Edimax EW-7326Ig User Manual

Edimax EW-7326Ig User Manual

Wireless 802.11b/g pci adapter
Hide thumbs Also See for EW-7326Ig:

Advertisement

Quick Links

Wireless 802.11b/g PCI Adapter
EW-7326Ig
User's Manual
Version: 1.0(July, 2008)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EW-7326Ig and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Edimax EW-7326Ig

  • Page 1 Wireless 802.11b/g PCI Adapter EW-7326Ig User’s Manual Version: 1.0(July, 2008)
  • Page 2 COPYRIGHT Copyright ©2005/2006 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties,...
  • Page 3: Federal Communication Commission Interference Statement

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4 Slovakia, Slovenia, the Netherlands, Portugal, Spain, Sweden, and the United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states: Iceland, Liechtenstein, Norway, and Switzerland. EU Countries not intended for use None Please check the declaration of conformity on www.edimax.com...
  • Page 5: Table Of Contents

    Product Introduction ...2 1.1. Features ...2 1.2. Specifications...2 2. Package Contents...3 Hardware Installation ...4 Software Installation...4 Connect to Wireless Access Point...8 5.1 Using Realtek Wireless Configuration Utility ...8 5.2 Using Windows Zero Config...12 Configuration Utility ...16 6.1. Utility Overview ...16 6.2.
  • Page 6: Product Introduction

    1. Product Introduction Thank you for your purchasing Edimax Wireless 802.11b/g PCI Adapter. This PCI adapter is designed to comply with IEEE 802.11b/g Wireless LAN standard and easy to carry with the Mini size. It is suitable for any Desktop computers.
  • Page 7: Package Contents

    LEDs: Link, TX/RX Transmit Power: 17dBm±2dBm Power Consumption: TX: 340mA, RX: 320mA Dimension: 19(H) x 127(W) x 121(D) mm Temperature: 32~131°F (0 ~55°C) Humidity: Max. 95% (NonCondensing) Certification: FCC, CE 2. 2. Package Contents Before you starting to use this Wireless PCI Adapter, please check if there’s anything missing in the package, and contact your dealer of purchase to claim for missing items: One Wireless PCI Adapter One 2dBi Antenna...
  • Page 8: Hardware Installation

    3. Hardware Installation A. Turn off your computer and remove its cover. B. Insert the PCI card to an available PCI slot firmly. C. Secure this card to the rear of the computer chassis and put back the cover. D. Secure the antenna to the antenna connector of the card. E.
  • Page 9 3. Select the Setup Language and click “OK” to proceed. 4. Click “Next” to start installing driver and utility.
  • Page 10 5. Select the Region Domain for which WLAN is authorized to use and click “Next” to continue. 6. Radio regulation warning window. Due to the Radio regulation at different area, different radio law might be applied. Please make sure your region selection is correct.
  • Page 11 7. The system starts to install the driver and utility. 8. Click “Finish” to complete the driver and utility installation.
  • Page 12: Connect To Wireless Access Point

    5. Connect to Wireless Access Point Using Configuration Utility to Connect to Wireless Access Point 5.1 Using Realtek Wireless Configuration Utility 1. After installation is complete, wireless configuration utility will be shown an icon at your windows desktop as below. Please click the icon by right mouse key to lunch the configuration utility.
  • Page 13 passphrase / preshared key at “Network key” & “Confirm network key”, then click ‘OK’. If the value you inputted here is wrong, you will not be able to connect to wireless access point. Authentication type is selected automatically, please don’t change it.
  • Page 14 4. The utility will automatically add the access point at Wireless Utility Profile.
  • Page 15 5. If the wireless access point is successfully connected, you’ll see a connected icon displayed at the lower-left corner of wireless configuration utility window and click ‘Close’ to exit.
  • Page 16: Using Windows Zero Config

    5.2 Using Windows Zero Config 1. After lunch wireless configuration, Please select “Windows Zero Config” and click “OK” to disable the utility of the adapter.. 2. Please lunch Windows Zero Config by double-click the wireless connection icon in the lower-left corner on Windows desktop.
  • Page 17 3. The Windows Zero Config Panel will pup-up. Please select the wireless access point which you want to connect and click “Connect”...
  • Page 18 4. If the wireless access point without encryption, there is warning window will pup-up. Please click “Connect Anywhere”.
  • Page 19 5. When you see the “Connected” shows on the Windows Zero Config window, the wireless is successfully connected.
  • Page 20: Configuration Utility

