background image

 

Disabled: No encryption.   

WEP: Deselect Network Key is provided for me 

automatically and enter the Key provided by the network. 

Available only with Open and Shared Authentication.   

TKIP: Available with WPA and WPA-PSK Authentication.   

 

  TKIP (Temporal Key Integrity Protocol) includes four algorithms: 

MIC (message integrity check), to protect packets from 

tampering; PPK (Per-Packet Key) hashing, to prevent weak key 

attacks; extended IV (initialization vector), to reduce IV reuse 

and the possibility that a hacker will collect sufficient packets to 

crack the encryption; and a re-keying mechanism, to change the 

temporal key dynamically. TKIP is the most commonly used 

encryption method; however, if your wireless clients do not 

support TKIP, the WX-5803 also supports AES (Advanced 

Encryption Security) encryption. AES will replace 802.11's 

RC4-based encryption under 802.11i specification. 

 

Network key 

Enter the security key for data encryption, when WEP or 

WPA-PSK is selected. This can be entered in ASCII or 

hexadecimal for WEP and in ASCII for WPA-PSK.   

 

Key index 

There are four Keys (1, 2, 3, 4) that can be selected for WEP. 

The key index selected here must match the network key index. 

 

The key is provided for me automatically   

Select if the key is automatically provided. Most often, the key is 

not automatically provided, so you have to un-check this box   

and enter the network key. If using a RADIUS server, the key is 

automatically provided.   

 

This is a computer-to-computer (ad hoc) network 

Select if the network you are creating or accessing is a 

computer-to computer (ad hoc) network. If you are attempting to 

connect to an infrastructure network, then do not select  this 

setting. 

 

Step 8  After entering the information for this network, click OK. 

The Wireless Network window is displayed and the new network 

is listed in the Preferred networks area.   

 

Step 9  Your computer is connected to the selected network 

when you see a blue bubble on top of the icon for that network. 

Summary of Contents for WMIA-166AG

Page 1: ...WMIA 166AG R User s Guide 11A G mini PCI module ...

Page 2: ... l Increase the separation between the equipment and receiver l Connect the equipment into an outlet on a circuit different from that to which the receiver is connected l Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment T...

Page 3: ...taining a separate FCC authorization End Product Labeling This transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained between the antenna and users for example Access point Router mobile device The final end product must be labeled in a visible area with the following Contains TX FCC ID MXF M950606AG Manual Information That Must...

Page 4: ...f WMIA 166AG R FCC ID MXF M950606AG is limited in CH1 CH11 for 2 4G band by specific firmware controlled by the manufacturer and is not user changeable Table of Contents Introduction 1 Hardware Installation 2 Software Installation 3 ...

Page 5: ...The WMIA 166AG R has the following features l Wireless LAN Data rates of 1Mbps to 54Mbps for 802 11g and 1Mbps to 11Mbps for 802 11b l Wireless security using WPA with TKIP encryption 802 1X with EAP type Authentication Hardware Installation Please follow the instruction to install your 11A G mini PCI module on your system for example your notebook Your computer comes with a unique Mini PCI Card s...

Page 6: ...properly If there is a yellow mark or red cross on the network adapter it may be a device or resource conflict Replace or update the device driver or consult Windows Trouble Shooting If the wireless LAN card does not function 1 Make sure you have properly installed the driver for the card 2 Consult the card s manual or contact the vendor for installation information Software Configuration If the d...

Page 7: ...your access point requires authentication Match the authentication used by the network l Open No authentication is used Shared The Pre Shared Key PSK authentication method is used In enterprises WPA will be used in conjunction with both wireless router and authentication server In Small Office Home Office SOHO environment where there are no authentication servers user can use pre shared key PSK mo...

Page 8: ...n Network key Enter the security key for data encryption when WEP or WPA PSK is selected This can be entered in ASCII or hexadecimal for WEP and in ASCII for WPA PSK Key index There are four Keys 1 2 3 4 that can be selected for WEP The key index selected here must match the network key index The key is provided for me automatically Select if the key is automatically provided Most often the key is...

Page 9: ... still does not appear double check that the wireless settings match the configuration of the wireless network Step 10 Click OK to save your changes Congratulation You have successfully setup your wireless connection Visit our website at www gemtek com tw ...

Reviews: