802.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
This device is intended only for OEM integrators under the following conditions: 1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and 2) The transmitter module may not be co-located with any other transmitter or antenna. As long as 2 conditions above are met, further transmitter test will not be required.
Distance between two external antennas on housing is 15cm, and PLS refer to the following picture for antenna position.
Table of Contents Federal Communications Commission Interference statement____1 Getting Started_____________________________________________4 About Your 802.
Getting Started This chapter introduces the module and prepares you to use the Wireless Utility. About Your 802.11g WLAN MIMO mPCI The Module is an IEEE 802.11b, and 802.11g compliant wireless LAN adapter. With the Module, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Module. 9 Your Module can communicate with other IEEE 802.11b/g compliant wireless devices. 9 Automatic rate selection.
1. Select [WEP] under [Security Mode] 2. Put a check mark next to [Using Static WEP] 3. Click [Config]. You will then see the screen below. 4. [WEP Method] Select the correct encryption level to match your access point. Either 64, 128, or 152-bit. The encryption level set her must match the encryption level used by your access point. a. [Authentication] You can choose between Auto, Open System, and Shared. Please see section 2.5 for more information on the different types of authentication.
Manual Input (Hexadecimal): You generate your own WEP Key using hexadecimal characters (10 characters for 64-bit, 26 characters for 128-bit, 32 characters for 152-bit). 5. Click [OK] to save your settings and return to the previous screen. 6. If you want to use 802.1x authentication with WEP, you will need to configure your 802.1x settings. Please see section 4.5 for details on configuring 802.1x. Configuring WPA-PSK 1. Select [WPA-PSK] under [Security Mode]. 2. Select [Encryption method].
Configuring WPA 1. Select [WPA-PSK] under [Security Mode]. 2. Select [Encryption method]. You can choose between TKIP or AES. Most access points use TKIP for WPA. 3. See section 4.5 for configuring 802.1x for WPA. Configuring 802.1x 1. Choose the EAP method under [Authentication protocol]. 2. Depending on the EAP method chosen the options under [User Information] will change. Configuring 802.1x – EAP-MD5 1. EAP-MD5 is only a choice when use WEP. MD5 is not allowed for WPA. 2.
Configuring 802.1x – EAP-LEAP 1. Enter in unique User ID and Password under [User Information] Configuring 802.1x – EAP-PEAP 1. Click [Config] under [Authentication protocol] 2. Select inner PEAP protocol. You choices are [MS-CHAP v2] or [TLS]. 3. Click [OK] to finish and return to the previous screen. 4. Enter in unique User ID and Password under [User Information]. 5. If using a user6 or server certificate click [Config certificate].
[Use user certificate]: Put a check in the box to activate user certificate. Then select certificate from the pull down menu. [Validate server certificate]: Put a check in the box to activate server certificate. Then select the certificate authority from the pull down menu. [Server name]: Name of server used for 802.1x authentication. [Server name should match exactly]: Check this box to force server name to match exactly the same in the certificate. 6.
Configuring 802.1x – EAP-TLS 1. Enter in unique User ID and Password under [User Information]. 2. TLS requires you to configure both a server and user7 certificate. 3. Click [Config certificate]. The following window appears: 7 You must first have a wired connection to a network and obtain the certificate(s) from a certificate authority (CA). Consult your network administrator for more information.
[Use user certificate]: Put a check in the box to activate user certificate. Then select certificate from the pull down menu. [Validate server certificate]: Put a check in the box to activate server certificate. Then select the certificate authority from the pull down menu. [Server name]: Name of server used for 802.1x authentication. [Server name should match exactly]: Check this box to force server name to match exactly the name in the certificate. 4.
Configuring 802.1x – EAP-TTLS 1. Enter in unique User ID and Password under [User Information]. 2. Select inner TTLS protocol. You can choose between [PAP], [CHAP], [MS-CHAP], [MS-CHAPv2], or [MD5-Challenge]. 3. Click [OK] to finish and return to the previous screen. 4. Click [Config certificate].
[Use user certificate]: Put a check in the box to activate user certificate. Then select certificate from the pull down menu. [Validate server certificate]: Put a check in the box to activate server certificate. Then select the certificate authority from the pull down menu. [Server name]: Name of server used for 802.1x authentication. [Server name should match exactly]: Check this box to force server name to match exactly the name in the certificate. 5.