LevelOne WNC-0300 User Manual

LevelOne WNC-0300 User Manual

54mbps wireless pci adapter
Hide thumbs Also See for WNC-0300:

Advertisement

Quick Links

LevelOne
WNC-0300
54Mbps Wireless PCI Adapter
User's Manual
Version 1.0

Advertisement

Table of Contents
loading

Summary of Contents for LevelOne WNC-0300

  • Page 1 LevelOne WNC-0300 54Mbps Wireless PCI Adapter User’s Manual Version 1.0...
  • Page 2: Fcc Radiation Exposure Statement

    Manufacturer's Disclaimer Statement The information in this document is subject to change without notice and does not represent a commitment on the part of the vendor. No warranty or representation, either expressed or implied, is made with respect to the quality, accuracy or fitness for any particular purpose of this document.
  • Page 3: Table Of Contents

    ETTING NFRASTRUCTURE ETWORK PC C ........9 NSTALLING IRELESS ETWORK Installation and Setup ................9 Installation and Setup............... 11 CONFIGURING LEVELONE WNC-0300 WIRELESS PCI ADAPTER....13 ..................13 ................14 ONFIGURATION ..................16 ECURITY ..................17 URVEY ................... 19 BOUT APPENDIX A: TROUBLESHOOTING ............20 APPENDIX B: NETWORKING BASIS ............25...
  • Page 4 TLS Authentication – Download Digital Certificate from Server ....45 MD5 Authentication ................51 .......... 54 UTHENTICATOR IRELESS ETWORK CCESS OINT 2000 S ............55 ADIUS ERVER INDOW ERVER For TLS Authentication Setup (Steps 34 ~ 38) ........66 For MD5 Authentication (Steps 39 ~ 54) ..........69 APPENDIX D: GLOSSARY ................74 APPENDIX E: TECHNICAL SPECIFICATION ..........79...
  • Page 5: Introduction

    IEEE 802.11b or g(draft), that the corresponding wireless networking device is using. LevelOne WNC-0300 Wireless PCI Adapter offers unbeatable performance of data rates up to 54 Mbps for 802.11g(draft) and 11 Mbps for 802.11b, while maintaining wide range of area coverage.
  • Page 6: System Requirements

    System Requirements Windows 98, 98SE, Millennium Edition (ME), 2000 and XP operating systems ♦ PC with Pentium III 600MHz system or above is recommended ♦ Equipped with at least one PCI slot. ♦ One CD-ROM drive ♦...
  • Page 7: Getting Started

    GETTING STARTED Getting Know LevelOne WNC-0300 54Mbps Wireless PCI Adapter The LED indicators Power LED ♦ The LED will be ON when the unit is powered up. The LED will be Blinking indicates a WLAN connection. Setting Up The Wireless Network There two wireless network topologies for you setting up your wireless card.
  • Page 8: Setting Up Infrastructure Network

    The idea of Ad-Hoc Network is rather simple. All the wireless station are set to use the same BSS ID and channel to establish communication linkage with each other to form a point-to-point network for data transmission and reception. Setting Up Infrastructure Network In order to setup an Infrastructure of a wireless network such as the example shown above, you will need the following: 1.
  • Page 9: Installation And Setup

    Installing Your LevelOne WNC-0300 Installation and Setup Before insert PCI Adapter into the PCI slot of your computer, please install the Utility Program first. Make sure that the 54Mbps Wireless Network PCI Adapter inserted into the Cardb us slot. Turn on the computer.
  • Page 10 InstallShield Wizard starts. Click “Next” to continue. Click “Next” to install the program files in the default folder.
  • Page 11: Installation And Setup

    Select the second option, and click “Finish” to complete the installation. NOW. 1. Turn off your computer, and remove the power cord from your PC. 2. Open up the cover of your PC. 3. Remove the PCI slot cover from PC case. 4.
  • Page 12 Click “Continue Anyway” to continue Click “Finish” to complete new hardware installation. After successful installation, a utility program icon will appear on your desktop screen. To launch the utility, simply double-click the icon.
  • Page 13: Configuring Levelone Wnc-0300 Wireless Pci Adapter

    TxRate: Shows the current data rate used for transmitting. Channel: Shows the current channel for communication. Link Quality: Shows the link quality of the LevelOne WNC-0300 54Mbps wireless PCI Adapter with the Access Point when operating under Infrastructure mode. Signal Strength: Shows the wireless signal strength of the connection between the 54Mbps wireless network PCI Adapter with the Access Point.
  • Page 14: Configuration Page

    Configuration Page This is the page where you can change the basic settings of the Access Point with the minimum amount of effort to implement a secure wireless network environment. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network.
  • Page 15 Power Mode: There are 3 modes to choose from Continuous Access Mode (default) – the PCI Adapter is constantly operating with full power and it consumes the most power Maximum Power Save – the PCI Adapter consumes the least power and only operates when there is wireless network activity.
  • Page 16: Security Page

    Security Page This is the page where you configure Security settings of your LevelOne WMC-0300 54Mbps wireless PCI Adapter. Encryption: Select Enable or Disable data encryption feature. Aut. Mode: There are three modes available to choose from. Open Authentication – the sender and receiver do not share secret Key for communication.
  • Page 17: Sitesurvey Page

    SiteSurvey Page This page allows you to enable the SiteSurvey function to scan for the available wireless network (wireless clients and Access Points) and establish wireless communications with one. Available Network – displays the wireless networks (wireless clients and Access Points) that are in your signal range. Select any one of them to establish communications by simply mouse double-click or click on the “Connect”...
  • Page 18 Click “Add” to add a profile, and the following screen would appear. All the detail information about each settings and configuration item are described in previous Configuration and Security Page sessions. Please refer to those two sessions for more information. When you finish enter the setting for this profile, click “OK”...
  • Page 19: About Page

    About Page This page displays some information about the 54Mpbs PCI Adapter utility, which includes the version numbers for Driver, Firmware and Utility. When there is new version of software available for upgrade, you will be able to identify by version numbers.
  • Page 20: Appendix A: Troubleshooting

    APPENDIX A: TROUBLESHOOTING This chapter provides solutions to frequently encountered problems that can occur during the installation and operation of LevelOne WNC-0300 54Mbps Wireless PCI Adapter. Please read through the following to solve your problems. The wireless clients cannot access the network in the infrastructure mode.
  • Page 21 Go to “Hardware” Click “Device Manager”...
  • Page 22 Right-click on the wireless network adapter. Select “Properties” Check and make sure that the network adapter is working properly...
  • Page 23 What is the difference between 54Mbps and 11Mbps wireless products? What’s the benefit of 54Mbps Wireless Access Point? The 54Mbps is made possible by the new modulation method called OFDM, which is different from the current CCK modulation method for 11Mbps. The 54Mbps wireless products also operate in the 2.4GHz ISM band and they are backward compatible with 11Mbps wireless products.
  • Page 24 What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. The 2.4GHz unlicensed ISM band is available worldwide, which presents the opportunity for the global market of 802.11b high speed wireless products. Could I implement the driver/utility installations on another operating system, e.g.
  • Page 25: Appendix B: Networking Basis

    APPENDIX B: NETWORKING BASIS This chapter will help you learn the basics of home networking. Using the Windows XP Network Setup Wizard Go to Start menu > Control Panel > Network onnections In the menu on the l side of the window, select “Set up a home or small o...
  • Page 26 Select the option that best describes how you connect your computer to the Internet. In the case of using router in the network, choose the second opti Click “Next” to continue. 1. Enter a short description for your computer. 2. Enter a name for your computer to be recognized among the network.
  • Page 27 Enter “Workgroup name” for your home network. Click “Next” to continue” Click “Next” and wait for the wizard to apply the settings.
  • Page 28 You may create a network setup disk which saves you the trouble of having to configure every PCs in your network. Select the first choice, and insert a floppy disk into your disk drive Click “Next” to continue.
  • Page 29 Click “Format Disk” if you wish to format the disk. Click “Next” to copy the necessary files to the disk. Click “Next” to continue with the Network Setup Wizard...
  • Page 30 NOTE: Now you may use the Network Setup Disk you just created in any PCs in your network that you wish to setup. Simply insert the Network Setup Disk into the disk drive of a PC, and open to browse the content of the disk with “My Computer” or “Windows File Manager”.
  • Page 31: Checking Ip Address Of Your Computer In Windows Xp

    Checking IP Address of Your Computer in Windows Sometimes you will need to know the IP address of the computer that you are using. For example, when you want to make sure that your computer is in the same network domain as that of your Access Point for you can configure and access the Go to Start menu >...
  • Page 32 If the IP address is assigned by DHCP server on the network, there are chances you might have to release the IP and acquire it from DHCP server again. Here is how you do it. Go to Start menu > Run >...
  • Page 33: Dynamic Ip Address V.s. Static Ip Address

    Dynamic IP Address V.S. Static IP Address By definition Dynamic IP addresses are the IP addresses that are being automatically assigned to a network device on the network. These dynamically assigned IP addresses will expire and may be changed over time. Static IP addresses are the IP addresses that users manually enter for each of the network adapters.
  • Page 34: Dynamically Assigned Ip Address

    Dynamically Assigned IP Address The TCP/IP Properties window appears. Select “Obtain an IP address automatically” if you are on a DHCP enabled network. Click “OK” to close the window with the changes made Static IP Address Select “Use the following IP address”...
  • Page 35: Wireless Network In Windows 2000

    NOTE: The IP address must be within the same range as the wireless route or Access Point. Wireless Network in Windows 2000 Go to Start menu > Settings > Network and Dial-up Connections > Double-click on 54Mbps High Speed Wireless Network Adapter the Local Area Connection Select “Internet Protocol (TCP/IP)”...
  • Page 36: Wireless Network In Windows 98 And Windows Me

    Select “Use the following IP address” Enter the IP address and subnet mask fields. Enter the IP address of the Router in the Default gateway field. Enter the IP address of the Router in the DNS server field Wireless Network In Windows 98 and Windows ME Go to Start menu >...
  • Page 37 The TCP/IP Properties window appears. Select “Obtain an IP address automatically” if you are on a DHCP enabled network. Click “OK” to close the window with the changes made Select “Specify an IP address” Enter the IP address and subnet mask fields. In the DNS Configuration Tab Page, (1) enter the IP address of the Router in the Default...
  • Page 38: Appendix C: 802.1X Authentication Setup

    APPENDIX C: 802.1x Authentication Setup There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2) Authenticator and (3) Server. The 802.1x security supports both MD5 and TLS Extensive Authentication Protocol (EAP). The 802.1x Authentication is a complement to the current WEP encryption used in wireless network. The current security weakness of WEP encryption is that there is no key management and no limitation for the duration of key lifetime.
  • Page 39 MD5 authentication is simply a validation of existing user account and password that is stored in the server with what are keyed in by the user. Therefore, wireless client user will be prompted for account/password validation every time when he/she is trying to get connected.
  • Page 40: Network Pci Adapter

    Supplicant: LevelOne WNC-0300 54Mbps Wireless PCI Adapter Here is the setup for LevelOne WNC-0300 Wireless PCI Adapter under Windows XP, which is the only Operating System that our driver supports for 802.1x. Microsoft is planning on supporting 802.1x security in all common Windows Operating System including Win98SE/ME/2000 by releasing Service Pack in 2003.
  • Page 41 Click on the “Wireless Network” tab. 54Mbps High Speed Network Adapter...
  • Page 42 Click “Properties” of the available wireless network, which you wish to connect or configure. Please note that if you are going to change to a different 802.1x authentication EAP method, i.e. switch from using MD5 to TLS, , you must remove the current existing wireless network from your Preferred networks first, and add it in again.
  • Page 43: Tls Authentication

    TLS Authentication Select “The key is provided for me automatically” option Click “OK” to close the Wireless Network Properties window.
  • Page 44 Click “Authentication” tab 10. Select “Enable network access control using IEEE 802.1x” option to enable 802.1x authentication. 11. Select “Smart Card or other Certificate” from the drop-down list box for EAP type. 12. Click “OK” to close the Wireless Network Connection Properties window, thus make the changes effective.
  • Page 45: Tls Authentication - Download Digital Certificate From Server

    TLS Authentication – Download Digital Certificate from Server In most corporations, it requires internal IT or MIS staff’s help to have the certificated downloaded to your local computer. One of the main reasons is that each corporation uses its own server systems, and you will need the assistance from your IT or MIS for account/password, CA server location and etc.
  • Page 46 16. Now we are connected to the Certificate Service. Select “Request a certificate”, and click “Next” to continue. 17. Select “User Certificate request”, and click “Next” to continue.
  • Page 47 18. Click “Submit >” to continue. 19. The Certificate Service is now processing the certificate request.
  • Page 48 20. The certificate is issued by the server, click “Install this certificate” to download and store the certificate to your local computer. 21. Click “Yes” to store the certificate to your local computer.
  • Page 49 22. Certificate is now installed. All the configuration and certificate download are now complete. Let’s try to connect to the Access Point using 802.1x TLS Authentication. 23. Windows XP will prompt you to select a certificate for wireless network connection. Click on the network connection icon in the system tray to continue.
  • Page 50 24. Select the certificate that was issued by the server (WirelessCA), and click “OK” to continue. 25. Check the server to make sure that it’s the server that issues certificate, and click “OK” to complete the authentication process.
  • Page 51: Md5 Authentication

    MD5 Authentication 26. Select “Data encryption (WEP enabled)” option, but leave other option unselected. 27. Select the key format that you want to use to key in your Network key. ASCII characters: 0~9, a~z and A~Z HEX characters: 0~9, a~f 28.
  • Page 52 30. Click “OK” to close the Wireless Network Properties window, thus make the changes effective. 31. Select “Authentication” tab. 32. Select “Enable network access control using IEEE 802.1X” to enable 802.1x authentication. 33. Select “MD-5 Challenge” from the drop-down list box for EAP type. 34.
  • Page 53 Unlike TLS, which uses digital certificate for validation, the MD-5 Authentication is based on the user account/password. Therefore, you must have a valid account used by the server for validation. 35. WindowsXP will prompt you to enter your user name and password. Click on the network connection icon in the system tray to continue.
  • Page 54: Authenticator: Wireless Network Access Point

    Authenticator: Wireless Network Access Point This is the web page configuration in the Access Point that we use. 1. Enable 802.1x security by selecting “Enable”. 2. If MD5 EAP methods is used then you can skip step 3 and go to step 4. 3.
  • Page 55: Radius Server: Window2000 Server

    Radius Server: Window2000 Server This section to help those who has Windows 2000 Server installed and wants to setup Windows2000 Server for 802.1x authentication, which includes setting up Certificate Service for TLS Authentication, and enable EAP-methods. 1. Login into your Windows 2000 Server as Administrator, or account that has Administrator authority.
  • Page 56 5. Select “Enterprise root CA”, and click “Next” to continue. 6. Enter the information that you want for your Certificate Service, and click “Next” to continue.
  • Page 57 7. Go to Start > Program > Administrative Tools > Certificate Authority 8. Right-click on the “Policy Setting”, select “new” 9. Select “Certificate to Issue” 10. Select “Authenticated Session” and “Smartcard Logon” by holding down to the Ctrl key, and click “OK” to continue.
  • Page 58 11. Go to Start > Program > Administrative Tools > Active Directory Users and Computers. 12. Right-click on domain, and select ”Properties” to continue. 13. Select “Group Policy” tab and click “Properties” to continue.
  • Page 59 14. Go to “Computer Configuration” > “Security Settings” > “Public Key Policies” 15. Right-click “Automatic Certificate Request Setting”, and select “New” 16. Click “Automatic Certificate Request ...”...
  • Page 60 17. The Automatic Certificate Request Setup Wizard will guide you through the Automatic Certificate Request setup, simply click “Next” through to the last step. 18. Click “Finish” to complete the Automatic Certificate Request Setup 19. Go to Start > Run, and type “command” and click “Enter” to open Command Prompt.
  • Page 61 Adding Internet Authentication Service 21. Go to Start > Control Panel > Add or Remove Programs 22. Select “Add/Remove Windows Components” from the panel on the left. 23. Select “Internet Authentication Service”, and click “OK” to install.
  • Page 62 Setting Internet Authentication Service 24. Go to Start > Program > Administrative Tools > Internet Authentication Service 25. Right-click “Client”, and select “New Client” 26. Enter the IP address of the Access Point in the Client address text field, a memorable name for the Access Point in the Client-Vendor text field, the access password used by the Access Point in the Shared secret text field.
  • Page 63 27. Click “Finish” to complete adding of the Access Point. 28. In the Internet Authentication Service, right-click “Remote Access Policies” 29. Select “New Remote Access Policy”.
  • Page 64 30. Select “Day-And-Time-Restriction”, and click “Add” to continue. 31. Unless you want to specify the active duration for 802.1x authentication, click “OK” to accept to have 802.1x authentication enabled at all times.
  • Page 65 32. Select “Grant remote access permission”, and click “Next” to continue. 33. Click “Edit Profile” to open up...
  • Page 66: For Tls Authentication Setup (Steps 34 ~ 38)

    For TLS Authentication Setup (Steps 34 ~ 38) 34. Select “Authentication” Tab 35. Enable “Extensible Authentication Protocol”, and select “Smart Card or other Certificate” for TLS authentication...
  • Page 67 36. Go to Start > Program > Administrative Tools > Active Directory Users and Computers 37. Select “Users”, and double-click on the user that can be newly created or currently existing, who will be configured to have the rights to obtain digital ertificate remotely.
  • Page 68 38. Go to the “Dial-in” tab, and check “Allow access” option for Remote Access Permission and “No Callback” for Callback Options.
  • Page 69: For Md5 Authentication (Steps 39 ~ 54)

    For MD5 Authentication (Steps 39 ~ 54) Go to Start > Program > Administrative Tools > Activ e Directory Users and omputers. 40. Right-click on the domain, and select “Properties” 41. Select “Group Policy” tab, and click “Edit” to edit the Group Policy.
  • Page 70 42. Go to “Computer Configuration” > “Windows Settings” > “Security Settings” > “Account Policies” > “Password Policies” 43. Click “Define this policy setting”, select “Enabled”, and click “OK” to continue.
  • Page 71 44. Go to Start > Program > Administrative Tools > Active Directory Users and Computers. 45. Go to Users. Right-click on the user that you are granting access, and select “Properties” 46. Go to “Account” tab, and enable “Store password using reversible encryption”...
  • Page 72 48. Go to Start > Program > Administrative Tools > Internet Authentication Service. 49. Go to Remote Access Policies 50. Make sure that MD5 is moved up to Order 1 51. Right-click “MD5”, and select “Properties”...
  • Page 73 52. Go to “Authentication” tab 53. Enable “Extensible Authentication Protocol” 54. Select “MD5-Challenge” for EAP type list.
  • Page 74: Appendix D: Glossary

    APPENDIX D: GLOSSARY Access Point ― An internetworking device that se amlessly connects wired and wireless networks. Ad- oc ― An independent wireless LAN network formed by a group of computers, each with an network adapter. AP Client – One of the additional AP operating modes offered by 54Mbps Access Poin , which allows the Access Point to act as an Ethernet-to-Wireless Bridge, thus a LAN or a single computer station can join a wireless ESS network through it.
  • Page 75 Browser ― An application program that enables one to read the content and interact in the World Wide Web or Intranet. BSS ― BSS stands for “Basic Service Set”. It is an Access Point and all the LAN PCs that associated with it. Channel ―...
  • Page 76 Encryption ― A security method that uses a specific algorithm to alter the data transmitted, thus prevent others from knowing the information transmitted. ESS ― ESS stands for “Extended Service Set”. More than one BSS is configured to become Extended Servic e Set.
  • Page 77 ISM Band ― The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4GHz, in particular, is being made available worldwide. MAC Address ―...
  • Page 78 RTS Threshold ― Transmitters contending for the medium may not be aware of each other. RTS/CTS mechanism can solve this “Hidden Node Problem”. If the packet size is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled. SSID ―...
  • Page 79: Appendix E: Technical Specification

    APPENDIX E: TECHNICAL SPECIFICATION Item Specification Standards Wireless: IEEE 802.11b, 802.11g (draft), PCI Standard ♦ v2.2 Data Rate 802.11g (draft): Up to 54Mbps (6/9/12/18/24/36/48/54) ♦ 802.11b: Up to 11Mbps (1/2/5.5/11) ♦ Emission Type Direct Sequence Spread Spectrum (DSSS) ♦ Data BPSK, QPSK, CCK and OFDM (BPSK/QPSK/16-QAM ♦...
  • Page 80 Interface PCI Standard v2.2 ♦ Power Voltage 5 Volt + 5% ♦ Power 802.11g (draft): TX 650mA, RX 450mA, Standby 20mA ♦ Consumption 802.11b: TX 600mA, RX 350mA, Standby 20mA ♦ * Design and specifications are subject to change without notice.

Table of Contents