background image

 

12 

 

 

 

 

Parameter Description 
Data Encryption 

• 

No Encryption – 

Disable the WEP Data Encryption. 

 

• 

WEP –

 Enable the WEP Data Encryption. When the item is 

selected, you have to continue setting the WEP Key Length 
and the encryption keys. 

 

• 

Realtek TKIP –

 Enable the TKIP Data Encryption. When the 

item is selected, you have to continue setting the TKIP Key 
Length and the encryption keys.

 

 

• 

Realtek AES –

 Enable the AES Data Encryption. When the 

item is selected, you have to continue setting the AES Key 
Length and the encryption keys.

 

Auth Algorithm 

This setting has to be consistent with the wireless devices which 
the adapter intends to connect. 

• 

Open System – 

No authentication is needed among the 

wireless devices. 

 

• 

Shared Key – 

Only wirelss devices using a shared key (WEP 

Key, TKIP Key or AES Key identified) are allowed to 
connecting each other. Setup the same key as the wireless 
devices which the adapter intends to connect. 

 

• 

Auto Switch – 

Auto switch the authentication algorithm 

depending on the wireless devices which the adapter is 
connecting to. 

 

 

Default Key ID 

Select one of the keys (1~4) as the encryption key. 

 

Summary of Contents for EW-7106PC

Page 1: ...W Wi ir re el le es ss s L LA AN N C Ca ar rd db bu us s A Ad da ap pt te er r User Manual Version 1 0 Dec 2002...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help FCC Caution This equipment must be installed and operated...

Page 4: ...tention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manufacture must therefore be allowed at...

Page 5: ...ONTENTS 2 2 INSTALLATION PROCEDURE 3 2 1 WINDOWS 98SE ME 2000 3 2 1 1 Install the Driver 3 2 1 2 Install the Utility 3 2 2 WINDOWS XP 4 3 CONFIGURATION UTILITY 7 3 1 CONFIGURATION 7 3 2 LINK STATE 9 3...

Page 6: ...128 bit WEP Data Encryption function for high level of security Support TKIP and AES advanced WLAN Security Supports peer to peer communication among any wireless users no Access Point required Automa...

Page 7: ...Contents Before you begin the installation please check the items of your package The package should include the following items One Wireless Cardbus Adapter One CD Driver Utility User s Manual One Q...

Page 8: ...Insert the adapter into the Cardbus port of your computer the system will automatically find the device and search for its driver 2 Please select the Driver Win2000 folder select the folder based on...

Page 9: ...esktop In the taskbar 2 2 Windows XP The installation process in Windows XP is similar with the process in windows 98SE Me 2000 Please refer to the instructions described in section 2 1 Due to the Win...

Page 10: ...ireless Network Connection Properties screen uncheck the setting Use Windows to configure my wireless network settings Note that if you want to change back to the Windows XP built in utility check the...

Page 11: ...6 Note If you don t disable the XP s Utility you can still see the link status and statistics during communication process from the adapter s utility...

Page 12: ...about the wireless LAN Parameter Description Network Type Infrastructure This operation mode requires the presence of an 802 11 Access Point All communication is done via the Access Point Ad Hoc Sele...

Page 13: ...d to the WLAN network periodly The beacon period is fixed in 100ms Power Save CAM Continuous Access Mode Adapter will always set in active mode Max Enable the adapter in the power saving mode when it...

Page 14: ...o be set Basic Click Apply button to save the above configurations click Undo button to cancel the settings Note The data rate is auto fallback among the range of the used data rate in case obstacles...

Page 15: ...the bar the more radio signal been received by the adapter This indicator helps to find the proper position of the wireless device for quality network operation Signal Quality This bar indicates the...

Page 16: ...a temporary quick fix method defined in IEEE 802 11i standard to quickly overcome the inherent weaknesses in WEP security AES has been developed to ensure the highest degree of security and authentici...

Page 17: ...ave to continue setting the AES Key Length and the encryption keys Auth Algorithm This setting has to be consistent with the wireless devices which the adapter intends to connect Open System No authen...

Page 18: ...ansmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex values in the A F a f and 0 9 range as the encryption keys For example 0123456aef 128 bit Inp...

Page 19: ...independent wireless LAN Ad hoc wireless LAN is applicable at a departmental scale for a branch or SOHO operation 4 What is Infrastructure An integrated wireless and wireless and wired LAN is called a...

Page 20: ...to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence...

Reviews: