background image

 

3

Federal Communication Commission Interference Statement 

This equipment has been tested and found to comply with the limits for a Class B 
digital device, pursuant to Part 15 of the FCC Rules.    These limits are designed to 
provide reasonable protection against harmful interference in a residential installation. 
This equipment generates, uses and can radiate radio frequency energy and, if not 
installed and used in accordance with the instructions, may cause harmful 
interference to radio communications.  However, there is no guarantee that 
interference will not occur in a particular installation.    If this equipment does cause 
harmful interference to radio or television reception, which can be determined by 
turning the equipment off and on, the user is encouraged to try to correct the 
interference by one of the following measures: 

Reorient or relocate the receiving antenna. 

Increase the separation between the equipment and receiver. 

Connect the equipment into an outlet on a circuit different from that to which the 
receiver is connected. 

Consult the dealer or an experienced radio/TV technician for help. 

FCC Caution: Any changes or modifications not expressly approved by the party 
responsible for compliance could void the user's authority to operate this equipment. 

This device complies with Part 15 of the FCC Rules. Operation is subject to the 
following two conditions: (1) This device may not cause harmful interference, and (2) 
this device must accept any interference received, including interference that may 
cause undesired operation. 

IMPORTANT NOTE: 
Radiation Exposure Statement: 

This equipment complies with FCC radiation exposure limits set forth for an 
uncontrolled environment. End users must follow the specific operating instructions 
for satisfying RF exposure compliance. To maintain compliance with FCC RF 
exposure compliance requirements, please follow operation instruction as 
documented in this manual.   
This transmitter must not be co-located or operating in conjunction with any other 
antenna or transmitter. 
SAR compliance has been established in typical laptop computer(s) with Cardbus 
slot, and product could be used in typical laptop computer with Cardbus slot. Other 
application like handheld PC or similar device has not been verified and may not 
compliance with related RF exposure rule and such use shall be prohibited. 
 
The availability of some specific channels and/or operational frequency bands are 
country dependent and are firmware programmed at the factory to match the 
intended destination. The firmware setting is not accessible by the end user. 

 

Summary of Contents for TEW-621PC - 300Mbps Wireless N PC Card TEW-621PC

Page 1: ......

Page 2: ...t to change without notice The manufacturer makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose The manufacturer reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of the manufacturer to notify an...

Page 3: ...esponsible for compliance could void the user s authority to operate this equipment This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation IMPORTANT NOTE Radiation Exposure Statement This ...

Page 4: ...uct In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures This transmitter must not be co located or operation in conjunction with any other antenna or transmitter ...

Page 5: ...k 7 Wireless LAN Security 11 Data Encryption with WEP 11 Chapter 2 Getting Started About Your Card 12 Package Content 12 System Requirement 12 LED Definition 12 Wireless Utility and Card Hardware Installation 13 Using the Utility to Configure Your Network 22 Link Information 22 Site Survey 24 Profile 25 Chapter 3 Maintenance Uninstalling the Driver 33 Uninstall the Client Utility 33 Upgrading the ...

Page 6: ... increases the transmission data rate again until it reaches the highest available transmission rate Types of Wireless Networks Wireless LAN networking works in either of the two modes ad hoc and infrastructure In infrastructure mode wireless devices communicate to a wired LAN via access points Each access point and its wireless devices are known as a Basic Service Set BSS An Extended Service Set ...

Page 7: ...When a number of wireless stations are connected using a single access point you have a Basic Service Set BSS 6 ...

Page 8: ...w communication is done through the access points which relay data packets to other wireless stations or devices connected to the wired network Wireless stations can then access resources such as a printer on the wired network ...

Page 9: ...e able to move from one access point to another without losing the connection In the diagram below when the user moves from BSS 1 to BSS 2 the card automatically switches to the channel used in BSS 2 Roaming in an ESS network diagram ...

Page 10: ......

Page 11: ... the card and the access point or other wireless stations to keep network communications private Both the wireless stations and the access points must use the same WEP key for data encryption and decryption There are two ways to create WEP keys in your card Automatic WEP key generation based on a password phrase called a passphrase The passphrase is case sensitive You must use the same passphrase ...

Page 12: ...as design 9 Driver support for Windows XP 2000 Vista 2 2 Package Content TEW 621PC Wireless N PC Card Multi Language Quick Installation Guide Driver CD ROM 2 3 System Requirement z 32 bit CardBus Type II Card slot z Microsoft Windows Vista XP or 2000 z CPU 300Mhz or above 800MHz or above Windows Vista z Memory 256MB RAM or above 512MB RAM or above Windows Vista z CD ROM drive 2 4 LED Definition Th...

Page 13: ...Windows Vista STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 Insert your Card to an available slot on your Laptop After the following window pop up click Locate and install driver software recommended STEP 3 Click Next STEP 4 IF YOU HAVE CONNECTED THE CARD TO YOUR COMPUTER PLEASE REMOVE IT FIRST NOTE ...

Page 14: ...ck close Windows XP STEP 1 Insert the Driver and Utility CD into CD drive STEP 2 If your CD Autorun is enabled the installation procedures will be started Then click Install Driver Utility Otherwise open your CD folder and double click on the setup exe file ...

Page 15: ...lShield Wizard prompts you for confirmation Click Next on the following menu STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software If you would like you may change the destination folder to another location Click Next ...

Page 16: ...16 STEP 6 The wizard is ready to begin installation Click Install on it STEP 7 At the Software Installation menu click Continue Anyway ...

Page 17: ...ete the client utility installation STEP 9 Insert your Card to an available slot on your Laptop The following window pop up Select No not this time and then click Next STEP 10 Choose Install the software automatically and click Next ...

Page 18: ...18 STEP 11 Click Continue Anyway STEP 12 Click Finish to complete the installation ...

Page 19: ...bled the installation procedures will be started Then click Install Driver Utility Otherwise open your CD folder and double click on the setup exe file STEP 3 The InstallShield Wizard prepares for installation STEP 4 The InstallShield Wizard prompts you for confirmation Click Next on the following menu ...

Page 20: ...creen you are asked to confirm the Destination Folder for the application software If you would like you may change the destination folder to another location Click Next STEP 6 The wizard is ready to begin installation Click Install on it ...

Page 21: ...21 STEP 7 Click Yes STEP 8 Click Finish to complete the client utility installation STEP 9 Insert your Card to an available slot on your Laptop Drivers will install automatically ...

Page 22: ... in the lower right tray bar Hold your mouse pointer over the icon and double click the left mouse button to open the Wireless Client Utility The Wireless Client Utility window as shown below will appear The user can now use any of the management functions available in the IEEE 802 11 Wireless Client Utility 2 6 1 Link Information Click the Link Information tab to see general information about the...

Page 23: ...network the station is connected to The options include Infrastructure access point Ad Hoc Wireless Mode Displays the wireless mode 802 11g 11b or 11n Transmit Rate Displays the current transmit rate in Mbps AP MAC Address Displays the MAC address of the access point the wireless card is associated to Signal Strength Shows the strength of wireless signal Channel Control Channel Channel number of t...

Page 24: ...the computer s IP address Subnet Mask Displays subnet mask Gateway Displays gateway address 2 6 2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks On this screen click Refresh to refresh the list at any time Connecting to a different network Hold your mouse pointer over the network icon and click the right mouse button to select the network ...

Page 25: ...e Profile Settings window opens to ask to create a profile for the network Follow the procedures to create profile for that network 2 6 3 Profile To add a new configuration profile click Add on the Profile tab To modify a configuration profile select the configuration from the Profile list and click the Edit button ...

Page 26: ... the Profile Settings screen to scan for available infrastructure and ad hoc networks On this list click Refresh to refresh the list at any time To configure a profile for Ad Hoc or Infrastructure mode select the Network Type field on the Profile Settings ...

Page 27: ...of Wi Fi Protected Access WPA Choosing WPA WPA2 opens the WPA WPA2 Security Settings screen The options include TLS Transport Layer Security is a Point to Point Protocol PPP extension supporting additional authentication methods within PPP Transport Layer Security TLS provides for mutual authentication integrity protected cipher suite negotiation and key exchange between two endpoints PEAP EAP GTC...

Page 28: ... server authentication and via a secure TLS tunnel for the client WPA PSK WPA2 PSK Enables WPA WPA2 Passphrase security Fill in the WPA WPA2 Passphrase on Security Settings screen 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x Security Settings screen The options include TLS PEAP TTLS Advanced Settings After Security Settings finished the Adv...

Page 29: ...G Threshold Value from 256 2346 Wireless Mode Enable or disable 802 11n mode After advance settings are finished the following screen showed as below You can activate the profile now or later Windows Vista Connecting to an Unsecured Wireless Connection On the bottom right hand corner of the screen right click the wireless network connection icon and select Connect to a network ...

Page 30: ...30 Select the desired network and then click Connect Click Connect Anyway Click Close ...

Page 31: ...re proceeding If you are not sure contact the network administrator or log on to your wireless router On the bottom right hand corner of the screen right click the wireless network connection icon and select Connect to a network Select the desired network and then click Connect Enter the security key and then click Connect ...

Page 32: ...32 Click Close ...

Page 33: ...all the driver 3 2 Uninstall the Client Utility Follow the steps below to remove the Client Utility from your computer Step 1 To remove the utility from the OS go to Start Control Panel Step 2 Double click Add Remove Programs Step 3 Select 802 11n Wireless Client Utility and click the Uninstall button 3 3 Upgrading the Wireless Utility To perform the upgrade follow the steps below Step 1 Download ...

Page 34: ...entication By using EAP to interact with an EAP compatible RADIUS server an access point helps a wireless station and a RADIUS server perform authentication ENCRYPTION The reversible transformation of data from the original to a difficult to interpret format Encryption is a mechanism for protecting confidentiality integrity and authenticity of data It uses an encryption algorithm and one or more e...

Page 35: ...EE 802 1X and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database If you do not have an external RADIUS server use WPA PSK WPA2 PSK WPA Pre Shared Key that only requires a single identi cal password entered into each access point wireless gateway and wireless client As long as the passwords match clients will be granted access to a WLAN WEP WEP...

Page 36: ...et with RMA number marked on the outside of the package and sent prepaid insured and packaged appropriately for safe shipment WARRANTIES EXCLUSIVE IF THE TRENDNET PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE THE CUSTOMER S SOLE REMEDY SHALL BE AT TRENDNET S OPTION REPAIR OR REPLACEMENT THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES EXPRESSED OR IMPLIED E...

Page 37: ... DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE Governing Law This Limited Warranty shall be governed by the laws of the state of California Note AC DC Power Adapter Cooling Fan Cable and Power Supply carry 1 Year Warranty ...

Page 38: ...38 ...

Reviews: