Edimax 802.11g manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Edimax 802.11g, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Edimax 802.11g one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Edimax 802.11g. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Edimax 802.11g should contain:
- informations concerning technical data of Edimax 802.11g
- name of the manufacturer and a year of construction of the Edimax 802.11g item
- rules of operation, control and maintenance of the Edimax 802.11g item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Edimax 802.11g alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Edimax 802.11g, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Edimax service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Edimax 802.11g.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Edimax 802.11g item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    8 8 0 0 2 2 . . 1 1 1 1 g g W W i i r r e e l l e e s s s s L L A A N N P P C C I I A A d d a a p p t t e e r r User M an u al[...]

  • Page 2

    V e r si o n : 1. 1 ( Ju n e, 2 005) COP YR IG HT C opy r i g ht © 2 005 / 2006 b y t his c om pan y. A ll r ig ht s r es e r v ed . No pa r t o f t h is pu blic ation m a y be r epr o duce d, t rans m it t ed , t r ans c r ibe d, s t or e d in a r e trie val s y s t em , or t r ans la t ed in t o an y langu age or c om pu t er la nguage , in an y[...]

  • Page 3

    F e d er al C o mmu ni ca ti on C o mmi ss io n In t e r f er enc e St at em en t T his equipm en t has been t es ted and f ound t o c om pl y wi t h t he l im it s f o r a Clas s B digi t a l de v i ce , pu r s uant t o Par t 15 o f F CC Rul es . T hes e l im it s are des ign ed t o pro v ide reas onable p ro t e ct ion agai ns t ha rm f ul in t e[...]

  • Page 4

    R &T T E C o mp l i an ce S t at emen t T his equipm en t c om plies wi t h a ll t he r eq uirem en t s of D I R E C T I V E 1999 / 5 / C E O F T H E EU R O PEA N PA R LIA M ENT A N D T H E C O U N C I L o f M a r ch 9 , 1 9 9 9 o n r adio eq uipm en t and t ele c om m unic a t ion t e r m inal E qu ipm ent a nd t he m ut u al r ec o gni t ion [...]

  • Page 5

    CO N TE NTS 1 I NTR O D UC TI O N ............................................................. 1 1.1 F EA TU R E S ........................................................................................ 1 1.2 S PE C I FI CA T IO N S ................................................................................ 1 1.3 P AC KAG E C ON TE N TS ....[...]

  • Page 6

    1 Introduction T han k y ou fo r pu r cha s i ng th e 802.11g W i r el e s s L AN C a r bu s Adap te r . T hi s A dapte r i s de s i gn ed to c ompl y w i th I EEE 802.11g W i r el e s s LA N st anda r d and ea s y to c ar r y w i th the Mi ni s i ze . I t i s s ui tabl e fo r any La ptop o r D e sk t op c om pu te r s . T hi s adap te r s up port [...]

  • Page 7

    • D i m ens i o n: 8( H ) x 11 8( W ) x 54( D ) m m • T e mp er at ur e: 32~ 13 1° F ( 0 ~ 55°C ) • H um i d i ty : 0- 9 5% ( N onC o nd ens i n g) • Ce rt i f i c atio n : F CC, CE 1. 3 P ackag e C o n t en ts Be for e y ou begi n t he in s tal l ati on, plea s e c hec k the i tem s o f y our pac k age. T he pac kage s h oul d i nclude t[...]

  • Page 8

    2 Installation Procedure Be for e y ou p r oc eed w i th t he i n s tal l ati on, pl ea s e noti c e f ol l ow i ng de s c r i ption s . Not e 1 : The fol l ow i ng i ns ta l l a tion w as ope r a te d i n Window s X P . (P r oc e dur e s a r e s i m i l a r for W i ndow s 9 8 S E / M e / 2 0 0 0 ) N o t e2: If yo u h a ve in st all ed t h e W ir e[...]

  • Page 9

    Ta b l e 2- 1. I n s t a l le r I n s t a l la t i o n S e le c t i o n s R ad i o B u t t o n D escr ip t i o n I n s t a ll C lie nt Ut ilit ie s and Dr i v e r (r ec om mended ) I n s t a ll s t he d r iv e r a n d c lien t u t ilit ies . T hi s i s t h e r e c o mme n d s option . In s tal l D r i ve r O nl y In st al l s o nl y t he d r ive r [...]

  • Page 10

    1 3 .W in d o w s m a y d is p la y a W in d o w s L o g o e r r o r fo r th e W LA N d r ive r . C li c k C lic k C ont i nue A ny w a y . T h e in s ta lle r c o n tin ue s in s ta lla tio n . 1 4 . C l i ck O K a t th e p ro m p t to r e b oo t a n d co m p l e te th e i n s ta ll a tio n . 5[...]

  • Page 11

    Insta l li ng the Ath e r o s U SB W i re l e ss N e t w o r k Adapt e r T o in s ta ll th e U SB d r iv e r a n d th e Ath e r o s C lien t Uti lit y, s ee “T o in s ta ll th e ACU and US B de v i c e dr i v er :” o n pag e 2- 1. T o in s ta ll th e U SB De vi c e Dr ive r s e p a r a te ly: 1 . In ser t t h e U S B dev ic e i nt o t he c om p[...]

  • Page 12

    4 . C l i c k Fi n is h to clo s e th e F o u n d N e w H a rd w a re W iza rd a n d co m p l e te i n s ta ll a ti o n of t h e US B dev i c e b oot l oa der . 5 . T h e F o un d Ne w H a rd w a re W i z a rd o pe n s t o i ns t a l l s o f t w a re f o r th e U S B d e v i ce . C l i c k N e x t t o c ont inue. 6. C h oo s e S e a r c h fo r dr i[...]

  • Page 13

    7. W i ndow s m ay di spl ay a Wi nd o w s L o go err or for t he WLA N dri v er . Cl i c k C o n tin u e An y w a y. T h e in s ta lle r w i ll c o n tin u e th e in s ta lla tio n . 8 . C l i c k Fi n is h to clo s e th e F o u n d N e w H a rd w a re W iza rd a n d co m p l e te i n s ta ll a ti o n o f th e Ath e r o s U SB N e t w o r k Ad a p[...]

  • Page 14

    F or W indow s XP , t he r e i s a “ W i ndo w s Z e r o C on fi gur a ti on T ool ” b y def aul t fo r y ou t o s e tup w i r ele s s c lie n t s . I f y ou w an t t o u s e t he U t ilit y o f t he USB adap t er, pl ea s e foll ow one of t he w a y s as b e l ow . A . Doubl e - c l i c k the i c on. B. C l i c k “A d v a n c e ”. C. U n c[...]

  • Page 15

    3 Configuration Utility The C lie nt U t ilit y i s a u s er- m ode ut ilit y d e s ig n e d t o edi t and ad d p r of i l e s f or , as w e l l as di s pl a y and di agno s ti c s pe r taini ng to a s el ect e d w i r el e s s U SB adapte r . 3. 1 W i rel es s C o n n ecti o n St at u s When y ou ope n the C on figur a tion U t ilit y , t he s y s[...]

  • Page 16

    3 .2 Pr of ile Ma na ge m e nt P a r ame te r D e s c r ipt ion N ew T o add a ne w c on figur a tion p r of i l e, c l i c k Ne w on the P r o fil e Managem ent t ab. T o m odi f y a c on fi gur a t i on p r of i l e, s el e c t the c onfi gu r at i on f r om the P r ofi l e l i s t and c l i c k the Modi fy bu tto n . Modi fy In t he At h er os C[...]

  • Page 17

    3. B r o w s e to the di r ec to r y to ex po r t the p r o fil e to. 4. Cl i c k Sav e . The p r ofil e i s e x po r ted t o th e s pe c i fi ed l oc a tion. O r d e r P r o f ile s In c l uding a p r ofil e i n t he auto s elec tion fea t ur e al l ow s the w i r el e s s adap t er to au t om aticall y s el ec t tha t p r of i l e f r om the l i [...]

  • Page 18

    3. 4 S ecu ri ty T hi s C hapte r de s c r i be s s etting up s e c u r i ty u s i ng th e Athe r o s C l i ent U t ilit y ( A C U) . Whi l e u s i ng the A the r o s U SB w i r el e s s ne tw o r k adapt e r , enc r ypt i on da ta can p r ote c t it s a s i t i s t r an s m i tt ed th r ough the w i r el e s s net w o rk . W hi l e us i ng th e At[...]

  • Page 19

    T h i s i s bec aus e th e W EP k ey s of al l dev i ces th at ar e t o c o m m un i c at e w i t h e ach o t h e r mu s t m a t c h . Au th en ti c a t i o n Pr oc ess Ena bl i ng EAP on t h e acc es s poi nt an d c onf i g ur i ng th e U SB dev i c e to LE AP, EAP- T LS , PE AP ( E AP- G T C ) , or P EAP ( EAP- M SC H AP V2) a u th en ti c at i o[...]

  • Page 20

    tha t Al l ow A s s o c i ati on to M i x ed C el l s i s c hec k ed on t he S e cu r i t y Ta b to al l ow a s s o c i ation. Pr e - Sh a r e d Ke y ( Sta t i c WEP ) Enable s the u s e of p r e -sha r ed key s tha t a r e de f i ned on bo t h th e a c c e s s p oint and t he s tation. T o defi ne p r e- sha r ed en c r yp tion k e y s , c hoo s e[...]

  • Page 21

    U s ing E A P - TLS S ec u r it y I m p ort a n t N o te : T o u s e EAP - T T LS s e c u r i ty , the ma c hi ne m u s t alr e ady ha v e the EA P- T T LS c e r ti fi c ate s do w nl oaded onto i t f r om a C e rti ficat e Autho r i t y ( C A ) . Plea s e c he c k w i th y our IT adm i ni s t r at o r . To u s e E AP - TLS s e c u r it y I n t he [...]

  • Page 22

    U s ing E A P - TTL S S ec u r i t y I m p ort a n t N o te : T o u s e EAP - T T LS s e c u r i ty , the ma c hi ne m u s t alr e ady ha v e the EA P- T T LS c e r ti fi c ate s do w nl oaded onto i t f r om a C e rti ficat e Autho r i t y ( C A ) . Plea s e c he c k w i th y our IT adm i ni s t r at o r . To u s e E AP s e c u r it y I n t h e A [...]

  • Page 23

    U s ing PE A P- G TC S e c u r it y I m p o r ta n t No te ! T o u se PE A P ( E A P - G T C ) secu ri ty , t h e se r v er m u s t h av e W P A - PE A P ce r t ifica t es, a n d t h e C e r t i f ica t e A u t h o r i t y ( C A ) serv er p r o p er t ies must alr ea d y b e se t u p . Pl ease ch e ck w ith yo u r I T a d m inistra t o r. T o us e [...]

  • Page 24

    7. C hoo s e T o k en or St ati c Pa ss w o r d , depe ndi ng on th e u s e r databa s e. N ote that To k en u s e s a ha r dw a r e to k en dev i c e o r t he Se c u r e C om puting SofT o k en p r og r am ( v e rs i on 1.3 or l ate r ) to ob tai n and en te r a one - ti m e pa s sw o r d dur i ng auth enticat i on . 8. Cl i c k Adv an ced and : ?[...]

  • Page 25

    5. Spe cify a u ser na m e fo r i n ne r PEAP t unnel authen ti c ation: – C hec k Us e W i ndow s Us e r N am e to u s e the W i n do w s u s er n am e a s the PEAP u s er nam e. – O R : Ente r a PEAP u s e r na m e i n the U s e r N a m e f i e l d to u se a s epa r at e u s e r nam e an d st ar t the PEAP au t hent i c ation p r o c e s s . [...]

  • Page 26

    U s ing LE A P S ec u r ity I m p ort a n t N o te ! LE AP s e c ur i t y r equi r e s that al l i nfr a s t r uc tu r e de v i c e s ( e. g. ac c e s s poi nt s and s e r v e r s ) a r e conf i gu r ed fo r L EAP au t hentica tion. C hec k w i th t he IT m anage r . To u s e s e c u r it y I n the A t he r o s C lien t U t ilit y , a c c e s s t h[...]

  • Page 27

    o C hec k U s e W indow s U s e r N am e to u s e the W i n do w s u s er n am e a s t he L EAP u s er nam e. o OR : C h e ck M anual l y P r om pt fo r LEAP U s e r N ame and Pa s s w or d to manual l y l ogi n and s ta r t the LE AP au thent i ca tion p r oc e s s . Se l e ct to U s e Sa ved U s er N ame and Pa s s w o r d b y c hoo s i ng the r [...]

  • Page 28

    5. En ter the W P A pa s s ph r a s e ( fo r A SC II t e x t, ente r 8 - 63 cha r a ct e r s , f o r he xade c i mal , ente r 64 c har a c te rs ) . C l i c k OK . 6. C l i c k O K and enabl e the p r ofi l e. 3. 4. 3 P r e - S h a r ed E n cry p ti o n K ey s T o u s e P r e - S ha r e d K e y ( s ta ti c W E P) s ecur i ty I n t h e A th er o s C[...]

  • Page 29

    c onfi gu r at i on s ecu r i ty . At lea s t one Sha r ed Key f i el d m u s t be popul ated to ena bl e s e c u r i ty u s i ng a s ha r ed k ey . C l i c k o n the r adi o butt on to set the k ey a s t he default e n cr yp t i o n ke y . WEP Key Si z e D efine s the s i z e f o r eac h enc r ypt i on k ey . T he opti on s i nclude: o 64 - bi t ([...]

  • Page 30

    4 Troubleshooting T hi s chapt e r p r o v i de s s ol ution s to p r obl em s u s ual l y enc oun ter ed du r i ng the i n s tall ati on and ope r ati on of t he adapte r . 1. F o r W i n d o w s 98SE c o m p u t e r s, i f t h e A t h er o s C l i en t U t il i t y f ail s to lo a d af t e r p ro p e r ly in s t a l l at io n , c li c k o n t h e[...]

  • Page 31

    s c heme s found i n 802.11b i nc l uding C C K fo r 11 and 5.5 M bp s a nd Ba r k e r c ode modul at i on f or 2 and 1 M bp s . B. A pr o tec ti on m ec hani s m c al l ed R T S/C T S that gov e r n s ho w 802.1 1g dev i c e s and 802. 11b de v i ce s i nt e r ope r ate. 2. W h at is t he I EEE 80 2 .11b s t an d a r d ? T he IE EE 802 .11b W i [...]

  • Page 32

    and how e ve r c om m uni cat ed o r st o r ed , w hi le m a k i ng m o r e ef ficient u s e of ha r dw ar e and/ or s of twar e t han p r e v i ou s enc r y pti on s tanda r d s . I t i s al so inc l uded i n I EEE 802.11i s t anda r d. C ompa r e w i th AES, T K IP i s a tem p o r a r y p r otocol fo r r e pl ac i n g W E P s e cu r i ty until m [...]