background image

43

The customer must submit with the product as part of the claim a written description of the
Hardware defect or Software nonconformance in sufficient detail to allow D-Link to confirm
the same.

The original product owner must obtain a Return Material Authorization (“RMA”) number from
the Authorized D-Link Service Office and, if requested, provide written proof of purchase of
the product (such as a copy of the dated purchase invoice for the product) before the warranty
service is provided.

After an RMA number is issued, the defective product must be packaged securely in the
original or other suitable shipping package to ensure that it will not be damaged in transit, and
the RMA number must be prominently marked on the outside of the package.  Do not include any
manuals or accessories in the shipping package.  D-Link will only replace the defective portion
of the Product and will not ship back any accessories.

The customer is responsible for all in-bound shipping charges to D-Link.  No Cash on Delivery
(“COD”) is allowed.  Products sent COD will either be rejected by D-Link or become the
property of D-Link.  Products shall be fully insured by the customer. D-Link will not be held
responsible for any packages that are lost in transit to D-Link.  The repaired or replaced
packages will be shipped to the customer via UPS Ground or any common carrier selected by
D-Link, with shipping charges prepaid. Expedited shipping is available if shipping charges are
prepaid by the customer and upon request.

Return Merchandise Ship-To Address

USA:

 17595 Mt. Herrmann, Fountain Valley, CA 92708-4160

Canada:

 2180 Winston Park Drive, Oakville, ON, L6H 5W1 (Visit 

http://www.dlink.ca

 for detailed

warranty information within Canada)

D-Link may reject or return any product that is not packaged and shipped in strict compliance with the
foregoing requirements, or for which an RMA number is not visible from the outside of the package. The
product owner agrees to pay D-Link’s reasonable handling and return shipping charges for any product
that is not packaged and shipped in accordance with the foregoing requirements, or that is determined by
D-Link not to be defective or non-conforming.

What Is Not Covered: 

This limited warranty provided by D-Link does not cover: Products, if in D-Link’s

judgment, have been subjected to abuse, accident, alteration, modification, tampering, negligence, misuse,
faulty installation, lack of reasonable care, repair or service in any way that is not contemplated in the
documentation for the product, or if the model or serial number has been altered, tampered with, defaced
or removed; Initial installation, installation and removal of the product for repair, and shipping costs;
Operational adjustments covered in the operating manual for the product, and normal maintenance;
Damage that occurs in shipment, due to act of God, failures due to power surge, and cosmetic damage;
Any hardware, software, firmware or other products or services provided  by anyone other than D-
Link; Products that have been purchased from inventory clearance or liquidation sales or other sales in
which D-Link, the sellers, or the liquidators expressly disclaim their warranty obligation pertaining to the
product.  Repair by anyone other than D-Link or an Authorized D-Link Service Office will void this
Warranty.

Disclaimer of Other Warranties: 

EXCEPT FOR THE LIMITED WARRANTY SPECIFIED HEREIN, THE

PRODUCT IS PROVIDED “AS-IS” WITHOUT ANY WARRANTY OF ANY KIND WHATSOEVER INCLUDING,
WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NON-INFRINGEMENT. IF ANY IMPLIED WARRANTY CANNOT BE DISCLAIMED IN ANY TERRITORY
WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE LIMITED TO
NINETY (90) DAYS. EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED
HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS
WITH THE PURCHASER OF THE PRODUCT.

