802.
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
CE Mark Warning This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.
Table of Contents Federal Communications Commission (FCC) Interference statement CE Mark Warning 2 3 Getting Started with the WPC-360A 5 Wireless LAN Networking Transmission Rate (Transfer Rate) Type of Wireless Networks Wireless LAN Security 6 6 6 10 Hardware and Wireless Utility About Your 802.
Getting Started with the WPC-360A Congratulations on purchasing the WPC-360A! This manual provides information for setting up and configuring the WPC-360A. This manual is intended for both home users and professionals. It is not required to read some of the more technical information in this manual (such as in “Wireless LAN Networking” and “Configuring Wireless Security”) to operate and enjoy the WPC-360A. It is included for your reference only.
Wireless LAN Networking This section provides background information on wireless LAN networking technology. Consult the “Glossary” for definitions of the terminology used in this section. THE INFORMATION IN THIS SECTION IS FOR YOUR REFERENCE. CHANGING NETWORK SETTINGS AND PARTICULARLY SECURITY SETTTINGS SHOULD ONLY BE DONE BY AN AUTHORIZED ADMINISTRATOR. Transmission Rate (Transfer Rate) The WPC-360A provides various transmission (data) rate options for you to select.
Ad-hoc mode does not require an access point or a wired network. Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). To set up an ad-hoc network, configure all the stations in ad-hoc mode. Use the same SSID and channel for each station.
When a number of wireless stations are connected using a single access point, you have a Basic Service Set (BSS).
In the ESS diagram below, communication is done through the access points, which relay data packets to other wireless stations or devices connected to the wired network. Wireless stations can then access resources, such as a printer, on the wired network.
In an ESS environment, users are able to move from one access point to another without losing the connection. In the diagram below, when the user moves from BSS (1) to BSS (2) the WPC-360A automatically switches to the channel used in BSS (2). Roaming in an ESS network diagram Wireless LAN Security Because wireless networks are not as secure as wired networks, its vital that security settings are clearly understood and applied.
To check wireless LAN security settings for a connection, open the Wireless Client Utility and select the Profile screen. Select the connection you want and click Properties. See “Modifying Profiles”. D ATA E NCRYPTION WITH W E P The WEP (Wired Equivalent Privacy) security protocol is an encryption method designed to try to make wireless networks as secure as wired networks.
Hardware and Wireless Utility This chapter introduces the Adapter and prepares you to use the Wireless Utility. About Your 802.11g Wireless MIMO PCI Card The Adapter is an IEEE 802.11b, and 802.11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment. The following lists the main features of your Card. 9 Your Adapter can communicate with other IEEE 802.11b/g compliant wireless devices. 9 Automatic rate selection.
Fixed Antenna LINK LED POWER LED R-SMA Connector Side view of the PCI Adapter from bracket. Product Outline Fixed Antenna LEDs R-SMA Connector PCI Interface golden fingers The 802.
Overview of the Wireless Client Utility The Wireless Client Utility is included on the CD that shipped with the WPC-360A. Install the utility as described in the Quick Start Guide before attaching the WPC-360A to your computer. IMPORTANT BE SURE TO INSTALL THE WIRELESS CLIENT UTILITY BEFORE YOU ATTACH THE WPC-360A TO YOUR COMPUTER. ATTACHING THE WPC-360A BEFORE THE UTILITY IS INSTALLED COULD CAUSE THE INSTALLATION TO FAIL.
The Link Information pane provides information on your current connection. This same pane is shows at the bottom of all screens so you are always aware of your connection status. l WHEN THE WPC-360A IS NOT CONNECTED TO YOUR COMPUTER, MOST SETTINGS IN THE WIRELESS CLIENT UTILITY ARE UNAVAILABLE. SETTINGS OR NOTE BUTTONS THAT ARE NOT AVAILABLE ARE GRAYED OUT. Working with Profiles A profile is a record of the configuration you use to connect to a particular access point.
2. Click Add. The Wireless Client Utility Profile Wizard opens. 3. Type a descriptive name for the profile such as Home or CoffeShop. 4. Click the drop-down arrow at Network Mode and select Infrastructure or Ad-Hoc. Choose Infrastructure when connecting to an access point or wireless router. You will need to know the SSID of the access point. Choose Ad-Hoc when connecting directly to another computer without using an access point.
5. In the SSID pane click Browse. The utility performs a site survey and displays the results. The SSID (Service Set IDentifier) is the name assigned to a wireless Wi-Fi network. All devices must use this case-sensitive name, which is a text string up to 32 bytes long, in order to communicate. 6. Select the SSID you want to connect to and click Add To Profile. 7. Click Next. The WLAN Security Configuration screen appears.
8. Select the Security Mode from the drop-down list and then select the appropriate settings for the security mode. 9. Click Next. 10. Click Save to complete the wizard and save the new profile. (If you do not want to activate the profile, uncheck the Apply this profile now checkbox.) MODIFYING PROFILES You may need to modify settings for a profile, for example, if you purchase a new router, or if your office administrator provides you with new security settings.
1. Open the Wireless Client Utility and click Profile. 2. Select the profile you want to modify and click Properties.
3. Make the changes you want to the Basic Settings and click Advanced Settings. Unless you have a thorough understanding of wireless networking, it is recommended that you leave these settings at the defaults. 4. Click WLAN Security. (Refer to “Configuring Wireless Security” for more details on security settings.
WPA WPA encrypts all traffic between the access point and the client using either TKIP or AES encryption. Depending on the authentication protocol selected, each client must authenticate using their own unique username, password, and security certificate. WPA-PSK WPA-PSK is a compromise between WPA and WEP. Like WEP, it uses a pre-shared key that every user of the network must have in order to send and receive data. Like WPA, it uses either TKIP or AES.
Checking for Available Access Points To scan for access points using the WPC-360A, refer to the following. 1. Open the Wireless Client Utility and click SiteSurvey. 2. Available wireless networks are listed. Click Refresh anytime to update the list.
3. Select the network you want and click Connect. Or click Add To Profile if you want to connect later. For details about any of the listed access points, select it from the list and click Detailed Info to see the following screen. (You can also double-click an access point to view the Detailed Info screen. Disabling the Wireless Client Utility You may need to have Windows manage your wireless network settings. In that case, you should disable the Wireless Client Utility.
Exploring the Wireless Client Utility Screens This section covers the following topics: • • • • • The Network Screen The Profile Screen The SiteSurvey Screen The Options Screen The Version Screen The Network Screen The Wireless Client Utility is included on the CD that shipped with the WPC-360A. Install the utility as described in the Quick Start Guide before attaching the WPC-360A to your computer. BE SURE TO INSTALL THE WIRELESS CLIENT UTILITY BEFORE YOU ATTACH THE WPC-360A TO YOUR COMPUTER.
WIRELESS SETTING The Wireless Setting pane settings are described below Shows the current profile you have selected. If you have not added a profile, only Default shows. The settings shown in the Network screen are for the current profile. Click the dropdown arrow to select another profile. Reconnect (button) Press to reconnect to the current access point. Current Profile Network Mode Security Authentication Shows the current network mode. Infrastructure or ad-hoc mode.
WIRELESS SYSTEMS WORK IN INFRASTRUCTURE MODE OR PEER-TO-PEER MODE. IN INFRASTRUCTURE MODE, WIRELESS DEVICES COMMUNICATE TO A WIRED LAN VIA ACCESS POINTS. IN AD-HOC MODE (ALSO KNOWN AS PEERTO-PEER MODE), WIRELESS DEVICES COMMUNICATE WITH EACH OTHER DIRECTLY AND DO NOT USE AN ACCESS POINT. TCP/IP S ETTING The TCP/IP Setting pane settings are described below. IP Address Shows the current network IP address. Subnet Mask Shows the current subnet mask status. Gateway Shows the current gateway.
THE LINK INFORMATION PANEL IS SHOWN IN ALL SCREENS SO YOU CAN ALWAYS SEE THE STATUS OF YOUR CURRENT CONNECTION. MONITOR THIS SETTING AS YOU MOVE AROUND TO ATTAIN A SUITABLE SIGNAL. NOTE WIRELESS SYSTEMS WORK IN INFRASTRUCTURE MODE OR AD-HOC (PEER-TO-PEER) MODE. IN INFRASTRUCTURE MODE, WIRELESS DEVICES COMMUNICATE TO A WIRED LAN VIA ACCESS POINTS. EACH ACCESS POINT AND ITS WIRELESS DEVICES ARE KNOWN AS A BASIC SERVICE SET (BSS).
PROFILE LIST The Profile List pane settings are described below. Name Shows the name of the profile that you assigned. If only default displays, no profiles have been added. SSID IP Address Shows the name (usually the equipment vendor's name) assigned to a wireless Wi-Fi network. (The keyword “ANY” means any available network.) Shows the IP address. Add (button) Click to add a profile. Remove (button) Click to remove the selected profile.
AVAILABLE NETWORKS The Available Networks pane settings are described below. SSID Shows the name (usually the equipment vendor's name) assigned to a wireless Wi-Fi network. Mode Shows the signal type (802.11b/g). Strength Shows the signal strength. Ch Shows the network channel. Security Shows the security status. Refresh (button) Click to refresh the list of currently available networks. Detailed Info (button) Click to view properties for the selected network. (See Detailed Info. Screen below.
DETAILED INFO. SCREEN For details about any of the listed access points, select it from the list and click Detailed Info to see the following screen. (You can also double-click an access point to view the Detailed Info screen. The Options Screen By default, the Wireless Client Utility configures your wireless settings. Use this screen to disable the Wireless Client Utility.
OPTIONS The Options pane settings are described below. Let Windows manage this wireless adapter (tick box) When you check the Let Windows manage this wireless adapter checkbox, Windows Zero Configuration manages your wireless settings. The Wireless Client Utility still shows the link status of the adapter. Apply Now (button) Click to execute the changes. The Version Screen This screen displays the software and hardware information of the adapter. You cannot make changes to this screen.
Reference the Version screen if you need to contact technical support. See “Maintenance”.
Configuring Wireless Security This chapter covers the configuration of security options in the 802.11 Wireless Client Utility. Configuring Security When you create a profile you need to configure the security settings with the information provided by the administrator. You modify security settings by selecting the profile and clicking Properties. C ONFIGURING W E P Refer to the following to modify WEP settings.
1. In the Properties window, click WLAN Security. 2. Click the drop-down arrow at Security Mode and choose WEP. 3. Click the Use Static WEP checkbox.
4. Click Configure. The WEP Configuration screen appears. WEP Method Select the encryption to match your access point: 64, 128, or 152-bit. The encryption level must match the encryption level used by your access point. Authentication Options are Auto, Open System, and Shared. For most installations choose Auto. Make Key using PassPhrase A WEP Key is automatically generated as you type in any Passphrase of your choice.
1. Click the drop-down arrow at Security Mode and choose WPA . 2. Click the drop-down arrow at Encryption Method and choose TKIP or AES. To configure 802.1X (authentication protocol) for WPA, see “Configuring 802.1X ”. C ONFIGURING WPA-PSK Refer to the following to configure WPA-PSK.
1. Click the drop-down arrow at Security Mode and choose WPA-PSK. 2. Click the drop-down arrow at Encryption Method and choose TKIP or AES. (Most access points use TKIP for WPA-PSK.) 3. At PSK Passphrase enter the same pass phrase used to configure the WPA-PSK on your access point. C ONFIGURING 802.1X You need to know if your access point supports 802.1X and then apply the configuration here. 1. Choose the EAP method under Authentication protocol. 2.
1. 2. 3. 4. 5. At WPA security mode, click Configure button next to Authentication Protocol. Select Inner PEAP protocol. Click Save to finish and return to the previous screen. Type in a unique User ID and Password under User Information. If your network uses a user server certificate click Configure Certificate (see Note below). The following window appears: Use user certificate Check this box if your network requires user certification and then select the certificate from the drop-down menu.
Validate server certificate Check this box if your network requires server certification and then select the certificate authority from the drop-down menu. Server name: Type in the name of the server that is used for 802.1X authentication. Server name should match exactly Check this box if the server name should exactly match the name in the certificate. 6. Click OK to apply the settings. .
C ONFIGURING 802.1X – EAP-TLS 1. At Security Mode select WPA from the drop-down menu. 2. At Authentication Protocol select TLS from the drop-down menu. 3. TLS requires both server and user certification. Click Configure Certificate (see Note below).
Use user certificate Check this box if your network requires user certification and then select the certificate from the drop-down menu. Validate server certificate Check this box if your network requires server certification and then select the certificate authority from the drop-down menu. Server name: Type in the name of the server that is used for 802.1X authentication. Server name should match Check this box if the server name should exactly match the name exactly in the certificate. 4.
Glossary For unfamiliar terms used below, look for entries elsewhere in the glossary. A D-H OC (IBSS) Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless from computer to computer without the use of a base station (access point). Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS). C HANNEL A radio frequency used by a wireless device is called a channel.
SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. T EMPO R AL K E Y I NTEG R I TY P RO TO CO L (TKIP) Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. U S ER A U TH EN TI C AT I O N WPA applies IEEE 802.
Appendix This section provides maintenance and troubleshooting procedures. The following topics are discussed: • • See “Maintenance” See “Troubleshooting” Maintenance Installing a newer version of the Wireless Client Utility may improve the performance of the WPC-360A. Before installing the new version, you must uninstall the old one. CHECKING THE WIRELESS CLIENT UTILITY VERSION To check the current Wireless Client Utility, open the utility on the Version screen.
UNINSTALLING THE WIRELESS CLIENT UTILITY Refer to the following to uninstall (remove) the Wireless Client Utility from your computer. 1. Click Start -> All Programs (Windows 2000 Programs) -> 802.11 Wireless Network Adapter -> Uninstall. 2. When prompted, click Yes to remove the driver and utility software. 3. 4. Click Finish to complete the uninstallation. Reboot your computer if prompted.
Troubleshooting P ROBLEMS S TARTING THE 802.11 W IRELESS C LIENT U TILITY P ROGRAM PROBLEM Windows does not auto-detect the WPC-360A. CORRECTIVE ACTION Make sure the WPC-360A is properly inserted into the PCI slot and then restart your computer. Perform a hardware scan by clicking Start, Settings, Control Panel and then double-click Add/Remove Hardware. (Steps may vary depending on Windows version). Follow the on-screen instructions to search for the WPC-360A (Wireless 802.
Infrastructure Make sure that the AP and the associated computers are turned on and working properly. Make sure the WPC-360A computer and the associated AP use the same SSID. Change the AP and the associated wireless clients to use another radio channel if interference is high. Make sure that the computer and the AP share the same security option and key. Verify the settings in the Profile Security Settings screen. Ad-Hoc (IBSS) Verify that the peer computer(s) is turned on.