    6. Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN PCI Card and monitor the link status and the statistics during the communication process. The Configuration Utility appears as an icon on the system tray and desktop of Windows. You can open it by double-click on the icon.
  • Page 21 Parameter Description Refresh – Refresh card list in the “B“ block. RT-Set – Open the RT-Set wizard. Mode – There are two modes: Station and Access Point. If “Station“ is selected, the card works as a wireless card. If “Access Point“...
  • Page 22: Available Network

    6.2. Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your card and automatically connect to the wireless network with the highest signal strength. From the “Available Network” tab, all the networks nearby will be listed.
  • Page 23: General

    6.3. General To check the connection status of the card, select “General“. This screen shows the information of Link Speed, Network Type, Encryption Method, SSID, Signal Strength, Link Quality and Network Address of the card. Parameter Status Speed Type Encryption SSID Signal Strength Description...
  • Page 24: Profile

    Parameter Link Quality Network Address 6.4. Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile. Parameter Available Profile(s) Add/ Remove/ Edit Button Duplicate Set Default Description It indicates the wireless link quality.
  • Page 25: Configure The Profile

    6.4.1. Configure the Profile Parameter Profile Name Network Name (SSID) This is a computer-to-computer (ad There are two kinds of network type described as follows. hoc) network; wireless access points are not used. Channel Description Define a recognizable profile name for you to identify the different networks.
  • Page 26 Parameter Network Authentication Description This setting has to be consistent with the wireless networks that the card intends to connect. Open System – No authentication is needed among the wireless network. Shared Key – Only wireless stations using a shared key (WEP Key identified) are allowed to connecting each other.
  • Page 27 Parameter Data Encryption ASCII Passphrase Network Key Confirm Network Key Key Index (advanced) Description Disabled – Disable the WEP Data Encryption. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP –...
  • Page 28 Parameter EAP Type Tunnel Username Identity Password Certificate Description GTC – GTC is an authentication protocol which allows the exchange of clear text authentication credentials across the network. TLS – TLS is the most secure of the EAP protocols but not easy to use.
  • Page 29: Advanced

    6.5. Advanced The “Advanced” option enables you to configure more advanced settings, for example: Power Save, Turbo Mode, Wireless Mode and etc. Parameter Power Save Turbo Mode Wireless Mode Description None – The card will always set in active mode. Min –...
  • Page 30 Parameter 802.11b Preamble Mode Fragment Threshold RTS Threshold Set Defaults Apply Description The preamble defines the length of the CRC block for communication among the wireless stations. There are three mode including Long, Short and Auto. High network traffic areas should use the shorter preamble type.
  • Page 31: Status

    6.6. Status This screen shows the information of manufacturer, driver version, settings of the wireless network the card is connecting to, linking time and link status. If you don’t ensure the status of the card and the network you are connecting, please go to the screen for more details. 6.7.
  • Page 32: Software Ap

    6.8. Software AP This card can run as a wireless AP. The relative configurations of the AP including channel, SSID, WEP encryption and so on are described as follows. Parameter SSID BSSID Associate Table Config Description The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN.
  • Page 33: Ap Properties Setting

    6.8.1. AP Properties Setting Please refer to Section 3.4.1 for the setting of the parameters for AP. Note that Ad Hoc mode is not enabled for AP. 6.8.2. AP Advanced...
  • Page 34: Ap Statistics

    Parameter Beacon Interval DTIM Period Preamble Mode Set Defaults Apply 6.8.3. AP Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want to recount the statistics value, please click “Reset“.
  • Page 35: Softap

    6.8.4. SoftAP If you want to connect to the internet through this SoftAP, you will need to make a bridge between our SoftAP and your internet connect. Select the internet connection in your SoftAP host machine and press the “Apply” button.
  • Page 36: Rt-Set Wizard

    7. RT-Set Wizard The RT-Set wizard can help users to connect to a wireless LAN or build an Ad-hoc wireless network. For example, if you want to connect to a wireless LAN in infrastructure mode: A. Open the RT-Set wizard and choose the Station (infrastructure) mode. B.
  • Page 37 C. In the Wireless network properties dialog, please fill in the security settings for this wireless network you’d like to connect to. D. Please specify the IP settings for this wireless network and click the “Finish” button.
  • Page 38 E. Now you can connect to the wireless network successfully.
  • Page 39: Troubleshooting

    8. 5 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the card. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 40 What is BSS ID? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. What is WEP? WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 41 13. What is Spread Spectrum? Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.

Table of Contents