Limitation of Liability: 

TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER

ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY
LOSS OF USE OF THE PRODUCT, INCONVENIENCE OR DAMAGES OF ANY CHARACTER, WHETHER
DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR
LOSS OF GOODWILL, LOSS OF REVENUE OR PROFIT, WORK STOPPAGE, COMPUTER FAILURE OR
MALFUNCTION, FAILURE OF OTHER EQUIPMENT OR COMPUTER PROGRAMS TO WHICH D-LINK ’ S
PRODUCT IS CONNECTED WITH, LOSS OF INFORMATION OR DATA CONTAINED IN, STORED ON, OR
INTEGRATED WITH ANY PRODUCT RETURNED TO D-LINK FOR WARRANTY SERVICE) RESULTING

FROM THE USE OF THE PRODUCT, RELATING TO WARRANTY SERVICE, OR ARISING OUT OF ANY
BREACH OF THIS LIMITED WARRANTY, EVEN IF D-LINK HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. THE SOLE REMEDY FOR A BREACH OF THE FOREGOING LIMITED WARRANTY IS
REPAIR, REPLACEMENT OR REFUND OF THE DEFECTIVE OR NON-CONFORMING PRODUCT.  THE MAXIMUM

Summary of Contents for AirPremier AG DWL-AG530

Page 1: ...Manual Building Networks for People 11a 11g Dualband 2 4GHz 5GHz DWL AG530 D Link AirPremier AG TM Wireless 108Mbps PCI Adapter ...

Page 2: ...cs 6 Getting Started 10 Using the Configuration Utility 13 Networking Basics 22 Troubleshooting 35 Technical Specifications 40 Contacting Technical Support 42 Warranty and Registration 43 Appendix 45 How to Replace the Bracket EAP Types Definitions of Configuration Terms ...

Page 3: ...issing please contact your reseller System Requirements for Configuration An 802 11a 802 11b or 802 11g access point for Infrastruc ture mode or another 802 11a 802 11b or 802 11g wireless adapter for Ad Hoc Peer to Peer networking mode At least 128MB of memory and a 500MHz processor Windows XP 2000 A desktop computer with an available 32 bit PCI 2 2 slot Due to DFS Dynamic Frequency Selection 802...

Page 4: ...ct to the network Unfamiliar clients would be denied access For home users that will not incorporate a RADIUS server in their network the security for the DWL AG530 used in conjunction with other WPA WPA2 compatible 802 11 products will still be much stronger than ever before Utilizing the Pre Shared Key mode of WPA WPA2 the DWL AG530 will obtain a new security key every time it connects to the 80...

Page 5: ...Access 2TM providing you a much higher level of security for your data and communication than has previously been avail able Faster Wireless Networking with speeds up to 108Mbps in Turbo mode Faster data transfers mean increased productivity With the DWL AG530 in your PC you will have the flexibility of wireless networking speeds that save you time and money IEEE 802 11a standard to provide wirele...

Page 6: ... home and office environments and public areas such as airports coffee shops and universities Innovative ways to utilize WLAN technology are helping people to work and communicate more efficiently Increased mobility and the absence of cabling and other fixed infrastructure have proven to be beneficial for many users Wireless Basics Wireless users can use the same applications they use on a wired n...

Page 7: ...network to go where wires cannot go even outside the home or office Inexpensive Solution Wireless network devices are as competitively priced as conventional Ethernet network devices Scalability WLANs can be configured in a variety of ways to meet the needs of specific applications and installations Configurations are easily changed and range from Peer to Peer networks suitable for a small number ...

Page 8: ...requency Division Multiplexing technology OFDM works by splitting the radio signal into multiple smaller sub signals that are then transmitted simultaneously at different frequencies to the receiver OFDM reduces the amount of crosstalk interference in signal transmissions TheD LinkDWL AG530 will automatically sense the best possible connection speed to ensure the greatest speed and range possible ...

Page 9: ... the number of walls and ceilings between the DWL AG530 and other network devices to a minimum each wall or ceiling can reduce your DWL AG530 s range from 3 90 feet 1 30 meters Position your devices so that the number of walls or ceilings is minimized 1 Be aware of the direct line between network devices A wall that is 1 5 feet thick 5 meters at a 45 degree angle appears to be almost 3 feet 1 mete...

Page 10: ...ructure network contains an access point or a wireless router The Infrastructure Network example shown on the following page contains the following D Link network devices your existing network may be comprised of other devices A wireless router D Link AirPremierTM AG DI 784 A laptop computer with a wireless adapter D Link Air PremierTM AG DWL AG660 A desktop computer with a wireless adapter D Link...

