LanReady WUB1920RS User Manual

802.11b/g /n usb dongle

Advertisement

Quick Links

802.11b/g /n USB Dongle
Model #
AWLL6077 V2 ;
WUB1920RS ;
WV-120N
;
UW-200NU2 ;
BS-WN-USB/1
User's Manual
2

Advertisement

Table of Contents
loading

Summary of Contents for LanReady WUB1920RS

  • Page 1 802.11b/g /n USB Dongle Model # AWLL6077 V2 ; WUB1920RS ; WV-120N UW-200NU2 ; BS-WN-USB/1 User’s Manual...
  • Page 2: Table Of Contents

    Table of Contents 1. Introduction ......................... 4 1.1 Package Contents ....................4 1.2 Features ........................ 4 2. Installation ........................5 3. Configuring the Adapter .................... 11 4. Wireless Utility ......................17 4.1 Wireless Information .................... 17 4.2 AP List ......................... 18 4.3 Profile Settings.....................
  • Page 3: Introduction

    1.1 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: x WUB1920RS Wireless N USB Adapter x USB Cable x Quick Installation Guide x Installation CD (Driver/Utility/Manual) 1.2 Features...
  • Page 4: Installation

    2. Installation This section provides instructions on how to install the WUB1920RS Wireless N USB Adapter. The driver is installed along with the utility. Step 1 Insert the USB adapter into an available USB port and turn on your computer.
  • Page 5 Step 3 The Autorun screen will pop up. Select Install Utility and Driver from the menu.
  • Page 6 Note: If the Autorun screen doesn’t appear automatically, or if you get a blank white screen, go to Start, Run, and type D:\Utility\Setup.exe (where D is the letter of your CD drive) and click OK. Windows Vista users: At this point, you may get a warning message like the one below.
  • Page 7 Step 4 Click Next at the welcome screen. Step 5 Click Install to begin install.
  • Page 8 Step 6 Click Continue Anyway at the Windows Logo Screen. (For Windows 2000, click Yes at the Digital Signature Not Found prompt).
  • Page 9 For Windows Vista, click the Install this driver software anyway button when the security warning appears. Step 7 Click Finish.
  • Page 10: Configuring The Adapter

    3. Configuring the Adapter This section describes how to connect your wireless adapter to a wireless network. Note to Windows XP Users: You must disable the Wireless Zero Configuration Utility in order to use the bundled Wireless Utility. Please follow the steps below to disable XP’s wireless utility. Windows Vista users can skip the following instructions and go to Step 1 Double-click on the Wireless Network Connection Icon in the system tray and then...
  • Page 11 Step 1 To open the utility, double click on the Wireless Monitor icon in the system tray at the bottom right-hand corner of your screen. Step 2 Go to the Available Network tab, select the SSID (Network Name) of the wireless network you wish to connect to, and double click Add to Profile.
  • Page 12 If the network you are attempting to connect to is configured for encryption, you will see an orange lock icon next to the network.
  • Page 13 When you click on it and click connect, a box will pop up requesting the wireless encryption key for the router. Enter the encryption key into the box and click OK.
  • Page 15 Step 3 You should now be connected. You should see “Status” in the top, middle , and SSID, signal Strength, Link Quality. Troubleshooting: If you are experiencing problems with the connection (unable to connect, low signal strength, slow connection speed, not working, unstable wireless connection) you will want to tune your router’s signal by changing channels on the router.
  • Page 16: Wireless Utility

    4. Wireless Utility This section describes the various functions of the Wireless Monitor that you can configure, including the settings of wireless encryption. 4.1 General The General box, you with the status of the current connection, including status, speed, type, encryption, network name (SSID), signal, link quality, and Network Address (MAC Address, IP Address, Subnet Mask, Gateway).
  • Page 17: Ap List

    4.2 Profile Settings This section provides instructions on using the Profile section of the wireless monitor. The Available Profile(s) box lists the different profiles you’ve created for the different networks that you use. Profiles are automatically created and added to this list when you connect to new networks.
  • Page 18 The Profile box will appear allowing you to specify the settings for your new profile or change settings for your existing profile. Once you are finished entering the settings, click OK to save the changes.
  • Page 19 4.3 Available Network The Available Network tab displays all the available wireless networks detected by the Wireless Adapter. Simply select the wireless network you wish to connect to and double click. If you have created multiple profiles, you can choice the SSID. Then click Add to profile to enable that profile.
  • Page 20: Configuring Encryption

