Intellinet 503457 User Manual

Intellinet 503457 User Manual

Wireless g usb adapter
Hide thumbs Also See for 503457:

Advertisement

Quick Links

Wireless G

UsB AdApter

User mAnUAl

Model 503457
INT-503457-UM-1207-01

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 503457 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Intellinet 503457

  • Page 1: Usb Adapter

    Wireless G UsB AdApter User mAnUAl Model 503457 INT-503457-UM-1207-01...
  • Page 3 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS ™ Wireless G USB Adapter, Model 503457. Compatible with 802.11b and 802.11g wireless access points and routers, this adapter lets you upgrade your wireless network without the need to replace existing equipment. Transfer or receive digital images, videos and MP3 files with link speeds of up to 54 Mbps using proven and reliable Wireless G technology.
  • Page 4 CAUTION: Any changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference;...
  • Page 5: Table Of Contents

    tABle of contents section page Installation ..................6 Configuration ..................7 Site Survey...................9 Profile ....................10 Profile Configuration ............. 11 Profile Authentication & Security .......... 12 802.1x Setting/Certification ........... 16 802.1x Setting/CA Server ............17 Link Status ................. 18 Statistics ..................19 Advanced ................... 20 QoS ....................
  • Page 6: Installation

    instAllAtion Prior to connecting the Wireless G USB Adapter: • Uninstall any previously loaded versions of the driver and utility. • Install the software program from the CD. NOTE: The following Windows XP procedure is similar for Windows 98SE/Me/2000/2003/Vista. 1. Insert the setup CD in the CD-ROM drive and run the setup program. 2.
  • Page 7: Configuration

    5. Once the software installation begins, a Setup Status screen is followed by a prompt to connect the Wireless G USB Adapter to your computer. The system automatically detects the adapter. NOTE: In Windows Vista, a Found New Hardware screen appears (as shown) when the adapter is connected.
  • Page 8 The configuration utility appears as an icon in the Windows system tray while the adapter is running. You can open it by double-clicking on the icon. In Windows XP, there is a “Windows Zero Configuration Tool” option for setting up wireless clients. If you prefer to use the configuration utility, there are two ways to switch to it instead of using the Windows tool.
  • Page 9: Site Survey

    3. Uncheck “Use Windows to configure my wireless network settings” to enable the utility for the adapter. NOTE: If “Wireless Zero Configuration Tool” is enabled, you can only configure the advanced settings or check the link status and statistics from the configuration utility of the adapter.
  • Page 10: Profile

    Available Networks: This list shows all available wireless networks within the range of the adapter. It also displays network information: SSID, BSSID, Signal Strength, Channel, Encryption, Authentication and Network Type. To connect to a network on the list, double-click the item and the adapter will connect automatically to it.
  • Page 11: Profile Configuration

    roFile onFiguration Profile Name: Define easily recognizable profile names to identify the different networks. SSiD: The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. If you specify an SSID for the adapter, then only the device with the same SSID can interconnect to the adapter.
  • Page 12: Profile Authentication & Security

    802.11 access point. All communication is done via the AP or router. • Ad-Hoc: Select this mode to connect to another wireless station in the wireless LAN network without using an access point or router. tx Power: To lower the transmit power of the adapter to reduce the power used by the system, select a lower percentage from the drop-down menu.
  • Page 13 vendors to implement this protocol, so it should be selected for use only when a limited vendor choice for client, access point and server products is not a concern. When you’ve set up LEAP authentication, you need to enter the username and password of your computer. •...
  • Page 14 don’t have the matching password from joining the network, while encrypting the data traveling between authorized devices. • WPA2: Like WPA, WPA2 supports IEEE 802.1x/EAP authentication, or PSK, technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES). AES is required for corporate or government users.
  • Page 15: 802.1X Setting/Ca Server

    all the wireless stations in the network. WeP Key (Key#1–4): WEP keys are used to encrypt data transmitted in the wireless network. There are two types of key length: 64-bit and 128-bit. Assign a default encryption key (Key#1 to Key#4) by clicking on the corresponding radio button.
  • Page 16: 802.1X Setting/Certification

    802.1 etting ertiFiCation Authentication type: The EAP authentication protocols supported by this adapter require that settings be consistent with the wireless access points or routers that the adapter is intended to connect. • PeAP & ttlS: These protocols are similar and easier to use than TLS (below) in that they specify a stand-alone authentication protocol to be used within an encrypted tunnel.
  • Page 17 Session resumption: The drop-down menu options are “Disabled,” “Reauthentication,” “Roaming,” “Same SSID” and “Always.” identity/Password: Enter the password as the identity for the server. use Client certificate: A client certificate is required for TLS, but is optional for TTLS and PEAP. This forces a client certificate to be selected from the appropriate Windows Certificate Store and made available to the RADIUS server for certification.
  • Page 18: Link Status

    use certificate chain: When the Extensible Authentication Protocol (EAP) authentication type — such as TLS, TTLS or PEAP — is selected and requires certification to tell the client what credentials to accept from the authentication server in order to verify the server, you need to enable this function.
  • Page 19: Statistics

    transmitted (Tx) and received (Rx). link Quality: This status bar indicates the quality of the link. The higher the percentage, the better the quality. dBm: To display the signal strength measured in dBm (decibels in milliwatts), click this box. Signal Strength: This bar shows the signal strength level. The higher the percentage being shown in the bar, the more radio signal being received by the adapter.
  • Page 20: Advanced

