User Guide WU830G Wireless USB Adapter Powe r Link
This device must be installed and used in strict accordance with the manufacturer’s instructions as described in the user documentation that comes with the product. FCC Compliance Class B Digital Device This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential environment.
Canada - Industry Canada (IC) The wireless radio of this device complies with RSS 210 and RSS 102 of Industry Canada. This Class B digital device complies with Canadian ICES-003 (NMB-003).
Contents Section 1:Overview Features ................................................................................................................ 1-2 Understanding Your User Guide ......................................................................... 1-3 Box Contents ........................................................................................................ 1-3 Simple Home Network Diagram ..........................................................................
CONTENTS Section 4:Troubleshooting Contact Us ..........................................................................................................4-1 Register the WU830G .........................................................................................4-1 Hardware Solutions...............................................................................................4-1 My computer is experiencing difficulty connecting to the wireless network. ..................................................
Section 1:Overview Congratulations on purchasing the Motorola WU830G Wireless USB Adapter! With the WU830G, your laptop or desktop computer is free to join and enjoy all the benefits of an 802.11b/g wireless home or small office network. Once connected, accessing a single broadband connection with everyone else on the network is simple and fun. You can also share files, pictures, peripherals, printers, and more. You’ll need one WU830G for each computer. Because your WU830G works with USB 2.
SECTION 1 OVERVIEW After installing the USB adapter, you’ll have the ability to wirelessly connect to your network to send and receive emails, print documents, or game online from your computer. Wireless USB Adapter WU830G Features The WU830G has the following features: 1-2 ! CD-ROM based Installation Wizard to provide easy installation ! Device Configuration and Status Utility ! Wireless security using WPA with TKIP encryption, 802.1X with EAP-type Authentication ! Compatibility with both 802.
OVERVIEW SECTION 1 Understanding Your User Guide The User Guide is divided into the following sections: Overview Describes the WU830G and its functions, the technology used, and recommended practices for using it. Installation Provides instructions for installing the firmware and hardware and setting up the firmware to get your adapter up and running. Configuration Describes the Configuration Utility that manages your WU830G.
SECTION 1 OVERVIEW Simple Home Network Diagram Your wireless USB adapter enables you to access files, printers, and an Internet connection on your network. A sample Local Area Network (LAN) is shown below: In the example above, the Internet communicates with the modem, which in turn communicates with the wireless router. The wireless router acts as the gateway to your network, sending information to whichever device asks for information.
OVERVIEW SECTION 1 Wireless Connections Your wireless USB adapter uses a radio transmission technology defined by the Institute of Electrical and Electronics Engineers (IEEE) called 802.11 Wireless Fidelity (Wi-Fi). This standard is subdivided into distinct categories of speed and the frequency spectrum used, designated by the lower case letter after the standard. For example, your USB adapter can work with both the ‘b’ and ‘g’ specifications. The 802.
SECTION 1 OVERVIEW USB Adapter Physical Description Front of USB Adapter The following illustration shows the front of the WU830G: The WU830G has the following features: 1-6 Feature Description 1 Power LED Indicates that the USB adapter is powered. 2 Link LED Indicates the activity of the wireless network traffic.
OVERVIEW SECTION 1 Back of USB Adapter The following illustration shows the back of the WU830G: FCC ID: ACQWU830G MODEL WU830G PART NUMBER: 512761-001-00 S/N: MODEL: WU830G Tested To Comply With FCC Standards FOR HOM E OR OFFICE USE MADE IN TAIWAN USB connector Label under WU830G The following describes the features on the back and bottom of the WU830G: WU830G Feature Description USB Connector Connector for one end of the USB 2.0 cable.
Section 2:Installation Before You Begin You need to collect information so that you can setup your WU830G correctly. Depending upon where you are connecting, the type of information required is divided between business (enterprise users) and home settings (small office/home office). Also, you need to consider the type of security to enable for your wireless connection. A discussion of the types of security available follows this section.
SECTION 2 INSTALLATION Small Office/Home Office Users The access point that communicates with the WU830G has a pre-assigned network name (SSID) that the WU830G recognizes upon startup. ! If you are setting up a new wireless network and want to use WEP (Wired Equivalent Privacy) security, use any string of characters on the wireless router/access point for the network key. This will generate a HEX or ASCII key that you must match when setting up your WU830G.
INSTALLATION SECTION 2 The following table lists the network authentication options and the data encryption options available for each type of authentication: Network Authentication Data Encryption Option Description Option Description Open With open authentication there is no data encryption. Disabled No encryption is used. Shared The network operates in Shared Key authentication mode when a network key is used for data encryption. WEP is the type of encryption used.
SECTION 2 INSTALLATION Security Example If you want to use a more secure protocol, the wireless network to which you are connecting must also support that protocol. For example, let’s say you decide to enable WPA-PSK on your WU830G. However, the slightly older wireless network you want to connect to only supports WEP, which means that you cannot use WPA (and should use WEP) because the security protocols must match between the WU830G and the access point.
INSTALLATION SECTION 2 Installing Your USB Adapter To install the software and hardware: 1 Insert the supplied CD-ROM into the CD-ROM drive. The software automatically starts the Installation Wizard program. 2 If the software does not automatically start, from your desktop, select Start > Run > the name of your CD ROM directory:/setup.exe. 3 Follow the prompts to set up your USB adapter.
Section 3:Configuration You can use the information in this section to: ! Understand the antenna icons ! Start the Configuration Utility and view link status information ! Connect to an available wireless network ! Create network profiles ! Configure security settings ! Remove a network from the profile list ! View product information ! Remove the WU830G from your computer The screenshots shown may look slightly different from the ones in your version of the software.
SECTION 3 CONFIGURATION Understanding the Antenna Icons The icon in you system tray (the area at the bottom right of the screen in your Task Bar) enables you to view the status of the wireless connection and access the Motorola Wireless USB Adapter Configuration Utility. System Tray Icon The following table describes the icons used by the utility. Antenna Icons There are no networks available. The signal strength is Very Low (0% to 20% signal strength).
CONFIGURATION SECTION 3 Starting the Configuration Utility and Viewing Link Status Information Windows XP users have the option of using the Wireless Zero Configuration utility to manage the wireless network configuration. Motorola’s Wireless USB Adapter Configuration Utility provides more wireless information about the network. To start the Motorola Wireless USB Adapter Configuration Utility: 1 Right-click the antenna icon in the system tray.
SECTION 3 CONFIGURATION Link Status Information The Link Status window provides: ! Currently connected network information ! Network settings ! MAC Address ! Signal information The following table describes the fields and buttons on the Link Status window: 3-4 Field or Button Description Network Name Displays the Service Set Identifier (SSID) of the network used by the WU830G. When you first access this window, the network with the highest signal strength is displayed.
CONFIGURATION WU830G SECTION 3 Field or Button Description Current IP Displays the IP address for your current wireless connection. Network Connection Type Displays the type of network to which the WU830G is connected. The possible types are Infrastructure and Ad-Hoc. AP MAC Address Displays the wireless MAC Address. Signal Quality Displays the signal to noise ratio (SNR). The higher the percentage the better the wireless connection.
SECTION 3 CONFIGURATION Connecting to an Available Wireless Network The Motorola Wireless USB Adapter Configuration Utility automatically searches for available wireless networks and connects to the network having the highest signal strength. You may want to select to a different network from a list of available networks. To connect to an available network: 1 Right-click the antenna icon in the system tray and select Show Config Utility.
CONFIGURATION SECTION 3 3 To ensure that the list is current, click Refresh. The updated list of access points is displayed. 4 Select the Network Name to which you want to connect. 5 Click Connect. Your WU830G connects to that network. The following table describes the information provided on the Site Monitor window: WU830G Column Heading Description Network Name Displays the name of the access point. Signal Displays the signal strength indicated by percent.
SECTION 3 CONFIGURATION Creating a Network Profile The Motorola Wireless USB Adapter Configuration Utility enables you to create profile configurations for different working environments. This enables you to enter all the configuration information for a network so you are ready to go as soon as you are in range of that network. For example, this could be useful if you are going to use a wireless network at a trade show.
CONFIGURATION SECTION 3 6 Select the Network Type. The options are Infrastructure or Ad-Hoc. For more information, refer to the description for Network Type in the table following this procedure. 7 If your network type is Ad-Hoc, select the Channel. For more information, refer to the description for Channel in the table following this procedure. 8 Click Set Security and configure the security for this profile. For more information, refer to “Configuring Security Settings.
SECTION 3 CONFIGURATION Field or Button Description Channel The channel setting is valid only when the Network Type is Ad-Hoc (no access point is being used). When the Network Type is Infrastructure, the channel of the card is automatically set to the same channel as the access point. Set Security 3-10 Enables you to configure the security options for this profile. A security setting box is displayed. For additional information refer to “Configuring Security Settings.
CONFIGURATION SECTION 3 Configuring Security Settings There are a series of security windows that enable you to configure the security type for your wireless connection.
SECTION 3 CONFIGURATION Network Authentication Data Encryption Option Description Option Description WPA-PSK For infrastructure environments without the RADIUS infrastructure. WPA-PSK supports the use of a pre-shared key. WPA-PSK is the next generation of wireless network security for home and small office environments. TKIP A network key is used (more secure). WPA The network operates in IEEE 802.1x authentication mode.
CONFIGURATION SECTION 3 Open Authentication The following window displays the Motorola Security Configuration with Open Authentication: The following table describes the encryption status and the fields that become active with that encryption status: Encryption Status Description Disabled Selecting this option leaves your wireless connection without any security protection. It is the only option available with Open Authentication. No additional fields become active.
SECTION 3 CONFIGURATION Shared Authentication The following window displays the Motorola Security Configuration with Shared Authentication: 3-14 WU830G
CONFIGURATION SECTION 3 The following table describes the encryption status and the fields that become active with that encryption status: Encryption Status Description WEP 64-bit or Select the same encryption that is used by your access point. WEP 128-bit Passphrase Some access points/wireless clients can use a passphrase instead of WEP keys. The passphrase automatically generates the WEP keys. The passphrase should be 8 to 63 characters long.
SECTION 3 CONFIGURATION WPA-PSK Authentication WPA-PSK is a pre-shared key authentication method. To use this method, you need to obtain the passphrase used by the access point to which you want to connect. Packets are encrypted based on the encryption method used.
CONFIGURATION SECTION 3 WPA Authentication WPA authentication provides both packet encryption and network/user authentication. In this type of security: ! The packets are encrypted using the TKIP algorithm ! The network is authenticated to be the network you want to connect to ! Your identity is authenticated by the network This security method does not require you to obtain a WPA passphrase.
SECTION 3 CONFIGURATION The different EAP methods have been created to support different authentication methods and their associated network security policies. Depending on which EAP method you select, different fields are active.
CONFIGURATION SECTION 3 The following table lists the fields displayed when WPA authentication is used: Field Description Encryption Status TKIP is the encryption algorithm used on the packets. EAP Method There are four different (Extensible Authentication Protocol) EAP methods that you can select on this window: EAP-TLS This method requires a Login Name and Certificate issued by the RADIUS server to which you are connecting.
SECTION 3 CONFIGURATION EAP Method continued EAP-PEAP This method requires a Login Name and Password. You must also choose an additional PEAP Protocol. The PEAP protocol must match the one on your target RADIUS server. The three PEAP Protocols are: MD5 Challenge EAP-GTC MS CHAP v2 You can also choose to authenticate the RADIUS server identity by checking the Validate Server Certificate check box. LEAP 3-20 This is a Cisco based EAP method.
CONFIGURATION SECTION 3 Removing a Network from the Profile List To remove a wireless network from your network profile list: WU830G 1 Right-click the antenna icon in the system tray and select Show Config Utility. The Motorola Wireless USB Adapter Configuration Utility window is displayed. 2 Click the Profiles tab. The following window is displayed: 3 In the Profile Name field, click the down arrow and select the profile name for the network you want to remove. 4 Click Remove.
SECTION 3 CONFIGURATION Viewing Product Information To view WU830G product information, including the current software versions: 3-22 1 Right-click the antenna icon in the system tray and select Show Config Utility. The Motorola Wireless USB Adapter Configuration Utility window is displayed. 2 Click the Information tab.
CONFIGURATION SECTION 3 Removing the Wireless USB Adapter You can safely remove the Wireless USB Adapter while the computer is operating. To remove the adapter: WU830G 1 Locate the device eject icon located in your system tray. In the illustration below, it is the third icon from the left – the picture of a card and a left-pointing arrow. 2 Double-click the device eject icon.
SECTION 3 3-24 CONFIGURATION 3 Highlight the device you want to remove. 4 Click Stop. The Stop a Hardware device window is displayed: 5 Confirm that the device listed in the window is the device you want to stop. 6 Click OK. After you receive a message telling you the device is stopped, you can safely remove the Wireless USB Adapter.
Section 4:Troubleshooting This section details possible solutions to common problems that may occur in using the WU830G. Contact Us If you are unable to locate a solution here, please access our website at www.motorola.com/broadband/consumers for the latest information. You can also reach us 7 days a week, 24 hours a day at 1-877-466-8646. Register the WU830G To register the WU830G, access the following website: https://broadbandregistration.motorola.
SECTION 4 TROUBLESHOOTING ! Ensure that your wireless USB adapter is within range of your access point or is not behind an obstruction; for example, metal structures will interfere with the signal, as will 2.4 GHz cordless phones, and microwaves. ! Ensure that your access point antenna is connected. I would like to test if my Internet connection is live. Use the ping command to test the connection. Before attempting, determine the IP Address of your USB adapter.
TROUBLESHOOTING 5 6 WU830G SECTION 4 In the Command window, type ping and your ISP’s default gateway IP Address and press Enter. You can determine your ISP’s default gateway by examining your modem and or router. Refer to the instructions provided with your modem/router. ! If you receive a reply (For example, Reply from 216.109.125.72…), then your connection to the Internet is live.
Section 5:Glossary A Access Point (AP) A device that provides wireless LAN connectivity to wireless clients (stations). Adapter A device or card that connects a computer, printer, or other peripheral device to the network or to some other device. A wireless adapter connects a computer to the wireless LAN. Address translation See NAT. Ad-Hoc Network A temporary local area network connecting access clients together, usually just for the duration of the communication session.
SECTION 5 GLOSSARY BSS Basic Service Set. A configuration of Access Points that communicate with each other without resorting any infrastructure. Also known as Ad-Hoc networks. Also see ESS. C CHAP Challenge Handshake Authentication Protocol. It is a password-based, challenge-response, mutual authentication protocol that uses the industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms to encrypt responses.
GLOSSARY SECTION 5 D Default Gateway A routing device that forwards traffic not destined to a station within the local subnet. DHCP A Dynamic Host Configuration Protocol server dynamically assigns IP addresses to client hosts on an IP network. DHCP eliminates the need to manually assign static IP addresses by “leasing” an IP address and subnet mask to each client. It enables the automatic reuse of unused IP addresses. DMZ DeMilitarized Zone.
SECTION 5 GLOSSARY DSSS Direct-Sequence Spread Spectrum. DSSS is a transmission technology used in WLAN transmissions where a data signal at the sending station is combined with a higher data rate bit sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping code is a redundant bit pattern for each bit that is transmitted, which increases the signal's resistance to interference.
GLOSSARY SECTION 5 ESS An Extended Service Set (ESS) is a set of two or more BSSs that form a single subnetwork. See also BSS. Ethernet The most widely used LAN type, also known as IEEE 802.3. The most common Ethernet networks are 10Base-T, which provide transmission speeds up to 10 Mbps, usually over unshielded, twisted-pair wire terminated with RJ-45 connectors. Fast Ethernet (100Base-T) provides speeds up to 100 Mbps. “Base” means “baseband technology” and “T” means “twisted pair cable.
SECTION 5 GLOSSARY H Hexadecimal A base-sixteen numbering system that uses sixteen sequential numbers (0 to 9 and the letters A to F) as base units before adding a new position. On computers, hexadecimal is a convenient way to express binary numbers. Host In IP, a host is any computer supporting end-user applications or services with full two-way network access. Each host has a unique host number that combined with the network number forms its IP address.
GLOSSARY SECTION 5 IP Address A unique 32-bit value that identifies each host on a TCP/IP network. TCP/IP networks route messages based on the destination IP address. For a Class C network, the first 24 bits are the network address and the final 8 bits are the host address; in dotted-decimal format it appears “network.network.network.host.” ISDN Integrated Services Digital Network ISP Internet Service Provider L LAN Local Area Network.
SECTION 5 GLOSSARY MS CHAP v2 Microsoft’s implementation of Challenge Handshake Authentication Protocol. MTU The Maximum Transmission Unit is the largest amount of data that can be transmitted in one discrete message on a given physical network. The MTU places an upper bound on the size of a message that can be transferred by the network in a single frame. Messages exceeding the MTU must be fragmented before transmission, and reassembled at the destination.
GLOSSARY SECTION 5 PCMCIA The Personal Computer Memory Card International Association sets international standards for connecting peripherals to portable computers. Laptop computers typically have a PCMCIA slot that can hold one or two PC Cards to provide features such as Ethernet or wireless connectivity. PING A network utility that tests host reachability by sending a small packet to the host and waiting for a reply.
SECTION 5 GLOSSARY R RADIUS Remote Access Dial In User Service. This is a widely deployed protocol for network access authentication, authorization, and accounting. RJ-11 The most common type of connector for household or office phones. RJ-45 An 8-pin modular connector; the most common connector type for 10Base-T or 100Base-T Ethernet networks. Roaming The ability to transfer your wireless session from one AP to another AP seamlessly. ROM Read-Only Memory.
GLOSSARY SECTION 5 S Server In a client/server architecture, a dedicated computer that supplies files or services such as file transfer, remote login, or printing to clients. Also see client. Service Provider A company providing Internet connection services to subscribers. SMTP Simple Mail Transfer Protocol is a standard Internet protocol for transferring e-mail. Static IP Address An IP address that is permanently assigned to a host. Normally, a static IP address must be assigned manually.
SECTION 5 GLOSSARY T TCP Transmission Control Protocol on OSI transport layer four, provides reliable transport over the network for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track outstanding packets, checks error in incoming packets, and retransmits packets if requested.
GLOSSARY SECTION 5 V VoIP Voice over Internet Protocol is a method to exchange voice, fax, and other information over the Internet. Voice and fax have traditionally been carried over traditional telephone lines of the PSTN (Public Switched Telephone Network) using a dedicated circuit for each line. VoIP enables calls to travel as discrete data packets on shared lines. VoIP is an important part of the convergence of computers, telephones, and television into a single integrated information network.
SECTION 5 GLOSSARY WLAN Wireless LAN. WPA Wi-Fi Protected Access. A security regimen developed by IEEE for protection of data on a WLAN. WWW World Wide Web. An interface to the Internet that you use to navigate and hyperlink to information.
Visit our website at: www.motorola.