Intellinet 530361 User Manual

Intellinet 530361 User Manual

Wireless g usb adapter

Advertisement

Wireless G

UsB AdApter

User mAnUAl

Model 530361
INT-530361-UM-0408-01

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 530361 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Intellinet 530361

  • Page 1: Usb Adapter

    Wireless G UsB AdApter User mAnUAl Model 530361 INT-530361-UM-0408-01...
  • Page 3 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS ™ Wireless G USB Adapter, Model 530361. Compatible with 802.11b and 802.11g wireless access points and routers, this adapter lets you upgrade your wireless network without the need to replace existing equipment. Transfer or receive digital images, videos and MP3 files with link speeds of up to 54 Mbps using proven and reliable Wireless G technology.
  • Page 4 CAUTION: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference;...
  • Page 5: Table Of Contents

    tABle of contents section page Installation ..................6 Configuration ..................7 Network ..................9 Profile ....................10 Profile Configuration ............. 12 Profile Authentication & Encryption (Security) ...... 13 802.1x Setting/Certification ........... 16 802.1x Setting/CA Server ............17 Statistics ..................18 Advanced ................... 18 WMM..................21 About..................22 WPS Configuration ..............22 SoftAP ......................24...
  • Page 6: Installation

    instAllAtion Prior to connecting the Wireless G USB Adapter: • Uninstall any previously loaded versions of the driver and utility. • Install the software program from the CD. NOTE: The following Windows XP procedure is similar for Windows 98SE/Me/2000/2003/Vista. 1. Insert the setup CD in the CD-ROM drive and run the setup program. 2.
  • Page 7: Configuration

    5. Once the software installation begins, a Setup Status screen is followed by a prompt to connect the Wireless G USB Adapter to your computer. The system automatically detects the adapter. NOTE: In Windows Vista, a Found New Hardware screen appears (above) when the adapter is connected. You can ignore the message, as it disappears once installation is complete.
  • Page 8 The configuration utility appears as an icon in the Windows system tray while the adapter is running. You can open it by double-clicking on the icon. In Windows XP, there is a “Windows Zero Configuration Tool” option for setting up wireless clients. If you prefer to use the configuration utility, there are two ways to switch to it instead of using the Windows tool.
  • Page 9: Network

    3. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adapter. NOTE: If “Wireless Zero Configuration Tool” is enabled, you can only configure the advanced settings or check the link status and statistics from the configuration utility of the adapter.
  • Page 10: Profile

    Available Networks: This list shows all available wireless networks within the range of the adapter. It also displays network information: SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. To connect to a network on the list, double-click the item and the adapter will connect automatically to it.
  • Page 11 Status: This field displays the SSID and MAC ID of the network the adapter is connecting to. Extra Info: This field displays the link status. Channel: This field displays the number of the radio channel and the frequency used for the networking. Link Speed (Mbps): These fields display the transmission (Tx) and the reception (Rx) rates of the network.
  • Page 12: Profile Configuration

    roFile onFiguration Profile Name: Define easily recognizable profile names to identify the different networks. SSID: The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. If you specify an SSID for the adapter, then only the device with the same SSID can interconnect to the adapter.
  • Page 13: Profile Authentication & Encryption (Security)

    RTS Threshold: This is the minimum packet size required for an RTS (request to send). For packets smaller than this threshold, an RTS is not sent and the packet is transmitted directly to the wireless network. Select a setting within a range of 0 to 2347 bytes. NOTE: A minor change is recommended.
  • Page 14 or pre-shared key (PSK) technology. It provides a high level of assurance to enterprises, small businesses and home users that data will remain protected and that only authorized users may access their networks. For enterprises that have already deployed IEEE 802.1x authentication, WPA offers the advantage of leveraging existing authentication databases and infrastructure.
  • Page 15: 802.1X Setting/Ca Server

    • WEP: Enables the WEP Data Encryption. When the item is selected, you need to continue setting the WEP Encryption keys. • TKIP: The Temporal Key Integrity Protocol changes the temporal key every 10,000 packets (a kind of message transmitted over a network.) This ensures much greater security than the standard WEP security.
  • Page 16: 802.1X Setting/Certification

