Repotec RP-WU5204 User Manual

Ieee 802.11n wireless series long-range usb adapter

Advertisement

Quick Links

IEEE 802.11n Wireless Series
Long-Range USB Adapter
User Manual
Version: 2.0
Date: January 13, 2009

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the RP-WU5204 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Repotec RP-WU5204

  • Page 1 IEEE 802.11n Wireless Series Long-Range USB Adapter User Manual Version: 2.0 Date: January 13, 2009...
  • Page 2 FCC Certifications Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 3: Ce Mark Warning

    CE Mark Warning This equipment complies with the requirements relating to electromagnetic compatibility, EN 55022 Class B for ITE, the essential protection requirement of Council Directive 89/336/EEC on the approximation of the laws of the Member States relating to electromagnetic compatibility. Company has an on-going policy of upgrading its products and it may be possible that information in this document is not up-to-date.
  • Page 4: Table Of Contents

    TABLE OF CONTENTS OVERVIEW ............1 ....................1 NPACKING NFORMATION IEEE 802.11 USB A ........1 NTRODUCTION TO THE IRELESS DAPTER ........................ 2 EATURES INSTALLATION GUIDE ........2 ....................2 OFTWARE NSTALLATION MANAGEMENT GUIDE ........5 ................5 AKING A ASIC ETWORK ONNECTION...
  • Page 5: Overview

    Overview Thank you for purchasing this product. Read this chapter to know about your IEEE 802.11n Wireless USB Adapter. Unpacking Information Before getting started, please verify that your package includes the following items: IEEE 802.11n Wireless USB Adapter. One Utility/ Manual CD. Introduction to the IEEE 802.11n Wireless USB Adapter The IEEE 802.11n Wireless USB adapter provides users to launch IEEE 802.11n wireless network at 150 Mbps in the 2.4GHz band, which is also compatible with IEEE 802.11b/g wireless devices...
  • Page 6: Key Features

    Key Features Complies with IEEE 802.11n wireless standards Supports wireless data encryption with   64/128-bit WEP, WPA, WPA2, TKIP, AES 2.4GHz frequency band, MIMO Supports QoS: WMM, WMM-PS   Complies with USB 2.0 Supports multiple BSSID   High speed transfer data rate up to 150 Mbps Supports driver for Windows 2000, XP 32/64, ...
  • Page 7 3. Select if you are going to install the driver and wireless utility; or install the driver only. 4. Select if you are going to configure your wireless network with this device or with Microsoft Zero Configuration tool. Note: This can be changed after installing this software. January 13, 2009 / Version: 2.0...
  • Page 8 5. Click the Install button to start installing. 6. Click the Finish button to complete installation. January 13, 2009 / Version: 2.0...
  • Page 9: Management Guide

    Management Guide Read this chapter to understand the management interface of the device and how to manage the device. Making a Basic Network Connection Select a configuration tool In the following instruction for making a network connection, we use the Utility we provide to configure your wireless network settings.
  • Page 10 The tool shows the available wireless networks. Select your demanding network to connect with. To connect to a wireless network with more security settings, please click Change advanced settings to be compatible with your wireless network security settings. January 13, 2009 / Version: 2.0...
  • Page 11: To Connect With 802.11N Wireless Lan Utility

    To connect with 802.11n Wireless LAN Utility We provide this Utility for users to connect to a wireless network easily. It provides more information and configuration for this adapter. As default, the Utility is started automatically upon starting your computer and connects to a connectable wireless network with best signal strength icon in the system ray and select Launch and with no security setting.
  • Page 12: Introduction To The 802.11N Wireless Lan Utility

    Introduction to the 802.11n Wireless LAN Utility Note: The Utility in Linux and Mac are different from the following. Interfaces This Utility is basically consisted of three parts: 1. Functional Buttons: on top of the window. You can click each button to access each configuration window.
  • Page 13: Link Status Information

    Link Status Information Network Information: Items Information Show the connecting status. Also shows the SSID while connecting to a Status valid network. Extra Info Display link status in use. Channel Display current channel in use. Authentication Authentication mode in use. Encryption Encryption type in use.
  • Page 14: Profile

    Profile This profile page allows users to save different wireless settings, which helps users to get access to wireless networks at home, office or other wireless network environments quickly. Profile List: The list shows all the profiles you have added before. Buttons: You can click on these buttons to add a new profile, edit, delete or activate an old profile.
  • Page 15 To add a new profile: 1. Click the Add button. The add profile window pops up. Note: you could also add a new profile quickly by selecting an available network in the Network function then click the Add to Profile button. ←...
  • Page 16 3. In section, fill in information for this profile: Items Information Profile Name Choose a name for this profile, or use default name defined by system. Fill in the intended SSID name or use the drop list to select from SSID available APs.
  • Page 17 4. In section, select an encryption type and fill in the corresponding wireless network information: Items Information For Windows 2000 User There are 7 types supported: Open, Shared, LEAP, WPA, WPA-PSK, WPA2, Authentication WPA2-PSK, and WPA-NONE . Please select a type from the drop down list. Type For Vista User There are 7 types supported: Open, Shared, WPA, WPA-PSK, WPA2, WPA2-PSK,...
  • Page 18 This checkbox appears while the environment is set to an Open authentication with WEP encryption. Mark the checkbox to make the section Use 802.1x available. The section is also available in WPA and WPA2 authentication types. This is the shared secret between AP and STA. For WPA-PSK, WPA2-PSK and WPA-NONE authentication mode, this field must be filled with characters longer than 8 and less than 32 lengths.
  • Page 19 5. Specify the 802.1x information if you are using the 802.1X certification method. Users that do not use this function or connecting to an open-wireless network please skip this part. EAP Method: For Windows 2000 User: There are total 5 modes: PEAP, TLS/Smart Card, TTLS, EAP-FAST, and MD5-Challenge.
  • Page 20 Tunnel Authentication: The tunnel authentication will differ from the EAP method you have chosen, the result is shown below: For Windows 2000 User: EAP Method Tunnel Authentication PEAP EAP-MSCHAP v2 , EAP-TLS/Smart Card, Generic Token Card TLS/Smart Card (no selection) TTLS CHP, MS-CHAP, MS-CHAP-V2, PAP, EAP-MD5 EAP-FAST...
  • Page 21 ID \ PASSWORD Items Information Authentication ID / Password The identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication can be keyed in domain name. Blank space can be keyed in domain name. Tunnel ID / Password Identity and Password for server.
  • Page 22 Server Certificate Items Information Use Certificate chain Mark the checkbox to enable using certification chain. Allow intimidate certificates Mark to allow intimidates certification. Server name Enter an authentication sever root. EAP Fast Items Information Allow unauthenticated During the PAC can be provisioned (distributed one time) to provision mode client automatically.
  • Page 23: Network

    Network This network lists the available wireless networks. The Utility connects to a wireless network with best signal strength automatically. You can change the connecting network by clicking on the network name and click the Connect button. To see detail information of each network, please double click on each item to pop up the information window.
  • Page 24: Advanced

    Advanced This page provides advanced configurations to this adapter. Please refer to the following chart for definitions of each item. Items Information Wireless mode Select wireless mode. 2.4G is supported. Enable TX Burst Select to enable connecting to a TX Burst supported device. Enable TCP Window Size Mark the checkbox to enable TCP window size, which help enhance throughput.
  • Page 25 Items Information Frames Transmitted Successfully Frames successfully sent. Frames Retransmitted Successfully retransmitted frames numbers. Successfully Frames Fail To Receive ACK After Frames failed transmit after hitting retry limit. All Retries RTS Frames Successfully Receive Successfully receive CTS after sending RTS frame. RTS Frames Fail To Receive CTS Failed to receive CTS after sending RTS.
  • Page 26: Wmm

    This page allows users to activate the WMM function for this device. Please note that this function only works while connecting to a WMM compatible device. Items Information WMM Enable Enable Wi-Fi Multi-Media. WMM - Power Save Enable Enable WMM Power Save. Please enable WMM before configuring this function.
  • Page 27 Steps to enable Direct Link Setup function: 1. Click the "Direct Link Setup Enable" checkbox. 2. Change to "Network" function. Add an AP that supports DLS features to the Profile. 3. Fill in the blanks of Direct Link with MAC Address of STA. The STA must conform to these two conditions: Connect with an AP that supports DLS features.
  • Page 28: Wps

    The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. This adapter supports the configuration setup using PIN configuration method or PBC configuration method through an internal or external Registrar. Items Information WPS AP List...
  • Page 29 The following description divides into four parts: A. WPS Information on AP B. Example of Adding to Registrar Using PIN Method C. Example of Adding to Registrar Using PIN Method D. Example of Configuring a Network/AP Using PIN or PBC Method January 13, 2009 / Version: 2.0...
  • Page 30 A. WPS Information on AP: On Network AP list, double click on the AP then you can see the information appears below. Items Information Authentication Type There are three authentication modes supported by this utility. They are open, Shared, WPA-PSK and WPA system. Encryption Type For open and shared authentication mode, the selection of encryption type are None and WEP.
  • Page 31 B. Example of Adding to Registrar Using PIN Method The user obtains a device password (PIN Code) from the STA and enters the password into the Registrar. Both the Enrollee and the Registrar use PIN Config method for the configuration setup. Please follow the step below.
  • Page 32 Click "PIN" to enter the PIN. Enter the PIN Code of the STA into the Registrar when prompted by the Registrar. Note: Allow of an exchange between Step 4 and Step 5.  If you use Microsoft Window Connection Now as an External Registrar, you must start ...
  • Page 33 Configure one or more credentials. Then connect successfully. Click "Detail." You can see the figure below. C. Example of Adding to the Registrar Using the PBC Method The PBC method requires the user to press a PBC button on both the Enrollee and the Registrar within a two-minute interval called the Walk Time.
  • Page 34 Select "Enrollee" from the Config Mode drop-down list. Click PBC to start the PBC connection. Push the PBC on AP. Note: Allow time for an exchange between Step 2 and Step 3. January 13, 2009 / Version: 2.0...
  • Page 35 The progress bar as shown in the figure below indicates that scanning progress. When one AP is found, join it. January 13, 2009 / Version: 2.0...
  • Page 36 Check WPS Information on the available WPS APs. Configure and receive one or more credential(s).Then connect successfully. The result will be displayed as it is in the figure below. January 13, 2009 / Version: 2.0...
  • Page 37 D. Example of Configuring a Network/AP Using PIN or PBC Method Select "Registrar" from the Config Mode drop-down list. Enter the details of the credential and change configurations (SSID, Authentication, Encryption and Key) manually if needed. If the PIN configuration is setup, enter the PIN sent from the Enrollee. Start PIN or PBC.
  • Page 38 If your AP Enrollee has been configured before the WPS process, the credential you set in advance will be updated to the AP itself. Otherwise, after a successful registration, the AP Enrollee will be re-configured with the new parameters, and the STA Registrar will connect to the AP Enrollee with these new parameters.
  • Page 39: Ccx

    This page is available for Vista user only. It provides CCX configurations to this adapter. Please refer to the following chart for definitions of each item. Items Information Enable CCX (Cisco Compatible Select to enable CCX. This function can only be applied extensions) when connecting to a Cisco compatible device.
  • Page 40: Ap Mode Management Guide For Windows 2000/Xp/Vista

    AP mode management guide for Windows 2000/XP/Vista If you wish to share the Internet access with the wireless stations in your environment, you can configure this wireless adapter as a software access point (Soft AP). In this mode, this wireless adapter becomes the wireless access point that provides local area network and Internet access for your wireless stations.
  • Page 41 Software Access Point (Soft AP) Application January 13, 2009 / Version: 2.0...
  • Page 42: Config

    Config This page provides overall configuration to this adapter. Please find the following items for identification to each field. 1. SSID: AP name of user type. User also can select [Use Mac Address] to display it. 2. Wireless Mode: Select wireless mode. Only 2.4G is supported. January 13, 2009 / Version: 2.0...
  • Page 43 3. Country Region Code: eight countries to choose. Country channel list: Classification Range 0: FCC (Canada) CH1 ~ CH11 1: ETSI CH1 ~ CH13 2: SPAIN CH10 ~ CH11 3: FRANCE CH10 ~ CH13 4: MKK CH14 ~ CH14 5: MKKI (TELEC) CH1 ~ CH14 6: ISRAEL CH3 ~ CH9...
  • Page 44: Security Setting

    Security Setting This page pops up after clicking the Security Setting button. Please follow the instructions below: 1. Authentication Type: Select to be open, shared, WPA-PSK, WPA2-PSK, or WPA PSK/WPA2-PSK system. 2. Encryption Type: Select an encryption type from the drop list. 3.
  • Page 45: Access Control

    Access Control This function filters users to use this device by designating MAC address. Please refer to the following chart for introduction. 1. Access Policy: Choose a method to process access control from the drop list to determine the MAC addresses that you designated are allowed to access the AP or not. 2.
  • Page 46: Mac Table

    MAC Table This page displays the station detail information of current connection. Items Information MAC Address The station MAC address of current connection. Raise value by current connection. Power Saving Check if the connected station supports power Mode saving. Status The connection status.
  • Page 47: Event Log

    Event Log Record Soft AP all event time and message. Items Information Event Time (yy/mm/dd-hh:mm:ss) Record event time. Message All event messages. January 13, 2009 / Version: 2.0...
  • Page 48: Statistics

    Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. 1. Transmit Statistics Items Information Frames Transmitted Successfully Frames that successfully sent. Frames Fail To Receive ACK After Frames that failed to transmit after All Retries hitting retry limit. RTS Frames Successfully Receive Counts that...

Table of Contents