    ADvANCeD This screen enables you to configure more advanced settings, such as the wireless mode and the protection mode. Wireless Mode: Select from the drop-down menu. • 802.11 B/G mix: If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended that the adapter be set to this mode.
  • Page 21 • B/G Mixed: If you have a mix of 802.11b and 802.11g wireless stations in your network, it is recommended that the adapter be set to this mode. This mode is also the default setting. • only G: Though the adapter is compatible with both 802.11g and 802.11b wireless stations, if there are only 802.11g wireless stations in the network, you can set the adapter to this mode.
  • Page 22 tx rate: There are several options in the drop-down menu: “Auto” and a range of speeds from “1 Mbps” to “54 Mbps.” When “Auto” is selected, the device automatically chooses the most suitable transmission rate. The higher the data rate designated in the network, the shorter the distance allowed between the adapter and the wireless stations.
  • Page 23: Qos

    enable radio Measurement: When this parameter is enabled, the Cisco AP can run the radio monitoring through the associated CCX-compliant clients to continuously monitor the WLAN radio environment and discover any new APs that are transmitting beacons. Non-Serving Channel Measurements: The Cisco access point can perform monitoring measurements through the CCX-compliant clients on the non-serving channels when this parameter is enabled.
  • Page 24: About

    click “Setting” to further configure the function as “AC_BK,” “AC_BE,” “AC_VI” or “AC_VO.” • Direct link Setup enable: Click the check box to enable, then click “Apply” to further configure the function (all within the Direct Link panel). - MAC Address: Specify the MAC address of the client adapter you want to direct link to and click “Apply”...
  • Page 25: Wps Configuration

    data and decreasing the wait time for sending data to routers or access points. Turbo Mode is enabled automatically without any configuration. WPS CoNfiGurAtioN The adapter supports WPS (Wi-Fi Protected Setup), allowing connection to wireless APs without complicated procedures. Two WPS configuration methods are available: PBC (push-button configuration) and PIN.
  • Page 26: Softap

    PiN Code: The WPS PIN Code of this network adapter is required for connection. SSiD (lower panel): The service set identifier of the connected WPS- enabled access point. MAC Address: The MAC address of connected WPS-enabled AP. Authentication (lower panel): The authentication type of connected WPS-enabled access point.
  • Page 27 MAC Table Wireless Mode: Selects the wireless mode supported by the AP. • 802.11 B/G Mixed: The AP works in 11b+g mixed mode. • 802.11 B only: The AP works in 11b mode. • 802.11 G only: The AP works in 11g mode. tx rate: There are several options in the drop-down menu: “Auto”...
  • Page 28 SSiD: The SSID (up to 32 printable ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. The default SSID of the AP is “SoftAP-X.” (“X” is the last number of this adapter’s MAC address).
  • Page 29: Authentication Vs. Security

    No forwarding among wireless clients: Enable to prevent wireless clients connected to this AP from sharing information with each other. Hide SSiD: When this box is checked, the AP will not appear in the site survey list of any wireless clients, meaning only the wireless clients set with the same SSID can connect to the AP.
  • Page 30 Authentication type: Four types of authentication mode are supported and presented in the drop-down menu. • open: No authentication is needed within the wireless network. • WPA-PSK: This is a special mode designed for home and small business users who do not have access to network authentication servers.
  • Page 31: Access Control

    • 64-bit: Input 10-digit hex values (in the A-F, a-f and 0-9 range) or 5-digit ASCII characters (a-z and 0-9) as the encryption keys. For example: “0123456aef“ or “test1.” • 128-bit: Input 26-digit hex values (in the A-F, a-f and 0-9 range) or 13-digit ASCII characters (“a-z”...
  • Page 32: Mac Table

    Access list: Displays all the MAC address that have been added. • Add: Add the MAC address to the access list. • Delete: Delete the selected MAC address from the access list. • remove All: Remove all MAC addresses from the access list. Apply: Click to apply the setting change(s).
  • Page 33: Statistics

    StAtIStIcS This screen displays the transmit and receive statistical information of the AP. Click “Reset Counters” to clear the data. MAC Table ABout This screen displays basic information about the utility, including the MAC address. MAC Table...
  • Page 34: Specifications

    specificAtions General • Standards: IEEE 802.11b, IEEE 802.11g, 2.4 GHz • Interface: Hi-Speed USB 2.0 • Chipset: Ralink RT2571 (RT73) • Frequency band: 2.4000 – 2.4835 GHz (Industrial Scientific Medical Band) • Modulation: OFDM with BPSK, QPSK, 16QAM, 64QAM (11g) BPSK, QPSK, CCK (11b) •...
  • Page 36 INTellINeT NeTWoRK SolUTIoNS offers a complete line ™ of active and passive networking products. Ask your local computer dealer for more information or visit www.intellinet-network.com Copyright © INTELLINET NETWORK SOLUTIONS All products mentioned are trademarks or registered trademarks of their respective owners.

Table of Contents