background image

 

18

 

Parameter Description 

Network Authentication 

Open

 –No authentication is needed among the wireless network.

 

Shared

 – Only wireless stations using a shared key (WEP Key 

identified) are allowed to connecting each other. 
 

WPA

 – This mode is for enterprise with an authentication server 

(Radius Server), WPA-enabled access point, and a WPA-enabled 
client. Once WPA is enabled, all clients and access points on the 
network must be WPA-enabled in order to access the network. 
 

WPA-PSK

 – It is a special mode designed for home and small 

business users who do not have access to network authentication 
servers. In this mode, known as Pre-Shared Key, the user 
manually enters the starting password in their access point or 
gateway, as well as in each PC on the wireless network. WPA 
takes over automatically from that point, keeping unauthorized 
users that don't have the matching password from joining the 
network, while encrypting the data traveling between authorized 
devices. 

 

 

Data Encryption 

Disabled

 – No encryption is needed. 

 
WEP

 – In WPA or WPA-PSK mode, WEP is also able to be the 

encryption method for the transmission data. 
 

TKIP

 – TKIP (Temporal Key Integrity Protocol) changes the 

temporal key every 10,000 packets (a packet is a kind of message 
transmitted over a network.) This insures much greater security 
than the standard WEP security. 
 

AES

 – AES has been developed to ensure the highest degree of 

security and authenticity for digital information and it is the most 
advanced solution defined by IEEE 802.11i for the security in the 
wireless network.   
 
Note: All devices in the network should use the same encryption 
method to ensure the communication. 

 
 
 
 
 
 
 
 

Summary of Contents for EW-7326Ig

Page 1: ...8 80 02 2 1 11 1g g W Wi ir re el le es ss s L LA AN N P PC CI I C Ca ar rd d User Manual Version 1 0 August 2005...

Page 2: ...arranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer a...

Page 3: ...Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experi...

Page 4: ...of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the...

Page 5: ...IGURATION UTILITY 9 3 1 Utility Overview 9 3 2 Available Network 10 3 3 General 12 3 4 Profile 13 3 4 1 Configure the Profile 14 3 4 2 Enable WPA in Windows XP 16 3 5 Advanced 19 3 6 Status 1 3 7 Stat...

Page 6: ...stomizes the way of saving the power from his her portable or handheld devices This card is cost effective together with the versatile features it is the best solution for you to build your wireless n...

Page 7: ...1 F 0 55 C Humidity Max 95 NonCondensing Certification FCC CE 1 3 Package Contents Before you begin the installation please check the items of your package The package should include the following ite...

Page 8: ...e card E Turn on the computer II Install the Driver Before you proceed with the installation please notice following descriptions Note1 The following installation was operated under Windows XP Procedu...

Page 9: ...older select the folder based on your computer s OS system and the system will start install the driver D The Hardware Installation screen is popped up Click Continue Anyway to continue E The system i...

Page 10: ...5 F Click Finish to complete the driver installation III Install the Utility A Execute Utility Setup exe from the installation CD B The InstallShield Wizard is displayed Click Next...

Page 11: ...icon in your desktop and an icon in the system tray IV Use the Configuration Utility To start configuring the card double click the icon in the system tray For Windows XP there is a Windows Zero Confi...

Page 12: ...ty of the card is displayed and it alerts you that you are in the Windows Zero Configuration mode Click Ok C Uncheck Windows Zero Config to enable the utility of the card Second Way A Right click the...

Page 13: ...8 C Uncheck Use Windows to configure my wireless network settings to enable the utility for the card...

Page 14: ...u can open it by double click on the icon In the Desktop In the System Tray Right click the icon in the system tray there are some items for you to operate the configuration utility Open Config Utilit...

Page 15: ...of the card If the radio is turned off the card will not work Windows Zero Config To configure the card from Windows XP Zero Configuration check the item It is the status bar that displays the current...

Page 16: ...on Signal and etc If you want to connect to any network on the list double click the selected network Refresh Click Refresh to update the available networks list It is recommended that refresh the lis...

Page 17: ...oint All communication is done via the Access Point or Router IBSS Select this mode if you want to connect to another wireless stations in the Wireless LAN network without through an Access Point or R...

Page 18: ...s connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Button Click these buttons to add delete edit the selected pr...

Page 19: ...for the card and then only the device with the same SSID can interconnect to the card This is a computer to computer ad hoc network wireless access points are not used There are two kinds of network...

Page 20: ...om joining the network while encrypting the data traveling between authorized devices The encryption method supported by the card is TKIP Data Encryption Disabled Disable the WEP Data Encryption WEP E...

Page 21: ...ses the level of data protection encryption and access control authentication for existing and future wireless LAN systems The technical components of WPA include Temporal Key Integrity Protocol TKIP...

Page 22: ...ess Configure button to configure the WPA function for the current network 1 From here right click the icon to select View Available Wireless Networks 2 Press Advanced button from Wireless Network Con...

Page 23: ...ll as in each PC on the wireless network WPA takes over automatically from that point keeping unauthorized users that don t have the matching password from joining the network while encrypting the dat...

Page 24: ...nents of the card are still alive In this mode the power consumption is larger than Max mode Max Enable the card in the power saving mode when it is idle Wireless Mode 802 11 b This card can be compat...

Page 25: ...to the country user located by firmware before importing Fragment Threshold The value defines the maximum size of packets any packet size larger than the value will be fragmented If you have decreased...

Page 26: ...and link status If you don t ensure the status of the card and the network you are connecting please go to the screen for more details 3 7 Statistics You can get the real time information about the p...

Page 27: ...characters is the unique name identified in a WLAN The ID prevents the unintentional merging of two co located WLANs The default SSID of the AP is ANY Wireless cards connect to the AP should set up t...

Page 28: ...efer to Section 3 4 1 for the setting of the parameters for AP Note that Ad Hoc mode is not enabled for AP Note The operating frequency channel will be restricted to the country user located by firmwa...

Page 29: ...selected the AP will auto switch the preamble mode depending on the wireless cards Data Rate There are several options including Auto 1 2 5 5 11Mbps for you to select When the Auto is selected the AP...

Page 30: ...Statistics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen If you want to recount the statistics value please cl...

Page 31: ...P includes the modulation schemes found in 802 11b including CCK for 11 and 5 5 Mbps and Barker code modulation for 2 and 1 Mbps B A protection mechanism called RTS CTS that governs how 802 11g device...

Page 32: ...ith Netware Windows 2000 or other LAN operating systems to support printer or file sharing 11 Would the information be intercepted while transmitting on air WLAN features two fold protection in securi...

Page 33: ...other words more bandwidth is consumed than in the case of narrowband transmission but the trade off produces a signal that is in effect louder and thus easier to detect provided that the receiver kno...

Reviews: