background image

 

Parameter Description 

Authentication Type 

LEAP

 – LEAP is a pre-EAP, Cisco-proprietary protocol, with many 

of the features of EAP protocols. Cisco controls the ability of other 

vendors to implement this protocol, so it should be selected for 

use only when limited vendor choice for client, access-point, and 

server products is not a concern. When you have set up LEAP 

authentication, you have to enter the user name and password of 

your computer. 

 

WPA – 

WPA provides a scheme of mutual authentication using 

either IEEE 802.1x/Extensible Authentication Protocol (EAP) 

authentication or pre-shared key (PSK) technology. It provides a 

high level of assurance to enterprises, small businesses and 

home users that data will remain protected and that only 

authorized users may access their networks. For enterprises that 

have already deployed IEEE 802.1x authentication, WPA offers 

the advantage of leveraging existing authentication databases 

and infrastructure.   

 

WPA-PSK

 – It is a special mode designed for home and small 

business users who do not have access to network authentication 

servers. In this mode, known as Pre-Shared Key, the user 

manually enters the starting password in their access point or 

gateway, as well as in each wireless stations in the network. 

WPA-PSK takes over automatically from that point, keeping 

unauthorized users that don't have the matching password from 

joining the network, while encrypting the data traveling between 

authorized devices. 

 

WPA2

 – Like WPA, WPA2 supports IEEE 802.1x/EAP 

authentication or PSK technology. It also includes a new 

advanced encryption mechanism using the Advanced Encryption 

Standard (AES). AES is required to the corporate user or 

government users. The difference between WPA and WPA2 is that 

WPA2 provides data encryption via the AES. In contrast, WPA 

uses Temporal Key Integrity Protocol (TKIP). 

 

WPA2-PSK – 

WPA2-PSK is also for home and small business. 

The difference between WPA-PSK and WPA2-PSK is that 

WPA2-PSK provides data encryption via the AES. In contrast, 

WPA-PSK uses Temporal Key Integrity Protocol (TKIP). 

 

 

802.1x Setting 

When you have set the Authentication Type to Open, Shared, 

WPA or WPA2, you can also enable IEEE 802.1x setting to use 

the authentication server or certification server to authenticate 

client users.   

 

                                                                    15                                    AirLive WT-2000USB User’s Manual

 

Summary of Contents for WT-2000USB

Page 1: ...Turbo G Wireless USB Adapter WT 2000USB User s Manual ...

Page 2: ...red trademarks of their respective holders Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio fr...

Page 3: ... with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL of March 9 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R TTE The R TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 Safety This equ...

Page 4: ... Utility 4 3 CONFIGURATION UTILITY 8 3 1 Site Survey 10 3 2 Profile 11 3 2 1Configure the Profile 12 3 2 1 1 Configuration 12 3 2 1 2 Authentication and Security 14 3 2 1 3 802 1x Setting Certification 18 3 2 1 4 802 1x Setting CA Server 19 3 3 Link Status 20 3 4 Statistics 22 3 5 Advance 22 3 6 About 25 3 7 Turbo Mode 25 3 8 WMM Function 26 4 TROUBLESHOOTING 28 ...

Page 5: ...uired to authorize before accessing to APs or AP Routers and the data transmitted in the network is encrypted decrypted by a dynamically changed secret key Furthermore this card supports WPA2 function WPA2 provides a stronger encryption mechanism through AES Advanced Encryption Standard which is a requirement for some corporate and government users When you use the devices such as Voice over Inter...

Page 6: ...z Frequency Band 2 4000 2 4835GHz Industrial Scientific Medical Band z Modulation OFDM with BPSK QPSK 16QAM 64QAM 11g z BPSK QPSK CCK 11b z Data Rate 54 48 36 24 18 12 11 9 6 5 5 2 1Mbps auto fallback z Security 64 128 bit WEP Data Encryption WPA TKIP with IEEE 802 1x WPA2 AES with IEEE 802 1x z Note WPA2 is enabled in Windows 2000 XP z Antenna Internal Antenna z Drivers Windows 98SE Me 2000 XP z ...

