Aztech Wireless N USB Adapter User Manual

Aztech Wireless N USB Adapter User Manual

Hide thumbs Also See for Wireless N USB Adapter:

Advertisement

Wireless N USB Adapter

Advertisement

Table of Contents
loading

Summary of Contents for Aztech Wireless N USB Adapter

  • Page 1 Wireless N USB Adapter...
  • Page 2 User Manual 2007 © All rights reserved. Version 1.0 No part of this document may be reproduced, republished, or retransmitted in any form or by any means whatsoever, whether electronically or mechanically, including, but not limited to, by way of photocopying, recording, information recording, or through retrieval systems without the express written permission.
  • Page 3: Table Of Contents

    User Manual Contents About the Product ...................... 4 System Requirements ................. 4 LED Indicators ....................5 Getting Started......................5 Check Package Contents................6 Using the USB Extension ..................6 Remove or Disable Conflicts ................ 6 Internet Sharing, Proxy, and Security Applications..........7 Configuring Internet Properties ................7 Removing Temporary Internet Files ................7 Installation .........................
  • Page 4: About The Product

    User Manual About the Product WL950USB provides wireless connectivity to desktop and notebook computers. The device performs the function of a radio broadcaster and receiver to communicate with a wireless network. This gives the computer connected with WL950USB the capability to communicate with other devices and use the Internet service available in the wireless network.
  • Page 5: Led Indicators

    User Manual LED Indicators The LED lights up when the device is connected to a wireless network. The LED flickers when the device is scanning for all available networks or transmitting/receiving data. Getting Started Setting up the device is easy. The flowchart below provides an outline of the steps needed to complete the installation.
  • Page 6: Check Package Contents

    User Manual Check Package Contents Make sure that you have the following items. If any of the items is damaged or missing, please contact your dealer immediately. WL950USB Utility USB 2.0 Adaptor Easy Start Guide Resource CD – contains WL950 Utility installer, Easy Start Guide, and User Manual USB Extension Using the USB Extension The USB Extension helps you place the device to a more prominent location and to...
  • Page 7: Internet Sharing, Proxy, And Security Applications

    User Manual Internet Sharing, Proxy, and Security Applications Internet sharing, proxy software, and firewall applications may interfere with the installation. These should be removed or disabled before start the installation. If you have any of the following or similar applications installed on your computer, remove or disable them according to the manufacturer’s instructions.
  • Page 8: Installation

    User Manual Installation Here are the instructions on how to install the driver software and connect to the wireless network. For Windows Vista Note: Do not connect the device until the Utility is not completely installed. To install the driver software: 1.
  • Page 9: For Windows Xp/2000

    User Manual confirm the Network key, and then click OK. The System tray icon changes to any of the following: • - You have a good or excellent connection to a wireless network • - You have a usable but weak connection to a wireless network •...
  • Page 10: Driver Only Installation

    User Manual To connect to a wireless network: 1. When you complete the installation, a new icon appears in the System tray - Double-click this icon to open WL950USB Utility. 2. Click Site Survey. 3. Select an ESSID and then click Join. The Privacy Configuration dialog box opens when a Network key is required from the selected ESSID.
  • Page 11: About Wl950Usb Utility

    Windows 2000, XP, or Vista. To connect to a wireless network: 1. Connect Wireless N USB adapter to a USB port. 2. When your device is detected, a new icon appears in the System tray Double-click this icon to open WL950USB Utility.
  • Page 12 User Manual Profile A Profile is a name identifier to wireless network connections that have been saved. Profiles are created to relieve your from reentering the wireless network settings every time you want to connect to a wireless network. Configuration SSID Represents the name of the wireless network.
  • Page 13: Advanced Configuration

    User Manual Advanced Configuration The Utility provides advanced configuration options that allow you specify the wireless protocol to be used, enable power saving mode, enable RTS Threshold, and Fragmentation Threshold. Note: Advanced configuration is only enabled for Windows 2000 and XP. Advanced Configuration options include: Wireless Mode Allows you to specify the wireless protocol Power Save Designed to conserve computer battery life.
  • Page 14: Security Enable (Privacy Configuration)

