Edimax EW-7612UAn V2 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Edimax EW-7612UAn V2 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Edimax EW-7612UAn V2, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Edimax EW-7612UAn V2 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Edimax EW-7612UAn V2. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Edimax EW-7612UAn V2 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Edimax EW-7612UAn V2
- Den Namen des Produzenten und das Produktionsjahr des Geräts Edimax EW-7612UAn V2
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Edimax EW-7612UAn V2
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Edimax EW-7612UAn V2 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Edimax EW-7612UAn V2 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Edimax finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Edimax EW-7612UAn V2 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Edimax EW-7612UAn V2, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Edimax EW-7612UAn V2 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    EW -7722 UTn V2 EW -7612 UAn V2 User Manual 10 -2011 / v1.0[...]

  • Seite 2

    Copyright  by Edimax T echnology Co, L TD. all rights reserved. No part of this publication may be reproduced, transmitted, transc ribed , stored in a retrieval system, or tran slated into any language or computer language, in any form o r by any m eans, electronic, m echanical, m agnetic, optica l, chemical, manual or otherwise, without the pri[...]

  • Seite 3

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply w ith the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are desig ned to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses, and can r[...]

  • Seite 4

    R&TTE Compliance Statement This equipment complies with all t he requirements o f DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive 9[...]

  • Seite 5

    CONTENTS 1 I N T R O D U C T I O N .................................................................................... 1 1.1 Features ......................................................................................................... 1 1.2 S pecifications .......................................................................................[...]

  • Seite 6

    1 1 Introduction Thank you for purchasing this high-speed wireless network card! Excepting common wireless standards 802.11b/g, this wireless netw ork card is also able to access 802.11n wireless networks - data transfer rate is 3 00Mbps ! For WLAN security issues, this adapter supports 64/128-bit WEP data encryption that protects your wireless net[...]

  • Seite 7

    2  Antenna: Chip Antenna (EW -7722UTn V2) High-Gain 3dBi Antenna (EW -7612UAn V2)  Hardware W PS button  Drivers: W indows XP /Vista /7  LEDs: Link/Activity  Temperature: Operating 32~1 04 ° F (0 ~ 40 ° C) , Storage -13~149 ° F (-25~65 ° C)  Humidity: Max. 95% (Non-Condensing) 1.3 Package Contents Before you begin the installa[...]

  • Seite 8

    3 2 Install ation Procedure Before you proceed with the installatio n, please notice follow ing descriptions. Note1: The following installation was operated under Windows XP . (Procedures are similar for Windows Vista /7 .) Note2: If you have install ed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Har[...]

  • Seite 9

    4 EW -76 12UA n V2 1. USB connector 2. Link/Activity LED (Under the case) 3. WPS Button LED N ame Light S tatus Description Link/ Activity Of f No wireless netw ork card is installed. On Solid light 5 sec o nds means WPS connection is establishe d successfully . Blinking W ireless netw ork card is n ormally inst alled /Linked to a wi reless access [...]

  • Seite 10

    5 Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on . EW -7722UTn V2 EW -7612UAn V2 Never use force to insert the card, if you feel it’ s stuck, flip the card over and try again.[...]

  • Seite 11

    6 The following message will appear on your compute r , click „Cancel‟ Software Installation This wizard can be run in W indows XP/V ista /7 . Y ou ca n inst all the W ireless Adapter by EZMAX Setup W izard in the CD-ROM including in the package. The wizard is an easy and quick configuration tool for internet connection with series process. W h[...]

  • Seite 12

    7 I. Inst a ll the Driver and Utility If you prefer the traditional setup procedure. Please insert the installation CD to y our CD -ROM Drive, and click “ Exit “ to disable EZmax W izard. If your OS is W indows V ista/7. Please execute the “ Utility Setup.exe “ program a s follows.[...]

  • Seite 13

    8 Click “ Next ” to go to the next step.[...]

  • Seite 14

    9 Now you ‟ ll see the following message, please click „ Install ‟ to begin the installation. The system start s to inst all the driver and utility . Click “ Finish ” to complete the driver and utility installation.[...]

  • Seite 15

    10 II. Conn ect to Wire less Access Point A. T o st art configuring the adapter , double click the icon in th e system tray or right click the icon and select open configuration utility . B. The utility of the adapter is displayed. Click “ Available Network ” and double-click on the wireless access point you want to connect to. If the wireless [...]

  • Seite 16

    11 NOTE: Network security type ( ‘ Network Auth entication ’ and ‘ Data encryption ’ ) will be selected automatically based on wir eless access point ’ s security setting. It ’ s not r equir ed to change these settings by yourself. C. Input the security setting (WEP key) and click “ OK ” to st art network connection. All opti ons i [...]

  • Seite 17

    12 hoc connection. Network Authentication Select the network authentication type from drop-down menu. This setting must be identical with the setting of wireless access point you w ith to connect. Data encryption Select the data encry ption t ype from drop-down menu. This setting must be identical with the setting of wireless access point you with [...]

  • Seite 18

    13 NOTE: If you connected to an access point but the connection has been dr opped soon, please check security settings and r e-check passwor d spelling.[...]

  • Seite 19

    14 * Use Win dows Z ero Configurati on on Win dows V ista: A. For Windows V ista user , you can use W indows Zero Configuration to con nect to wireless access point. Click „ S tart ‟ button, the n click „ Contr o l P anel. Click „ Netw ork and In tern et ‟ in C ontrol Panel. B. Click „Connect to a network‟ u nder „Network and Sharin[...]

  • Seite 20

    15 C. Click the access point you want to use if it‟ s shown, then click „Connect‟. D. If it‟s an un named access point (i.e. the SSID of this wir eless access point is hidden), you‟ll be prompted to input it‟ s name, and the name must be identical to the SSID setting of the wireless access point y ou‟re connecting to.[...]

  • Seite 21

    16 E. If the access point is protected by encryption method, y ou have to input its sec urity or passphrase here. It must match the encryption setting on the access point. F. If you can see this image, the connection betw e en your computer and wireless ac cess point is successfully est ablished. Click „Close‟ to start netw ork connection.[...]

  • Seite 22

    17 3 Configuration Utility The Configuration Utility is a powerful application that helps you config ure the W ireless L AN Mini USB Adapter and monitor the link status and th e statistics during the communication process. The Configuration Utility appears as an icon on the sy stem tray and desktop of W ind ows. You can open it by double-click on t[...]

  • Seite 23

    18 3.1 Utilit y Overvie w There are several parts in the utility screen. Please refer to the follow ing tabl e fo r the description. Parameter Description Refresh – Refresh adapter list in the “ B “ block. Mode – There are two modes: S tation and Access Point. If “ S tation “ is selected, the adapter works as a wireless adapter . If “[...]

  • Seite 24

    19 W ind ows XP Zero Co nfiguration, check the item. Radio Off – This function is for you to turn of f or turn on the radio of the adapter . If the radio is turned of f, the adapter will not work. It is the stat us bar that displays the curr ent st atus of t he utility . T o close it, please disable the “ S tatus Bar “ in the “ View “ ite[...]

  • Seite 25

    20 3.2 Available Netw ork W hen y ou open the Configuration Utility, the system wil l sca n all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wir eless network with the highest signal s trength . From the “ Available Netw o rk ” tab, all the networks nearby w ill[...]

  • Seite 26

    21 3.3 Ge neral To check the connection status of the adapter, select “ General “ . This screen shows the information of Link Speed, Network Type, Encry ption Method, SSID, Signal Strength, Link Quality and Network Address of the adapter. Paramet er Description S tatus It will show the connection status of th e adapter . S peed It shows the cur[...]

  • Seite 27

    22 connection including None, WEP , TKIP or AES. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. Th e ID prevents the unintentional merging of two co-located WLANs. Signal S trength It indicates the wireless signal strength. Link Quality It indicates the wireless link quality . Network Address It shows [...]

  • Seite 28

    23 3.4 Profile The “ Profiles List ” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set De fault to manage a profile. Parameter Description Av a ilable Profile(s) This list shows the preferred networks for the w ireless connection. Y o u can add, remove, edit, duplicate the preferred netwo[...]

  • Seite 29

    24 3 . 4 . 1 C o n f i g u r e t h e P r o f i l e Parameter Description Profile Name Define a recognizable profile name for you to identify the different netw o rks ( Acce ss Point ). Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID p revents the unintentional merging of two co-loc[...]

  • Seite 30

    25 or Router . If this item is selected, the adapter will work in Ad Ho c mode. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network you are connecting to. Network Authentication This setting has to be consistent with the wirel[...]

  • Seite 31

    26 WP A2 802.1X – Like W P A , W P A2 support s IEEE 802.1x/EAP authentication or PSK technology . It also includes a new advanced encryption mechanism using the A dvanced Encry ption S tandard (AES). AES is required to the corporate user or government users. The difference betw e en WP A and WP A2 is that W P A 2 provides data encryption via the[...]

  • Seite 32

    27 computers within the network. Key Length W hen y ou select the “ W EP an d “ PASSPHRASE “ and this function will display in the current status of the utility. The keys are used to encrypt dat a transmitted in the wireless network. Fill the tex t box by following the rules below . 64 -bit – Input 10-digit Hex values as the encryption keys[...]

  • Seite 33

    28 including CHAP , MSCHAP , MSCHAPv2 and P AP . PEAP speci fies that an EAP -compliant authentication protocol must be used; this adaptor supports MD5, TLS, GTC (Generic T oken Card) and MSCHAPv2. T he client certificate is optional required for the authentication. T unnel Includes MD5, GTC, TLS, MSCHAP-v2. Username The certificate username in the[...]

  • Seite 34

    29 3.5 Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you don ‟ t ensure the status of th e adapter and the network y ou are connecting, please go to the screen for more details.[...]

  • Seite 35

    30 3.6 Statis tics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o recount the statistics value, please click “ Reset “ .[...]

  • Seite 36

    31 3.7 Wi -Fi Protect Setup (WPS) Wi -Fi Protected Setup ( W PS) is the latest wireless network technolo gy which makes wireless network setup become very simple. If you have W PS -enabled wireless access point, and you want to establish a secure connection to it, yo u don ‟ t have to configure the wireless access point and setup data encry ption[...]

  • Seite 37

    32 3. If you click „ Yes ‟ , and the following message will appear on your computer, please select the SSID of wireless access point that you wish to con nect and click „ Select ‟ . 4. Please wait while the install procedure is running and wait for few seconds to two minutes. If a wireless access point with correct PIN code is found, you ?[...]

  • Seite 38

    33 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point ‟ s manufacturer), then click „ PBC ‟ button in wireless configuration utility to start to establish wireless connection by W PS. Please be patient (This may req uire several seconds to one minute to [...]

  • Seite 39

    34 2. W hen t he connection between this wireless netw ork card and access point is successfully established by W PS, and t he in formation about access point you connected to will be displayed.[...]

  • Seite 40

    35 3.8 So ftwa re A P Excepting become a wireless client of other wir eless access points, this w ireless card can act as a wireless service provider also! Y ou can switch this w ireless card‟s operating mode to „AP‟ mode to simulate the function of a real wireless access point by software, and all other computers and w ireless devices can co[...]

  • Seite 41

    36 Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID prevent s th e unintentional merging of two co-located WLANs. The default SSID of the AP is Full Computer Name + “ _AP “ . W ireless adapters connect to the AP should set up the same SSID as the AP . BSSID Display the MA[...]

  • Seite 42

    37 3 . 8 . 1 AP P r o p e r t i e s S e t t i n g To configure software AP, please click “ Config ” button.[...]

  • Seite 43

    38 Please note that Ad -Hoc mode is not available w hen network card is in AP mode. The description of major setup items are listed below: Network Name (SSID) Please input the SSID (the name use d t o ide ntify th is wireless access point) here. Up to 32 numerical characters can be accepted here, excepting spac e . Channel Please select the wireles[...]

  • Seite 44

    39 menu. ASCII / P ASSPHRASE If the encryption method is W EP , check either „ASCII‟ or „P ASSPHRASE‟ box and input it in the box as W EP passphrase. Key Index Select WEP key index (1- 4). If you don‟t know which one you should use, select 1. Network key / Confirm network key IF netw ork au thentication m ode is W P A, please input W P A [...]

  • Seite 45

    40 3 . 8 . 2 AP Ad v a n c e d If you want to setup adv anced settings of software access point, select „Advanced‟ menu. If you don‟t know the meaning and affects of these settings, keep them untouched. Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packet s (milliseconds). The range for the b[...]

  • Seite 46

    41 3 . 8 . 3 AP S ta t i s t i c s You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o recount the statistics value, please click “ Reset “ .[...]

  • Seite 47

    42 3 . 8 . 4 I C S In this page, y ou can assign a network card on your computer as the path for all wireless clients to get connected to Internet. If you have only one network card (except this softw are access point), you don‟t have to select network card here; if you have more than one network card, select the one you wish to be used as Intern[...]

  • Seite 48

    43 4 Troubles hooting & Glossary This chapter provides solutions to problems usually encountered during the installation and operati on of the adapter . If you encounter any problem when you‟re using this w ireless network card, don‟t panic! Before you call y our dealer of purch ase for help, please check this troubleshooting table, t he so[...]

  • Seite 49

    44 he / she can add the MAC address of y our network card to his / her access point‟ s l ist. The network is slow / having problem when transferring large files 1. Move closer to the place where access point is located. 2. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number .[...]

  • Seite 50

    45 4. What is A d - hoc ? An Ad -hoc integrated w ireless LAN is a group of computers, each has a W ireless LAN adapt er , Con nected as an independent wir eless LAN. A d hoc wireless LAN is applicable at a departmental sca le for a branch or SOHO operation. 5. What is Infrastructure ? An integrated wireless and wireless and wired LAN is called[...]

  • Seite 51

    46 12. What i s DSSS ? What is FHSS ? And what are their differences ? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a p attern that is known to both transmitter and receiver . Properly synchronized, the net ef fe ct is to maintai n a single logical channel. T o an unintended receiver , FHSS appe[...]

  • Seite 52

    47 Federal Communication Commission Interference St atement This equipment has been tested and found to comply w ith the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are desig ned to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and ca[...]

  • Seite 53

    48 R&TTE Compliance St a tement This equipment complies with all t he requirements o f DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mu tual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the direc[...]