The following example describes how to use WPA with TKIP encryption using TTLS or PEAP authentication. Setting up the Client for TLS authentication Step 2: Specifying the certificate used by Intel(R) PROSet 1. Obtain and install a client certificate, refer to Step 1 or consult your system administrator.
  • Page 57 12. Enter your user name in the User Name field. 13. Select the "Certificate Issuer" from the list. Select Any Trusted CA as the default. Click the "allow intermediate certificates" checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA.
  • Page 58 6. Select Open (recommended) for the Network Authentication. 7. Select WEP as the Data Encryption. 8. Select either 64 or 128-bit for the Encryption Level. 9. Select the key index 1, 2, 3 or 4. 10. Enter the required pass phrase or hex key. 11.
  • Page 59 using 8-63 alphanumeric characters ((0-9, a-z or A-Z), in the pass phrase field. Use hex Key: Click Use hex Key to enable. Enter up to 64 alphanumeric characters, 0-9, A-F in the hex key field. 9. Click the 802.1x Enabled checkbox. 10.
  • Page 60 If you know the server name enter this name. Select the appropriate option to match the server name exactly or specify the domain name. 14. Use Client Certificate: This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication.
  • Page 61 The following example describes how to use WPA with TKIP encryption using TTLS or PEAP authentication. 1. Obtain and install a client certificate, refer to Setting up the Client for TLS authentication or consult your system administrator. 2. From the General page, click the Networks tab. 3.
  • Page 62 Setting up the Client for CCX using CKIP encryption and LEAP authentication Configuring LEAP using Intel(R) PROSet An Intel(R) PROSet CCX (v1.0) profile must be configured to connect to a specific ESS or Wireless LAN network. The profiles settings include LEAP, CKIP and Rogue AP detection settings.
  • Page 63 Network authentication and the Data Encryption now include the CCX security options: Open, Shared for 802.11 Authentication and none, WEP, CKIP for Data encryption. 6. Click Next. 7. Select Open in the Network Authentication options. 8. Select CKIP as the Data encryption. 9.
  • Page 64 Client: In this case the client needs to send out an authentication algorithm value of 0x80 else the 802.11 authentication handshake would fail. During boot, when the Wireless LAN driver is already loaded, but the Intel(R) PROSet supplicant is still unloaded, the client sends 802.11 authentication with an Authentication algorithm value of 0x0. Once the Intel(R) PROSet supplicant loads, and engages the LEAP profile, it sends 802.11...
  • Page 65 Some non-Intel clients, for example, when set to LEAP, cannot authenticate in this case. However, the Intel Wireless LAN client can authenticate, if the Rogue AP is unchecked. Rogue AP Checkbox configuration When the checkbox is checked it ensures that the client implements the Rogue AP feature as required by CCX.
  • Page 66 WEP/RC4 support Support of 4 keys for WEP Both WEP40 and WEP128 keys are supported LEAP support is required Rogue AP reporting support Cisco Extension: Aironet IE support – CWmin and CWmax fields Encapsulation Transformation Rule IE support Cisco Extension: AP IP address IE Cisco Extension: Symbol IE Mixed (WEP and non-WEP) cells AP may respond to more than one SSID –...
  • Page 67 Back to Contents Page Specifications: Intel(R) PRO/Wireless 2200BG User's Guide Specifications Form Factor Mini PCI Type 3B Dimensions Width 2.34 in x Length 1.75 in x Height 0.20 in (59.45 mm x 44.45 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Hirose U.FL-R-SMT mates with cable connector...
  • Page 68 Data Rates 1, 2, 5.5, 6, 9, 11, 12, 24, 36, 48 and 54 Mbps Indoor Range 100 ft (30 m) @ 11 Mbps / 300 ft (90 m) @ 1 Mbps Outdoor Range 400 ft (120 m) @ 11 Mbps / 1500 ft (460 m) @ 1 Mbps Power Transmit Output 16 dBm (typical)
  • Page 69 Back to Contents Glossary of Terms: Intel(R) PRO/Wireless 2200BG User's Guide Numerical A B D E F I K M O P R S T U W Numerical 802.11a: The 802.11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz.
  • Page 70 supporting 128-, 192-, and 256-bit keys. Basic Service Set Identifier (BSSID): A unique identifier for each wireless client on a wireless network. The BSSID is the Ethernet MAC address of each adapter on the network. Bit Rate: The total number of bits (ones and zeros) per second that a network connection can support.