    User Manual Security Enable (Privacy Configuration) Security is applied to wireless networks to ensure integrity and limit unauthorized access within the network. To open Security Enable (Privacy Configuration), check Security Enable, and then click Config. This opens Privacy Configuration which has the Security and Certification tabs.
  • Page 15 User Manual Note: All the security settings you provide must be similar to the security settings defined from the wireless access point. Privacy Authentication Mode Authentication modes include: • Open, Shared, WPA-PSK, WPA, WPA2-PSK, and WPA2 Encryption Mode Encryption modes include: •...
  • Page 16: Wireless Lan Security Overview

    User Manual Wireless LAN Security Overview Wireless LAN security is vital to your network to protect wireless communications against hacker entering your system and prevent unauthorized wireless station from accessing data transmitted over the network; the WL950USB Utility offers a sophisticated security algorithm.
  • Page 17 User Manual key is set up exactly the same on the Wireless LAN stations as they are on the wireless Access Points. For 64bit encryption you may choose: • Alphanumeric 5 characters entering (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (e.g. MyKey). •...
  • Page 18 User Manual WPA (2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 is a wireless security standard that defines stronger encryption, authentication and key management than WPA. WPA: Allows you to gain access to a more secured wireless network that requires mutual authentication between client and access point with a Radius authentication server or other authentication server on the network.
  • Page 19 User Manual WPA-PSK: WPA offers a Personal mode of operation. In the Personal mode of operation, a pre-shared key is used for authentication. WPA-PSK allows you to gain access to a secured wireless network that the station and the access point use the same pre-shared key to authenticate.
  • Page 20 User Manual WPA2: WPA2 provides a stronger encryption mechanism than WPA. WPA2 is the second generation of WPA security, providing personal and enterprise users with a high level of assurance that only authorized users can access to their wireless network. There is no difference between WPA and WPA2.
  • Page 21 User Manual WPA2-PSK: Like WPA, WPA2-Personal offers authentication via a pre-shared key. Pre- shared key is usually used for Personal authentication. Personal mode requires only an access point and client on the network. Similarly, you need to type a mixture of numbers and letters in the Pre-shared key section of this menu.
  • Page 22 User Manual Encryption Mode WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1X. WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP.
  • Page 23 User Manual IEEE 802.1X Authentication WPA and WPA2 apply IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4 way handshake) and shortens the time required to connect to a network.
  • Page 24 User Manual TLS is used to create a secure tunnel through which authentication and encryption keys can be passed and require server and client side keys. To save the information you entered in the appropriate field, click the OK button. Otherwise, click the Cancel button to close the menu.
  • Page 25 User Manual LEAP: Clicking the Certification tab for LEAP shows the following menu. LEAP requires the mutual authentication between station and access points. You must present a User Name and Password in the User Information field that will be verified by LEAP-capable server.
  • Page 26: Authentication Type

    User Manual Authentication Type The IEEE 802.11b/g standard describes a simple authentication method between the wireless stations and AP. Two authentication types are defined: Open system mode and a Shared key mode. • Open system mode is implemented for ease-of-use and when security is not an issue.
  • Page 27: Site Survey Tab

    User Manual Site Survey Tab Site Survey displays the available wireless networks you can connect to. To connect to a wireless network, select the ESSID and then click the Join. Click Rescan to rescan the network. Site Survey displays the following information: •...
  • Page 28: About Tab

    User Manual About Tab The About tab displays the version of the Configuration Utility, Network Driver, Network Firmware, the device MAC Address, and Frequency Domain. Page 28 of 29...
  • Page 29: Safety Warnings

    User Manual Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. Do not open the device. Opening or removing the device can expose you to dangerous voltage points or other risks. Only qualified service personnel can service the device.

Table of Contents