Intellinet Network Solutions 525336 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Intellinet Network Solutions 525336, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Intellinet Network Solutions 525336 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Intellinet Network Solutions 525336. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Intellinet Network Solutions 525336 should contain:
- informations concerning technical data of Intellinet Network Solutions 525336
- name of the manufacturer and a year of construction of the Intellinet Network Solutions 525336 item
- rules of operation, control and maintenance of the Intellinet Network Solutions 525336 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Intellinet Network Solutions 525336 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Intellinet Network Solutions 525336, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Intellinet Network Solutions service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Intellinet Network Solutions 525336.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Intellinet Network Solutions 525336 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    NANO 150N WIRELESS USB ADAPTER USER MANUAL MODEL 525336 I N T - 525336 - UM -0 212 - 01[...]

  • Page 2

    CONTENTS 1 Introduc tion .............................................................................................................. 1 1.1 Features ................................................................................................................................ .... 1 1.2 Specif icati ons ..........................................[...]

  • Page 3

    1 1 Introduction Thank you f or purchasi ng the I NTELLI NET NETWORK SOLUTI ONS™ Nano 15 0N Wirel ess USB Adapter, Model 525336 . By following th e simple steps in this user ma nual, you will soon be able to enjoy the hel pful feat ures list ed below . 1.1 Features • Connects your n etbook, laptop or desk top PC to a wireless network • Fits d[...]

  • Page 4

    2 System Requir ements • Notebook or Desk top PC with Penti um 300 MHz - compatible processor or higher • Window s X P, Vis ta and Win dows 7 • Available Hi - Speed USB 2.0 por t Package Conte nts • Nano 150N Wi reles s USB Ada pter • Quick i nstal l gu id e • Setup CD wit h user manual[...]

  • Page 5

    3 2 Installation Procedure Before you procee d wit h the inst allation, note the following . Note1: The fol lowing inst allat ion was operat ed under Windows XP. ( Procedure s are simil ar for Windo ws 2 000/ Vist a /7.) Note2: If y ou have installed th e Wire less PC Adapt er driver and utility before, uni nstall the old version first . I. Install[...]

  • Page 6

    4 D. When you se e the followi ng screen, cli ck “ Install ” to begin the installa tion. E. The syst em starts to inst all th e driver and util ity. F. Clic k “Fi nish” to c omplete the drive r and util ity inst allat ion.[...]

  • Page 7

    5 II. Connect to a Wireless Access Point A. To star t confi guring t he adapter, double - click t he icon in the system tr ay or right - click the icon and select “O pen configurat ion util ity. ” B. The uti lity of the adapter i s display ed. Click the “Availab le Network” ta b and double - click on the wirele ss acc ess po int you want to[...]

  • Page 8

    6 * Use Window s Zero Configura tion on Windows Vista / 7 : A. Wit h Windows Vista / 7, yo u can us e Wi ndows Zero Configuration t o connect to a wirel ess a ccess point. Click “Start,” then click “ Contro l Pane l. ” Click “ Network and I nter net ” in the Control Panel . B. Clic k “ Connec t t o a ne twork ” under “ Networ k an[...]

  • Page 9

    7 C. Clic k the acces s poi n t you wa nt to use if it’s s hown, th en click “C onnect.” D. If it’s an unnam ed ac cess poin t (i.e. , the SS ID of this w ireless ac cess po int is hidde n), you’ll be prompted to input it s name, and the name must be identical t o the SSID setting of the wireless a ccess point you’re connecting t o.[...]

  • Page 10

    8 E. If the acces s point is pro tected b y an encryption method, you need to input its secu rity or passphrase here. It must match the encrypti on setting on the access point. F. If you can s ee the sc reen belo w, the co nnecti on between your compu ter and w ireless ac cess poin t has been successfully est ablished. Click “ Cl ose ” to start[...]

  • Page 11

    9 3 C onfiguration Utility The Configur ation Uti lity is a powerf ul appli cation that hel ps you conf igure t he a dapter and moni tor t he link statu s and statistics during the communication process. The Configur ation Uti lity appears as an icon on the syst em tray and desktop of Windows. You can open it by double - click ing the icon. Right -[...]

  • Page 12

    10 Parameter Descrip tion Refresh – Refresh the adapter list in the “B“ block. Mode – There a re two m odes: S tation and Access Point. If “Station“ is selecte d, the adapte r works as a w ireless adapte r. If “Access Po int“ is selected, the a dapter will works as a wireless AP. View – Enab le “Status Bar“ and the “D“ b l[...]

  • Page 13

    11 Parameter Descrip tion Availabl e Networ k(s) This li st shows al l inf ormation of the avai lable wi reless n etworks within the range of your adapter ( SSID, Chan nel, En crypti on, Network Authen ticat ion, Signa l etc. ). T o connect to any network on the lis t, double - cli ck the selected network. Refresh Click “Refr esh“ to up date t [...]

