Edimax EW-7722UTn V2 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Edimax EW-7722UTn V2, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Edimax EW-7722UTn V2 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Edimax EW-7722UTn V2. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Edimax EW-7722UTn V2 should contain:
- informations concerning technical data of Edimax EW-7722UTn V2
- name of the manufacturer and a year of construction of the Edimax EW-7722UTn V2 item
- rules of operation, control and maintenance of the Edimax EW-7722UTn V2 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Edimax EW-7722UTn V2 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Edimax EW-7722UTn V2, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Edimax service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Edimax EW-7722UTn V2.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Edimax EW-7722UTn V2 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    EW-7722 UTn V2 EW-7612 UAn V2 User Manual 10 -2011 / v1.0[...]

  • Page 2

    Copyright  by Edimax T echnology Co, L TD. all rights reserved. No p art of this publication may be reproduced, transmitted, transc ribed , stored in a retrieval system, or tran slated into any language or computer language, in any form o r by any m eans, electronic, m echanical, m agnetic, optica l, chemical, manual or otherwise, without the pr[...]

  • Page 3

    Federal Communication Commission Interference Statement This equipment has been tested and found to comply w ith th e limits for a Class B digital device, pursuant to Part 15 of FCC Ru les. Thes e limits are designed to provide reasonable protection against harmful interference in a residential inst allation. This equipment generates, uses, and can[...]

  • Page 4

    R&TTE Compliance Statement This equipment complies with all t h e requirements of DIRECTIVE 1999/5/E C OF THE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the directive [...]

  • Page 5

    CONTENTS 1 I N T R O D U C T I O N .................................................................................... 1 1.1 Features ................................................................................................ ......... 1 1.2 S pecifications ......................................................................................[...]

  • Page 6

    1 1 Introduction Thank you for purchasing this high-speed wireless network card! Excepting common wireless standards 802.11b/g, this wireless netw ork ca rd is also able to access 802.11n wireless networks - data transfer rate is 3 00Mbps ! For WLAN security issues, this adapter supports 64/128-bit WEP data encryption that protects your wireless ne[...]

  • Page 7

    2  Antenna: Chip Antenna (EW -7722UTn V2) High-Gain 3dBi Antenna (EW -7612UAn V2)  Hardware W PS button  Drivers: W indows XP/Vista /7  LEDs: Link/Activity  Temperature: Operating 32~1 04 ° F (0 ~40 ° C) , Storage -13~149 ° F (-25~65 ° C)  Humidity: Max. 95% (Non-Condensing) 1.3 Package Contents Before you begin the installati[...]

  • Page 8

    3 2 Install ation Procedure Before you proceed with the installatio n , p lease notice follow ing descriptions. Note1: The following installation was operated under Windows XP . (Procedures are similar for Windows Vista/7 .) Note2: If you have install ed the Wireless PC Adapter driver & utility before, please uninstall the old version first. Ha[...]

  • Page 9

    4 EW -76 12 UA n V2 1. U SB connector 2. L ink/Activity L ED (Under the case) 3. W PS Button LED N a me Light S tatus Description Link/ Activity Of f No wireless netw ork card is installe d. On Solid light 5 sec onds means W PS connection is establishe d successfully . Blinking W ireless netw o rk card i s norm all y installed /Linked to a wi reles[...]

  • Page 10

    5 Insert the USB wireless network card into an empty USB 2.0 port of your computer when computer is switched on . EW -7722UTn V2 EW -7612UAn V2 Never use force to insert the card, if you feel it’ s stuck, flip the card over and try again.[...]

  • Page 11

    6 The following message will appear on your compute r , click „Cancel‟ Software Installation This wizard can be run in W indow s XP/Vista/7 . Y ou ca n inst all th e W ir eless Adapter by EZMAX Setup W izar d in the CD -ROM including in the package. The wizard is an easy and quick configuration tool for internet connection with series process. [...]

  • Page 12

    7 I. Inst all the Driver and Utility If you prefer the traditional setup procedure. Please insert the installation CD to y ou r CD-ROM Drive, and click “ Exit “ to disable EZmax W izard. If your OS is W indow s Vista/7. Please execute the “ Utility Setup.exe “ program as follows.[...]

