LogiLink WLO147 User Manual
LogiLink WLO147 User Manual

LogiLink WLO147 User Manual

Wireless n 300mbps usb adapter

Advertisement

Quick Links

Advertisement

Table of Contents
loading

Summary of Contents for LogiLink WLO147

  • Page 2: Table Of Contents

    According to the European WEEE directive, electrical and electronic equipment must not be disposed with consumers waste. Its components must be recycled or disposed apart from each other. Otherwise contaminative and hazardous substances can pollute our environment. You as a consumer are committed by law to dispose electrical and electronic devices to the producer, the dealer, or public collecting points at the end of the devices lifetime for free.
  • Page 3 3-8 About ......................49 CHAPTER IV: Soft-AP Function ............50 4-1 Switch to AP Mode and Basic Configuration ........51 4-2 Security Settings ..................56 4-3 802.1x Setting..................63 4-4 Access Control ..................63 4-5 Connection table ..................65 4-6 Event Log ....................67 4-7 Statistics ....................
  • Page 4: Chapter I: Product Information

    Chapter I: Product Information 1-1 Introduction and safety information Thank you for purchasing this high-speed 802.11n/g/b wireless network card! Excepting common wireless standards 802.11b/g, this wireless network card is also 802.11 N compatible - data transfer rate is 300Mbps, and that’s six times faster than 802.11g wireless network! 802.11 N also provides wider wireless coverage, so you don’t have to worry if your computer is far from your wireless access point.
  • Page 5: Safety Information

    1-2 Safety Information In order to keep the safety of users and your properties, please follow the following safety instructions: 1. This USB wireless network card is designed for indoor use only. DO NOT expose this network card to direct sun light, rain, or snow.
  • Page 6: System Requirements

    1-3 System Requirements  An empty USB 2.0 port (May not work on USB 1.1 port, and performance will be greatly reduced)  Windows 2000, 2003, XP, Vista or Windows 7 operating system  CD-ROM drive  At least 100MB of available disk space ~ 5 ~...
  • Page 7: Package Contents

    1-4 Package Contents Before you starting to use this wireless network card, please check if there’s anything missing in the package, and contact your dealer of purchase to claim for missing items: 1. Wireless N USB2.0 Adapter x 1 2. Protection Cap x 1 3.
  • Page 8: Familiar With Your New Wireless Network Card

    1-5 Familiar with your new wireless network card 1. USB Connector 2. Connector Cap (To protect USB connector when not in use) 3. Link/Activity LED LED Name Light Description Status Link/ Linked to a wireless access point / Activity Transferring data No wireless activity ~ 7 ~...
  • Page 9: Chapter Ii: Driver Installation And Configuration

    CHAPTER II: DRIVER INSTALLATION AND CONFIGURATION 2-1 Network Card Installation Please follow the following instructions to install your new wireless network card: 1. Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on. Never use force to insert the card, if you feel it’s stuck, flip the card over and try again.
  • Page 10 2. The following message will appear on your computer, click ‘cancel’. 3. Please insert the AUTORUN CD into your CD-ROM drive. The CD should auto-start, displaying the following window. If it does not start, click on Start-Run and type in CD: \autorun.exe (where CD is the drive letter of your CD-ROM drive.) Click "Driver Installation".
  • Page 11 4. You can choose the configuration tool used to configure the wireless network card here, or only install driver. ~ 10 ~...
  • Page 12 5. There are two configuration tool you can select here: Ralink Configuration Tool or Microsoft Zero Configuration Tool It’s recommended to select ‘Ralink Configuration Tool’, which provides fully access to all function of this wireless network card. If you prefer to use the wireless configuration tool provided by Windows XP or Vista, please select ‘Microsoft Zero Configuration Tool’, then click ‘Next’.
  • Page 13 7. Please wait while the install procedure is running. When you see this message, please click ‘Finish’ to complete the driver installation process. A new icon will appear at lower-right corner of your computer desktop, you can put the mouse cursor on the icon, and the status of wireless card will be displayed as a popup balloon.
  • Page 14 2-2 Ralink Utility and Windows Zero Configuration Windows XP includes a wireless configuration utility named "Windows Zero configuration" (WZC) which provides basic configuration functions to the Ralink Wireless NIC. Ralink's utility (RaUI) additionally provides WPA functionality. To make it easier for the user to select the correct utility.
  • Page 15 RaUI can co-exist with WZC. When coexisting with WZC, RaUI only provides monitoring functions, such as surveying the link status, network status, statistic counters, advanced feature status, WMM status and WPS status. It won't interfere with WZC's configuration or profile functions. ~ 14 ~...
  • Page 16: Connect To Wireless Access Point

    2-2-1 Using Ralink Utility Please follow the following instructions to use Ralink configuration utility to connect to wireless access point. 1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click ‘Launch Config Utilities’. 2. Configuration utility will scan for all wireless access points automatically.
  • Page 17 Select the SSID of the AP to be connected, press the “connect”. The Ralink Utility, will detect the pattern of security encryption to complete the set requires a password, and click “OK” ~ 16 ~...
  • Page 18 The Ralink Utility connection is successful. 6. You can save multiple profiles, and activate the correct one at your preference. If you want to click new profile, then click ‘Add to Profile’ button. Here are descriptions of every setup items: Profile Name: The user can chose any name for this profile, or use the default name defined by system.
  • Page 19 7. Now click ‘Auth. \ Encry.’ tab, and set the encryption and authentication settings. ~ 18 ~...
  • Page 20 8. After you finish all settings, click ‘OK’ to save settings and exit. The profile you just created will be displayed: ~ 19 ~...
  • Page 21: Using Windows Zero Configuration

    2-2-2 Using Windows Zero Configuration Windows XP and Vista has a built-in wireless network configuration utility, called as ‘Windows Zero Configuration’ (WZC). You can also use WZC to configure your wireless network parameter: 1. Right-click Ralink configuration utility icon and select ‘Use Zero Configuration as Configuration utility.
  • Page 22 3. Click ‘Connect to a network’ under ‘Network Connections’ 4. Right-click ‘Wireless Network Connection’ (it may have a number as suffix if you have more than one wireless network card, please make sure you right-click the ‘Ralink 802.11n Wireless LAN Card), then select ‘View Available Wireless Networks’.
  • Page 23 5. All wireless access points in proximity will be displayed here. If the access point you want to use is not displayed here, please try to move your computer closer to the access point, or you can click ‘Refresh network list’ to rescan access points. Click the access point you want to use if it’s shown, then click ‘Connect’.
  • Page 24 7. If you can see ‘Connected’ message, the connection between your computer and wireless access point is successfully established. ~ 23 ~...
  • Page 25: Chapter Iii: Ralink Wireless Utility

    Chapter III: Ralink Wireless Utility 3-1 Profile The Profile List keeps a record of your favorite wireless settings at home, office, and other public hot-spots. You can save multiple profiles, and activate the correct one at your preference. Definition of each field: Profile Name: Name of profile, preset to PROF* (* indicate 1, 2, 3...).
  • Page 26 Authentication: Indicates the authentication mode used. Encryption: Indicates the encryption Type used. Use 802.1x: Shows if the 802.1x feature is used or not. Tx Power: Transmitting power, the amount of power used by a radio transceiver to send the signal out. Cannel: Channel in use for Ad-Hoc mode.
  • Page 27 : Indicates if the network is security-enabled. : Click to add a new profile. : Click to edit an existing profile. : Deletes an existing profile. : Activates the selected profile. : Shows information of the related status section. : Hides information of the related status section. Add/Edit Profile: There are three methods to open the Profile Editor dialog box.
  • Page 28 Profile Name: The user can chose any name for this profile, or use the default name defined by system. SSID: The user can key in the intended SSID name or select one of the available APs from the drop-down list. Power Save Mode: Choose CAM (Constantly Awake Mode) or Power Saving Mode.
  • Page 29 Authentication Type: There are 7 type of authentication modes supported by RaUI. They are open, Shared, LEAP, WPA and WPA-PSK, WPA2 and WPA2-PSK. Encryption Type: For open and shared authentication mode, the selection of available encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, both TKIP and AES encryption is available.
  • Page 30: Network

    3-2 Network The system will display the information of local APs from the last scan result as part of the Network section. The Listed information includes the SSID, BSSID, Signal, Channel, Encryption algorithm, Authentication and Network type. Definition of each field : SSID: Name of BSS or IBSS network.
  • Page 31 Icons and buttons : : Indicates that the connection is successful. : Indicates the network type is in infrastructure mode. : Indicates the network type is in Ad-hoc mode. : Indicates that the wireless network is security-enabled. : Indicates 802.11a wireless mode. : Indicates 802.11b wireless mode.
  • Page 32 : Adds the selected AP to the Profile setting. It will bring up a profile page and save the user's setting to a new profile. : Shows the Status Section. : Hides the Status Section. ~ 31 ~...
  • Page 33: Advanced

    3-3. Advanced Wireless mode: Select wireless mode. 2.4G, 5G and 2.4+5G are supported. Wireless Protection: Users can choose from Auto, On, and Off. (This is not supported by 802.11n adapters.) Auto: STA will dynamically change as AP announcement. On: The frames are always sent with protection. Off: The frames are always sent without protection.
  • Page 34 Enable TX Burst: Ralink's proprietary frame burst mode. Enable TCP Window Size: Optimise the TCP window size to allow for greater throughput. Fast Roaming at-: enables fast roaming, which is set by the transmit power. Select Your Country Region Code: There are eight countries to choose from in the country channel list.
  • Page 35: Statistics

    3-4. Statistics The Statistics page displays detailed counter information based on 802.11 MIB counters. This page translates that MIB counters into a format easier for the user to understand. Transmit Statistics: Frames Transmitted Successfully: Frames successfully sent. Frames Fail To Receive ACK After All Retries: Frames failed transmit after hitting retry limit.
  • Page 36 Frames Retransmitted Successfully: Successfully retransmitted frames numbers. Reset counters to zero. Receive Statistics: Frames Received Successfully: The number of frames successfully received. Frames Received With CRC Error: The number of frames received with a CRC error. Frames Dropped Due To Out-of-Resource: The number of frames dropped due to a resource issue.
  • Page 37 Duplicate Frames Received: The number of duplicate frames received. Reset all the counters to zero. ~ 36 ~...
  • Page 38: Wmm

    3-5. WMM The WMM involves "WMM Enable", "WMM - Power Save Enable" and DLS setup. The introduction indicates as follow : Direct Link Setup Enable : Enable DLS (Direct Link Setup). WMM Enable : Enable Wi-Fi Multi-Media. WMM - Power Save Enable : Enable WMM Power Save. ~ 37 ~...
  • Page 39: Wps

    3-6. WPS WPS Configuration: The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. Ralink STA supports the configuration and setup using a PIN configuration method or a PBC configuration method through an internal or external Registrar.
  • Page 40 Information: Displays the information about WPS IE on the selected network. The detailed list includes the Authentication Type, Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands. PIN Code: The user is required to enter an 8-digit PIN Code into Registrar.
  • Page 41 5. Export Profile: Exports all credentials to a Profile. 6. Delete: Deletes an existing credential. And then selects the next credential. If there is not another credential, the driver will select any non-security AP. PIN: Start to add to Registrar using PIN configuration method. If STA Registrar, remember that enter PIN Code read from your Enrollee before starting PIN.
  • Page 42: Wps Configuration

    WPS Configuration Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes wireless network setup become very simple. If you have WPS-enabled wireless access point, and you want to establish a secure connection to it, you don’t have to configure the wireless access point and setup data encryption.
  • Page 43: Wps Setup - Pbc (Push-Button Configuration)

    3-6-1 WPS Setup - PBC (Push-Button Configuration) 1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click ‘Launch Config Utilities’. 2. Click ‘WPS’ tab, and the following settings will appear: ~ 42 ~...
  • Page 44 3. Set ‘Config Mode’ to ‘Enrollee’, and then push the ‘WPS’ button on your wireless access point (the button used to activate WPS standby mode may have another name), or use other way to start WPS standby mode as the instruction given by your wireless access point’s user manual.
  • Page 45 5. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s manufacturer), then click ‘PBC’ button in wireless configuration utility to start to establish wireless connection by WPS. Please be patient (This may require several seconds to one minute to complete).
  • Page 46 access point found. You can also click ‘Rotate’ button, and next access point on the list will be selected to establish connection. If you want to delete a found access point from the list, select it and click ‘Delete’ button. ~ 45 ~...
  • Page 47: Wps Setup - Pin

    3-6-2 WPS Setup - PIN If the wireless access point you wish to connect supports PIN, please follow the following instructions to establish connection to it: 1. Right-click the Ralink configuration utility icon located at lower-right corner of computer desktop, then click ‘Launch Config Utilities’.
  • Page 48 The PIN number of your wireless network card is an eight-digit number located at the upper-right position of configuration utility. Remember it, and input the number to your wireless access point as the WPS PIN code (Please refer to the user manual of your wireless access point for instructions about how to do this).
  • Page 49: Radio On/Off

    3-7. Radio on/off Radio On: Click to turn the wireless radio ON. Radio Off: Click to turn the wireless radio OFF. ~ 48 ~...
  • Page 50: About

    3-8. About The ‘About’ tab provides you the information about version numbers of configuration utility, firmware, and other important information about your wireless network card. If you need assistance about network problem, you’ll need these values. You can also click ‘WWW.RALINKTECH.COM’ button to go to the web site of network card driver manufacturer and get more information about your wireless network card.
  • Page 51: Chapter Iv: Soft-Ap Function

    CHAPTER IV: Soft-AP Function Excepting become a wireless client of other wireless access points, this wireless card can act as a wireless service provider also! You can switch this wireless card’s operating mode to ‘AP’ mode to simulate the function of a real wireless access point by software, and all other computers and wireless devices can connect to your computer wirelessly, even share the internet connection you have! Please follow the instructions in following chapters to use the AP...
  • Page 52: Switch To Ap Mode And Basic Configuration

    4-1 Switch to AP Mode and Basic Configuration The operating mode of the wireless card is ‘Station Mode’ (becoming a client of other wireless access points) by default. If you want to switch to AP mode, please right-click Ralink utility icon, and select ‘Switch to AP Mode’.
  • Page 53 If your computer has another network card which is connected to Internet, please select it from ‘Name’ dropdown menu, and click ‘Enable ICS’; if your computer does not have another network card with Internet connection, please click ‘Not enable ICS’. After you click ‘Enable ICS’...
  • Page 54 Here are descriptions of every setup items: SSID Please input the SSID (the name used to this identify wireless access point) here. Up to 32 numerical characters can be accepted here, excepting space. TX Rate Please select the data transfer rate here. The maximum TX rate you can select here depends on the wireless mode you’re using.
  • Page 55 Channel Please select the wireless channel you wish to use. The number of channels available here will vary depends on the setting of ‘Country Region Code’. Wireless Mode Please select the wireless operating mode. You can limit the type of wireless client to 802.11b or 802.11g only, or allow 802.11b/g, and 802.11b/g/n clients.
  • Page 56 Protection when there are both 802.11b and 802.11g clients. You can select ‘Auto’ to let configuration utility to decide to use wireless protection or not. You can also select ‘ON’ or ‘OFF’ to force the use of wireless protection or not. Beacon(ms) You can define the time interval that a beacon signal should be send.
  • Page 57: Security Settings

    4-2 Security Settings This wireless card supports wireless encryption in AP mode, which will encrypt the data being transferred over the air to enhance data security level. It’s recommended to enable data encryption unless you wish to open your computer (and its internet connection) to the public.
  • Page 58 Note: WPA encryption is safer than WEP, however, some older wireless clients don’t support WPA encryption. WPA Pre-shared Please input the WPA pre-shared key here. Only clients with the same pre-shared key you inputted here will be able to connect to your computer.
  • Page 59 replaced by asterisk (*). Click this button to save changes you made in this page. Cancel Click this button to discard all changes you made in this window. ~ 58 ~...
  • Page 60: Authentication Type

    4-3 802.1x Setting 802.1x is used for authentication of the "WPA" and "WPA2" certificate by the server. Authentication type:  PEAP: Protect Extensible Authentication Protocol. PEAP transport securely authenticates data by using tunneling between PEAP clients and an authentication server. PEAP can authenticate wireless LAN clients using only server-side certificates, thus simplifying the implementation and administration of a secure wireless LAN.
  • Page 61  EAP-FAST: Flexible Authentication via Secure Tunneling. It was developed by Cisco. Instead of using a certificate, mutual authentication is achieved by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be supplied (distributed one time) to the client either manually or automatically.
  • Page 62: Client Certification

    ID \ PASSWORD:  Authentication ID/Password: The identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain names can be keyed in the blank space.  Tunnel ID/Password: Identity and Password for the server. Client Certification: Use Client certificate: Client certificate for server authentication.
  • Page 63  Allow unauthenticated provision mode: During the PAC can be provisioned (distributed one time) to the client automatically. It only supported "Allow unauthenticated provision mode" and use "EAP-MSCHAP v2" authentication to authenticate now. It causes to continue with the establishment of the inner tunnel even though it is made with an unknown server.
  • Page 64: 802.1X Setting

    4-4 Access Control If you’re not going to open your computer and wireless resources to the public, you can use MAC address filtering function to enforce your access control policy, so only wireless clients with MAC address you defined by this function can be connected to your software access point.
  • Page 65 Here are descriptions of every setup items: Access Policy Select the policy type of your access rule: Disable: Allow any wireless client with proper authentication settings to connect to this access point. Allow All: Only allow wireless clients with MAC address listed here to connect to this access point.
  • Page 66: Connection Table

    4-5 Connection table If you want to see the list of all wireless clients connected to this access point, please follow the following instructions: 1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’ 2. Click ‘Mac Table’ tab, and a list containing all connected wireless clients will appear: ~ 65 ~...
  • Page 67 Here are descriptions of every fields: MAC Address Displays the MAC address of this wireless client. The serial number of this wireless connection. Power Saving Displays the capability of power-saving function Mode of this wireless client. Status Displays additional information of this wireless mode Connection, like current wireless operating and data transfer rate.
  • Page 68: Event Log

    4-6 Event Log This software access point will log all wireless-related activities as a log. You can follow the following instructions to view the content of the event log: 1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’ 2.
  • Page 69: Statistics

    4-7 Statistics If you want to know detailed information about how your software access point works, you can follow the following instructions to view the statistics of the access point: 1. Right-Click Ralink configuration utility icon, and select ‘Launch Config Utilities’ 2.
  • Page 70: Chapter Iiv: Appendix

    CHAPTER IIV: APPENDIX 5-1 Hardware Specification  Standards: IEEE 802.11n/g/b  Interface: USB 2.0 (USB 1.1 Compatible)  Frequency Band: 2.4000 ~ 2.4835GHz (Industrial Scientific Medical Band)  Data Rate: 11b: 1/2/5.5/11Mbps 11g: 6/9/12/24/36/48/54Mbps 11n (20MHz): MCS0-15, 32 with Half Guard Interval Support (up to 144Mbps) 11n (40MHz): MCS0-15, 32 with Half Guard Interval Support (up to 300Mbps)
  • Page 71: Troubleshooting

    5-2 Troubleshooting If you encounter any problem when you’re using this wireless network card, don’t panic! Before you call your dealer of purchase for help, please check this troubleshooting table, the solution of your problem could be very simple, and you can solve the problem by yourself! Scenario Solution...
  • Page 72 I can not establish 1. Click ‘Connect’ for few more times. connection with a 2. If the SSID of access point you wish to certain wireless connect is hidden (nothing displayed in access point ‘SSID’ field in ‘Site Survey’ function), you have to input correct SSID of the access point you wish to connect.
  • Page 73: Glossary

    5-3 Glossary 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 74 3. What does IEEE 802.11 feature support? The product supports the following IEEE 802.11 functions: CSMA/CA plus Acknowledge Protocol  Multi-Channel Roaming  Automatic Rate Selection  RTS/CTS Feature  Fragmentation  Power Management  4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN card, Connected as an independent wireless LAN.
  • Page 75 9. What is AES? AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It is also included in IEEE 802.11i standard.
  • Page 76 damaged during transmission, statistical techniques embedded in the radio can recover the original data without-the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband receivers. 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems.
  • Page 77 order to conserve power. WMM Power Save has been optimized for mobile devices running latency-sensitive applications such as voice, audio, or video, but can benefit any Wi-Fi device. WMM Power Save uses mechanisms included in the IEEE 802.11e standard and is an enhancement of IEEE 802.11 legacy power save.
  • Page 78: Fcc And Other Compliance Statements

    5-4 FCC and Other Compliance Statements Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 79 Federal Communication Commission (FCC) Radiation Exposure Statement This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) during normal operation.
  • Page 80 CE Declaration: This device corresponds to EU directive 1995/5EC: With the CE sign Logilink®, a registered trademark of the 2direct GmbH ensures, that the product is conformed to the basic standards and directives. These standards can be requested online on www.logilink.com. All trademarks and registered brands are the property of their respective owners.

Table of Contents