    IEEE 802.1x RADIUS RADIUS Access Client Client Server IEEE 02.1x Access Client RADIUS Client RADIUS Server Access Point Windows 2000 IAS (Internet Authentication 1 Client requests to log in to the network  Username and password sent to RADIUS server 2 Log in with username and password  User login to the LAN approved or denied Service)
  • Page 17 the authentication phase. The server presents a certificate to the client and, after validating the server’s certificate, the client presents a client certificate to the server for validation. Session Resumption: Click/check the box to activate or de-activate. ID/Password: Enter the password as the identity for the server. Client Certification: A client certificate is required for TLS, but is optional for TTLS and PEAP.
  • Page 18: Statistics

    which contains the issuer’s public key, into the trusted root certification authority certificate store of the host computer. Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority. Server Name: Enter the authentication server name. Server name must match exactly: When selected, the server name must exactly match the server name found on the certificate.
  • Page 19 to this mode. This mode is also the default setting. • 802.11 B only: Though the adapter is compatible with both 802.11g and 802.11b wireless stations, if there are only 802.11b wireless stations in the network, you can set the adapter to this mode. Ad Hoc Wireless Mode: When the adapter is set in Ad Hoc (Peer to Peer) mode, you can designate the wireless connection mode for the Ad Hoc network.
  • Page 20 Tx Rate: There are several options in the drop-down menu: “Auto” and a range of speeds from “1 Mbps” to “54 Mbps.” When “Auto” is selected, the device automatically chooses the most suitable transmission rate. The higher the data rate designated in the network, the shorter the distance allowed between the adapter and the wireless stations.
  • Page 21: Wmm

    authenticates the client so quickly that there is no perceptible delay in voice or other time-sensitive applications. Enable Radio Measurement: When this parameter is enabled, the Cisco AP can run the radio monitoring through the associated CCX-compliant clients to continuously monitor the WLAN radio environment and discover any new APs that are transmitting beacons.
  • Page 22: About

    • Direct Link Setup Enable: Click the check box to enable, then click “Apply” to further configure the function (all within the Direct Link panel). - MAC Address: Specify the MAC address of the client adapter you want to direct link to and click “Apply” to add to the DLS Status table (below).
  • Page 23 in this list. If the list is empty, that means that no WPS-enabled AP is in the range. WPS Probe IE: The Wireless Provisioning Services Information Element (WPS IE) makes it easier to connect to public Wi-Fi networks you’ve not previously connected to. Your computer must have the WPS IE update for Windows XP SP2 installed in order to use the function.
  • Page 24: Softap

    one will be connected; if there’s nothing in the profile, the adapter will connect to any unsecured wireless AP nearby. Delete: Delete the WPS-enabled access point from the list. PIN: To use the PIN-type WPS configuration option, enter the PIN code and then click “PIN.”...
  • Page 25 of this adapter’s MAC address). Wireless adapters connected to the access point should be set up with the same SSID as the AP. Tx Rate: There are several options in the drop-down menu: “Auto” and a range of speeds from “1 Mbps” to “54 Mbps.” When “Auto” is selected, the device automatically chooses the most suitable transmission rate.
  • Page 26: Security Setting

    SECURITY SETTING This screen — accessed by clicking “Security Setting” on the previous SoftAP Configuration screen — lets you to configure the authentication mode and encryption algorithm used within the AP. pre-Shared Key Authentication Type: Four types of authentication mode are supported and presented in the drop-down menu.
  • Page 27 have the matching password from joining the network, while encrypting the data traveling between authorized devices. • WPA2-PSK: This is also for home and small business use. • WPA-PSK/WPA2-PSK: When selecting this mode, the AP supports both WPA-PSK and WPA2-PSK. Encryption Type: Five options are available in the drop-down menu.
  • Page 28: Access Control

    ACCESS CONTROL This screen lets you configure the access control policy used within the access point. MAC Table Access Policy: Select from the drop-down menu. • Disable: Disables the MAC address filtering function. • Allow All: Only wireless adapters with a MAC address on the access list can connect to the AP.
  • Page 29: Mac Table

    MAC TABLE This screen displays details of the wireless adapters connected to the AP. MAC Table MAC Address: The addresses of wireless adapters connected to the AP. AID: The Association ID of the current connection. Power Saving Mode: The supporting status of the power saving mode of the connected wireless adapter.
  • Page 30: Statistics

    STATISTIcS This screen displays the transmit and receive statistical information of the AP. Click “Reset Counters” to clear the data. MAC Table ABOUT This screen displays basic information about the utility, including the MAC address. MAC Table...
  • Page 31: Specifications

    specificAtions General • Standards: IEEE 802.11b, IEEE 802.11g, 2.4 GHz • Interface: Hi-Speed USB 2.0 • Chipset: Ralink RT2571 (RT73) • Frequency band: 2.4000 – 2.4835 GHz (Industrial Scientific Medical Band) • Modulation: OFDM with BPSK, QPSK, 16QAM, 64QAM (11g) BPSK, QPSK, CCK (11b) •...
  • Page 32 INTellINeT NeTWoRK SolUTIoNS offers a complete line ™ of active and passive networking products. Ask your local computer dealer for more information or visit www.intellinet-network.com Copyright © INTELLINET NETWORK SOLUTIONS All products mentioned are trademarks or registered trademarks of their respective owners.

Table of Contents