  • Page 14

    12 Encrypti on This displays the encryptio n setting o f the curren t conne ction: None, WEP, TKIP or AES. SSID The SSID (up to 32 pr intable ASCII charac ters) i s the uni que name identified in a WLAN. The I D prevents the unintentional mergi ng o f t wo c o - loc ated WLANs. Signal Strengt h This indicates the wireless s ignal stren gth. Link Qu[...]

  • Page 15

    13 3.4.1 Configure the Profile Parameter Descrip tion Profil e Name Define a rec ognizab le profile na me so you can iden tify different networks. Network Name (SSID) The SSID (up to 32 printable AS CII charac ters) is the uni que name identified in a WLAN. The ID prevents the unintentional mergi ng of t wo co - located W LANs . You may spe cify a [...]

  • Page 16

    14 business users who do not have access to network authenticati on servers. In this m ode, known as Pre - Shared Key, the user manual ly ente rs the starti ng passwo rd i n th eir access point or gateway, as well as in each w ireless st ation in the network . WPA - PSK ta kes over automati cally from t hat point, keeping unauthorized users that do[...]

  • Page 17

    15 ASCII The WEP k ey can be in ASCII format ( a lphanu meric va lues or signs are allowed ) so it’s more recogni zable f or user s. PASSPHRASE This is a text string w ith a ma ximu m of 32 alphanume ric characters; for example, “Test.” The WE P key is based o n the p assphrase determined by you. This passphrase ma y not work with other vendo[...]

  • Page 18

    16 Password User’s password in the RADIUS s erver. Certif icate Select the certifi cate for RADIUS server a uthentication . 3.5 Status This screen shows information about th e manu facturer, d river versio n, settings o f the wirele ss netw ork the adap ter is conn ecting to, lin king time and link s tatus. If you ’re u nsure about the status o[...]

  • Page 19

    17 3.7 Wi -Fi Protect Setup (WPS) Wi - Fi Pr otected Setup (WPS) is the latest wirel ess network technol ogy , which makes wireless n etwork setup becom e ver y sim ple. If you have a WP S- enabled wir eless access point an d y o u w a n t to es t a b li s h a secure connection t o it, you don’t nee d to configu re the w ireless acc ess poin t an[...]

  • Page 20

    18 3. If you click “ Yes ” and the fo llo wi ng m essage appear s on y our computer, select the SS ID of the wireless access point that y ou w ant to con nect to an d click “ Select .” 4. You’ll need to wait up to two minutes while the install procedure ru n s . If a wireles s acces s point with th e correct PIN code is found, you’l l b[...]

  • Page 21

    19 II. Push Button Config (PBC) 1. Start the PBC pairing procedure on the access point side ( refer to the instruction s given by your access point’s m anufacturer), then cl ick “ PBC ” in the wireless co nfiguratio n utilit y to start to establ ish a wire less connect ion by W PS. (Th is may re quire up to a m inute to complete . ) 2. When t[...]

  • Page 22

    20 3.8 Software AP This adapte r can run as a wireless AP. The re lative con figurations of the AP ( channel, SSID, WEP encryption and so on ) are describ ed below . Parameter Descrip tion SSID The SSID (up to 32 printable AS CII charac ters) is the uni que name identified in a WLAN. The ID prevents the unintentional mergi ng of t wo co - located W[...]

  • Page 23

    21 3.8.1 AP Properties Setting R efer to Sect ion 3.4.1 for the se tting of the parame ters for the AP. Note that Ad Hoc mode is not enabled for the AP. 3.8.2 AP Advanced[...]

  • Page 24

    22 Parameter Descrip tion Beacon Interval This specifies the duration b etween beacon packets (milliseconds ). The range fo r the beac on period is 20 - 1000 mill iseconds , with a typ ical value o f 100. DTIM Peri od This d etermines the interval the a ccess p oint will send its broadcast traf fic. Default value is 3 beacons. Preamble The preamble[...]

  • Page 25

    23[...]

  • Page 26

    24 Reference Terminology 1. What is t he I EEE 802 .11g s tandard ? 802.11g is t he new IEEE standard for high - speed wirel ess LAN communications that provides for up to 5 4 Mb ps data rate in t he 2.4 GHz band. 802.11g is qui ckly becoming the next mains trea m w ireless L AN tech nology fo r home, o ffice and p ublic netw orks. 802.11g defines [...]

  • Page 27

    25 7. What is TKI P? TKIP is a quick - fix m ethod to q uickly ove rcome the inhere nt weak nesses in WEP security, especially t he reuse of encryption keys. 8. What is AES ? AES (Advanc ed Encryption Standard), a chip -based security, has been developed to ensure t he highest degree of security and authentic ity for digital information, wherever a[...]

  • Page 28

    26 R&TTE Compliance Statement This equipment complies with all the requirements o f Direct ive 1999/5/EC of t he Eur opean Parliament and the Council of March 9, 1999, on radio equipment and telecommunication terminal equipment and the mutu al recog nition of the ir conform ity (R&TT E). Safety This equipment is designed with the ut m ost c[...]

  • Page 29

    27[...]