    4.4 Configuring Encryption This section describes the different types of encryption available and how to configure them. In most cases, encryption will be automatically configured and all that will need to be entered is the key, as described in Section 3 Step 2.
  • Page 21 These three are meant for the home user: Disable: No encryption in use WEP: The most popular but least secure form of encryption WPA/WPA2-PSK: The most secure and recommended level of encryption The remaining two are for use in a corporate environment that utilizes authentication servers.
  • Page 22 Configuring WEP encryption Select WEP from the Data encryption box. Under Network Authentication, you will want to select Shared key or Open System, depending on the router settings. ASCII / PASSPHRASE will also be predetermined by the router. Refer to your routers settings to find out what you should select here.
  • Page 23 Configuring WPA/WPA2-PSK Encryption (for home users) Select WPA-PSK/WPA2-PSK from the Network Authentication box. Under Data encryption select either TKIP or AES depending on the settings for your router. Enter the encryption key into the KEY box.
  • Page 24 Configuring WPA/WPA2 Encryption (for corporate networks) Select WPA 802.1x / WPA2 802.1x from the Network Authentication box. Under Data encryption select either TKIP or AES depending on the settings for your router.
  • Page 25 The adapter supports GTC,TLS, LEAP, TTLS, and PEAP authentication methods. Refer to your system administrator for information about what settings you should enter here.
  • Page 26: Ad-Hoc And Peer-To-Peer Wireless Networks

    4.5 Ad-hoc and Peer-to-Peer Wireless Networks Ad-hoc networking is used when you want to connect two or more computers together but you don’t have a router. In ad-hoc mode, you lose a lot of the features that come with a router. The maximum connection speed drops significantly to 11Mbps.
  • Page 27 Open the Wireless Monitor. Click on Profile, then click on Add. The profile settings box will appear. First change the network type to Adhoc. (Infrastructure is for when you are using a router). Enter a profile name into the Profile Name box so that you can identify the profile. Type in a network name (SSID) into the SSID box Select your desired Channel You can also choose between no security or WEP security.
  • Page 28 Once that is done, click on the Available Network. Select your new profile from the profile chooser and double click to enable the profile. You will need to configure all other computers that you are planning on connecting to your ad-hoc network with the same settings that you input on this screen. Every computer has to be set up exactly the same.
  • Page 29: Wi-Fi Protected Setup (Wps)

    4.6 Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup™ (WPS) is a new and easy way to configure the encryption for your wireless network clients. In order to use it with your router, firstly, you will need to have a router that supports this feature, like the AR670W Wireless N Router. Secondly, you must configure the wireless encryption on the router;...
  • Page 30 Step 2 Choose your configuration method, either Push Button or Pin Code and click Next. Step 3a If you choose the Push Button method, make sure that you click on the Push Button Config button.
  • Page 31 Step 3b Push the WPS button on the router, and the blue LED will start blinking. The router will now start the handshake with the wireless adapter, then the connection will be built up in couple minutes. Note: You will find the WPS button at the same place on Support WPS Wireless N Router. Step 4a If you choose the Pin Code method, write down the PIN and click Yes.
  • Page 32 Step 4b Log in to your router’s configuration page from the web browser and click on Wireless. Then click Wireless security. Make sure that the Wi-Fi Protected Setup Enable box is checked. Click the Add Wireless Device Wizard button. Step 4c Enter the Pin Code in the Pin Number box and click Connect.
  • Page 33 4.7 Access Point Mode Access point mode allows you to set up your computer to act as a wireless router and share its existing wired connection with other computers. In order to use this mode, the computer will need to be hard wired directly to the internet. To switch into access point mode click on Mode at the top of the utility window and click on Access Point.
  • Page 34 And the interface will change providing you with new options: SSID displays the current SSID setting of the adapter. The SSID is what other computers will need to look for when trying to connect to your adapter. BSSID is the physical address or MAC address of your wireless adapter. Association Table shows you the remote computers that are currently connected to your wireless adapter.
  • Page 35 Here you can set all of the options for your adapter. Network Name(SSID) this is the name that your wireless adapter will be broadcasting. Channel allows you to select which channel you want the network to operate on. You may want to change this if you are having connectivity issues. Wireless Network Security can be set if you want to secure your network.
  • Page 36 ICS or Internet Connection Sharing shows the device that the adapter is using to provide an internet connection to wireless clients. This is automatically configured during the setup.
  • Page 37: About

    4.8 About The About tab shows the Utility, Driver versions.
  • Page 38: Appendix A - Features

    Appendix A – Features Frequency Band System Requirements x 2.4~2.5 GHz x 300 MHz processor or better x 512Byte RAM x Available USB port Standards x IEEE 802.11b / 802.11g x 802.11n draft 2.0 OS Compatibility x Windows 2000/XP/Vista x linux Interface x USB 2.0 x MAC OS 10.4/10.5...
  • Page 39: Appendix B - Information

    Appendix B – Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 40: Technical Support

    (e.g., cordless telephones and microwaves) as well as network overhead lower actual data throughput rate. Specifications are subject to change without notice. All products and trademarks are the property of their respective owners. Copyright ©2008 LanReady®...

Table of Contents