Page 3
Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately. Revision User’s Manual for PLANET 802.11g Wireless PCMCIA Adapter Model: WL-3565 Rev: 1.0 (November 2005) Part No. EM-WL3565...
802.11b devices. When the card connects to 11b devices, the link speed will be up to 11Mbps. The WL-3565 supports specific ways to increase the data transfer rate at a time: compress the data and decrease the waiting time to send the next data to the Routers or APs. This feature is called Turbo Mode.
1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: 1 x WL-3565 1 x Driver and User's manual CD 1 x Quick Installation Guide If any of the above items is missing, contact your supplier as soon as possible.
Note2: If you have installed other Wireless PC Card driver & utility before, please uninstall them first. 1. Plug the WL-3565 into the PCMCIA slot of the computer. When the “Found New Hardware Wizard” appears, click “Cancel”. 2. Insert the bundled CD into the CD-ROM drive to launch the autorun program. Once completed, a menu screen will appear.
Page 8
7. You can see the installation progress in this screen. 8. The system will automatically detect the card and display “Found New Hardware Wizard” screen. Click “Install the Software Automatically” to continue.
Page 9
9. When the “Hardware Installation” screen appears, click “Continue Anyway” to proceed. 10. Click “Finish” to complete “Found New Hardware Wizard”. 11. Click “Finish” to complete “PLANET WL-3565 Setup”.
3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the WL-3565 and monitor the link status and the statistics during the communication process. When the WL-3565 is installed, the configuration utility will be displayed automatically. This card will auto connect to wireless device which has better signal strength and no wireless security setting.
Site Survey When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed. You can change the connection to another networks or add one of the networks to your own profile list.
Page 12
Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the WL-3565 and then only the device with the same SSID can interconnect to the card. If you want to...
Page 14
802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through Access Point or Router. X Power you want to lower the transmit power of the card for saving the power of the system, you can select the lower percentages from the list.
Minor change is recommended. hannel his setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to. .2.1.2 Authentication and Security Paramete Description Authentication Type...
Page 16
WPA – WPA provides a scheme of mutual authentication using either IEEE 802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. It provides high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks.
AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless network. ote: All devices in the network should use the same encryption method to ensure the communication.
Page 18
IEEE 802.1x RADIUS RADIUS Access Client Client Server Access Point Windows 2000 IAS (Internet Authentication Service) (1) Client requests to login the (3) Send username, password to network. RADIUS server. (4) Approve or deny user (2) Login with username, login to the LAN. password.
Page 19
EAP-TLS/Smart card and Generic Token Card. The client certificate is optional required for the authentication. TLS/Smart Card –TLS is the most secure of the EAP protocols but not easy to use. It requires that digital certificates be exchanged in the authentication phase. The server presents a certificate to the client.
3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
blueberry.zeelans.com) but it may be any name used in the certificate name field. Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Parameter Description Status Display the SSID and MAC ID of the network the card is connecting to.
If you want to know the signal strength in the unit of dBm, select this check box. Signal Strength This bar shows the signal strength level. The higher percentage shown in the bar, the more radio signal been received by the card. This indicator helps to find the proper position of the wireless device for quality network operation.
Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc. Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode.
Page 24
B/G Protection If you have a mix of 802.11b and 802.11g wireless stations in the network, it is recommended to enable the protection mechanism. This mechanism can decrease the rate of data collision between 802.11b and 802.11g wireless stations. When the protection mode is enabled, the throughput of the card will be a little lower due to many of frame traffic should be transmitted.
Page 25
CCX 2.0 CCX 2.0 (Cisco Compatible Extensions) is developed by Cisco for the radio monitoring and fast roaming. LEAP Turn on CCKM During normal operation, LEAP-enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication, including communication with the main RADIUS server.
D. Select “Advanced” page, enable the “WMM Capable”. Advanced Settings The WL-3565 provides more advanced parameters in Windows Device Manager. You can find the Advanced configuration following the step A to D in section 3.7. Please check below to know the function of the settings.
Page 29
Using different MAC address if wanted. This MAC address will not Local Administration MAC... write to EEPROM. It is only used in run time. Network Type Selecting Infrastructure or AdHoc mode. Power Saving Mode Selecting different power mode. Radio On/Off RF switching.
4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
Page 31
6. What is BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
Page 32
13. What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.
Need help?
Do you have a question about the WL-3565 and is the answer not in the manual?
Questions and answers