Page 7: ...One USB 2 0 Extension Cable 100 cm z One CD Driver Utility User s Manual z One Quick Guide If any of the above items is missing contact your supplier as soon as possible 3 AirLive WT 2000USB User s Manual ...

Page 8: ...Turbo Wireless LAN USB Adaptor driver utility before please uninstall the old version first I Install the Hardware A Turn off your computer and remove its cover B Insert the PCI card to an available PCI slot firmly C Secure this card to the rear of the computer chassis and put back the cover D Secure the antenna to the antenna connector of the card E Turn on the computer II Install the Driver and ...

Page 9: ... is a Windows Zero Configuration Tool for you to setup the wireless adaptor You can choose to configure the adaptor through the Windows Zero Configuration Tool or the AirLive Turbo G Configuration Tool for the adaptor It is recommended to choose the AirLive Turbo G Configuration Tool for the adaptor Click Next to continue The system starts to install the software of the card 5 AirLive WT 2000USB U...

Page 10: ...operate with better performance please choose the Optimize for performance to enable the Tx Burst mode Or you can choose Optimize for Wi Fi mode to let the adaptor run in standard wireless network 6 AirLive WT 2000USB User s Manual ...

Page 11: ...he system will automatically detect the card and display Hardware Installation screen Click Continue Anyway to continue G Please click Finish to complete the installation 7 AirLive WT 2000USB User s Manual ...

Page 12: ...y appears as an icon on the system tray of Windows while the card is running You can open the utility by double click on the icon Right click the icon there are some items for you to operate the configuration utility z Lauch Config Utilities Select Lauch Config Utilities to open the Configuration Utility tool z Use Zero Configuration as Configuration Utility z Select Use Zero Configuration as Conf...

Page 13: ...or the card please follow one of the ways as below First Way Right click the icon in the system tray and select Use AirLiveConfig as Configuration Utility Second Way A Right click the icon and select View Available Wireless Networks B Click Advanced C Uncheck Use Windows to configure my wireless network settings to enable the utility for the card 9 AirLive WT 2000USB User s Manual ...

Page 14: ...guration Utility the system will scan all the channels to find all the access points stations within the accessible range of your card and automatically connect to the wireless device with the highest signal strength From the Site Survey all the networks nearby will be listed You can change the connection to another networks or add one of the networks to your own profile list 10 AirLive WT 2000USB...

Page 15: ...st double click the item on the list and the card will automatically connect to the selected network Rescan Button Click Rescan button to collect the new information of all the wireless networks nearby Connect Button Click Connect to connect to the selected network Add to Profile Button Add the selected network to Profiles list 3 2 Profile The Profiles List is for you to manage the networks you co...

Page 16: ...e card will be initially connected to the profile 3 2 1 Configure the Profile 3 2 1 1 Configuration Parameter Description Profile Name Define a recognizable profile name for you to identify the different networks SSID The SSID up to 32 printable ASCII characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs You may specify a SSID for the ...

Page 17: ... the card is set in Ad Hoc Peer to Peer Mode you can designate the wireless connection mode for the Ad Hoc network 802 11 B only This card can be compatible with both 802 11g and 802 11b wireless stations If there are only 802 11b wireless stations in the network you can set the card to this mode 802 11 B G mix If you have a mix of 802 11b and 802 11g wireless stations in your network it is recomm...

Page 18: ...gain but it will likely decrease overall network performance Select a setting within a range of 256 to 2346 bytes Minor change is recommended Channel This setting is only available for Ad Hoc mode Select the number of the radio channel used for the networking The channel setting should be the same with the network you are connecting to 3 2 1 2 Authentication and Security Parameter Description Auth...

Page 19: ...etwork authentication servers In this mode known as Pre Shared Key the user manually enters the starting password in their access point or gateway as well as in each wireless stations in the network WPA PSK takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the data traveling between authorized devices...

Page 20: ...thod to ensure the communication WPA Pre Shared Key The WPA PSK key can be from 8 to 64 characters and can be letters or numbers This same key must be used on all of the wireless stations in the network WEP Key Key1 Key4 The WEP keys are used to encrypt data transmitted in the wireless network There are two types of key length 64 bit and 128 bit Select the default encryption key from Key 1 to Key ...

Page 21: ...ends an EAP Request for the user s identity to the device EAP or the Extensible Authentication Protocol is an authentication protocol that runs before network layer protocols transmit data over the link In turn the device responds with its identity and the AP relays this identity to an authentication server which is typically an external RADIUS server An example for MD5 Authentication RADIUS Serve...

Page 22: ...ut not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a certificate to the client After validating the server s certificate the client presents a client certificate to the server for validation MD5 Challenge MD5 Challenge is the easiest EAP Type It requires the wireless station to enter a set of user name and password as the identity ...

Page 23: ...ng domain Password The password used for authentication It may contain up to 63 ASCII characters and is case sensitive 3 2 1 4 802 1x Setting CA Server Parameter Description Use Certificate Chain When the EAP authentication type such as TLS TTLS or PEAP is selected and required a certification to tell the client what server credentials to accept from the authentication server in order to verify th...

Page 24: ...uthority Server Name Enter the authentication server name Server name must match exactly When selected the server name must match exactly the server name found on the certificate Domain name must end in specified name When selected the server name field identifies a domain The certificate must use a server name belonging to this domain or to one of its sub domains e g zeelans com where the server ...

Page 25: ...peed of data transmitted and received Link Quality This bar indicates the quality of the link The higher the percentage the better the quality dBm If you want to know the signal strength in the unit of dBm select this check box Signal Strength This bar shows the signal strength level The higher percentage shown in the bar the more radio signal been received by the card This indicator helps to find...

Page 26: ...the connection including transmit statistics and receive statistics You may reset the counters by clicking Reset Counter 3 5 Advance This option enables you to configure more advanced settings for example wireless mode protection mode and etc 22 AirLive WT 2000USB User s Manual ...

Page 27: ...ountry B G Protection If you have a mix of 802 11b and 802 11g wireless stations in the network it is recommended to enable the protection mechanism This mechanism can decrease the rate of data collision between 802 11b and 802 11g wireless stations When the protection mode is enabled the throughput of the card will be a little lower due to many of frame traffic should be transmitted Auto Based on...

Page 28: ...ions is developed by Cisco for the radio monitoring and fast roaming LEAP Turn on CCKM During normal operation LEAP enabled client devices mutually authenticate with a new access point by performing a complete LEAP authentication including communication with the main RADIUS server When you configure your wireless LAN for fast re association however LEAP enabled client devices roam from one access ...

Page 29: ... MAC Address of the card is displayed in the screen as well 3 7 Turbo Mode This card supports specific ways to increase the data transfer rate at a time compress the data and decrease the waiting time to send the next data to the Routers or APs this feature known as Turbo Mode enables higher throughput than IEEE 802 11g standard Up to 54Mbps When the card is connecting to the Routers or APs with t...

Page 30: ...defined WMM as a profile of the IEEE 802 11e extensions for 802 11 networks will help to define the priorities of the data traffics by the data categories to provide enhanced multimedia support When the card is connected to the AP or Router with WMM function you can enable the function of the card by following the steps below A In the Desktop of the computer right click My Network Places and selec...

Page 31: ...B Right Click the Wireless Network Connection and select Properties C Click Configure D Select Advanced page enable the WMM Capable 27 AirLive WT 2000USB User s Manual ...

Page 32: ...n schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g devices and 802 11b devices interoperate 2 What is the IEEE 802 11b standard The IEEE 802 11b Wireless LAN standard subcommittee which formulates the standard for the industry The objective is to enable wireless LAN hardware from ...

Page 33: ...s 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in security On the hardware side as with Direct Sequence Spread Spectrum technology it has the inherent security feature of scrambling On the software side WLAN series offer the encryption function WEP to enhance security and A...

Page 34: ...andwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver knows the parameters of the spread spectrum signal being broadcast If a receiver is not tuned to the right frequency a spread spectrum signal looks like background noise There are two main alternatives Direct Sequence Spr...

Reviews: