Edimax-technology 802.11g Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Hardware Edimax-technology 802.11g. Edimax Technology 802.11g User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - User Manual

880022..1111gg WWiirreelleessss LLAANN PPCCII AAddaapptteerr User Manual

Strany 2 - COPYRIGHT

13.Windows may display a Windows Logo error for the WLAN driver. Click Click Continue Anyway. The installer continues installation. 14.Click O

Strany 3 - Interference Statement

Installing the Atheros USB Wireless Network Adapter To install the USB driver and the Atheros Client Utility, see “To install the ACU and USB device

Strany 4

4. Click Finish to close the Found New Hardware Wizard and complete installation of the USB device bootloader. 5. The Found Ne w Ha rdware Wizard o

Strany 5 - CONTENTS

7. Windows may display a Windows Logo error for the WLAN driver. Click Continue Anyway. The installer will continue the installation. 8. Cli

Strany 6 - 1 Introduction

For Windows XP, there is a “Windows Zero Configuration Tool” by default for you to setup wireless clients. If you want to use the Utility of the US

Strany 7 - 1.3 Package Contents

3 Configuration Utility The Client Utility is a user-mode utility designed to edit and add profiles for, as well as display and diagnostics pertainin

Strany 8 - 2 Installation Procedure

3.2 Profile Management Parameter Description New To add a new configuration profile, click Ne w on the Profile Management tab. To modify a config

Strany 9

3. Browse to the directory to export the profile to. 4. Cli ck Save. The profile is exported to the specified location. Order Profiles Includi

Strany 10

3.4 Security This Chapter describes setting up security using the Atheros Client Utility(ACU). While using the Atheros USB wireless network adapter,

Strany 11 - Adapter

This is because the WEP keys of all devices that are to communicate with each other must match. Authentication Process Enabling EAP on the access p

Strany 12

Version: 1.1 (June, 2005) COPYRIGHT Copyright © 2005/2006 by this company. All rights reserved. No part of this publication may be reproduced,

Strany 13

that Allow Association to Mixed Cells is checked on the Secu rity Tab to allow association. Pre- Shar ed Key(Static WEP) Enables the use of pre-sha

Strany 14

Using EAP-TLS Security Important Note: To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it from a Ce

Strany 15 - 3 Configuration Utility

Using EAP-TTLS Security Important Note: To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it from a C

Strany 16 - 3.2 Profile Management

Using PEAP-GTC Security Impor ta nt Note ! To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the Certificate Authority

Strany 17 - 3.3 Diagnostics

7. Choose Token or Static Password, depending on the user database. Note that Token uses a hardware token device or the Secure Computing SofToken

Strany 18 - 3.4 Security

5. Specify a user name for inner PEAP tunnel authentication: – Check Use Windows User Name to use the Windows user name as the PEAP user name.

Strany 19

Using LEAP Security Important Note! LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP a

Strany 20

o Check Use Windows User Name to use the Windows user name as the LEAP user name. o OR: Check Manually Prompt for LEAP User Name and Password to man

Strany 21 - Using EAP-TLS Security

5. Enter the WPA passphrase (for ASCII text, enter 8-63 characters, for hexadecimal, enter 64 characters). Click OK. 6. Click OK and enable the pro

Strany 22 - Using EAP-TTLS Security

configuration security. At least one Shared Key field must be populated to enable security using a shared key. Click on the radio button to set the

Strany 23 - Using PEAP-GTC Security

Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital de

Strany 24

4 Troubleshooting This chapter provides solutions to problems usually encountered during the installation and operation of the adapter. 1. For Win

Strany 25

schemes found in 802.11b including CCK for 11 and 5.5 Mbps and Barker code modulation for 2 and 1 Mbps. B. A protection mechanism called RTS/CTS tha

Strany 26 - Using LEAP Security

and however communicated or stored, while making more efficient use of hardware and/or software than previous encryption standards. It i s also inclu

Strany 27

R&TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999/5/CE OF THE EUROPEAN PARLIAMENT AND THE COUNCIL o

Strany 28

CONTENTS 1 INTRODUCTION...1 1.1 FEATURES...

Strany 29 - Disabling Static WEP

1 Introduction Thank you for purchasing the 802.11g Wireless LAN Carbus Adapter. This Adapter is designed to comply with IEEE 802.11g Wireless LAN s

Strany 30 - 4 Troubleshooting

• Dimension: 8(H) x 118(W) x 54(D) mm • Temperature: 32~131°F (0 ~55°C) • Humidity: 0-95% (NonCondensing) • Certification: FCC, CE 1.3 Package Co

Strany 31

2 Installation Procedure Before you proceed with the installation, please notice following descriptions. Note1: The following installation was op

Strany 32

Table 2-1. Installer I nstallation Selections Radio Button Description Install Client Utilities and Driver (recommended) Installs the driver and cl

Komentáře k této Příručce

Žádné komentáře