Page 11: ...bus Adapter into a laptop computer See the Quick Installation Guide included with the DWL AG660 If you wish you may connect a computer that is equipped with an Ethernet network adapter such as a DFE 528TX to the router also A RADIUS server is optional Connect a RADIUS server to your network to use all the features of WPA Without a RADIUS server you can still use the WPA Pre Shared Key mode RADIUS ...

Page 12: ...e in the same IP address range as all the computers in the network and the subnet mask must be exactly the same for all the computers in the network For example If the first computer is assigned an IP address of 192 168 0 2 with a subnet mask of 255 255 255 0 then the second computer can be assigned an IP address of 192 168 0 3 with a subnet mask of 255 255 255 0 etc IMPORTANT If computers or othe...

Page 13: ...roperties window that enables windows configuration UsingtheConfigurationUtility If you are using Windows XP you can use either the Zero Configuration Utility or the D Link Configuration Utility If the icon does not display in the taskbar then click on this icon on your desktop to open To use the D Link Configuration Utility with XP right click on the wireless network icon in the taskbar in the lo...

Page 14: ... band Encryption You can see if WEP Wired Equivalent Privacy is Enabled or Disabled here Wireless Mode Either Infrastructure or Ad Hoc will be displayed here Please see the Getting Started section in this manual for an explanation of these two modes Signal Strength Link Quality Packet Count Displays the statistics of the data packets that are transmitted and received Rescan Button Rescans for the ...

Page 15: ...enting English letters as numbers from 0 127 Using the Configuration Utility continued Configuration Select Enabled or Disabled Open Authentication The DWL AG530 is visible to all devices on the network Shared Authentication Allows communication only with other devices with identical WEP settings WPA WPA2 Select to enable WPA WPA2 Click Athentication Config WPA PSK WPA2 PSK Select to enable WPA PS...

Page 16: ...lly through a DHCP server Assign the following IP Address Choose this option to assign a static IP address Obtain DNS Server Address Automatically Choose this option to obtain a DNS server address automatically Use the following DNS Server address If you make this selection enter the Preferred DNS server and the Alternate DNS server in the appropriate fields ...

Page 17: ...hown below Select the EAP Type you want to use Configure the information needed for authenticating Click OK The WPA WPA2 configuration is complete Trusted CA List InnerAuthentication Protocol For an explanation of the terms shown in this window please see the appendix Select WPA WPA2 in the Authentication field Click Authentication Config When you select WPA WPA2 802 1X is Enabled ...

Page 18: ...g When you select WPA PSK WPA2 PSK 802 1X is Dis abled Using the Configuration Utility continued Authentication WPA PSK WPA2 PSK 802 1X Enter the WPA WPA2 passphrase WPA PSK WPA2 PSK does not re quire a RADIUS server in the network Click OK The WPA PSK WPA2 PSK configuration is complete Advanced Security Settings ...

Page 19: ...er Set the Fragmentation Threshold and the RTS Threshold Please see below Fragmentation Threshold This value should remain at its default setting of 2346 If you experience a high packet error rate you may slightly increase your fragmentation threshold within the value range of 256 to 2346 Setting the fragmentation threshold too low may result in poor performance This value should remain at its def...

Page 20: ...r configure the Properties of the profile in order to connect with an available network Connect Highlight a network profile click Connect to connect to that network Rescan Click Rescan to rescan and connect to the strongest signal Configure Highlight an existing network and click Config ure the configuration window on the next page will appear Advanced Highlight a network click Advanced and the sc...

Page 21: ... window you can select the type of network connection that applies Click OK to save the changes If you clicked on Configuration or Properties you can configure in this window all the properties of a profile that already exists in the network Advanced Add Configuration Properties About The About screen displays informa tion regarding your DWL AG530 in cluding the MAC address Utility ver sion Driver...

Page 22: ...osoft Windows XP Note Please refer to websites such as http www homenethelp com and http www microsoft com windows2000 for information about networking computers using Windows 2000 Me 98SE Go to Start Control Panel Network Connections Select Set up a home or small office network Networking Basics When this screen appears click Next ...

Page 23: ...ns in this window Networking Basics continued Click Next In the following window select the best description of your computer If your computer connects to the Internet through a gateway router select the second option as shown Click Next ...

Page 24: ...24 Enter a Computer description and a Computer name optional Networking Basics continued Click Next Enter a Workgroup name All computers on your network should have the same Workgroup name Click Next ...

Page 25: ... while the Network Setup Wizard applies the changes Networking Basics continued When the changes are complete click Next Please wait while the Network Setup Wizard configures the computer This may take a few minutes ...

Page 26: ...w select the option that fits your needs In this example Create a Network Setup Disk has been selected You will run this disk on each of the computers on your network Click Next Insert a disk into the Floppy Disk Drive in this case drive A Click Next ...

Page 27: ...read the information under Here s how in the screen below After you complete the Network Setup Wizard you will use the Network Setup Disk to run the Network Setup Wizard once on each of the computers on your net work To continue click Next ...

Page 28: ...ew settings will take effect when you restart the computer Click Yes to restart the computer You have completed configuring this computer Next you will need to run the Network Setup Disk on all the other computers on your network After running the Network Setup Disk on all your computers your new wireless network will be ready to use ...

Page 29: ...e directions Click Start in the lower left corner of the screen Right click on My Computer Select Properties and click Select the Computer Name Tab in the Sys tem Properties window You may enter a Com puter Description if you wish this field is optional To rename the computer and join a domain click Change ...

Page 30: ...e see Getting Started in this manual for a definition of IP ad dress range To check on the IP address of the adapter please do the following Right click on the Local Area Connection icon in the task bar Click on Status Click OK All computers on your network must have the same Workgroup name Select Workgroup and enter the name of the Workgroup In this window enter the Computer name ...

Page 31: ...ters will automatically assign IP addresses to the com puters on the network using DHCP Dynamic Host Configuration Protocol tech nology If you are using a DHCP capable gateway router you will not need to assign static IP addresses If you are not using a DHCP capable gateway router or you need to assign a static IP address please follow these instructions Go to Start Double click on Control Panel ...

Page 32: ...32 Networking Basics continued Assigning a Static IP Address in Windows XP 2000 Double click on Network Connections Double click on Properties Right click on Local Area Connections ...

Page 33: ... IPAddress e g 192 168 0 2 Subnet Mask 255 255 255 0 Default Gateway Enter the LAN IP address of the wireless router D Link wireless routers have a LAN IP address of 192 168 0 1 In the window below select Use the following IP address Input your IP address and subnet mask The IP addresses on your network must be within the same range For example if one computer has an IP address of 192 168 0 2 the ...

Page 34: ... xxx xxx xxx where xxx is the IP address of the wireless router or access point A good wireless connection will show four replies from the wireless router or access point as shown Go to Start Run type command A window similar to this will appear Type ping xxx xxx xxx xxx where xxx is the IP address of the wireless router or access point A good wireless connection will show four replies from the wi...

Page 35: ...ides solutions to problems that can occur during the installa tion and operation of the DWL AG530 Read the following descriptions if you are having problems The examples below are illustrated in Windows XP If you have a different operating system the screenshots on your computer will look similar to the following examples Go to Start My Computer Properties ...

Page 36: ...er ties to check that the drivers are installed properly Click OK D Link AirProDWL AB650 Wireless CardbusAdapter Look under Device Status to check that the device is working properly D Link Air PremierTM DWL AG530 D Link AirPremier DWL AG530 11a 11g Dualband Wireless 108Mbps PCI Adapter TM PCI D Link AirPremierDWL AG530 Wireless PCIAdapter ...

