submitted | available | document details (if available) | source link |
---|---|---|---|
October 08 2005 | untitled Acrobat Distiller 6.0 (Windows) |
various | User Manual | Users Manual | 3.82 MiB | / October 08 2005 |
CoverF J20H018 Foxconn WLAN Client Module IEEE 802.11g/b 802.11b/g WLAN Module Doc. No. MV-S800245-00, Rev. C May 26, 2005 J20H018 802.11b/g WLAN Module Document Conventions Note Provides related information or information of special importance. Caution Indicates potential damage to hardware or software, or loss of data. Warning Indicates a risk of personal injury. Document Status Doc Status: 2.00 Technical Publication: 0.x Disclaimer No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the information, text, graphics, or other items contained within this document. Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use Marvell products in these types of equipment or applications. With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees:
1) Not to re-export or release any such information consisting of technology, software or source code controlled for national security reasons by the U.S. Export Control Regulations ("EAR"), to a national of EAR Country Groups D:1 or E:2;
2) Not to export the direct product of such technology or such software, to EAR Country Groups D:1 or E:2, if such technology or software and direct products thereof are controlled for national security reasons by the EAR; and, 3) In the case of technology controlled for national security reasons under the EAR where the direct product of the technology is a complete plant or component of a plant, not to export to EAR Country Groups D:1 or E:2 the direct product of the plant or major component thereof, if such direct product is controlled for national security reasons by the EAR, or is subject to controls under the U.S. Munitions List ("USML"). At all times hereunder, the recipient of any such information agrees that they shall be deemed to have manually signed this document in connection with their receipt of any such information. Copyright 2005. Marvell International Ltd. All rights reserved. Marvell, the Marvell logo, Moving Forward Faster, Alaska, Fastwriter, GalNet, Libertas, Link Street, NetGX, PHYAdvantage, Prestera, Virtual Cable Tester, and Yukon are registered trademarks of Marvell. AnyVoltage, Discovery, DSP Switcher, Feroceon, GalTis, Horizon, RADLAN, Raising The Technology Bar, The Technology Within, UniMAC, and VCT are trademarks of Marvell. All other trademarks are the property of their respective owners. Doc. No. MV-S800245-00 Rev. C Page 2 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Table of Contents Table of Contents Section 1. Introduction........................................................................................................ 9 1.1 Wireless Networks.......................................................................................................................9 1.1.1 Ad-Hoc Mode ....................................................................................................................................9 1.1.2 Infrastructure Mode ...........................................................................................................................9 Section 2. Configuration Utility Overview ....................................................................... 11 2.1 Overview....................................................................................................................................11 2.2 Windows XP Users....................................................................................................................11 2.2.1 Zero Configuration Utility.................................................................................................................12 2.2.1.1 Configuration Utility Tabs ...................................................................................................................... 13 2.2.2 Marvell Configuration Utility.............................................................................................................14 2.2.2.1 Tray Status Icons .................................................................................................................................. 14 Security......................................................................................................................................15 2.3.1 Security Configurations ...................................................................................................................15 AutoLink.....................................................................................................................................16 2.4.1 Configure an AutoLink AP ...............................................................................................................16 2.4.2 Create Connection with AutoLink AP ..............................................................................................18 2.3 2.4 3.2 Section 3. Configuration Utility User Interface ............................................................... 19 Network Status Tab ...................................................................................................................20 3.1 3.1.1 Select Profile ...................................................................................................................................20 3.1.2 Link Information...............................................................................................................................21 3.1.3 Signal Strength/Wireless Mode Indicator ........................................................................................22 3.1.4 Internet Protocol (TCP/IP) ...............................................................................................................23 3.1.5 Actual Throughput Performance .....................................................................................................24 3.1.6 Radio On/Off Box ............................................................................................................................24 Profile Manager Tab ..................................................................................................................25 3.2.1 Profile SettingNetwork Info Tab ...................................................................................................26 3.2.2 Profile SettingSecurity Tab ..........................................................................................................28 3.2.2.1 Non-WPA Authentication Modes........................................................................................................... 28 3.2.2.2 WPA Authentication Modes .................................................................................................................. 28 3.2.2.3 Encryption Methods .............................................................................................................................. 36 3.2.2.4 WEP Key Settings................................................................................................................................. 36 3.2.2.5 TKIP/AES Settings ................................................................................................................................ 37 3.2.3 Profile SettingProtocol .................................................................................................................38 Site Survey Tab .........................................................................................................................39 3.3.1 Site SurveyAccess Point Filter.....................................................................................................40 3.3.2 Site SurveyList Window ...............................................................................................................40 3.3.3 Site SurveyFilter Button ...............................................................................................................41 3.3.3.1 Network SSID........................................................................................................................................ 41 3.3.3.2 Network BSSID ..................................................................................................................................... 41 3.3 Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 3 J20H018 802.11b/g WLAN Module 3.3.3.3 Select Channel...................................................................................................................................... 41 3.3.4 Site SurveyRefresh Button.......................................................................................................... 41 3.3.5 Site SurveyAssociate Button....................................................................................................... 41 Statistics Tab............................................................................................................................. 42 3.4.1 Signal Strength ............................................................................................................................... 42 3.4.2 Transmit Window............................................................................................................................ 43 3.4.3 Receive Window............................................................................................................................. 44 Advanced Tab ........................................................................................................................... 45 3.5.1 Advanced TabMarvell Wireless Card.......................................................................................... 45 3.5.2 Advanced TabProtocol................................................................................................................ 46 3.5.3 Advanced TabMiscellaneous ...................................................................................................... 48 Admin Tab................................................................................................................................. 49 3.6.1 Admin TabImport Profiles ........................................................................................................... 49 3.6.2 Admin TabExport Profiles ........................................................................................................... 49 About Tab.................................................................................................................................. 50 3.4 3.5 3.6 3.7 Appendix A.Acronyms and Abbreviations ....................................................................... 51 Appendix B.Revision History............................................................................................. 55 Doc. No. MV-S800245-00 Rev. C Page 4 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 List of Figures List of Figures Section 1. Introduction........................................................................................................ 9 Section 2. Configuration Utility Overview ....................................................................... 11 Zero Configuration Utility Window .................................................................................................... 12 Figure 1:
Marvell Configuration Utility in Active Mode ..................................................................................... 13 Figure 2:
Zero Configuration Disabled Window ............................................................................................... 13 Figure 3:
Figure 4:
Icon Window...................................................................................................................................... 14 Tray Status Icons Window................................................................................................................. 14 Figure 5:
AutoLink AP Configuration ................................................................................................................ 16 Figure 6:
AutoLink AP ConfigurationRadio Off ............................................................................................. 17 Figure 7:
Figure 8:
AutoLink AP ConfigurationSecurity Pin ......................................................................................... 17 Figure 9:
