Download Print this page

Gemtek Systems WL-611GS User Manual

802.11g wireless lan pc card

Advertisement

Quick Links

WL-611GS
User's Guide
802.11g Wireless LAN PC Card

Advertisement

loading

Summary of Contents for Gemtek Systems WL-611GS

  • Page 1 WL-611GS User’s Guide 802.11g Wireless LAN PC Card...
  • Page 2: Important Note

    Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Gemtek Technology Co., Ltd declares that WL-611GS (FCC ID: Consult the dealer or an experienced radio/TV technician MXF-C921217G) is limited in CH1~CH11 by specified firmware for help.
  • Page 3: Ec Declaration Of Conformity (Europe)

    EC DECLARATION OF CONFORMITY (EUROPE) Table of Contents Gemtek Technology Co., Ltd. declares that the device conform to the specifications listed below, following the provisions of the Introduction……………………………………………..1 European R&TTE directive 1999/5/EC, directive A Look at the Hardware……………………………….2 89/336/EEC, and Low Voltage directive 73/23/EEC: Hardware Installation………………………………….3 For 2.4 GHz devices with 100 mW radios, the following Configuration……………………………………..…….4...
  • Page 4: A Look At The Hardware

    A Look at the Hardware well accepted 802.11b WLAN technology. Gemtek WL-611GS 802.11g Wireless LAN PC Card has two In order to supplement the compatibility between 802.11b and Light Emitting Diodes (LEDs), or link lights. The following table 802.1g, Complementary Code Keying (CCK) is implemented to...
  • Page 5: Hardware Installation

    If using Windows XP, you can use the Windows XP Wireless Zero Configuration (WZC) utility to manage your wireless client Thank you for purchasing the WL-611GS. The following adapter. You have the second choice. Gemtek also provides instructions will walk you through installation of the PC card.
  • Page 6 and the value is case sensitive. Step 6 If the network requires Network Authentication, select the type of authentication required. WPA might require further Authentication options found on the Authentication tab. Match the setting used by the network. Step 7 Enter information for the new wireless network based on the descriptions in the following: Network Authentication Select if your access point requires authentication.
  • Page 7 WPA: Wi-Fi® Protected Access (WPA) authentication MIC (message integrity check), to protect packets from (802.1X) is used with an EAP type. tampering; PPK (Per-Packet Key) hashing, to prevent weak key attacks; extended IV (initialization vector), to reduce IV reuse WPA consists of three main elements: an Authentication Server and the possibility that a hacker will collect sufficient packets to (typically a RADIUS server), WPA-enabled router or AP (called crack the encryption;...
  • Page 8 and enter the network key. If using a RADIUS server, the key is automatically provided. This is a computer-to-computer (ad hoc) network Select if the network you are creating or accessing is a computer-to computer (ad hoc) network. If you are attempting to connect to an infrastructure network, then do not select this setting.