Range Master WiFi King User Manual

802.11n long-range usb wifi antena

Advertisement

Quick Links

802.11n Long-Range
USB WiFi Antenna
User Manual
Version: 2.0
Version: 2.0
iii

Advertisement

Table of Contents
loading

Summary of Contents for Range Master WiFi King

  • Page 1 802.11n Long-Range USB WiFi Antenna User Manual Version: 2.0 Version: 2.0...
  • Page 2: Table Of Contents

    TABLE OF CONTENTS OVERVIEW ............1 ....................1 NPACKING NFORMATION WiFi King W USB A ..........1 NTRODUCTION TO THE IRELESS DAPTER ....................... . 2 EATURES INSTALLATION GUIDE ........2 ....................2 OFTWARE NSTALLATION MANAGEMENT GUIDE.........5 ................5 AKING A ASIC ETWORK ONNECTION Select a configuration tool ..................
  • Page 3: Overview

    Overview Thank you for purchasing this product. Read this chapter to learn about your Range Master WiFi King 802.11n Wireless USB Adapter. Unpacking Information Before getting started, please verify that your package includes the following items: WiFi King Wireless USB Adapter.
  • Page 4: Key Features

    Key Features Complies with IEEE 802.11n wireless standards Supports wireless data encryption with 64/128-bit WEP, WPA, WPA2, TKIP, AES 2.4GHz frequency band, MIMO Supports QoS: WMM, WMM-PS Complies with USB 2.0 Supports multiple BSSID High speed transfer data rate up to 150 Mbps Supports driver for Windows 2000, XP 32/64, Vista 32/64, Windows 7, Linux (2.4.x/2.6.x), and Supports auto-installation...
  • Page 5 3. Select if you are going to install the driver and wireless utility; or install the driver only. 4. Select if you are going to configure your wireless network with this device or with Microsoft Zero Configuration tool. Note: This can be changed after installing this software. Version: 2.0...
  • Page 6 5. Click the Install button to start installing. 6. Click the Finish button to complete installation. Version: 2.0...
  • Page 7: Management Guide

    Management Guide Read this chapter to understand the management interface of the device and how to manage the device. Making a Basic Network Connection Select a configuration tool In the following instructions for making a network connection, we use the utility we provide to configure your wireless network settings.
  • Page 8 The tool shows the available wireless networks. Select the network you want to connect to. To connect to a wireless network with more security settings, please click Change advanced settings and configure to be compatible with your wireless network security settings. Version: 2.0...
  • Page 9: To Connect With 802.11N Wireless Lan Utility

    To connect with 802.11n Wireless LAN Utility We provide this utility for users to connect to a wireless network easily. It provides more information and configuration for this adapter. As default, the utility is started automatically upon starting your computer and connects to a connectable wireless network with best signal strength icon in the system ray and select Launch and with no security setting.
  • Page 10: Introduction To The 802.11N Wireless Lan Utility

    Introduction to the 802.11n Wireless LAN Utility Note: The Utility in Linux and Mac are different from the following. Interfaces This utility basically consists of three parts: 1. Function Buttons: on top of the window. You can click each button to access each configuration window.
  • Page 11: Link Status Information

    Link Status Information Network Information: Items Information Show the connecting status. Also shows the SSID while connecting to a Status valid network. Extra Info Display link status in use. Channel Display current channel in use. Authentication Authentication mode in use. Encryption Encryption type in use.
  • Page 12: Profile

    Profile The profile page allows users to save different wireless settings, which helps users to get access to wireless networks at home, office or other wireless network environments quickly. Profile List: The list shows all the profiles you have added before. Buttons: You can click on these buttons to add a new profile, edit, delete or activate an old profile.
  • Page 13 To add a new profile: 1. Click the Add button. The add profile window pops up. Note: you could also add a new profile quickly by selecting an available network in the Network function then click the Add to Profile button. ←...
  • Page 14 3. In section, fill in information for this profile: Items Information Profile Name Choose a name for this profile, or use default name defined by system. Fill in the intended SSID name or use the drop list to select from SSID available APs.
  • Page 15 4. In section, select an encryption type and fill in the corresponding wireless network information: Items Information For Windows 2000 User There are 7 types supported: Open, Shared, LEAP, WPA, WPA-PSK, WPA2, Authentication WPA2-PSK, and WPA-NONE . Please select a type from the drop down list. Type For Vista User There are 7 types supported: Open, Shared, WPA, WPA-PSK, WPA2, WPA2-PSK,...
  • Page 16 This checkbox appears while the environment is set to an Open authentication with WEP encryption. Mark the checkbox to make the section Use 802.1x available. The section is also available in WPA and WPA2 authentication types. This is the shared secret between AP and STA. For WPA-PSK, WPA2-PSK and WPA-NONE authentication mode, this field must be filled with characters longer than 8 and less than 32 lengths.
  • Page 17 5. Specify the 802.1x information if you are using the 802.1X certification method. Users that do not use this function or connect to an open-wireless network please skip this part. EAP Method: For Windows 2000 User: There are total 5 modes: PEAP, TLS/Smart Card, TTLS, EAP-FAST, and MD5-Challenge.
  • Page 18 Tunnel Authentication: The tunnel authentication will differ from the EAP method you have chosen, the result is shown below: For Windows 2000 User: EAP Method Tunnel Authentication PEAP EAP-MSCHAP v2 , EAP-TLS/Smart Card, Generic Token Card TLS/Smart Card (no selection) TTLS CHP, MS-CHAP, MS-CHAP-V2, PAP, EAP-MD5 EAP-FAST...
  • Page 19 ID \ PASSWORD Items Information Authentication ID / Password The identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication can be keyed in domain name. Blank space can be keyed in domain name. Tunnel ID / Password Identity and Password for server.
  • Page 20 Server Certificate Items Information Use Certificate chain Mark the checkbox to enable using certification chain. Allow intimidate certificates Mark to allow intimidates certification. Server name Enter an authentication sever root. EAP Fast Items Information Allow unauthenticated During the PAC can be provisioned (distributed one time) to provision mode client automatically.
  • Page 21: Network

    Network This network lists the available wireless networks. The utility connects to a wireless network with the best signal strength automatically. You can change the connecting network by clicking on the network name and click the Connect button. To see detail information of each network, please double click on each item to pop up the information window.
  • Page 22: Advanced

    Advanced This page provides advanced configurations to this adapter. Please refer to the following chart for definitions of each item. Items Information Wireless mode Select wireless mode. 2.4G/5.8G is supported. Enable TX Burst Select to enable connecting to a TX Burst supported device. Enable TCP Window Size Mark the checkbox to enable TCP window size, which help enhance throughput.
  • Page 23: Statistics

    Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. This page translates the MIB counters into a format easier for user to understand. Items Information Frames Transmitted Successfully Frames successfully sent. Frames Retransmitted Successfully retransmitted frames numbers. Successfully Frames Fail To Receive ACK After Frames failed transmit after hitting retry limit.
  • Page 24: Wmm

    This page allows users to activate the WMM function for this device. Please note that this function only works while connecting to a WMM compatible device. Items Information WMM Enable Enable Wi-Fi Multi-Media. WMM - Power Save Enable Enable WMM Power Save. Please enable WMM before configuring this function.
  • Page 25 Steps to enable Direct Link Setup function: 1. Click the "Direct Link Setup Enable" checkbox. 2. Change to "Network" function. Add an AP that supports DLS features to the Profile. 3. Fill in the blanks of Direct Link with MAC Address of STA. The STA must conform to these two conditions: Connect with an AP that supports DLS features.
  • Page 26: Wps

    The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. This adapter supports the configuration setup using PIN configuration method or PBC configuration method through an internal or external Registrar. Items Information Display the information of surrounding APs with WPS IE from last scan...
  • Page 27 The following description divides into four parts: A. WPS Information on AP B. Example of Adding to Registrar Using PIN Method C. Example of Adding to Registrar Using PIN Method D. Example of Configuring a Network/AP Using PIN or PBC Method Version: 2.0...
  • Page 28 A. WPS Information on AP: On Network AP list, double click on the AP then you can see the information appears below. Items Information Authentication Type There are three authentication modes supported by this utility. They are open, Shared, WPA-PSK and WPA system. Encryption Type For open and shared authentication mode, the selection of encryption type are None and WEP.
  • Page 29 B. Example of Adding to Registrar Using PIN Method The user obtains a device password (PIN Code) from the STA and enters the password into the Registrar. Both the Enrollee and the Registrar use PIN Config method for the configuration setup. Please follow the step below.
  • Page 30 Click "PIN" to enter the PIN. Enter the PIN Code of the STA into the Registrar when prompted by the Registrar. Note: Allow of an exchange between Step 4 and Step 5. If you use Microsoft Window Connection Now as an External Registrar, you must start PIN connection at STA first.
  • Page 31 Configure one or more credentials. Then connect successfully. Click "Detail." You can see the figure below. C. Example of Adding to the Registrar Using the PBC Method The PBC method requires the user to press a PBC button on both the Enrollee and the Registrar within a two-minute interval called the Walk Time.
  • Page 32 Select "Enrollee" from the Config Mode drop-down list. Click PBC to start the PBC connection. Push the PBC on AP. Note: Allow time for an exchange between Step 2 and Step 3. Version: 2.0...
  • Page 33 The progress bar as shown in the figure below indicates that scanning progress. When one AP is found, join it. Version: 2.0...
  • Page 34 Check WPS Information on the available WPS APs. Configure and receive one or more credential(s).Then connect successfully. The result will be displayed as it is in the figure below. Version: 2.0...
  • Page 35 D. Example of Configuring a Network/AP Using PIN or PBC Method Select "Registrar" from the Config Mode drop-down list. Enter the details of the credential and change configurations (SSID, Authentication, Encryption and Key) manually if needed. If the PIN configuration is setup, enter the PIN sent from the Enrollee. Start PIN or PBC.
  • Page 36 If your AP Enrollee has been configured before the WPS process, the credential you set in advance will be updated to the AP itself. Otherwise, after a successful registration, the AP Enrollee will be re-configured with the new parameters, and the STA Registrar will connect to the AP Enrollee with these new parameters.
  • Page 37: Ccx

    This page is available for Vista user only. It provides CCX configurations to this adapter. Please refer to the following chart for definitions of each item. Items Information Enable CCX (Cisco Compatible Select to enable CCX. This function can only be applied extensions) when connecting to a Cisco compatible device.
  • Page 38: Ap Mode Management Guide For Windows 2000/Xp/Vista

    AP mode management guide for Windows 2000/XP/Vista If you wish to share the Internet access with the wireless stations in your environment, you can configure this wireless adapter as a software access point (Soft AP). In this mode, this wireless adapter becomes the wireless access point that provides local area network and Internet access for your wireless stations.
  • Page 39 Software Access Point (Soft AP) Application Version: 2.0...
  • Page 40: Config

    Config This page provides overall configuration to this adapter. Please find the following items for identification to each field. 1. SSID: AP name of user type. User also can select [Use Mac Address] to display it. 2. Wireless Mode: Select wireless mode. Only 2.4G is supported. Version: 2.0...
  • Page 41 3. Country Region Code: eight countries to choose. Country channel list: Classification Range 0: FCC (Canada) CH1 ~ CH11 1: ETSI CH1 ~ CH13 2: SPAIN CH10 ~ CH11 3: FRANCE CH10 ~ CH13 4: MKK CH14 ~ CH14 5: MKKI (TELEC) CH1 ~ CH14 6: ISRAEL CH3 ~ CH9...
  • Page 42: Security Setting

    Security Setting This page pops up after clicking the Security Setting button. Please follow the instructions below: 1. Authentication Type: Select to be open, shared, WPA-PSK, WPA2-PSK, or WPA PSK/WPA2-PSK system. 2. Encryption Type: Select an encryption type from the drop list. 3.
  • Page 43: Access Control

    Access Control This function filters users to use this device by designating MAC address. Please refer to the following chart for introduction. 1. Access Policy: Choose a method to process access control from the drop list to determine the MAC addresses that you designated are allowed to access the AP or not. 2.
  • Page 44: Mac Table

    MAC Table This page displays the station detail information of current connection. Items Information MAC Address The station MAC address of current connection. Raise value by current connection. Power Saving Check if the connected station supports power Mode saving. Status The connection status.
  • Page 45: Event Log

    Event Log Record Soft AP all event time and message. Items Information Event Time (yy/mm/dd-hh:mm:ss) Record event time. Message All event messages. Version: 2.0...
  • Page 46: Statistics

    Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. 1. Transmit Statistics Items Information Frames Transmitted Successfully Frames that successfully sent. Frames Fail To Receive ACK After Frames that failed to transmit after All Retries hitting retry limit. RTS Frames Successfully Receive Counts that...
  • Page 47 FCC Certifications Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 48 CE Mark Warning This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022 Class B for ITE, the essential protection requirement of Council Directive 89/336/EEC on the approximation of the laws of the Member States relating to electromagnetic compatibility.

Table of Contents