AutoLink AP Connection ................................................................................................................... 18 Figure 10: AutoLink AP ConnectionSecurity Pin............................................................................................. 18 Section 3. Configuration Utility User Interface ............................................................... 19 Figure 11: Network Status Window ................................................................................................................... 20 Figure 12: Select Profile Window ...................................................................................................................... 20 Figure 13: Link Information Section .................................................................................................................. 21 Figure 14: Signal Strength Bar Window ............................................................................................................. 22 Figure 15: TCP/IP Window ................................................................................................................................ 23 Figure 16: Actual Throughput Performance Window ......................................................................................... 24 Figure 17: Radio On/Off Window ....................................................................................................................... 24 Figure 18: Radio Off Window ............................................................................................................................ 24 Figure 19: Profile Manager Window .................................................................................................................. 25 Figure 20: Network Info TabInfrastructure Network ....................................................................................... 26 Figure 21: Network Info TabAd-Hoc Network ................................................................................................ 26 Figure 22: Authentication Modes ....................................................................................................................... 28 Figure 23: WPA-PSK/WPA2-PSK Authentication .............................................................................................. 29 Figure 24: WPA-PSK/WPA2-PSK with TKIP ..................................................................................................... 29 Figure 25:
802.1x/WPA/WPA2 EAP-TLS Authentication ................................................................................... 30 Figure 26:
802.1x/WPA/WPA2 EAP-TLS Radius Configuration......................................................................... 30 Figure 27: Select Certificate Window ................................................................................................................ 31 Figure 28: WPA Radius Configuration with Certificate ....................................................................................... 31 Figure 29:
802.1x/WPA/WPA2 PEAP Authentication......................................................................................... 32 Figure 30:
802.1x/WPA/WPA2 PEAP Radius Configuration .............................................................................. 32 Figure 31: WPA/WPA2 EAP/LEAP Authentication............................................................................................. 34 Figure 32: WPA/WPA2 EAP/LEAP Radius Configuration ................................................................................. 34 Figure 33: CCX EAP/LEAP Authentication......................................................................................................... 35 Figure 34: CCX EAP/LEAP Radius Configuration ............................................................................................. 35 Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 5 J20H018 802.11b/g WLAN Module Figure 35: WEP Key Settings ............................................................................................................................ 36 Figure 36: WEP Key Configuration .................................................................................................................... 36 Figure 37: TKIP/AES Settings ........................................................................................................................... 37 Figure 38: Profile SettingProtocol Window...................................................................................................... 38 Figure 39: Site Survey Tab ................................................................................................................................ 39 Figure 40: Site Survey List Window ................................................................................................................... 40 Figure 41: Site Survey Filter Button Window ..................................................................................................... 41 Figure 42: Statistics Window ............................................................................................................................. 42 Figure 43: Transmit Window .............................................................................................................................. 43 Figure 44: Receive Window ............................................................................................................................... 44 Figure 45: Advanced Tab .................................................................................................................................. 45 Figure 46: Protocol Window ............................................................................................................................... 46 Figure 47: Miscellaneous Window ...................................................................................................................... 48 Figure 48: Configuration Utility Window with Admin Tab ................................................................................... 49 Figure 49: About Tab Window ............................................................................................................................ 50 Doc. No. MV-S800245-00 Rev. C Page 6 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 List of Tables List of Tables Section 1. Introduction........................................................................................................ 9 Section 2. Configuration Utility Overview ....................................................................... 11 Section 3. Configuration Utility User Interface ............................................................... 19 Link Information Window Description.................................................................................................21 Table 1:
Table 2:
TCP/IP Window Description ...............................................................................................................23 Profile List Window Description..........................................................................................................25 Table 3:
Network Info Description ....................................................................................................................27 Table 4:
802.1x/WPA/WPA2 EAP-TLS Radius Configuration..........................................................................31 Table 5:
Table 6:
WPA PEAP Radius Configuration......................................................................................................33 CCX EAP/LEAP Radius Configuration...............................................................................................35 Table 7:
WEP Key Configuration......................................................................................................................37 Table 8:
Table 9:
Protocol Window Description .............................................................................................................38 Site Survey List Window Description..................................................................................................40 Table 10:
Transmit Window Description.............................................................................................................43 Table 11:
Receive Window Description..............................................................................................................44 Table 12:
Table 13:
Advanced Tab Protocol Window Description .....................................................................................46 Advanced Tab Miscellaneous Window...............................................................................................48 Table 14:
Table 15:
Acronyms and Terms .........................................................................................................................51 Table 16: FCC Caution/IC Caution ....................................................................................................................54 Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 7 J20H018 802.11b/g WLAN Module THIS PAGE INTENTIONALLY LEFT BLANK Doc. No. MV-S800245-00 Rev. C Page 8 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Introduction Wireless Networks Section 1. Introduction This document describes the functions of the Foxconn WLAN Module Configuration Utility for the following:
Foxconn J20H018 802.11b/g WLAN Module Notes In this document, the Foxconn WLAN Module Configuration Utility may also be referred to as the Configuration Utility or just the Utility. See the J20H018 Installation Guide for information on installing the Configuration Utility, the Client Card Module, and the Foxconn Windows driver. See Appendix A. "Acronyms and Abbreviations" on page 51 for a list of acronyms used throughout this document. Ad-Hoc (peer-to-peer group) mode Access Point (AP) Infrastructure mode 1.1 Wireless Networks Foxconn WLAN Module operate similar to Ethernet cards except that a radio replaces the wires between communication devices. All existing applications that operate over Ethernet operates over a Foxconn wireless network without any modification or need for special wireless networking software. The adapter supports the following network technologies:
1.1.1 Ad-Hoc Mode In Ad-Hoc mode (also referred to as peer-to-peer mode), wireless clients send and receive information to other wireless clients without using an AP. In comparison to infrastructure mode, this type of WLAN connection only contains wireless clients. Ad-Hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required. Two or more computers can establish an Ad-Hoc network when within range of one another. Each computer dynamically connects to one another without additional configuration. Ad-Hoc mode is used to network computers at home or in small offices. It is also used to set up a temporary wireless network for meetings. 1.1.2 In infrastructure mode, wireless devices communicate with other wireless devices or devices on the LAN side wired network through Access Points. When communicating through wired networks, client cards send and receive information through APs. The AP receives the information and redirects it for clients to receive the information. Access Points are typically strategically located within an area to provide optimal coverage for wireless clients. A large WLAN uses multiple APs to provide coverage over a wide area. APs connect to a LAN through a wired Ethernet connection. APs send and receive information from the LAN through this wired connection. Most corporate WLANs operate in infrastructure mode because they require access to the wired LAN in order to use services such as file servers or printers. Infrastructure Mode Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENT Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 9 J20H018 802.11b/g WLAN Module User Guide THIS PAGE INTENTIONALLY LEFT BLANK Doc. No. MV-S800245-00 Rev. C Page 10 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility Overview Overview Section 2. Configuration Utility Overview Overview 2.1 The Foxconn Wireless Module Configuration Utility is a Microsoft Windows application that allows configuration and management of Foxconn J20H018 client cards. The Configuration Utility sets up profiles and performs wireless network management tasks. See the J20H018 Installation Guide for information on installing the Configuration Utility. 2.2 Windows XP Users For Windows XP, use either the Zero Configuration Utility or the Foxconn Configuration Utility to configure the cards. Both utilities cannot be used at the same time. Selection is made during installation of the card or can be switched during normal operation. Notes Zero Configuration can be disabled when running the setup program for the Foxconn Client Configuration Utility. See the Installation Guide for more information on selections made during installation of the Utility. When using the Marvell Configuration Utility on Windows XP, Foxconn recommends turning off the Windows wireless configuration feature. For information on how to disable this feature, refer to Windows documentation. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 11 J20H018 802.11b/g WLAN Module User Guide Zero Configuration Utility 2.2.1 To use the Zero Configuration Utility:
1. Open the Control Panel and click on Network Connections. 2. Right click on the icon for the Foxconn client card and select Properties. 3. Click on the Wireless Networks tab. 4. Check the Use Windows to configure my wireless settings checkbox to enable Zero Configuration. Figure 1: Zero Configuration Utility Window Doc. No. MV-S800245-00 Rev. C Page 12 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility Overview Windows XP Users 2.2.1.1 Configuration Utility Tabs When Zero Configuration is enabled, the Foxconn Configuration Utility enters Monitor mode. When in Monitor mode, the Foxconn Configuration Utility has the following properties:
Limited tab display (Network Status, Statistics, About, and Readme tabs) Information reporting only (the Utility cannot be used to configure the card) Figure 2: Foxconn Configuration Utility in Active Mode When Zero Configuration is disabled, all tabs available through the Foxconn Configuration Utility are active, as shown in Figure 2. Figure 3: Zero Configuration Disabled Window Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 13 J20H018 802.11b/g WLAN Module User Guide 2.2.2 Foxconn Configuration Utility Once installed, the Foxconn Configuration Utility is accessed from the Start menu or the Desktop:
Start > Foxconn Libertas Client Configuration Manager Start > Programs > Foxconn Libertas 802.11g Client > Foxconn Libertas Client Configuration Manager DesktopDouble click on the Configuration Utility icon Figure 4:
Icon Window 2.2.2.1 Tray Status Icons Different icons in the system tray indicate the status of the wireless connection:
Figure 5: Tray Status Icons Window Doc. No. MV-S800245-00 Rev. C Page 14 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility Overview Security Security 2.3 Implementing a security infrastructure to monitor physical access to WLAN networks is more difficult than monitoring access on wired networks. Unlike wired networks where a physical connection is required, anyone within range of a wireless Access Point can send and receive frames, as well as listen for frames being sent. IEEE 802.11 defines a set of standards and protocols for use in minimizing the security risks on wireless networks. Two of these security standards are as follows:
802.1x802.1x authentication provides authenticated access to 802.11 wireless networks and to wired Ethernet networks. 802.1x minimizes wireless network security risks by providing user and computer identification, centralized authentication, and encryption services based on the WEP algorithm. 802.1x supports Extensible Authentication Protocol (EAP). EAP allows the use of different authentication methods, such as smart cards and certificates. Wi-Fi Protected Access (WPA)WPA is an implementation based on a subset of the 802.11i standard. WPA provides enhanced security for wireless networks when used with the TKIP and the Message Integrity Check (MIC) algorithms. Wi-Fi Protected Access (WPA2)The next generation of Wi-Fi security, based on the final 802.11i standard. WPA2 offers the strongest available security in the form of AES-level encryption (Advanced Encryption Standard), plus faster roaming between access points. Security Configurations 2.3.1 The configuration utility supports the following security protocols:
Shared Key Auto Switch 802.1x Authentication Modes Open System WPA-PSK WPA2-PSK WPA WPA2 CCX Encryption Methods WEP TKIP AES 802.1x Authentication Protocol Security Off EAP/TLS EAP/PEAP EAP/LEAP WEP Key Size 64 bits WEP (40-bit key (5 bytes)) 128 bits WEP (104-bit key (13 bytes)) Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 15 J20H018 802.11b/g WLAN Module User Guide AutoLink Configure an AutoLink APfirst time use, AutoLink AP, or renew an AP Configuration Create connection with AutoLink APnew Foxconn client card connecting to an AutoLink AP 2.4 AutoLink is a feature integrated in Foxconn wireless client cards that offers users a simple way to configure a new Foxconn AP in conjunction with the Configuration Utility. The AutoLink dialog box pops up automatically when a non-configured Foxconn AP or an AutoLink configured Foxconn AP appears in the area of a client card that is not connected to an AP or Ad-Hoc network. AutoLink operations include:
2.4.1 Configure an AutoLink AP Equipment needed to configure an AutoLink AP:
To start or renew an AutoLink AP, configure an AP and create a connection profile for the client card in a secure wireless network:
1. 2. 3. Click "Advanced" tab. 4. Uncheck "Auto connect "
5. Check "Enable Auto Link". Click OK button. Foxconn AutoLink AP (i.e., AP-32) Foxconn Wireless Client Card (J20H018) and software package (in CD or storage device) Laptop PC or Desktop PC with a Microsoft Windows XP, 2000, ME or 98SE operating system Install Foxconn Wireless Client Card (J20H018) on PC. Launch Configuration Utility. Figure 6: AutoLink AP Configuration Note Refer to the AP User Guide for the instructions to reset AP configuration to default. Doc. No. MV-S800245-00 Rev. C Page 16 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility Overview AutoLink 6. Relaunch Configuration Utility. 7. Click Advanced tab. 8. Check "Radio Off" below the Miscellaneous box in the utility. Figure 7: AutoLink AP ConfigurationRadio Off 9. Move the Foxconn AP close to the PC and turn the AP power on. 10. An AutoLink dialog box opens immediatetly. If not, click the AP power off and on again. Figure 8: AutoLink AP ConfigurationSecurity Pin 11. Enter the security PIN number. Click Apply. It takes a few seconds for the AutoLink AP configuration. After configuration completed, the AutoLink AP restarts automatically. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 17 J20H018 802.11b/g WLAN Module User Guide 2.4.2 Create Connection with AutoLink AP To set up a Foxconn wireless client card connection to an existing Foxconn AutoLink AP:
1. 2. 3. Click "Advanced" tab. 4. Check "Enable Auto Link" and click OK button. Install Foxconn Wireless Adapter (j20H018) on PC. Open device driver and Configuration Utility installation. Launch Configuration Utility. Figure 9: AutoLink AP Connection 5. An AutoLink dialog box opens immediatetly. If not, make sure the "Radio Off" button below the Miscellaneous box in the utility is unchecked. 6. Select the AP in which to connect, and enter the PIN number used in this AutoLink AP. Click Apply. Figure 10: AutoLink AP ConnectionSecurity Pin Doc. No. MV-S800245-00 Rev. C Page 18 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Section 3. Configuration Utility User Interface The Configuration Utility allows configuration of Foxconn client cards through the following tabs:
Network Status Tabdisplays the status of the network to which the user is connected. The Configuration Utility initializes on this page Profile Manager Tabdisplays the current profiles and allows the user to set attributes for network type, security options, and protocols, as well as create/modify/delete profiles Site Survey Tabdisplays site survey information Statistics Tabdisplays the statistics of the current session Advanced Tabused to set protocol parameters Admin Tabused to import and export profiles About Tabprovides the information for the driver version number, firmware version number, Config Utility version number, and MAC address of the client card etc. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 19 J20H018 802.11b/g WLAN Module User Guide Network Status Tab 3.1 The Network Status tab displays the status of the network. When the Wireless Client Card Configuration Utility initializes, it displays the Network Status tab:
Figure 11: Network Status Window Select Profile 3.1.1 The Select Profile window displays the name of the profile in use. Additional information about the profile is provided in the Profile Manager. Select one of the profiles previously defined by clicking the down arrow and highlighting a profile from the pulldown list. Figure 12: Select Profile Window Profiles are created, modified, and deleted through the Profile Manager. Note This feature is disabled when Zero Configuration is enabled. Doc. No. MV-S800245-00 Rev. C Page 20 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Network Status Tab 3.1.2 The Link Information section contains the current information about the wireless connection:
Link Information Figure 13: Link Information Section Table 1:
Link Information Window Description Fields Status Network SSID Network Type Descriptio n Status of the wireless network connection:
Card Unpluggedadapter is not plugged in, or adapter is plugged in but not recognized. Connectedcard plugged in and connected to a wireless network Not connectedcard plugged in, but no wireless connection. No Radiocard plugged in, but the radio is turned off. Uncheck the Radio Off box to turn the radio on. Network SSID label (i.e., Network Name). The Network Name is a text string of up to 32 characters. Type of environment connected to:
Infrastructure Modewireless clients send and receive information through the APs. When a wireless client communicates with another, it transmits to the AP. First the AP receives the information and rebroadcasts it, then other devices receive the information. The APs are strategically located within an area to provide optimal coverage for wireless clients. A large WLAN uses multiple APs to provide coverage over a wide area. APs can connect to a LAN through a wired Ethernet connection. APs send and receive information from the LAN through the wired connection. Ad-Hoc Modewireless clients send and receive information to other wireless clients without using an AP. This type of WLAN only contains wireless clients. Use Ad-Hoc mode to network computers at home or in small office, or to set up a temporary wireless network for a meeting. Network BSSID Network Basic Service Set Identifier. The BSSID is a 48-bit identity used to identify a particular BSS within an area. In Infrastructure BSS networks, the BSSID is the MAC address of the AP. In independent BSS or Ad-Hoc networks, the BSSID is generated randomly. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 21 J20H018 802.11b/g WLAN Module User Guide Table 1:
Link Information Window Description Fields Security Descrip tion Reports the type and level of security set. The security level is set through the Profile Setting of the Profile Manager tab. Configure security settings also through the Site Survey tab when connecting to a network. Connection speed, (i.e., 54 Mbps, 48 Mbps, etc.) Link Speed 3.1.3 The color-coded Signal Strength bar displays the signal strength of the last packet received by the adapter:
Signal Strength/Wireless Mode Indicator Figure 14: Signal Strength Bar Window Signal strength is reported as a percentage. A signal in the red indicates a bad connection. A signal in the green indicates a good connection. The Wireless Mode indicator shows the data rates the client card operates. There are two modes:
802.11b 802.11g (backward compatible to 802.11b) Doc. No. MV-S800245-00 Rev. C Page 22 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Network Status Tab Internet Protocol (TCP/IP) 3.1.4 The Internet Protocol specifies the format of packets, also called datagrams, and the addressing scheme. Most networks combine IP with a higher-level protocol called TCP, which establishes a virtual connection between a destination and a source. Figure 15: TCP/IP Window The parameters of the Internet Protocol are:
Table 2:
TCP/IP Window Description Field DHCP Option IP Address Subnet Mask Default Gateway Descriptio n Dynamic Host Configuration Protocol. Either enabled or disabled An identifier for a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255. A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network address and the host address. The first two numbers represent the Class B network address, and the second two numbers identify a particular host on this network. The default node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 23 J20H018 802.11b/g WLAN Module User Guide 3.1.5 Actual Throughput Performance This section of the Network Status tab displays the Current Tx Rate and the Current Rx Rate of the channel being monitored. Figure 16: Actual Throughput Performance Window Note These are actual throughput diagrams (without the WLAN overhead delivered by the client card). 3.1.6 Radio On/Off Box Clicking the Radio Off check box turns off the radio. Unchecking the box turns on the radio. Figure 17: Radio On/Off Window Another way to turn the radio on or off is to right-click the Configuration Utility icon in the System Tray and click Turn Radio Off to turn the radio off. When the radio is off, click Turn Radio On to turn the radio back on. Figure 18: Radio Off Window The system hot key (Alt+F2) is also used to turn the radio on/off. When the radio is off, there is no radio activity, and the following property pages are disabled:
Site Survey Statistics Advanced Note This feature is disabled when Zero Configuration is enabled. Doc. No. MV-S800245-00 Rev. C Page 24 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab Profile Manager Tab 3.2 Clicking on the Profile Manager tab displays the Profile Manager dialog box. The Profile Manager displays the profiles available and allows you to create, modify, and delete profiles:
Figure 19: Profile Manager Window Note The Profile Manager window is not accessible when Zero Configuration is enabled. PROFILE MANAGERPROFILE LIST WINDOW The window on the left side of this tab lists all of the profiles available. Highlighting a profile selects it. If the Default box next to the profile is checked, that profile is used in auto-configuration mode when the link is lost. If it is unchecked, that profile is excluded in auto-configuration. The controls associated with this window are:
Table 3:
Profile List Window Description Fields Apply Profile Move Up / Move Down Delete Create Save Descriptio n Applies the profile selected or user call Apply the profile by double-clicking on the desired profile. Moves the profile up and down in the window All profiles with the Network Type set to Infrastructure are displayed before the profiles with the Network Type set to Ad-Hoc. In auto-configuration mode, the checked priorities at the top of the list have higher priority than checked profiles at the bottom of the list. Deletes a profile Creates a profile Saves changes made to a selected profile Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 25 J20H018 802.11b/g WLAN Module User Guide PROFILE MANAGERPROFILE SETTING The Profile Settings are used to display information about the profile selected in the Profile List window. The information is divided into three tabs: Network Info, Security, and Protocol. 3.2.1 The Profile Manager initially displays the Network Info tab. The Network Info tab displays the following fields:
Profile SettingNetwork Info Tab Figure 20: Network Info TabInfrastructure Network Figure 21: Network Info TabAd-Hoc Network Doc. No. MV-S800245-00 Rev. C Page 26 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab Table 4:
Network Info Description Fields Profile Name Network SSID Network Type Wireless Mode Prefer Channel Descriptio n Profile name Network SSID label Infrastructure: When an Infrastructure network is selected, the Profile Setting displays the Wireless Mode field. Ad-Hoc: When an Ad-Hoc network is selected, the Profile Setting displays an additional Prefer Channel field. Auto: Connects to either 802.11g network or 802.11b network (Infrastructure network only). 802.11g: Connects to either 802.11g or 802.11b network (Ad-Hoc network only). 802.11b: Connects to 802.11b network only (Available in both Infrastructure and Ad-Hoc networks). Channel being used (Ad-Hoc network only) Note Prefer Channel and Wireless Mode are used only when an Ad-Hoc network is started by the client card. These two attributes are ignored if the client card is connected to an existing Ad-Hoc network with the same desired SSID. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 27 J20H018 802.11b/g WLAN Module User Guide Profile SettingSecurity Tab 3.2.2 Clicking on the Security tab displays the following security options:
WEP Key Setting (Passphrase Key or Authentication Protocol) Authentication Mode Encryption Method (Security off, WEP, TKIP, and AES) Figure 22: Authentication Modes 3.2.2.1 Non-WPA Authentication Modes The Foxconn Configuration Utility currently supports the following non-WPA authentication modes:
Open SystemOpen Authentication (no key or a pre-shared wired equivalent privacy (WEP) key is required) Shared KeyShared Authentication (a pre-shared wired equivalent privacy (WEP) key is required) Auto SwitchAuto Select Authentication modes (Open System or Shared Key, WEP key required) 802.1x (TLS/PEAP) 3.2.2.2 WPA Authentication Modes The Foxconn Configuration Utility currently supports the following WPA Authentication Modes:
WPA-PSK WPA2-PSK WPA (TLS/PEAP/LEAP) WPA2 (TLS/PEAP/LEAP) CCX (LEAP) Doc. No. MV-S800245-00 Rev. C Page 28 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab 3.2.2.2.1 WPA-PSK/WPA2-PSK Support In Infrastructure Mode, if WPA-PSK/WPA2-PSK is selected as the Authentication Mode, either TKIP or AES is selected as the Encryption Method. Figure 23: WPA-PSK/WPA2-PSK Authentication Figure 24: WPA-PSK/WPA2-PSK with TKIP Enter the network passphrase in the Passphrase and Confirm fields. WPA-PSK/WPA2-PSK is not supported in Ad-Hoc network mode. 3.2.2.2.2 802.1x/WPA/WPA2 EAP-TLS Support If 802.1x/WPA/WPA2 is selected, AES or TKIP encryption is available, and a certificate is required for the authentication. 1. To connect to an AP through the Radius Server, select 802.1x/WPA/WPA2 as the Authentication Mode. 2. Select WEP, TKIP, or AES as the Encryption Method. 3. Select EAP/TLS (Use Certificate) as the 802.1x Authentication Protocol. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 29 J20H018 802.11b/g WLAN Module User Guide Figure 25: 802.1x/WPA/WPA2 EAP-TLS Authentication 4. Click the Configure WPA Radius button to configure security settings. Figure 26: 802.1x/WPA/WPA2 EAP-TLS Radius Configuration 5. Click the Browse button to activate the dialog for selecting a certificate. 6. Before clicking the OK button to exit the dialog, make sure that the Login Name is entered. Doc. No. MV-S800245-00 Rev. C Page 30 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab Figure 27: Select Certificate Window Figure 28: WPA Radius Configuration with Certificate Table 5:
