Intellinet 525206 User Manual

Intellinet 525206 User Manual

Wireless 300n usb adapter

Advertisement

Quick Links

WIRELESS
300N USB
ADAPTER
USER
MANUAL
MODEL 525206
INT-525206-UM-1111-01

Advertisement

Table of Contents
loading

Summary of Contents for Intellinet 525206

  • Page 1 WIRELESS 300N USB ADAPTER USER MANUAL MODEL 525206 INT-525206-UM-1111-01...
  • Page 2: Fcc Caution

    Federal Communications Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 3 R&TTE Compliance Statement This equipment complies with all the requirements of Directive 1999/5/EC of the European Parliament and the Council of March 9, 1999, on radio equipment and telecommunication terminal equipment and the mutual recognition of their conformity (R&TTE). Safety This equipment is designed with the utmost care for the safety of those who install and use it.
  • Page 4: Table Of Contents

    Contents 1 Introduction ..................1 1.1 Features ......................1 1.2 Specifications ....................1 2 Installation Procedure............... 3 3 Configuration Utility................9 3.1 Utility Overview....................9 3.2 Available Network ..................11 3.3 General ......................12 3.4 Profile......................13 3.4.1 Configure the Profile ................14 3.5 Status......................18 3.6 Statistics ......................
  • Page 5: Introduction

    1 Introduction Thank you for purchasing the INTELLINET NETWORK SOLUTIONS™ Wireless 300N USB Adapter, Model 525206. By following the simple steps in this user manual, you will soon be able to enjoy the helpful features listed below that make this item such a popular selection.
  • Page 6 LEDs • Link/Activity Environmental • Dimensions: 15 (H) x 15 (W) x 155 (L) mm (0.4 x 1.1 x 3.5 in.) • Weight: 0.14 kg (0.3 lbs.) • Operating temperature: 0 – 40°C (32 – 104°F) • Operating humidity: max. 95% RH, non-condensing System Requirements •...
  • Page 7: Installation Procedure

    Installation Procedure Before you proceed with the installation, notice following descriptions. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows Vista/7.) Note2: If you have installed the Wireless PC Adapter driver and utility before, uninstall the old version first.
  • Page 8 D. When you see the following screen, click “Install” to begin the installation. E. The system starts to install the driver and utility. F. Click “Finish” to complete the driver and utility installation.
  • Page 9 Connect to a Wireless Access Point A. To start configuring the adapter, double-click the icon in the system tray or right-click the icon and select “Open configuration utility.” B. The utility of the adapter is displayed. Click the “Available Network” tab and double-click on the wireless access point you want to connect to.
  • Page 10 * Use Windows Zero Configuration on Windows Vista/7: A. With Windows Vista / 7, you can use Windows Zero Configuration to connect to a wireless access point. Click “Start,” then click “Control Panel.” Click “Network and Internet” in the Control Panel. B.
  • Page 11 C. Click the access point you want to use if it’s shown, then click “Connect.” D. If it’s an unnamed access point (i.e., the SSID of this wireless access point is hidden), you’ll be prompted to input its name, and the name must be identical to the SSID setting of the wireless access point you’re connecting to.
  • Page 12 E. If the access point is protected by an encryption method, you need to input its security or passphrase here. It must match the encryption setting on the access point. F. If you can see the screen below, the connection between your computer and wireless access point has been successfully established.
  • Page 13: Configuration Utility

    Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless 300N USB Adapter and monitor the link status and statistics during the communication process. The Configuration Utility appears as an icon on the system tray and desktop of Windows. You can open it by double-clicking the icon.
  • Page 14 Parameter Description Refresh – Refresh the adapter list in the “B“ block. Mode – There are two modes: Station and Access Point. If “Station“ is selected, the adapter works as a wireless adapter. If “Access Point“ is selected, the adapter will works as a wireless View –...
  • Page 15: Available Network

    Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wireless network with the highest signal strength. From the “Available Network” tab, all the networks nearby will be listed.
  • Page 16: General

    General To check the connection status of the adapter, select “General.” This screen shows the Link Speed, Network Type, Encryption Method, SSID, Signal Strength, Link Quality and Network Address of the adapter. Parameter Description Status This shows the connection status of the adapter. Speed This shows the current speed.
  • Page 17: Profile

    Signal Strength This indicates the wireless signal strength. Link Quality This indicates the wireless link quality. Network Address This shows the MAC, IP address and other information about the adapter. Profile The “Profiles List” is for managing the networks you connect to frequently. You are able to use Add/Remove/Edit/Duplicate/Set Default to manage a profile.
  • Page 18: Configure The Profile

    3.4.1 Configure the Profile Parameter Description Profile Name Define a recognizable profile name so you can identify different networks. Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
  • Page 19 Network Authentication This setting has to be consistent with the wireless networks that the adapter intends to connect. Open System – No authentication is needed within the wireless network. Shared Key – Only wireless stations using a shared key (WEP Key identified) are allowed to connect to each other.
  • Page 20 Data Encryption Disabled – Disable the WEP Data Encryption. WEP – Enable the WEP Data Encryption. When this is selected, you need to continue setting the WEP Encryption keys. TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10,000 packets (a packet is a kind of message transmitted over a network).
  • Page 21 EAP Type GTC – GTC is an authentication protocol that allows the exchange of clear text authentication credentials across the network. TLS – TLS is the most secure of the EAP protocols, but is not easy to use. It requires that digital certificates be exchanged in the authentication phase.
  • Page 22: Status

    Status This screen shows information about the manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you’re unsure about the status of the adapter and the network you are connecting, go to the screen for more details. Statistics You can get real-time information about the packet transmission and receiving status during wireless communication from this screen.
  • Page 23: Wi-Fi Protect Setup (Wps)

    Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wireless network technology, which makes wireless network setup become very simple. If you have a WPS-enabled wireless access point and you want to establish a secure connection to it, you don’t need to configure the wireless access point and set up data encryption by yourself.
  • Page 24 3. If you click “Yes” and the following message appears on your computer, select the SSID of the wireless access point that you want to connect to and click “Select.” 4. You’ll need to wait up to two minutes while the install procedure runs. If a wireless access point with the correct PIN code is found, you’ll be connected to that access point.
  • Page 25 Push Button Config (PBC) 1. Start the PBC pairing procedure on the access point side (refer to the instructions given by your access point’s manufacturer), then click “PBC” in the wireless configuration utility to start to establish a wireless connection by WPS. (This may require up to a minute to complete.) 2.
  • Page 26: Software Ap

    Software AP This adapter can run as a wireless AP. The relative configurations of the AP (channel, SSID, WEP encryption and so on) are described below. Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN.
  • Page 27: Ap Properties Setting

    3.8.1 AP Properties Setting Refer to Section 3.4.1 for the setting of the parameters for the AP. Note that Ad Hoc mode is not enabled for the AP. 3.8.2 AP Advanced...
  • Page 28: Ap Statistics

    Parameter Description Beacon Interval This specifies the duration between beacon packets (milliseconds). The range for the beacon period is 20-1000 milliseconds, with a typical value of 100. DTIM Period This determines the interval the access point will send its broadcast traffic. Default value is 3 beacons. Preamble The preamble defines the length of the CRC block for communication among the wireless stations.
  • Page 29: Ics

    3.8.4 To connect to the Internet through this SoftAP, you need to make a bridge between SoftAP and your Internet connection. Select the Internet connection in your SoftAP host machine and click “Apply.”...
  • Page 30 Reference Terminology 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for home, office and public networks.
  • Page 31 7. What is TKIP? TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. 8. What is AES? AES (Advanced Encryption Standard), a chip-based security, has been developed to ensure the highest degree of security and authenticity for digital information, wherever and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards.

Table of Contents