Page 37: ...puter PCI slot If Windows does not detect the hardware upon insertion of the adapter make sure to completely remove drivers that were previously loaded To remove the drivers do the following Check to see if the DWL AG530 PCI adapter is firmly inserted into the PCI slot of your laptop computer Reset the access point to its factory default settings and restore the DWL AG530 PCI adapter to the factor...

Page 38: ...mly connected Check that the IP address subnet mask gateway and DNS settings are correctly entered for the network In Infrastructure mode make sure the same Service Set Identifier SSID is specified on the settings for the wireless clients and access points The SSID factory default setting for the D Link products is default Double click on the WLAN icon in the taskbar The Link Info screen will disp...

Page 39: ...e click on the WLAN icon in the taskbar click Encryption Check to see that the key selected is set to the same key as other devices on the network 7 How can I avoid connection problems using the DWL AG530 Move the DWL AG530 and the access point or wireless router into the same room and then test the wireless connection Change the channel of the access point Move devices within the line of sight If...

Page 40: ...ams Weight Internal Antenna Type Omni Directional Dipole Antenna with 2 4 dbi gain 64 128 bit WEP Security 802 1X WPA WPA2 Wi Fi Protected Access Wi Fi Protected Access 2TM 64 128 bit WEP with TKIP MIC IV Expansion Shared Key Authentication Physical Dimensions L 5 24 inches 133mm W 4 27 inches 120mm H 0 87 inches 22mm IEEE 802 11g Supports Advanced Encryption Standard AES PCI 32 bit interface ...

Page 41: ...With Automatic Fallback 108Mbps Turbo Mode 54Mbps 48Mbps 36Mbps 24Mbps 18Mbps 12Mbps 11Mbps 9Mbps 6Mbps 5 5Mbps 2Mbps 1Mbps Modulation Technology Orthogonal Frequency Division Multiplexing OFDM Media Access Control CSMA CAwith ACK Receiver Sensitivity 6Mbps OFDM 10 PER 91dBm Range Indoors Up to 328 feet 100 meters 15dBm 2dB Transmitter Output Power LEDs Link Complementary Code Keying CCK Direct Se...

Page 42: ...ortion of the product Software will substantially conform to D Link s then current functional specifications for the Software as set forth in the applicable documentation from the date of original retail purchase of the Software for a period of ninety 90 days Warranty Period provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation D Li...

Page 43: ...alteration modification tampering negligence misuse faulty installation lack of reasonable care repair or service in any way that is not contemplated in the documentation for the product or if the model or serial number has been altered tampered with defaced or removed Initial installation installation and removal of the product for repair and shipping costs Operational adjustments covered in the ...

Page 44: ...nergy and if not installed and used in accordance with the instructions may cause harmful interference to radio communication However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correc...

Page 45: ...hem 4 6 8 3 5 7 9 Peel off the tubing Take the DWL AG530 Assemble the low profile bracket Take apart the bracket Fix the cable and bone of bracket with the backup tubing Turn the screws to the RIGHT to tighten them Heat the tubing with hair dryer around 3 minutes How to Replace the Bracket ...

Page 46: ...entication Protocol Information needed for Authenticating EAP TLS Certificate UserName LEAP UserName Password PAP TTLS Identity UserName Password CHAP TTLS Identity UserName Password MSCHAP TTLS Identity UserName Password DomainName EAP TTLS MSCHAPv2 TTLS Identity UserName Password DomainName ...

Page 47: ... to verify the identity of the authentication server based on its certificate when using EAP TTLS PEAP and EAP TLS This is checked by default Certain protocols such as EAP TTLS PEAP and EAP TLS allow you to verify the identity of the authentication server as the server verifies your identity This is called mutual authentication You can select trusted authentication server certificates using the Ad...

Page 48: ...hat means that not only are your credentials secure from eavesdropping but your identity is protected as well Thus with EAP TTLS you have two identities an inner one and an outer one The inner identity is your actual user name Your outer identity can be completely anonymous Set your outer identity in the TTLS Identity field Trusted CA List The Trusted CA List allows you to configure which authenti...

Reviews: