background image

 50                          

 

wireless network. 

 
Note: All devices in the network should use the same encryption method 
to ensure the communication. 

ASCII 

WEP Key can be ASCII format. Alphanumeric values or signs are 

allowed to be the WEP key. It is more recognizable for user. 

PASSPHRASE 

It is a text string with a maximum of 32 alphanumeric characters, for 

example: “Test“. The WEP Key is based upon the Passphrase 

determined by you. This passphrase may not work with other vendors’ 

products due to possible incompatibility with other vendors’ passphrase 

generators. You must use the same passphrase or WEP key settings for 

all wireless computers within the network. 

Key Length 

When you select the “WEP and “PASSPHRASE" and this function will 

display in the current status of the utility. 

The keys are used to encrypt data transmitted in the wireless network. 

Fill the text box by following the rules below. 

64-bit – Input 10-digit Hex values as the encryption keys. For example: 

“0123456aef“. 

128-bit – Input 26-digit Hex values as the encryption keys. For example: 

“01234567890123456789abcdef“. 

Key Index (advanced) 

Select one of the four keys to be the data encryption key. 

Network Key 

Please enter network security key here to make sure the password is 
correct. 

Confirm Network Key 

Please enter network security key here again. 

EAP Type 

GTC

 – GTC is an authentication protocol which allows the exchange of 

clear text authentication credentials across the network. 

 

TLS

 – TLS is the most secure of the EAP protocols but not easy to use. 

It requires that digital certificates be exchanged in the authentication 
phase. The server presents a certificate to the client. After validating the 
server’s certificate, the client presents a client certificate to the server for 
validation. 

 

LEAP

 – LEAP is a pre-EAP, Cisco-proprietary protocol, with many of the 

features of EAP protocols. Cisco controls the ability of other vendors to 
implement this protocol, so it should be selected for use only when 
limited vendor choice for client, access-point, and server products is not 
a concern. When you have set up LEAP authentication, you have to 
enter the user name and password of your computer. 

 

PEAP & TTLS

 – PEAP and TTLS are similar and easier than TLS in that 

they specify a stand-alone authentication protocol be used within an 
encrypted tunnel. TTLS supports any protocol within its tunnel, including 
CHAP, MSCHAP, MSCHAPv2 and PAP. PEAP specifies that an EAP-
compliant authentication protocol must be used; this adaptor supports 
MD5, TLS, GTC (Generic Token Card) and MSCHAPv2. The client 
certificate is optional required for the authentication. 

 
 

 

Summary of Contents for Hi-Gain

Page 1: ......

Page 2: ...right 2009 Hawking Technologies Inc All rights reserved All other brands and product names are trademarks of their respective companies No part of this publication may be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without the express written consent of the manufacturer as stipulated by the United States Copyright Act of 19...

Page 3: ...efore be allowed at all times to ensure the safe use of the equipment EU Countries Intended for Use The ETSI version of this device is intended for home and office use in Austria Belgium Denmark Finland France Germany Greece Ireland Italy Luxembourg the Netherlands Portugal Spain Sweden and the United Kingdom The ETSI version of this device is also authorized for use in EFTA member states Iceland ...

Page 4: ... 2 Available Network Tab 22 3 3 General Tab 23 3 4 Profile Tab 24 3 5 Statistics 30 3 6 Wi Fi Protect Setup WPS 31 3 7 NETWORK SECURITY WEP WPA 33 4 UNINSTALLING HAWKING UTILITY DRIVER 36 III FOR MAC USERS 37 1 INSTALLATION FOR MAC OSX 10 4 OR LATER 37 2 CONNECTING TO YOUR WIRELESS NETWORK MAC 10 5 OR LATER 40 3 CONNECTING TO YOUR WIRELESS NETWORK MAC 10 4 10 4 9 42 4 HAWKING HWDN2 WIRELESS UTILIT...

Page 5: ...sensitive applications the HWDN2 supports Hardware based IEEE 802 11i encryption decryption engine including 64 bit 128 bit WEP TKIP and AES Also it supports Wi Fi alliance WPA and WPA2 encryption 1 Features Work with 802 11b g n wireless network devices High speed transfer data rate up to 150 Mbps High throughput supports multi media data bandwidth requirement Support 64 128 bit WEP Data Encrypti...

Page 6: ...s when active connection is available else remains switched OFF PWR Blinks rapidly when data communication in progress else remains switched OFF 3 System Requirements To begin using the HWDN2 Dish Adapter your PC Notebook must meet the following minimum requirements Operating System Microsoft Windows 2000 XP Vista or Mac OS 10 4 or later An Available USB Port on your Laptop or Desktop 256MB system...

Page 7: ...eless PC Adapter driver utility before please uninstall the old version first 2 Be sure to save all your work your system may automatically restart after installation a Insert the included CD an auto load page will appear instantly on you screen b Select Driver Utility Setup c Choose a setup language ...

Page 8: ...ntinue e Please wait during the setup status screen then Select Install to begin Installation f Please wait until the Install Wizard completes Note A Windows Security screen might show up at this point Select Install this driver software anyway to Continue g Select Finish ...

Page 9: ...lete Control Center will indicate that your network is ready Select OK d The Adapter will automatically search and locate an open network Select a desired network You can locate search for the available network by clicking on the wireless icon on your system tray bottom right corner e If your selected network is encrypted password protected please enter the network security key and click OK If you...

Page 10: ...10 f Congratulations you are now successfully connected ...

Page 11: ...m will automatically search for the installed driver for your HWDN2 adapter and will prompt you when it is ready g Select a location for your network h If your selected network is encrypted password protected please enter the network security key and click OK If you don t have the network security key please contact your network administrator i Congratulations you are now successfully connected ...

Page 12: ...guration go to Start ÆConnect To b Select the Network you wish to connect to If you are connecting to an unsecure network go to step c If you are connecting to a secured network go to step d c If you are connecting to an open network unsecured network a warning may appear indicating that the network is an unsecured network Select Connect Anyway and skip step ...

Page 13: ...phrase If you are connecting to a network that is security enabled but do not have the security key or passphrase please obtain the passphrase from your Network Administrator e Please wait while your HWDN2 is connecting f The HWDN2 Wireless Dish Adapter is now connected you may save this network as your preferred network ...

Page 14: ...ver Utility is located on the CD The following installation was operated under Windows XP Procedures are similar for Windows 2000 1 Insert the support CD into your CD Drive 2 The CD drive should auto load the following 3 Open the file and you can briefly see the following Select Run 4 Select Setup Language and click Next and Next again in the following screen ...

Page 15: ...15 5 Now you ll see the following message please click Install to begin the installation Wait while your system begins to install ...

Page 16: ... and utility installation 7 At this point your system may prompt you to restart your computer Plug in the HWDN2 to an available USB after computer restarts 8 Your system will recognize the new hardware HWDN2 adapter Please wait while it searches for the installed driver and utility ...

Page 17: ... to complete your hardware installation 2 1 Verify installation Windows 2000 XP 1 Open Control Panel ÆDouble click on System 2 Select Hardware tabÆClick on Device Manager Select and double click on 802 11N USB wireless LAN card ...

Page 18: ...t click on Wireless Network Select ÆLocal Area Connection icon Æ select Properties Select Internet Protocol TCP IP ÆClick Properties Select the General tab a If your Wireless Router supports DHCP function please select both Obtain an IP address automatically and Obtain DNS server address automatically b If the router does not support DHCP function you have to configure the IP and DNS settings ...

Page 19: ...out Select About to show the utility information Hide Select Hide to hide the utility in the system tray Quit Select Quit to quit the utility in the system tray 2 From the Available network tab double click on the SSID or Access the SSID and click on Connect NOTE The HWDN2 Adapter must be connected to your computer at this point Your home office environment should have a wireless LAN Access Point ...

Page 20: ...ireless networks select Available Network tabÆ Select Refresh All detected service set identifiers SSID will be listed under SSID column Encryption Security Authentication If the selected SSID is an open network or has no encryption none will be listed under the Encryption column If the selected SSID has encryption WEP TKIP WPA please enter the password in the network key field and confirm network...

Page 21: ...less Utility works best with Windows XP and 2000 For Windows 7 and Windows Vista it is recommended to use the default Windows Zero Configuration Wireless Utility There are several parts to the utility screen Please refer to the following table for the description A B C D ...

Page 22: ...he adapter from Windows XP Zero Configuration check the item Recommended for Vista and Windows 7 Radio Off This function is for you to turn off or turn on the radio in the adapter If the radio is turned off the adapter will not work D Status bar that displays the current status of the utility To close it please disable the Status Bar in the View item E Utility and Configuration tabs for the HWDN2 ...

Page 23: ...etwork to a profile click this button 3 3 General Tab To check the connection status of the adapter select General This screen shows the information of Link Speed Network Type Encryption Method SSID Signal Strength Link Quality and Network Address of the adapter Parameter Description Status Shows the connection status of the adapter Speed Shows the current speed Infrastructure This operation mode ...

Page 24: ...ts you manage the networks you connect to frequently You are able to add Remove Edit Duplicate Set Default to manage a profile Parameter Description Available Profile s This list shows the preferred networks for the wireless connection You can add remove edit duplicate the preferred networks or set one of the networks as the default connection Add Remove Edit Button Click these buttons to add dele...

Page 25: ...etworks you are saving Network Name SSID The SSID up to 32 printable ASCII characters is the unique name for the wireless network you are saving The ID prevents the unintentional merging of two co located wireless networks You may specify a SSID for the adapter and then only the device with the same SSID can interconnect to the adapter ...

Page 26: ...rks that the adapter intends to connect to Open System No authentication is needed among the wireless network Shared Key Only wireless stations using a shared key WEP Key identified are allowed to connect with each other WPA PSK Designed for home and small business users who do not have access to network authentication servers In this mode known as Pre Shared Key the user manually enters the start...

Page 27: ...vanced Encryption Standard AES AES is required to the corporate user or government users The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES In contrast WPA uses Temporal Key Integrity Protocol TKIP WEP 802 1X It s a special mode for using IEEE 802 1x EAP technology for authentication and WEP keys for data encryption Data Encryption Disabled Disable the WEP Data E...

Page 28: ...or WEP key settings for all wireless computers within the network Key Length When you select the WEP and PASSPHRASE and this function will display in the current status of the utility The keys are used to encrypt data transmitted in the wireless network Fill the text box by following the rules below 64 bit Input 10 digit Hex values as the encryption keys For example 0123456aef 128 bit Input 26 dig...

Page 29: ...and TTLS are similar and easier than TLS in that they specify a stand alone authentication protocol be used within an encrypted tunnel TTLS supports any protocol within its tunnel including CHAP MSCHAP MSCHAPv2 and PAP PEAP specifies that an EAP compliant authentication protocol must be used this adaptor supports MD5 TLS GTC Generic Token Card and MSCHAPv2 The client certificate is optional requir...

Page 30: ...30 3 5 Statistics You can get real time information about packet transmissions and receiving statuses during wireless communications If you want to recount the statistics value please click Reset ...

Page 31: ...ish to establish a secure connection 3 6 1 Pin Input Config PIN 1 The PIN code of your wireless network card is an eight digit number located at the upper right position of configuration utility Remember it and input the number to your wireless access point as the WPS PIN code Please refer to the user manual of your wireless access point for instructions about how to do this 2 Click Pin Input Conf...

Page 32: ...connected to that access point 3 6 2 Push Button Config PBC a Start PBC pairing procedure at access point side please refer to the instruction given by your access point s manufacturer then click PBC button in wireless configuration utility to start to establish wireless connection by WPS Please be patient This may require several seconds to one minute to complete ...

Page 33: ... key you must enter the same security key and setting If you do not have the Network Encryption key please request it from the Network Administrator or the person who set up your wireless network After you obtained the network security information open up Hawking Wireless Utility Continue below to set up your Network Security Code 3 7 1 WEP Setup If the SSID or Access Point you wish to connect has...

Page 34: ...on type of the AP Router Please confirm the setting of the AP Router Open WEP open system is based on request and grant It is essentially no authentication Shared WEP shared key is based on request challenge challenge response grant deny b Data Encryption field Select WEP Make sure the 1 Network Authentication and 2 Data encryption matches your selected Network Finally enter the 3 Network Key 1 2 ...

Page 35: ...st Correspond to the Value on your AP c Enter the WAP Preshared Key and click OK WPA and WPA2 1 If you wish to connect to an AP with WPA or WPA2 authentication select the AP or SSID and select Connect For example the N Router is being selected the security settings must correspond to Wireless Access Point 2 Setting the Authentication and Security Page a Network Authentication select WPA or WPA2 PS...

Page 36: ...alling Hawking Utility Driver Select Uninstall option from the start menu Select Yes to remove all its features Removing the utility is in progress HWDN2 Driver and Utility has finished uninstalling Select Finish ...

Page 37: ...r into your Mac desktop or notebook before installing the software program from the CD The following installation was operated under Apple OSX 10 5 Leopard Installation Procedures are similar in other OS However the installation images and screens may not look the same as the ones in this manual If you have previously installed other Wireless Adapter Drivers Utilities please uninstall the older ve...

Page 38: ...e to the Hawking HWDN2 Hi Gain Adapter Driver Installer Select Continue 4 Read the Important information in the following screen then Continue 5 Software License Agreement select Continue 6 Click Agree to continue ...

Page 39: ...e 8 The driver will take 2 5MB of space on your computer Click Install to continue 9 If your computer is password protected please enter your password to continue 10 Again make sure you save all your work then select Continue Installation ...

Page 40: ...ss N USB Dish Adapter into an available USB port on your desktop or notebook computer Insert the USB dish adapter firmly into the USB port to ensure a proper connection is made When the adapter is inserted carefully lift the antenna unit upright NOTE If your computer or laptop already has a built in Airport Card please turn it off by going to the Wireless Icon on the top right corner or your scree...

Page 41: ...ose the appropriate selection You can manually configure your IP Address DNS Servers and other information here Please contact a network administrator if you are uncertain of the settings that are required to connect to your network When you have finished select APPLY NOW to continue Please note the Ethernet Adapter en15 network interface You will need to enable this in the Network Preferences Not...

Page 42: ... it 6 Congratulations the asterisk sign next to the selected network indicates that your are connected 3 Connecting To Your Wireless Network Mac 10 4 10 4 9 1 When your computer has successfully restarted Insert the HWDN2 Hi Gain Wireless N USB Dish Adapter into an available USB port on your desktop or notebook computer Insert the USB dish adapter firmly into the USB port to ensure a proper connec...

Page 43: ... computer you will need to enable the device before using the Wireless Utility In the System Preferences page locate the NETWORK icon and double click it to access the control panel 4 The new USB wireless adapter will automatically be detected Click OK to continue NOTE If your computer or laptop already has a built in Airport Card please turn it off by going to the Wireless Icon on the top right c...

Page 44: ...pter selection and selecting TCP IP If you are using an automatically assigned IP address MOST NETWORKS you do not have to worry about this Simply close the window to proceed HOW TO CHANGE YOUR IP ADDRESS TO STATIC MODE Change from DHCP to Manual Configuration If your wireless network uses a static IP address or requires manual configuration you may do so by highlighting the USB wireless adapter S...

Page 45: ...cted 4 Hawking HWDN2 Wireless Utility The Hawking HWDN2 Wireless Utility is an application that helps you configure the HWDN2A and monitor the link status and statistics of your wireless connection Each time you insert the HWDN2 the Hawking Wireless Utility should automatically load In the case that it doesn t you may manually load the Utility by using FINDER to view your APPLICATIONS folder and s...

Page 46: ... the networks to your own profile list Parameter Description Available Network This list shows all available wireless networks within range of your card It also displays the information of the networks including the SSID BSSID Channel Encryption Authentication and Network Type If you want to connect to any networks on the list double click the item on the list and the adapter will automatically co...

Page 47: ...nnect to frequently You are able to Add Delete Edit Activate a profile Parameter Description Profiles List The profiles list display all the profiles and the relative information including Profile Name SSID Channel etc Add Edit Remove Duplicate Button Click these buttons to Add Edit Remove Duplicate the selected profiles Apply Click Apply to connect to the selected profile 4 2 1 Configure the Prof...

Page 48: ...is done via the Access Point or Router Ad Hoc Connect to another wireless adapter in the Wireless LAN network without through an Access Point or Router If this item is selected the adapter will work in Ad Hoc mode Channel This setting is only available for Ad Hoc mode Select the number of the radio channel used for the networking The channel setting should be the same with the network you are conn...

Page 49: ... of leveraging existing authentication databases and infrastructure WPA2 802 1X Like WPA WPA2 supports IEEE 802 1 x EAP authentications or PSK technology It also includes a new advanced encryption mechanism using the Advanced Encryption Standard AES AES is required to the corporate user or government users The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES In con...

Page 50: ...ke sure the password is correct Confirm Network Key Please enter network security key here again EAP Type GTC GTC is an authentication protocol which allows the exchange of clear text authentication credentials across the network TLS TLS is the most secure of the EAP protocols but not easy to use It requires that digital certificates be exchanged in the authentication phase The server presents a c...

Page 51: ...Strongest Connection First you must determine where the location of your Wireless Access Point is within your network Position the directional antenna towards the location of the Access Point While viewing your Link Status utility rotate the antenna clockwise and counter clockwise slowly to figure out which position gives you the highest Link Quality and Signal Strength Once you have determined wh...

Page 52: ...52 4 4 Information By choosing this option you can the information about the Driver and Utility 5 Uninstalling Hawking Utility Mac 1 Insert the Original Setup CD Select Sofware_MAC folder ...

Page 53: ...53 2 Select your Mac OS 10 4 or 10 5 and the Uninstall command 3 Click on Password and enter the password for your computer then enter If your computer is not password protected then press enter ...

Page 54: ...bps 11n 40MHz MCS0 7 up to 150Mbps Security 64 128 bit WEP Data Encryption WPA WPA2 Antenna Hi Gain Dual Antenna Dish Technology Drivers Windows 2000 XP Vista or Mac 10 4 or later LEDs Link Activity Transmit Power 11n 14 1 5dBm 11g 14 1 5dBm 11b 17 1 5dBm Dimension 4 17 L in x 4 9 W in x 5 14 H in Weight 137 gram 4 8 oz Temperature Operating 32 104 F 0 40 C Storage 13 149 F 25 65 C Humidity Max 95...

Page 55: ...E 802 11 feature support The product supports the following IEEE 802 11 functions z CSMA CA plus Acknowledge Protocol z Multi Channel Roaming z Automatic Rate Selection z RTS CTS Feature z Fragmentation z Power Management 3 What is Ad hoc An Ad hoc integrated wireless LAN is a group of computers each has a Wireless LAN adapter Connected as an independent wireless LAN Ad hoc wireless LAN is applica...

Page 56: ...re their differences Frequency hopping spread spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct sequence spread spectrum DSSS generates a redundant bit pattern for each ...

Page 57: ...ss output pattern of antennas In standard installations it is normally the wireless access point that uses the omni directional antenna 360 degree wireless output whiles the clients desktop or laptops that use the directional antennas concentrated narrow wireless signal to create a stronger link directly to the access point 15 How do I get an Optimal Wireless Connection with the HWDN2 If pointing ...

Page 58: ...product b Frequently Asked Questions FAQs with answers to common asked questions about your product EMAIL SUPPORT techsupport hawkingtech com DOCUMENT SUPPORT Product User s Manual Normally located on the product CD You ll find detail install instruction on your product and default user name and password RMA RETURN MERCHANDISE AUTHORIZATION http www hawkingtech com support customerservice php CUST...

Reviews: