Edimax EW-7612HPn manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Edimax EW-7612HPn, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Edimax EW-7612HPn one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Edimax EW-7612HPn. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Edimax EW-7612HPn should contain:
- informations concerning technical data of Edimax EW-7612HPn
- name of the manufacturer and a year of construction of the Edimax EW-7612HPn item
- rules of operation, control and maintenance of the Edimax EW-7612HPn item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Edimax EW-7612HPn alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Edimax EW-7612HPn, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Edimax service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Edimax EW-7612HPn.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Edimax EW-7612HPn item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    [...]

  • Page 2

    COPYRIGHT Copyright ©2009/2010 by this company. All ri ghts reserved. No part of this publication may be reproduced, transmitted, transcri bed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, c hemical, manual or otherwise, without the prior[...]

  • Page 3

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radi[...]

  • Page 4

    Federal Communication Commission (FCC) Radiation Exposure S tatement This EUT is compliance with SAR for gener al population/uncontrolled exposure limits in ANSI/IEEE C95.1-1999 and had been tested in accordance wit h the measurement methods and procedures specified in OET Bulletin 65 Supplement C. The equipment version marketed in US is restricted[...]

  • Page 5

    R&TTE Compliance Statement This equipment complies with all the r equirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN P ARLIAMENT AND THE CO UNCIL of March 9, 1999 on radio equipment and telecommunication terminal E quipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and repl aces in the directive [...]

  • Page 6

    English Copyright © by Edimax T echnol ogy Co, L TD. all ri g h t s r e s e r v e d . N o p a r t o f t h i s publication may be reproduced, tr ansmitted, transcribed, stor ed in a retrieval system, or translated into any languag e or computer language, in any form or by any means, electronic, mechanical, magnet ic, optical, chemical, manual or ot[...]

  • Page 7

    CONTENTS 1  INTRODUCT ION ............................................................................. 1  1.1  Features ....................................................................................................................... .. 1  1.2  Specifications ....................................................................[...]

  • Page 8

    1 1 Introduction Thank you for purchasing this high-spe ed wire less network card! Excepting common wirele ss standards 802.11b/g, this wirel ess network card is also able to access 802.11 n wireless networks - data transfer rate is 300Mbps, and that’ s three times faster than 802.11g wireless network! For WLAN security issues, this ada pter supp[...]

  • Page 9

    2 • Temperature: Operating 32 ~104 ° F (0 ~40 ° C), Storage -13~149 ° F (-25~65 ° C) • Humidity: Max. 95% (Non-Condensing) 1.3 Package Contents Before you begin the inst allation, please check the items of your p ackage. The package shoul d include the following items: • One USB Adapter • One CD (Driver/Utility/User’s Manual) • One [...]

  • Page 10

    3 2 Installation Procedure Before you proceed with the inst allation, please notice following descriptions. Note1: The following installation was operated under Windows XP. (Procedures are similar for Windows 2000/Vista/7.) Note2: If you have installed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Hard[...]

  • Page 11

    4 Software Installation This wizard can be run in Windows 2000/XP/V ista/7. Y ou can install the Wireless Adapter by EZMAX Setup Wizard in the CD-ROM including in the p ackage. The wizard is an easy and quick configuration tool fo r internet connection with series process. When you start EZMAX Setup Wizard, you will get the following welcome scre e[...]

  • Page 12

    5 I. Install the Driver and Utility A. Insert the Installation CD to your CD-R OM Drive. Execute the “Setup.exe” program. B. Select Setup Language and click “OK” to proceed. C. Click “Next” to go to the next step.[...]

  • Page 13

    6 D. Now you’ll see the following message, pleas e cli ck ‘Install’ to begin the installation. E. The system start s to install the driver and utility .[...]

  • Page 14

    7 F. Click “Finish” to complete the driver and utility inst allation.[...]

  • Page 15

    8 II. Connect to W ireless Access Point A. T o start configuring the adapter , double click the icon in the system tray or right click the icon and select open confi guration utility . B. The utility of the adapter is displayed. Cli ck “A vailable Network” and double-clic k on the wireless access point you want to connect to.[...]

  • Page 16

    9 C. Input the security setting and click “OK” to start network conn ection.[...]

  • Page 17

    10 * Use Windows Zero Configuration on Windows V ista: A. For Windows Vist a user , you can use Windows Ze ro Configuration to connect to wireless access point. Click ‘S tart’ button, then click ‘Control Panel. Click ‘Network and Internet’ in Control Panel. B. Click ‘Connect to a network’ under ‘Network and Sharing Ce nter ’[...]

  • Page 18

    11 C. Click the access point you want to us e if it’ s shown, then click ‘Connect’. D. If it’s an unnamed acce ss point (i.e. the SSID of this wireless access point is hidden), you’ll be prompted to input it’s nam e, and the name must be identical to the SSID setting of the wireless access point you’re connecting to.[...]

  • Page 19

    12 E. If the access point is protected by encryption met hod, you have to input it s security or passphrase here. It must match the encryption setting on the access point. F. If you can see this image, the connection bet ween your co mputer and wireless access point is successfully esta blished. Click ‘Close’ to start network connection.[...]

  • Page 20

    13 3 Configuration Utility The Configuration Utility is a powerful application that helps you conf igure the Wireless LAN Mini USB Adapter and monitor the link status an d the statistics during the communication process. The Configuration Utility appears as an icon on the sy stem tray and desktop of Windows. You can open it by double-click on the i[...]

  • Page 21

    14 3.1 Utility Overview There are several parts in the ut ility screen. Please refer to the fo llowing table for the descripti on. Parameter Description Refresh – Refresh adapter list in the “B“ block. Mode – Ther e are two modes: S tation and Access Point. If “S tation“ is selected, the adapter works as a wireless a dapter . If “Acce[...]

  • Page 22

    15 It is the status bar that displays t he current status of the utility . T o close it, please disable the “S tatus Bar“ i n the “View“ item. There are several t abs in the block for you to setup the function of the adapter . Please refer to the description in the following sections. 1% ~ 100% Where you can adjust wireless Tx power ( wirel[...]

  • Page 23

    16 Parameter Description Available Net work(s) This list shows all information of the available wireless networks within the range of your adapter . Th e information includes SSID, Channel, Encryption, Network Authentication, Signal and etc. If you want to connect to any network on the list, double-cli ck the selected netw ork. Refresh Click “Ref[...]

  • Page 24

    17 Parameter Description S tatus It will show the connection st atus of the adapter . S peed It shows the current speed T ype Infrastructure – This operation mode require s the presence of an 802.1 1 Access Point. All communication is done via the Access Point or Router . IBSS – Select this mode if you want to connect to another wireless st ati[...]

  • Page 25

    18 3.4 Profile The “Profiles List” is for you to manage the netwo rks you con nect to frequently. You are able to Add/Remove/Edit/Duplicate/Set Default to manage a profile. Parameter Description Available Prof ile(s) This list shows the pref erre d networks for the wireless connectio n. Y ou can add, remove, edit, duplicate the preferred net wo[...]

  • Page 26

    19 3.4.1 Configure the Profile Parameter Description Profile Name Define a recognizable profile name for you to identify the dif ferent networks ( Acce ss Point ). Network Name (SSID) The SSID (up to 32 printabl e ASCII characters) is the unique name identified in a WLAN. The ID prevents the unintentional merging of two co-located WLANs. Y ou may s[...]

  • Page 27

    20 Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. The channel setting should be the same with the network yo u are connecting to. Network Authentication This setting has to be co nsistent with the wireless networks that the adapter intends to connect. Open System – No authe [...]

  • Page 28

    21 Parameter Description Data Encryption Disabled – Disable the WEP Data Encryption. WEP – Enable the WEP Data Encryption. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP – TKIP (T emporal Key Integrity Protocol) chang es the temporal key every 10,000 packets (a p acket is a kind of message transmitted ov[...]

  • Page 29

    22 Parameter Description Confirm Network Key Please enter network se curity key here again. EAP T ype GTC – GTC is an authentication proto col which allows the exchange of clear text authentic ation credential s across the network. TLS – TLS is the most secure of the EAP protocols but not easy to use. It requires that digit al ce rtificates be [...]

  • Page 30

    23 3.5 Status This screen shows the information of manufactu rer, driver version, se ttings of the wireless network the adapter is connecting to, linking time and link stat us. If you don’t ensure the status of the adapt er and the network you are con necting, please go to the screen for more details.[...]

  • Page 31

    24 3.6 Statistics You can get the real time information about t he packet transmissi on and receiving status duri ng wireless communication from the screen. If you want to recount the statistics va lue, please click “Reset“.[...]

  • Page 32

    25 3.7 Wi-Fi Protect Setup (WPS) Wi-Fi Protected Setup (WPS) is the latest wirele ss networ k technology which makes wireless n etwork setup become very simple. If you have WPS-enabled wireless a ccess point, and you want to establish a secure connection to it, you don’t have to configu re the wireless access point and setup data encryption by yo[...]

  • Page 33

    26 3. If you click ‘Yes’, and the following me ssage will appear on your computer, please select the SSID of wireless access point that you wish to co nnect and click ‘Select’. 4. Please wait while the install procedure is running an d wait for few seconds to two minutes. If a wireless access point with correct PIN code is found, you’ll b[...]

  • Page 34

    27 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point’s manufacturer), then click ‘PBC’ button in wireless configuration utility to start to establish wireless conne ction by W PS. Please be patient (This may require several seconds to one minute to comp[...]

  • Page 35

    28 3.8 Software AP You should click “ Mode “ and sele ct “Access Poin t “ to enable Software AP mode.This adapter can run as a wireless AP. The relative configurations of the AP including channel, SSID, WEP encrypti on and so on are described as follows. Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique[...]

  • Page 36

    29 3.8.1 AP Properties Setti ng Please refer to Section 3.4.1 for the setti ng of the parameters for AP. Note that Ad Hoc mode is not enabled for AP.[...]

  • Page 37

    30 3.8.2 AP Advanced Parameter Description Beacon Interval Beacon Interval t hat specifies the duration between beacon packet s (milliseconds). The r ange for the beacon period is between 20-1000 milliseconds with a typical value of 100. DTIM Period Determines the interval th e Access Point will send its broadcast traffic. Defaul t value is 3 beaco[...]

  • Page 38

    31 3.8.3 AP St atistics You can get the real time information about t he packet transmissi on and receiving status during wireless communication from the screen. If you want to recount the statistics va lue, please click “Reset“.[...]

  • Page 39

    32 3.8.4 ICS If you want to connect to the internet through this SoftAP, you will need to make a bridge between our SoftAP and your internet connect. Select the inte rnet connection in your SoftAP host machine and press the “Apply” button.[...]

  • Page 40

    33 4 Troubleshooting This chapter provides solutions to pro blems us ually encountered during the inst allation and operation of the adapter . 1. What is the IEEE 802.1 1g st andard? 802.1 1g is the new IEEE st andard fo r high-speed wireless LAN comm unications that provides for up to 54 Mbps dat a rate in the 2.4 GHz band. 80 2.1 1g is quickly b [...]

  • Page 41

    34 6. What is BSS ID ? A specific Ad hoc LAN is called a Basic Service Set (BSS). Computers in a BSS must be configured with the same BSS ID. 7. What is WEP ? WEP is Wi red Equivalent Privacy , a dat a pr ivacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 .1 1 standard. 8. What is TKIP? TKIP is a quick-fix meth[...]

  • Page 42

    35 13. What is Spread S pectrum ? S pread S pectrum technology is a wideband radio frequency tech nique developed by the military for use in reliable, secure, missi on-critical communication systems. It is desig ned to trade off bandwidt h efficiency for reliability , integrity , and security . In other words, more bandwidth is consumed than in t[...]

  • Page 43

    36 Federal Communication Commission Interference S t atement This equipment has been tested and found to comply with the limit s for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses, and c[...]

  • Page 44

    37 R&TTE Compliance S t atement This equipment complies with all the requirement s of DIRECTIVE 1999/5/EC OF THE EUROPEAN P A RLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in th e direct[...]

  • Page 45

    38[...]