  • Page 71 Extensible Authentication Protocol (EAP): An IETF standard that establishes an authentication protocol for network access. Many authentication methods, including passwords, certificates, and smart cards, work within this framework. EAP-TLS: A type of authentication method using the Extensible Authentication Protocol (EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use passwords.
  • Page 72 Independent Basic Service Set Identifier (IBSSID): Used to identify a wireless network configured to allow each wireless client to communicate directly with each other without an access point. Independent Network: A network that provides (usually temporarily) peer-to-peer connectivity without relying on a complete network infrastructure. Infrastructure Network: A wireless network centered around an access point.
  • Page 73 Multipath: The signal variation caused when radio signals take multiple paths from transmitter to receiver. Orthogonal Frequency Division Multiplexing (OFDM): A modulation technique for transmitting large amounts of digital data over radio waves. 802.11a uses OFDM, as will 802.11g. Peer-to-Peer Mode: A wireless network structure that allows wireless clients to communicate with each other without using an access point.
  • Page 74 resources. Roaming: Movement of a wireless node between two microcells. Roaming usually occurs in infrastructure networks built around multiple access points. Service Set Identifier (SSID): Used to identify clients on a wireless network. Shared key: An encryption key known only to the receiver and sender of data. Site Survey: A process where you set up one transceiver in a fixed location, and then use another unit to plot the field strength of the first unit’s transmitted signal.
  • Page 75 transceivers. UNII Bands: Unlicensed National Information Infrastructure. In contrast to the ISM bands, these are a group of frequency bands set aside by the FCC for WLAN type communications only. Users must accept interference from other legal WLAN users, but the other sources of interference problems are, or legally should be, missing.
  • Page 76 Back to Contents Please read all restrictions and disclaimers.
  • Page 77 Back to Contents Page Customer Support: Intel(R) PRO/Wireless 2200BG User's Guide Customer Support Intel support is available online or by telephone. Available services include the most up- to-date product information, installation instructions about specific products, and troubleshooting tips. Online Support Technical Support: http://support.intel.com...
  • Page 78 Corporate Web Site: http://www.intel.com Back to Contents Page Please read all restrictions and disclaimers.
  • Page 79: Safety Notices

    The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment. The Intel(R) PRO/Wireless 2200BG adapter meets the Human Exposure limits found in OET Bulletin 65, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCC’s recommended limits.
  • Page 80 Warning: It is recommended that the user limit exposure time if the antenna is positioned closer than 20 cm (8 inches). Warning: The Intel(R) PRO/Wireless 2200BG product is not designed for use with high-gain directional antennas. Use of such antennas with these products is illegal.
  • Page 81 2200BG product device may not yet be harmonized in all countries. The Intel(R) PRO/Wireless 2200BG product is designed for use only in specific countries, and is not allowed to be operated in countries other than those of designated use. As a user of this...
  • Page 82 In some situations or environments, the use of the Intel(R) PRO/Wireless 2200BG adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization.
  • Page 83 This device may not cause harmful interference. This device must accept any interference that may cause undesired operation. NOTE—The radiated output power of the Intel(R) PRO/Wireless 2200BG adapter wireless network device is far below the FCC radio frequency exposure limits.
  • Page 84 Consult the dealer or an experienced radio/TV technician for help. NOTE—The Intel(R) PRO/Wireless 2200BG adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations.

This manual is also suitable for:

Wm3b2200bg

Table of Contents