Page 1
22Mbps Wireless Network PCI Adapter User Manual version 3.1...
Page 2
Manufacturer's Disclaimer Statement The information in this document is subject to change without notice and does not represent a commitment on the part of the vendor. No warranty or representation, either expressed or implied, is made with respect to the quality, accuracy or fitness for any particular purpose of this document.
INTRODUCTION The 22Mbps Wireless Network PCI Adapter delivers enhanced IEEE 802.11b high performance for up to 22Mbps, which is double of that offered by most of the current wireless products in the market. The 22Mbps high data rate is made possible by the latest advanced TI wireless technology, which incorporates the new PBCC modulation method.
System Requirements Ø Windows 98, 98SE, Millennium Edition (ME), 2000 and XP computers Ø PC with Pentium III 600MHz system or above is recommended Ø Equipped with at least one empty PCI standard v2.1 socket. Ø One CD-ROM drive...
GETTING STARTED Getting To Know The 22Mbps Wireless Network PCI Adapter WIRELESS NETWORK PCI Adapter’s LEDs Ø Power LED ON when the unit is powered up Blink indicates wireless activity Setting Up The Wireless Network There two wireless ne twork topologies that you can setup your wireless card with. One is called “Ad-Hoc”, and the other is “Infrastructure ”.
Page 7
same BSS ID and channel to establish communication linkage with each other to form a point-to-point network for data transmission and reception. Setting Up Infrastructure Network In order to setup an Infrastructure of a wireless network such as the example shown above, you will need the following: 1.
Installing Your 22Mbps Wireless Network PCI Adapter Make sure that the 22Mbps Wireless Network PCI Adapter is inserted into your computer. Turn on the computer. Insert the software CD into the CD-ROM Drive. Please note that the installation screens in this quick guide are captured from WindowsXP. The other Windows systems will have similar screen for the installation procedure.
Page 9
Click on “Install” button to start Utility installation. InstallShield Wizard starts. Click “Next” to continue. Click “Next” to install the program files in the default folder.
Page 10
Select the second option, and click “Finish” to complete the installation. - Turn off your computer, and make sure the power core is unplugged. - Open the computer case. - Insert the 22Mbps Wireless Network PCI Adapter into the PCI socket on the mainboard of your computer.
Page 11
Select first option then click on the checkbox click “Browse ” button to specify the driver file folder. Go to D:\Driver\WinXP Click “OK” Please note that letter “D:\” represents the CD-ROM driver letter, and select folder “Win98” when installing under Windows 98 O/S or WinME2000 for Windows ME or 2000 O/S.
Page 12
Click “Continue Anyway” to continue Click “Finish” to complete new hardware installation. After successful installation, an utility program icon will appear on your desktop screen. Simply, double-click the icon to launch the utility.
CONFIGURING YOUR WIRELESS PCI Adapter Link Info. Page This is the default page when the utility starts up. Status: Shows the BSSID associated, which can be used to identify the wireless network. SSID: Shows current SSID, which must be the same for the wireless client and AP in order for communication to be established.
Configuration Page This is the page where you can change the basic settings of the Access Point with the minimum amount of effort to adjust a secure wireless network. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network.
Page 15
the PSDU. The Short Preamble and header may be used to minimize overhead and, thus, maximize the network data throughput. Ho wever, the Short Preamble is supported only from the IEEE 802.11b (High-Rate) standard and not from the original IEEE 802.11. That means that stations using Short-Preamble cannot communicate with stations implementing the original version of the protocol.
Security Page This is the page where you configure Security settings of your 22Mbps wireless PCI Adapter. Data Encryption: Click the box to enable Data Encryption feature. Aut. Mode: There are three modes available to choose from. Open Authentication – the sender and receiver do not share secret Key for communication.
SiteSurvey Page This page allows to utilize the SiteSurvey function to scan for the available wireless network (wireless clients and Access Points) and select one to establish wireless communication. Available Network – displays the wireless networks (wireless clients and Access Points) that are in your signal range.
Page 18
All the detail information about each settings and configuration item are described in previous Configuration and Security Page sessions. Please refer to those two sessions for more information. When you finish enter the setting for this profile, click “OK” to add a new profile.
About Page This page displays some information about the 22mpbs PCI Adapter utility, which includes the version numbers for Driver, Firmware and Utility. When there is new version of software available for upgrade, you will be able to identify by version numbers.
APPENDIX A: TROUBLESHOOTING This chapter provides solutions to frequently encountered problems that can occur during the installation and operation of the 22Mbps Wireless Network PCI Adapter. Please read through the following to solve your problems. The wireless clients cannot access the network in the infrastructure mode. Ø...
Page 21
Go to “Hardware” Go to “Device Manager”...
Page 22
Right mouse click on the 22 M WLAN PCI Adapter and go to “Properties”...
Page 23
Check and make sure that the network adapter is working properly What is the difference between 22Mbps and 11Mbps wireless products? What’s the benefit of 22Mbps Wireless Access Point? The 22Mbps is made possible by the new modulation method called PBCC developed by TI, which is different from the current CCK modulation method for 11Mbps.
Page 24
allows the network to identify it at the hardware level. Unlike IP addresses, which can be changed or dynamically assigned by the network, the MAC address of a networking device is permanent. What is WEP? Wired Equivalent Privacy (WEP) is a type of data encryption mechanism described in the IEEE 802.11 standard.
APPENDIX B: NETWORKING BASIS This chapter will help you learn the basics of home networking. Using the Windows XP Network Setup Wizard Go to Start menu > Control Panel > Network Connections In the menu on the left side of the window, select “Set up a home or small office network ”...
Page 26
Select the option that best describes how you connect your computer to the Internet. In the case of using router in the network, choose the second option. Click “Next” to continue. 1. Enter a short description for your computer. 2. Enter a name for your computer to be recognized among the network.
Page 27
Enter “Workgroup name ” for your home network. Click “Next” to continue” Click “Next” and wait for the wizard to apply the settings.
Page 28
You may create a Network Setup Disk which saves you the trouble of having to configure every PCs in your network. Select the first choice, and insert a floppy disk into your disk drive Click “Next” to continue.
Page 29
Click “Format Disk” if you wish to format the disk. Click “Next” to copy the necessary files to the disk. Click “Next” to continue with the Network Setup Wizard...
Page 30
!Note: Now you may use the Network Setup Disk you just created in any PCs in your network that you wish to setup. Simply insert the Network Setup Disk into the disk drive of a PC, and open to browse the content of the disk with “My Computer” or “Windows File Manager”.
Page 31
Checking IP Address of Your Computer In Windows XP Sometimes you will need to know the IP address of the computer that you are using. For example, when you want to make sure that your computer is in the same network domain as that of your Access Point for you can configure and access the AP.
Page 32
Go to Start menu > Run > type “command” Click “OK” Type command, “ipconfig /renew” in the command prompt window and press Enter. This command releases the current IP address and acquire it from the network, i.e. DHCP server, once more. In this case, the IP address that we acquired is the same as previous one, 192.
Page 33
Dynamic IP Address V.S. Static IP Address By definition Dynamic IP addresses are the IP addresses that are being automatically assigned to a network device on the network. These Dynamically assigned IP addresses will expire and may be changed over time. Static IP addresses are the IP addresses that users manually enter for each of the network adapters.
Page 34
The Local Area Connection Properties would appear. Select “Internet Protocol (TCP/IP)” and Click “Properties” to continue. Dynamically Assigned IP Address The TCP/IP Properties window appears. Select “Obtain an IP address automatically” if you are on a DHCP enabled network. Click “OK” to close the window with the changes made...
Page 35
Static IP Address Select “Use the following IP address” Enter the IP addre ss and subnet mask fields. Enter the IP address of the Router in the Default gateway field. Enter the IP address of the Router in the DNS server field Click “Ok”...
Page 36
The TCP/IP Properties window appears. Select “Obtain an IP address automatically” if you are on a DHCP enabled network. Click “OK” to close the window with the changes made Select “Use the following IP address” Enter the IP address and subnet mask fields.
Page 37
Wireless Network In Windows 98 and Windows ME Go to Start menu > Settings > Control Panel > Double-click on Network Select TCP/IP of the network device Click “Propert ies” to continue The TCP/IP Properties window appears. Select “Obtain an IP address automatically”...
Page 38
Select “Use the following IP address” Enter the IP address and subnet mask fields. In the DNS Configuration Tab Page, (1) enter the IP address of the Router in the Default gateway field. (2) Enter the IP address of the Router in the DNS server field...
APPENDIX C: 802.1x Authentication Setup There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2) Authenticator and (3) Server. The 802.1x security supports both MD5 and TLS Extensive Authentication Protocol (EAP). The 802.1x Authentication is a complement to the current WEP encryption used in wireless network. The current security weakness of WEP encryption is that there is no key management and no limitation for the duration of key lifetime.
have access to the Internet/Intranet. In 802.1x authentication infrastructure, each of these wireless clients would have to be authenticated by the Radius server, which would grant the authorized client and notified the Access Point to open up a communication port to be used for the granted client. There are 2 Extensive Authentication Protocol (EAP) methods supported: (1) MD5 and (2) TLS.
Page 41
Please note that the setup illustration is based on our 22Mbps wireless PC Card. Go to Start > Control Panel double-click on “Network Connections” right-click on the Wireless Network Connection that you use with our 22Mbps wireless PC Card. Click “Propert ies” to open up the Properties setting window.
Page 43
Click “Properties” of the available wireless network, which you wish to connect or configure. Please note that if you are going to change to a different 802.1x authentication EAP method, i.e. switch from using MD5 to TLS, , you must remove the current existing wireless network from your Preferred networks first, and add it in again.
TLS Authentication Select “The key is provided for me automatically” option Click “OK” to close the Wireless Network Properties window.
Page 45
Click “Authentication” tab Select “Enable network access control using IEEE 802.1x” option to enable 802.1x authentication. Select “Smart Card or other Certificate ” from the drop-down list box for EAP type. Click “OK” to close the Wireless Network Connection Properties window, thus make the changes effective.
Page 46
TLS Authentication – Download Digital Certificate from Server In most corporations, it requires internal IT or MIS staff’s help to have the certificated downloaded to your local computer. One of the main reasons is that each corporation uses its own server systems, and you will need the assistance from your IT or MIS for account/passwo rd, CA server location and etc.
Page 47
16. Now we are connected to the Certificate Service. Select “Request a certificate ”, and click “Next” to continue.
Page 48
17. Select “User Certificate request”, and click “Next” to continue.
Page 50
19. The Certificate Service is now processing the certificate request.
Page 51
20. The certificate is issued by the server, click “Install this certificate” to download and store the certificate to your local computer. 21. Click “Yes” to store the certificate to your local computer.
Page 53
All the configuration and certificate download are now complete. Let’s try to connect to the Access Point using 802.1x TLS Authentication. 23. Windows XP will prompt you to select a certificate for wireless network connection. Click on the network connection icon in the system tray to continue.
Page 54
24. Select the certificate that was issued by the server (WirelessCA), and click “OK” to continue. 25. Check the server to make sure that it’s the server that issues certificate, and click “OK” to complete the authentication process.
MD5 Authentication Select “Data encryption (WEP enabled)” option, but leave other option unselected. Select the key format that you want to use to key in your Network key. ASCII characters: 0~9, a~z and A~Z HEX characters: 0~9, a~f Select the key length that you wish to use 40 bits (5 characters for ASCII, 10 characters for HEX) 104 bits (13 characters for ASCII, 26 characters for HEX) After deciding the key format and key length that you wish to use for network...
Page 56
Select “Authentication” tab. Select “Enable network access control using IEEE 802.1X” to enable 802.1x authentication. Select “MD-5 Challenge ” from the drop-down list box for EAP type. Click “OK” to close Wireless Network Connection Properties window, thus make all the changes effective.
Page 57
Unlike TLS, which uses digital certificate for validation, the MD-5 Authentication is based on the user account/password. Therefore, you must have a valid account used by the server for validation. WindowsXP will prompt you to enter your user name and password. Click on the network connection icon in the system tray to continue.
Page 58
Enter the user name, p assword and the logon domain that your account belongs if you have one or more network domain exist in your network. Click “OK” to complete the validation process.
Authenticator: Wireless Network Access Point This is the web page configuration in the Access Point that we use. 1. Enable 802.1x security by selecting “Enable ”. 2. If MD5 EAP methods is used then you can skip step 3 and go to step 4. 3.
Page 60
!Note: As soon as 802.1x security is enabled, all the wireless client stations that are connected to the Access Point currently will be disconnected. The wireless clients must be configured manually to authenticate themselves with the Radius server to be reconnected.
Radius Server: Window2000 Server This section to help those who has Windows 2000 Server installed and wants to setup Windows2000 Server for 802.1x authentication, which includes setting up Certificate Service for TLS Authentication, and enable EAP-methods. Login into your Windows 2000 Server as Administrator, or account that has Administrator authority.
Page 62
Select “Enterprise root CA”, and click “Next” to continue. Enter the information that you want for your Certificate Service, and click “ Next ” to continue.
Page 63
Go to Start > Program > Administrative Tools > Certificate Authority Right-click on the “Policy Setting”, select “new” Select “Certificate to Issue” 10. Select “Authenticated Session” and “Smartcard Logon” by holding down to the Ctrl key, and click “OK” to continue.
Page 64
11. Go to Start > Program > Administrative Tools > Active Directory Users and Computers . 12. Right-click on domain, and select ”Properties” to continue. 13. Select “Group Policy” tab and click “Properties” to continue.
Page 65
14. Go to “Computer Configuration” > “Security Settings” > “Public Key Policies” 15. Right-click “Automatic Certificate Request Setting”, and select “N e w” 16. Click “Automatic Certificate Request ...”...
Page 66
17. The Automatic Certificate Request Setup Wizard will guide you through the Automatic Certificate Request setup, simply click “Next” through to the last step. 18. Click “ Finish ” to complete the Automatic Certificate Request Setup 19. Go to Start > Run, and type “command” and click “Enter” to open Command Prompt.
Page 67
Adding Internet Authentication Service 21. Go to Start > Control Panel > Add or Remove Programs 22. Select “Add/Remove Windows Components” from the panel on the left. 23. Select “Internet Authentication Service ”, and click “OK” to install.
Page 68
Setting Internet Authentication Service 24. Go to Start > Program > Administrative Tools > Internet Authentication Service 25. Right-click “Client”, and select “New Client”...
Page 69
26. Enter the IP address of the Access Point in the Client address text field, a memorable name for the Access Point in the Client-Vendor text field, the access password used by the Access Point in the Shared secret text field. Re-type the password in the Confirmed shared secret text field.
Page 70
28. In the Internet Authentication Service, right-click “Remote Access Policies” 29. Select “New Remote Access Policy”. 30. Select “Day-And-Time -Restriction”, and click “Add” to continue.
Page 71
31. Unless you want to specify the active duration for 802.1x authentication, click “OK” to accept to have 802.1x authentication enabled at all times. 32. Select “Grant remote access permission”, and click “Next” to continue.
Page 73
For TLS Authentication Setup (Steps 34 ~ 38) 34. Select “Authentication” Tab 35. Enable “Extensible Authentication Protocol”, and select “Smart Card or other Certificate” for TLS authentication...
Page 74
36. Go to Start > Program > Administrative Tools > Active Directory Users and Computers 37. Select “Users ”, and double-click on the user that can be newly created or currently existing, who will be configured to have the right to obtain digital certificate remotely.
Page 75
38. Go to the “Dial-in” tab, and check “Allow access” option for Remote Access Permission and “No Callback” for Callback Options.
Page 76
For MD5 Authentication (Steps 39 ~ 54) 39. Go to Start > Program > Administrative Tools > Active Directory Users and Computers. 40. Right click on the domain, and select “Properties”...
Page 77
41. Select “Group Policy” tab, and click “Edit” to edit the Group Policy.
Page 78
42. Go to “Computer Configuration” > “Windows Settings” > “Security Settings” > “Account Policies” > “Password Policies” 43. Click “Define this policy setting”, select “Enabled”, and click “OK” to continue.
Page 79
44. Go to Start > Program > Administrative Tools > Active Directory Users and Computers . 45. Go to Users . Right-click on the user that you are granting access, and select “Properties”...
Page 80
46. Go to “Account” tab, and enable “Store password using reversible encryption” 47. Click “OK” to continue.
Page 81
48. Go to Start > Program > Administrative Tools > Internet Authentication Service. 49. Go to Remote Access Policies 50. Make sure that MD5 is moved up to Order 1 51. Right-click “MD5 ”, and select “Properties”...
Page 82
52. Go to “Authentication” tab 53. Enable “Extensible Authentication Protocol” 54. Select “MD5-Challenge” for EAP type.
APPENDIX D: GLOSSARY Access Point ? An internetworking device that seamlessly connects wired and wireless networks. Ad-Hoc ? An independent wireless LAN network formed by a group of computers, each with an network adapter. AP Client – One of the additional AP operating modes offered by 22Mbps Access Point, which allows the Access Point to act as an Ethernet-to-Wireless Bridge, thus a LAN or a single computer station can join a wireless ESS network through it.
Page 84
Basic Rate ? the fixed transmitted and receiving data rate allowed by the AP with the value 1,2,5.5, 11 and 22 Mbps for selection. Beacon ? A beacon is a packet broadcast by the Access Point to keep the network synchronized.
Page 85
if one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low power wideband noise and is rej e cted (ignored) by most narrowband receivers.
Page 86
ISM Band ? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4GHz, in particular, is being made available worldwide. MAC Address ? Media Access Control Address is a unique hex number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level.
Page 87
is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled. SSID ? Service Set Ide ntifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each clients and nodes in the wireless network.
Need help?
Do you have a question about the TEW-303PI and is the answer not in the manual?
Questions and answers