Edimax EW-7722UTn V2 User Manual
Edimax EW-7722UTn V2 User Manual

Edimax EW-7722UTn V2 User Manual

Wireless network card
Hide thumbs Also See for EW-7722UTn V2:

Advertisement

Quick Links

EW-7722UTn V2
EW-7612UAn V2
User Manual
10-2011 / v1.0

Advertisement

Table of Contents
loading

Summary of Contents for Edimax EW-7722UTn V2

  • Page 1 EW-7722UTn V2 EW-7612UAn V2 User Manual 10-2011 / v1.0...
  • Page 2 Copyright by Edimax Technology Co, LTD. all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this Company .
  • Page 3 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 4 R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
  • Page 5: Table Of Contents

    CONTENTS INTRODUCTION ..................1 1.1 Features ......................1 1.2 Specifications ....................1 1.3 Package Contents ..................2 INSTALLATION PROCEDURE ..............3 CONFIGURATION UTILITY ..............17 3.1 Utility Overview ..................... 18 3.2 Available Network ..................20 3.3 General ......................21 3.4 Profile ......................23 3.4.1 Configure the Profile .............
  • Page 6: Introduction

    1 Introduction Thank you for purchasing this high-speed wireless network card! Excepting common wireless standards 802.11b/g, this wireless network card is also able to access 802.11n wireless networks - data transfer rate is 300Mbps! For WLAN security issues, this adapter supports 64/128-bit WEP data encryption that protects your wireless network from eavesdropping.
  • Page 7: Package Contents

    1.3 Package Contents Before you begin the installation, please check the items of your package. The package should include the following items:  One USB Adapter (EW-7722UTn V2 / EW-7612UAn V2)  One USB Cable  One CD (Utility / Multi-Language QIG / User‟s Manual) ...
  • Page 8: Installation Procedure

    (Procedures are similar for Windows Vista/7.) Note2: If you have installed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Hardware Installation EW-7722UTn V2 1. Link/Activity LED (Under the case) 2. WPS Button LED Name...
  • Page 9 EW-7612UAn V2 1. USB connector 2. Link/Activity LED (Under the case) 3. WPS Button LED Name Light Status Description Link/ No wireless network card is installed. Activity Solid light 5 seconds means WPS connection is established successfully. Blinking Wireless network card is normally installed /Linked to a wireless access point / Transferring or receiving data.
  • Page 10 Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on . EW-7722UTn V2 EW-7612UAn V2 Never use force to insert the card, if you feel it’s stuck, flip the card over...
  • Page 11 The following message will appear on your computer, click „Cancel‟ Software Installation This wizard can be run in Windows XP/Vista/7. You can install the Wireless Adapter by EZMAX Setup Wizard in the CD-ROM including in the package. The wizard is an easy and quick configuration tool for internet connection with series process.
  • Page 12 Install the Driver and Utility If you prefer the traditional setup procedure. Please insert the installation CD to your CD-ROM Drive, and click “ Exit “ to disable EZmax Wizard. If your OS is Windows Vista/7. Please execute the “ Utility \ Setup.exe “ program as follows.
  • Page 13 Click “Next” to go to the next step.
  • Page 14 Now you‟ll see the following message, please click „Install‟ to begin the installation. The system starts to install the driver and utility. Click “Finish” to complete the driver and utility installation.
  • Page 15 II. Connect to Wireless Access Point To start configuring the adapter, double click the icon in the system tray or right click the icon and select open configuration utility. The utility of the adapter is displayed. Click “Available Network” and double-click on the wireless access point you want to connect to.
  • Page 16 NOTE: Network security type (‘Network Authentication’ and ‘Data encryption’) will be selected automatically based on wireless access point’s security setting. It’s not required to change these settings by yourself. Input the security setting (WEP key) and click “OK” to start network connection. All options in this page will be filled automatically according to the access point you wish to add to profile.
  • Page 17 hoc connection. Network Select the network authentication type from Authentication drop-down menu. This setting must be identical with the setting of wireless access point you with to connect. Data encryption Select the data encryption type from drop-down menu. This setting must be identical with the setting of wireless access point you with to connect.
  • Page 18 NOTE: If you connected to an access point but the connection has been dropped soon, please check security settings and re-check password spelling.
  • Page 19 * Use Windows Zero Configuration on Windows Vista: For Windows Vista user, you can use Windows Zero Configuration to connect to wireless access point. Click „Start‟ button, then click „Control Panel. Click „Network and Internet‟ in Control Panel. Click „Connect to a network‟ under „Network and Sharing Center‟...
  • Page 20 Click the access point you want to use if it‟s shown, then click „Connect‟. If it‟s an unnamed access point (i.e. the SSID of this wireless access point is hidden), you‟ll be prompted to input it‟s name, and the name must be identical to the SSID setting of the wireless access point you‟re connecting to.
  • Page 21 If the access point is protected by encryption method, you have to input its security or passphrase here. It must match the encryption setting on the access point. If you can see this image, the connection between your computer and wireless access point is successfully established.
  • Page 22: Configuration Utility

    3 Configuration Utility The Configuration Utility is a powerful application that helps you configure the Wireless LAN Mini USB Adapter and monitor the link status and the statistics during the communication process. The Configuration Utility appears as an icon on the system tray and desktop of Windows.
  • Page 23: Utility Overview

    Utility Overview There are several parts in the utility screen. Please refer to the following table for the description. Parameter Description Refresh – Refresh adapter list in the “B“ block. Mode – There are two modes: Station and Access Point. If “Station“ is selected, the adapter works as a wireless adapter.
  • Page 24 Windows XP Zero Configuration, check the item. Radio Off – This function is for you to turn off or turn on the radio of the adapter. If the radio is turned off, the adapter will not work. It is the status bar that displays the current status of the utility.
  • Page 25: Available Network

    Available Network When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wireless network with the highest signal strength. From the “Available Network”...
  • Page 26: General

    General To check the connection status of the adapter, select “General“. This screen shows the information of Link Speed, Network Type, Encryption Method, SSID, Signal Strength, Link Quality and Network Address of the adapter. Parameter Description Status It will show the connection status of the adapter. Speed It shows the current speed Infrastructure –...
  • Page 27 connection including None, WEP, TKIP or AES. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Signal Strength It indicates the wireless signal strength. Link Quality It indicates the wireless link quality.
  • Page 28: Profile

    Profile The “Profiles List” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile. Parameter Description Available Profile(s) This list shows the preferred networks for the wireless connection. You can add, remove, edit, duplicate the preferred networks or set one of the networks as the default connection.
  • Page 29: Configure The Profile

    3.4.1 Configure the Profile Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks ( Access Point ). Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs.
  • Page 30 or Router. If this item is selected, the adapter will work in Ad Hoc mode. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to.
  • Page 31 WPA2 802.1X – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required to the corporate user or government users. The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES.
  • Page 32 computers within the network. When you select the “WEP and “PASSPHRASE“ and Key Length this function will display in the current status of the utility. The keys are used to encrypt data transmitted in the wireless network. Fill the text box by following the rules below.
  • Page 33 including CHAP, MSCHAP, MSCHAPv2 and PAP. PEAP specifies that an EAP-compliant authentication protocol must be used; this adaptor supports MD5, TLS, GTC (Generic Token Card) and MSCHAPv2. The client certificate is optional required for the authentication. Tunnel Includes MD5, GTC, TLS, MSCHAP-v2. Username The certificate username in the RADIUS server.
  • Page 34: Status

    Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you don‟t ensure the status of the adapter and the network you are connecting, please go to the screen for more details.
  • Page 35: Statistics

    Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want to recount the statistics value, please click “Reset“.
  • Page 36: Wi-Fi Protect Setup (Wps)

    Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wireless network technology which makes wireless network setup become very simple. If you have WPS-enabled wireless access point, and you want to establish a secure connection to it, you don‟t have to configure the wireless access point and setup data encryption by yourself.
  • Page 37 3. If you click „Yes‟, and the following message will appear on your computer, please select the SSID of wireless access point that you wish to connect and click „Select‟. 4. Please wait while the install procedure is running and wait for few seconds to two minutes.
  • Page 38 Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point‟s manufacturer), then click „PBC‟ button in wireless configuration utility to start to establish wireless connection by WPS. Please be patient (This may require several seconds to one minute to complete).
  • Page 39 2. When the connection between this wireless network card and access point is successfully established by WPS, and the information about access point you connected to will be displayed.
  • Page 40: Software Ap

    Software AP Excepting become a wireless client of other wireless access points, this wireless card can act as a wireless service provider also! You can switch this wireless card‟s operating mode to „AP‟ mode to simulate the function of a real wireless access point by software, and all other computers and wireless devices can connect to your computer wirelessly, even share the internet connection you have!
  • Page 41 Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the AP is Full Computer Name + “_AP“.
  • Page 42: Ap Properties Setting

    3.8.1 AP Properties Setting To configure software AP, please click “ Config” button.
  • Page 43 Please note that Ad-Hoc mode is not available when network card is in AP mode. The description of major setup items are listed below: Network Name (SSID) Please input the SSID (the name used to identify this wireless access point) here. Up to 32 numerical characters can be accepted here, excepting space.
  • Page 44 menu. If the encryption method is WEP, check either „ASCII‟ ASCII / PASSPHRASE or „PASSPHRASE‟ box and input it in the box as WEP passphrase. Select WEP key index (1-4). If you don‟t know which Key Index one you should use, select 1. Network key / Confirm IF network authentication mode is WPA, please input network key...
  • Page 45: Ap Advanced

    3.8.2 AP Advanced If you want to setup advanced settings of software access point, select „Advanced‟ menu. If you don‟t know the meaning and affects of these settings, keep them untouched. Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packets (milliseconds).
  • Page 46: Ap Statistics

    3.8.3 AP Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want to recount the statistics value, please click “Reset“.
  • Page 47: Softap

    3.8.4 In this page, you can assign a network card on your computer as the path for all wireless clients to get connected to Internet. If you have only one network card (except this software access point), you don‟t have to select network card here;...
  • Page 48: Troubleshooting

    4 Troubleshooting & Glossary This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. If you encounter any problem when you‟re using this wireless network card, don‟t panic! Before you call your dealer of purchase for help, please check this troubleshooting table, the solution of your problem could be very simple, and you can solve the problem by yourself! Scenario...
  • Page 49 he / she can add the MAC address of your network card to his / her access point‟s list. The network is slow / 1. Move closer to the place where access point is having problem when located. transferring large files 2.
  • Page 50 4. What is Ad-hoc? An Ad-hoc integrated wireless LAN is a group of computers, each has a Wireless LAN adapter, Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation.
  • Page 51 12. What is DSSS?What is FHSS?And what are their differences? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel. To an unintended receiver, FHSS appears to be short-duration impulse noise.
  • Page 52 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 53 Romania, Slovakia, Slovenia, the Netherlands, Portugal, Spain, Sweden, and the United Kingdom. The ETSI version of this device is also authorized for use in EFTA member states: Iceland, Liechtenstein, Norway, and Switzerland. EU Countries not intended for use None Please check the declaration of conformity on www.edimax.com...

This manual is also suitable for:

Ew-7612uan v2

Table of Contents