Intellinet 525336 User Manual

Nano 150n wireless usb adapter
Hide thumbs Also See for 525336:

Advertisement

Quick Links

NANO 150N
WIRELESS

USB ADAPTER

USER MANUAL

MODEL 525336
INT-525336-UM-0212-01

Advertisement

Table of Contents
loading

Summary of Contents for Intellinet 525336

  • Page 1: Usb Adapter

    NANO 150N WIRELESS USB ADAPTER USER MANUAL MODEL 525336 INT-525336-UM-0212-01...
  • Page 2: Table Of Contents

    CONTENTS Introduction ......................1 Features............................1 Specifications..........................1 Installation Procedure ....................3 Configuration Utility ....................9 Utility Overview .........................9 Available Network ........................10 General ...........................11 Profile............................12 3.4.1 Configure the Profile ................. 13 Status............................16 Statistics..........................16 Wi-Fi Protect Setup (WPS) .....................17 Software AP ..........................20 3.8.1 AP Properties Setting ................
  • Page 3: Introduction

    1 Introduction Thank you for purchasing the INTELLINET NETWORK SOLUTIONS™ Nano 150N Wireless USB Adapter, Model 525336. By following the simple steps in this user manual, you will soon be able to enjoy the helpful features listed below. 1.1 Features •...
  • Page 4 System Requirements • Notebook or Desktop PC with Pentium 300 MHz-compatible processor or higher • Windows XP, Vista and Windows 7 • Available Hi-Speed USB 2.0 port Package Contents • Nano 150N Wireless USB Adapter • Quick install guide • Setup CD with user manual...
  • Page 5: Installation Procedure

    Installation Procedure Before you proceed with the installation, note the following. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/Vista/7.) Note2: If you have installed the Wireless PC Adapter driver and utility before, uninstall the old version first.
  • Page 6 D. When you see the following screen, click “Install” to begin the installation. E. The system starts to install the driver and utility. F. Click “Finish” to complete the driver and utility installation.
  • Page 7 II. Connect to a Wireless Access Point A. To start configuring the adapter, double-click the icon in the system tray or right-click the icon and select “Open configuration utility.” B. The utility of the adapter is displayed. Click the “Available Network” tab and double-click on the wireless access point you want to connect to.
  • Page 8 * Use Windows Zero Configuration on Windows Vista / 7: A. With Windows Vista / 7, you can use Windows Zero Configuration to connect to a wireless access point. Click “Start,” then click “Control Panel.” Click “Network and Internet” in the Control Panel. B.
  • Page 9 C. Click the access point you want to use if it’s shown, then click “Connect.” D. If it’s an unnamed access point (i.e., the SSID of this wireless access point is hidden), you’ll be prompted to input its name, and the name must be identical to the SSID setting of the wireless access point you’re connecting to.
  • Page 10 E. If the access point is protected by an encryption method, you need to input its security or passphrase here. It must match the encryption setting on the access point. F. If you can see the screen below, the connection between your computer and wireless access point has been successfully established.
  • Page 11: Configuration Utility

    Configuration Utility The Configuration Utility is a powerful application that helps you configure the adapter and monitor the link status and statistics during the communication process. The Configuration Utility appears as an icon on the system tray and desktop of Windows. You can open it by double-clicking the icon.
  • Page 12: Available Network

    Parameter Description Refresh – Refresh the adapter list in the “B“ block. Mode – There are two modes: Station and Access Point. If “Station“ is selected, the adapter works as a wireless adapter. If “Access Point“ is selected, the adapter will works as a wireless View –...
  • Page 13: General

    Parameter Description Available Network(s) This list shows all information of the available wireless networks within the range of your adapter (SSID, Channel, Encryption, Network Authentication, Signal etc.). To connect to any network on the list, double-click the selected network. Refresh Click “Refresh“...
  • Page 14: Profile

    Encryption This displays the encryption setting of the current connection: None, WEP, TKIP or AES. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Signal Strength This indicates the wireless signal strength.
  • Page 15: Configure The Profile

    3.4.1 Configure the Profile Parameter Description Profile Name Define a recognizable profile name so you can identify different networks. Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
  • Page 16 business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in their access point or gateway, as well as in each wireless station in the network. WPA-PSK takes over automatically from that point, keeping unauthorized users that don’t have the matching password from joining the network, while encrypting the data traveling between...
  • Page 17 ASCII The WEP key can be in ASCII format (alphanumeric values or signs are allowed) so it’s more recognizable for users. PASSPHRASE This is a text string with a maximum of 32 alphanumeric characters; for example, “Test.” The WEP key is based on the passphrase determined by you.
  • Page 18: Status

    Password User’s password in the RADIUS server. Certificate Select the certificate for RADIUS server authentication. Status This screen shows information about the manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you’re unsure about the status of the adapter and the network you are connecting, go to the screen for more details.
  • Page 19: Wi-Fi Protect Setup (Wps)

    Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wireless network technology, which makes wireless network setup become very simple. If you have a WPS-enabled wireless access point and you want to establish a secure connection to it, you don’t need to configure the wireless access point and set up data encryption by yourself.
  • Page 20 3. If you click “Yes” and the following message appears on your computer, select the SSID of the wireless access point that you want to connect to and click “Select.” 4. You’ll need to wait up to two minutes while the install procedure runs. If a wireless access point with the correct PIN code is found, you’ll be connected to that access point.
  • Page 21 Push Button Config (PBC) 1. Start the PBC pairing procedure on the access point side (refer to the instructions given by your access point’s manufacturer), then click “PBC” in the wireless configuration utility to start to establish a wireless connection by WPS. (This may require up to a minute to complete.) 2.
  • Page 22: Software Ap

    Software AP This adapter can run as a wireless AP. The relative configurations of the AP (channel, SSID, WEP encryption and so on) are described below. Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN.
  • Page 23: Ap Properties Setting

    3.8.1 AP Properties Setting Refer to Section 3.4.1 for the setting of the parameters for the AP. Note that Ad Hoc mode is not enabled for the AP. 3.8.2 AP Advanced...
  • Page 24: Ap Statistics

    Parameter Description Beacon Interval This specifies the duration between beacon packets (milliseconds). The range for the beacon period is 20-1000 milliseconds, with a typical value of 100. DTIM Period This determines the interval the access point will send its broadcast traffic. Default value is 3 beacons. Preamble The preamble defines the length of the CRC block for communication among the wireless stations.
  • Page 26 Reference Terminology 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for home, office and public networks.
  • Page 27 7. What is TKIP? TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. 8. What is AES? AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards.
  • Page 28 R&TTE Compliance Statement This equipment complies with all the requirements of Directive 1999/5/EC of the European Parliament and the Council of March 9, 1999, on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). Safety This equipment is designed with the utmost care for the safety of those who install and use it.

Table of Contents