  • Page 13

    8 Click “ Next ” to go to the next step.[...]

  • Page 14

    9 Now you ‟ ll see the following message, please click „ Install ‟ to begin the installation. The system start s to install the driver and utility . Click “ Finish ” to complete the driver and utility installation.[...]

  • Page 15

    10 II. Conn ect to Wir eless Access Point A. T o st art con f iguring the adapter , double click the icon in the sy stem tray or right click the icon and select open configuration utility . B. The utility o f the adapt er is displayed. Click “ Av a ilable Network ” and double-click on the wireless access point you want to connect to. If the wir[...]

  • Page 16

    11 NOTE: Network security type ( ‘ Network Authentication ’ and ‘ Data encryption ’ ) will be selected automatically based on wir eless access point ’ s sec urity setting. It ’ s not r equir ed to change these settings by yourself. C. Input the security setting (WEP key) and click “ OK ” to st art network connection. All opti on s i[...]

  • Page 17

    12 hoc connection. Network Authentication Select the network authentication type from drop-down menu. T his setting must be identical with the setting of wireless access point you w ith to connect. Data encryption Select the data encry pt ion type from drop -down menu. This setting must be identical with the setting of wireless access point you wit[...]

  • Page 18

    13 NOTE: If you connected to an access point but the connection has been dr opped soon, please check security settings and r e-check passwor d spelling.[...]

  • Page 19

    14 * Use Windows Z ero Conf iguration on Win dows V ista : A. For Windows V ista user , you can use W indows Zero Configuration to con nect to wireless access point. Click „ S t art ‟ button , then cli ck „ Control Panel. Click „ Ne twork and Internet ‟ in Contr ol Panel. B. Click „Connect to a network‟ u nder „Network and Sharing C[...]

  • Page 20

    15 C. Click the access point you want to use if it‟ s shown, then click „Connect‟. D. If it‟s an un name d access point (i.e. the SSID of this w ireless acce ss point is hidden), you‟ll be prompted to input it‟ s name, and the name must be identical to the SSID setting of the wireless access point y o u‟re connecting to.[...]

  • Page 21

    16 E. If the access point is protected by encryption method, y ou have to input its sec urity or passphrase here. It m ust match the encryption setting on the access point. F. If you can see this image, the connection betw een your com puter and wireless ac cess point is successfully est ab lished. Click „Cl o se‟ to start network connection.[...]

  • Page 22

    17 3 Configuration Utility The Configuration Utility is a powerful application that helps you config ure t he W ireless L AN Mini USB Adapter and monitor the link status and the statistics during the communication process. The Configuration Utility appears as an icon on the sy ste m tray an d desktop of W ind ows. You can open it by double-click on[...]

  • Page 23

    18 3.1 Utilit y Overvie w There are several parts in the utility screen. Please refer to the follow ing tab l e for the description. Parameter Description Refresh – Refresh adapter list in the “ B “ block. Mode – There are two m odes: S tation and Access Point. If “ S tation “ is selected, the adapter works as a wireless adapter . If ?[...]

  • Page 24

    19 W ind ows XP Zero Configuration, check the item. Radio Off – T his function is for you to turn of f or turn on the radio of the adapter . If the rad io is t urned off, the adapter will not work. It is the st atus bar th at displays the current s tatus of the utility . T o close it, please disable the “ S tatus B ar “ in the “ View “ it[...]

  • Page 25

    20 3.2 Available Netw ork W hen y ou open the Configuration Utility, the sy ste m will scan a ll the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wir e less network with the highest signal s trength . From the “ Available Netw ork ” tab, all the networks nearby w il[...]

  • Page 26

    21 3.3 Ge neral To check the connection status of the adapter, select “ General “ . This screen shows the information of Link Speed, Network Type, Encry p tion Method, SSID, Signal Strength, Link Quality and Network Address of the adapter. Paramet er Description S tatus It will show the connection status of th e adapter . S peed It shows the cu[...]

  • Page 27

    22 connection including None, WEP , TKIP or AES. SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. Th e ID prevents the unintentional merging of two co-located WLANs. Signal S trength It indicates the wireless signal strength. Link Quality It indicates the wireless link quality . Network Address It shows [...]

  • Page 28

    23 3.4 Profile The “ Profiles List ” is for you to manage the networks you connect to frequently. You are able to Add/Remove/Edit/Duplicate/Set De f ault to manage a profile. Parameter Description Av ailable P rofile(s) This list shows the preferred networks for the w i reless connection. Y ou can add, remove, edit, duplicate the preferred netw[...]

  • Page 29

    24 3 . 4 . 1 Co n f i g u r e t h e P r o f i l e Parameter Description Profile Name Define a recognizable profile name for you to identify the different netw orks ( Access Point ). Network Name (SSID) The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID prevents the unintentional merging of two co-located[...]

  • Page 30

    25 or Router . If this item is selected, the adapter will work in Ad Ho c mode. Channel This setting is only available for Ad Hoc mode. Select the number of the radio channel used for the networking. T he channel setting should be the same with the network you are connecting to. Network Authentication This setting has to be consistent with the wire[...]

  • Page 31

    26 WP A2 802.1X – Like W P A , W P A2 support s IEEE 802.1x/EAP authentication or PSK technology . It also includes a new advanced encryption mechanism using the A dvanced Encry p tion S tandard (AES). AES is required to the corporate user or government users. The difference betw een W P A and WP A2 is that W P A 2 provides data encryption via th[...]

  • Page 32

    27 computers within the network. Key Length W hen y ou select the “ WEP and “ PASSPHRASE “ and this function will display in the current status of the utility. The keys are used to encrypt dat a transmitted in the wireless network. Fill the tex t box by following t he rules below . 64 -bit – Input 10-digit Hex values as the encryption keys.[...]

  • Page 33

    28 including CHAP , MSC HAP , MSCHAPv2 and P AP . PEAP speci f ies that an EAP-compliant authentication protocol must be used; this adaptor supports MD5, TLS, GTC (Generic T oken Ca rd) and MSCHAPv2. The client certificate is optional required for the authentication. T unnel Includes MD5, GTC, TLS , MSCHAP-v2. Username The certificate username in t[...]

  • Page 34

    29 3.5 Status This screen shows the information of manufacturer, driver version, settings of the wireless network the adapter is connecting to, linking time and link status. If you don ‟ t ensure the status of the adapter and the network you are connecting , please go to the screen for more details.[...]

  • Page 35

    30 3.6 Statis tics You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o reco unt the statistics value, please click “ Reset “ .[...]

  • Page 36

    31 3.7 Wi -Fi Protect Setup (WPS) Wi -Fi Protected Setup ( W PS) is the latest wireless network technology which makes wireless network setup become very simple. If you have W PS -enabled wireless access point, and you want to establish a secure connection to it, yo u d on ‟ t have to configure the wireless access point and setup data encry ptio [...]

  • Page 37

    32 3. If you click „ Yes ‟ , and the following message will appear on your computer, please select the SSID of wireless access point that you wish to con n ect and click „ Select ‟ . 4. Please wait while the install procedure is running and wait for few seconds to two minutes. If a wireless access point with correct PIN code is f ound, you [...]

  • Page 38

    33 II. Push Button Config (PBC) 1. Start PBC pairing procedure at access point side (please refer to the instruction given by your access point ‟ s manufacturer), then click „ PBC ‟ button in wireless configuration utility to start to establish wireless connection by W PS. Please be p atient (This may require several seconds to one minute to [...]

  • Page 39

    34 2. W hen t he connection between this wireless netw ork card a nd access point is successfully e stablished by W PS, and the i nf ormation about acce ss point you connected to will be displayed.[...]

  • Page 40

    35 3.8 So ftwa re A P Excepting become a wireless client of other wir eless access points, this w ireless card can act as a wireless service provider also! Y ou can switch this w ireles s card‟s operating mode to „AP‟ mode to simulate the function of a real wireless access point by software, and all other computers and w ireless de vices can [...]

  • Page 41

    36 Parameter Description SSID The SSID (up to 32 printable ASCII characters) is the unique name identified in a W LAN. The ID prev ents the unintentional merging of two co-located WLANs. The default SSID of the AP is Full Computer Name + “ _AP “ . W ireless adapters connect to the AP sho uld set up the same SSID as the AP . BSSID Display the MA[...]

  • Page 42

    37 3 . 8 . 1 AP P r o p e r t i e s S e t t i n g To configure software AP, please click “ Config ” button.[...]

  • Page 43

    38 Please note that Ad -Hoc mode is not available w he n network card is in AP mode. Th e description of major setup items are listed below: Network Name (SSID) Please input the SSID (the name used to identify t his wireless access point) here. Up to 32 numerical characters can be accepted here, excepting spac e. Channel Please select the wireless [...]

  • Page 44

    39 menu. ASCII / P ASSPHRASE If the encryption method is WEP , check eith er „ASCII‟ or „P ASSPHRASE‟ box and input it in the box as W EP passphrase. Key Index Select WEP key in dex (1- 4). If you don‟t know which one you should use, select 1. Network key / Confirm network key IF netw o rk authentication mode is W P A, please input W P A [...]

  • Page 45

    40 3 . 8 . 2 AP Ad v a n c e d If you want to setup adv a nced settings of softw are a ccess point, select „Advanced‟ menu. If you don‟t know t he meaning and af fe cts o f these settings, keep them untouched. Parameter Description Beacon Interval Beacon Interval that specifies the duration between beacon packet s (milliseconds). The range fo[...]

  • Page 46

    41 3 . 8 . 3 AP S ta t i s t i c s You can get the real time information about the packet transmission and receiving status during wireless communication from the screen. If you want t o reco unt the statistics value, please click “ Reset “ .[...]

  • Page 47

    42 3 . 8 . 4 I C S In this page, y ou can assign a network card on your computer as the path fo r all wireless clients to get connected to Internet. If you have only one network card (except this softw are a ccess point), y o u don‟t have to select network card here; if you have more than one network card, select the one you wish to be used as In[...]

  • Page 48

    43 4 Troubles hooting & Glossary This chapter provides solutions to problems usually encountered during the installation and operati on of the adapter . If you encounter any problem when you‟re using this w ireless ne twork card, don‟t panic! Before you call y ou r dealer of purcha se for help, please chec k th is troubleshooting table, t h[...]

  • Page 49

    44 he / she can add the MAC address of y ou r network card to his / her access point‟ s l ist. The network is slow / having problem when transferring large files 1. Move closer to the place where access point is located. 2. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number [...]

  • Page 50

    45 4. What is A d -hoc ? An Ad -hoc integrated w i reless LAN is a group of computers, each has a W ireless LAN adapt er , Connected as an independent wireless LAN. Ad hoc wireless LAN is applicable at a departmental scale fo r a branch or SOHO operation. 5. What is Infrastructure ? An integrated wireless and wireless and wired LAN is called an[...]

  • Page 51

    46 12. What is DSSS ? What is FHSS ? And what are their differences ? Frequency-hopping spread-spectrum (FHSS) uses a narrowband carrier that changes frequency in a p attern t hat is known to both transmitter and receiver . Properly synchronized, the net ef fect is to maintain a single logical channel. T o an unintended receiver , FHSS appear[...]

  • Page 52

    47 Federal Communication Commission Interference St atement This equipment has been tested and found to comply w ith th e limits for a Class B digital device, pursuant to Part 15 of FCC Ru les. T hese limits are de signed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and[...]

  • Page 53

    48 R&TTE Compliance St a tement This equipment complies with all t h e requirements of DIRECTIVE 1999/5/EC OF T HE EUROPEAN P ARLIAMENT AND T HE COUNCIL of March 9, 1999 on radio equipment and telecommunication terminal Equipment and the mu tua l recognition of their conformity (R&TTE) The R&TTE Directive repeals and replaces in the dir[...]

  • Page 54

    49[...]