Planet WL-3565 User Manual

Planet WL-3565 User Manual

802.11g wireless pcmcia adapter
Hide thumbs Also See for WL-3565:

Advertisement

Quick Links

802.11g Wireless PCMCIA Adapter
WL-3565
User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WL-3565 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Planet WL-3565

  • Page 1 802.11g Wireless PCMCIA Adapter WL-3565 User’s Manual...
  • Page 2: Federal Communication Commission Interference Statement

    Copyright Copyright © 2005 by PLANET Technology Corp. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of PLANET.
  • Page 3 Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately. Revision User’s Manual for PLANET 802.11g Wireless PCMCIA Adapter Model: WL-3565 Rev: 1.0 (November 2005) Part No. EM-WL3565...
  • Page 4: Table Of Contents

    CONTENTS 1 INTRODUCTION ..............1 1.1 Features ......................1 1.2 Specifications....................1 1.3 Package Contents ..................2 2 INSTALLATION PROCEDURE..........3 3 CONFIGURATION UTILITY ............. 6 3.1 Site Survey ..................... 7 3.2 Profile ......................7 3.2.1 Configure the Profile ..................9 3.2.1.1 Configuration....................
  • Page 5: Introduction

    802.11b devices. When the card connects to 11b devices, the link speed will be up to 11Mbps. The WL-3565 supports specific ways to increase the data transfer rate at a time: compress the data and decrease the waiting time to send the next data to the Routers or APs. This feature is called Turbo Mode.
  • Page 6: Package Contents

    1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items: 1 x WL-3565 1 x Driver and User's manual CD 1 x Quick Installation Guide If any of the above items is missing, contact your supplier as soon as possible.
  • Page 7: Installation Procedure

    Note2: If you have installed other Wireless PC Card driver & utility before, please uninstall them first. 1. Plug the WL-3565 into the PCMCIA slot of the computer. When the “Found New Hardware Wizard” appears, click “Cancel”. 2. Insert the bundled CD into the CD-ROM drive to launch the autorun program. Once completed, a menu screen will appear.
  • Page 8 7. You can see the installation progress in this screen. 8. The system will automatically detect the card and display “Found New Hardware Wizard” screen. Click “Install the Software Automatically” to continue.
  • Page 9 9. When the “Hardware Installation” screen appears, click “Continue Anyway” to proceed. 10. Click “Finish” to complete “Found New Hardware Wizard”. 11. Click “Finish” to complete “PLANET WL-3565 Setup”.
  • Page 10: Configuration Utility

    3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the WL-3565 and monitor the link status and the statistics during the communication process. When the WL-3565 is installed, the configuration utility will be displayed automatically. This card will auto connect to wireless device which has better signal strength and no wireless security setting.
  • Page 11: Site Survey

    Site Survey When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the networks nearby will be listed. You can change the connection to another networks or add one of the networks to your own profile list.
  • Page 12 Parameter Description Profiles List The profiles list display all the profiles and the relative settings of the profiles including Profile Name, SSID, Channel, etc. This sign indicates the activated profile is been connecting. This sign indicates the activated profile is not been connecting.
  • Page 13: Configure The Profile

    WLAN. The ID prevents the unintentional merging of two co-located WLANs. You may specify a SSID for the WL-3565 and then only the device with the same SSID can interconnect to the card. If you want to...
  • Page 14 802.11 Access Point. All communication is done via the Access Point or Router. Ad-Hoc – Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through Access Point or Router. X Power you want to lower the transmit power of the card for saving the power of the system, you can select the lower percentages from the list.
  • Page 15: Authentication And Security

    Minor change is recommended. hannel his setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to. .2.1.2 Authentication and Security Paramete Description Authentication Type...
  • Page 16 WPA – WPA provides a scheme of mutual authentication using either IEEE 802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key (PSK) technology. It provides high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks.
  • Page 17: 802.1X Setting-Certification

    AES – AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802.11i for the security in the wireless network. ote: All devices in the network should use the same encryption method to ensure the communication.
  • Page 18 IEEE 802.1x RADIUS RADIUS Access Client Client Server Access Point Windows 2000 IAS (Internet Authentication Service) (1) Client requests to login the (3) Send username, password to network. RADIUS server. (4) Approve or deny user (2) Login with username, login to the LAN. password.
  • Page 19 EAP-TLS/Smart card and Generic Token Card. The client certificate is optional required for the authentication. TLS/Smart Card –TLS is the most secure of the EAP protocols but not easy to use. It requires that digital certificates be exchanged in the authentication phase. The server presents a certificate to the client.
  • Page 20: 802.1X Setting-Ca Server

    3.2.1.4 802.1x Setting-CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS, TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify the server, you have to enable this function.
  • Page 21: Link Status

    blueberry.zeelans.com) but it may be any name used in the certificate name field. Link Status From the “Link Status” option, you can view all the information of the network you are connecting to. Parameter Description Status Display the SSID and MAC ID of the network the card is connecting to.
  • Page 22: Statistics

    If you want to know the signal strength in the unit of dBm, select this check box. Signal Strength This bar shows the signal strength level. The higher percentage shown in the bar, the more radio signal been received by the card. This indicator helps to find the proper position of the wireless device for quality network operation.
  • Page 23: Advance

    Advance This option enables you to configure more advanced settings, for example: wireless mode, protection mode and etc. Parameter Description Wireless Mode 802.11 B/G mix – If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended to setting the card to this mode.
  • Page 24 B/G Protection If you have a mix of 802.11b and 802.11g wireless stations in the network, it is recommended to enable the protection mechanism. This mechanism can decrease the rate of data collision between 802.11b and 802.11g wireless stations. When the protection mode is enabled, the throughput of the card will be a little lower due to many of frame traffic should be transmitted.
  • Page 25 CCX 2.0 CCX 2.0 (Cisco Compatible Extensions) is developed by Cisco for the radio monitoring and fast roaming. LEAP Turn on CCKM During normal operation, LEAP-enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication, including communication with the main RADIUS server.
  • Page 26: About

    When the WL-3565 is connected to the AP or Router with WMM function, you can enable the function of the card by following the steps below.
  • Page 27 B. Right Click the “Wireless Network Connection” and select “Properties”. C. Click “Configure…”.
  • Page 28: Advanced Settings

    D. Select “Advanced” page, enable the “WMM Capable”. Advanced Settings The WL-3565 provides more advanced parameters in Windows Device Manager. You can find the Advanced configuration following the step A to D in section 3.7. Please check below to know the function of the settings.
  • Page 29 Using different MAC address if wanted. This MAC address will not Local Administration MAC... write to EEPROM. It is only used in run time. Network Type Selecting Infrastructure or AdHoc mode. Power Saving Mode Selecting different power mode. Radio On/Off RF switching.
  • Page 30: Troubleshooting

    4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. What is the IEEE 802.11g standard? 802.11g is the new IEEE standard for high-speed wireless LAN communications that provides for up to 54 Mbps data rate in the 2.4 GHz band. 802.11g is quickly becoming the next mainstream wireless LAN technology for the home, office and public networks.
  • Page 31 6. What is BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .11 standard.
  • Page 32 13. What is Spread Spectrum Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in reliable, secure, mission-critical communication systems. It is designed to trade off bandwidth efficiency for reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband transmission, but the trade off produces a signal that is, in effect, louder and thus easier to detect, provided that the receiver knows the parameters of the spread-spectrum signal being broadcast.

Table of Contents