802.1x/WPA/WPA2 EAP-TLS Radius Configuration Fields Login Name Certificate View Browse Descriptio n Login name to the RADIUS server Certificate selected for authentication View button to view the selected certificate Browse button to select the certificate Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 31 J20H018 802.11b/g WLAN Module User Guide 3.2.2.2.3 802.1x/WPA/WPA2 PEAP Support in Infrastructure Mode To connect to an AP through the Radius Server, select 802.1x/WPA/WPA2 as the Authentication Mode, Protected EAP (PEAP) as the Authentication Protocol, and AES or TKIP as the Encryption Method. Figure 29: 802.1x/WPA/WPA2 PEAP Authentication Clicking on the Configure WPA Radius button displays the WPA PEAP Radius Configuration window. Enter all of the required information. Click OK button to set the configuration. Figure 30: 802.1x/WPA/WPA2 PEAP Radius Configuration Doc. No. MV-S800245-00 Rev. C Page 32 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab Table 6: WPA PEAP Radius Configuration Fields Inner EAP Protocol Login Name Password Domain Descriptio n Currently supports EAP/MS-CHAP V2 only Login name to the RADIUS server Password to login to the RADIUS server Domain name for login to the RADIUS server (optional) Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 33 J20H018 802.11b/g WLAN Module User Guide 3.2.2.2.4 WPA/WPA2 EAP/LEAP To connect to an AP through the Radius Server, select WPA/WPA2 as the Authentication Mode, Light EAP (LEAP) as the 802.1x Authentication Protocol, and TKIP as the Encryption Method for WPA LEAP or AES as the Encryption Method for WPA2 LEAP. Figure 31: WPA/WPA2 EAP/LEAP Authentication Clicking on the Configure WPA Radius button configures the security settings displays the WPA LEAP Radius Configuration Window. Enter all the required information. Click OK button to set the configuration. Figure 32: WPA/WPA2 EAP/LEAP Radius Configuration Doc. No. MV-S800245-00 Rev. C Page 34 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab 3.2.2.2.5 CCX EAP/LEAP To connect to a Cisco AP through the Radius Server, select CCX EAP/LEAP. WEP is the encryption method and the key is generated automatically. Figure 33: CCX EAP/LEAP Authentication If Enable CCKM is checked, the Cisco Centrailized Key Management (CCKM) is enabled. Clicking on the CCX Configuration button displays the CCX LEAP Radius Configuration window. Enter all the required information in CCX configuration box. Click OK button to set CCX EAP/LEAP configuration. Figure 34: CCX EAP/LEAP Radius Configuration Table 7:
CCX EAP/LEAP Radius Configuration Fields Login Name Password Domain Descriptio n Login name to the RADIUS server. Password to login to the RADIUS server. Domain name to login to the RADIUS server (optional). Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 35 J20H018 802.11b/g WLAN Module User Guide 3.2.2.3 Encryption Methods The following encryption methods are available, depending on the Authentication Mode:
WEP TKIP AES Security Off 3.2.2.4 WEP Key Settings If the WEP Encryption method is selected, the security tab displays the WEP Key Setting. To configure the WEP keys, select any WEP Key Setting and press the Configure WEP Keys button. Figure 35: WEP Key Settings Clicking the Configure WEP Keys button displays the Configure WEP Key dialog box:
Figure 36: WEP Key Configuration Doc. No. MV-S800245-00 Rev. C Page 36 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Profile Manager Tab Table 8: WEP Key Configuration Fields Key Format Key Size Transmit Keys Descriptio n Either ASCII characters or hexadecimal digits 40-bit, 5 character ASCII key size (40-bit, 10 character hexadecimal) 104-bit, 13 character ASCII key size (104-bit, 26 character hexadecimal) There are four transmit keys. The key value is in ASCII or hexadecimal, depending on the format selected. The WEP key size shown depends on the key size selected. 3.2.2.5 TKIP/AES Settings If TKIP/AES is selected and the authentication mode is WPA-PSK or WPA2-PSK, the security tab displays the TKIP/AES passphrase settings. Enter the passphrase into the Passphrase and Confirm boxes. Click OK. Figure 37: TKIP/AES Settings Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 37 J20H018 802.11b/g WLAN Module User Guide 3.2.3 The protocol tab allows you to set or change the protocol information. Profile SettingProtocol Figure 38: Profile SettingProtocol Window DO NOT CHANGE SETTINGS If this box is checked, the protocol setting is not changed when the profile is applied. USE BELOW SETTINGS When the Do not change setting box is unchecked, the protocol settings include:
Table 9:
Protocol Window Description Fields Power Save Mode Preamble (802.11b) Transmit Rate Fragment Threshold RTS/CTS Threshold Reset button Descrip tion Sets the power mode. Available options are Continuous Access or Max Power Save. The default is Continuous Access. Sets the Radio Preamble to Auto, short, or Long. This option takes effect only when attaching to an 802.11b network. The range of the data rate depends on the type of AP that the client card is connected to. The default setting is Auto Select. Sets the fragmentation threshold (the size that packets are fragmented into for transmission). The default setting is 2346. Sets the packet size at which the AP issues a Request-To-Send (RTS) or Clear-to-Send (CTS) frame before sending the packet. The default setting is 2347. Resets the protocol settings to their default values. Doc. No. MV-S800245-00 Rev. C Page 38 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Site Survey Tab Site Survey Tab 3.3 Clicking on the Site Survey tab displays the Site Survey dialog box. There are two ways to connect to a network through the Site Survey Window:
Double click on the network Select network and click the Associate button Figure 39: Site Survey Tab This tab shows a list of all of the peer-to-peer and AP stations within range of the adapter. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 39 CB-35P/MB-35P Wireless Adapter User Guide Site SurveyAccess Point Filter 3.3.1 This section is used to customize which sites are displayed in the Site Survey list window:
3.3.2 This window reports information on the Ad-Hoc or AP stations detected:
Display Peer-To-Peer stationschecking this box displays all of the peer-to-peer stations within range. Display 802.11a Access Pointsdisabled (not supported in CB-35P/MB-35P). Display 802.11g Access Pointschecking this box displays all of the 802.11g APs within range. Display 802.11b Access Pointschecking this box displays all of the 802.11b APs within range. Site SurveyList Window Figure 40: Site Survey List Window Table 10: Site Survey List Window Description Fields Network SSID MAC Address Security CH WMM Signal Icons Description Network SSID label; i.e., the Network Name. The Network Name is a text string. MAC address, a hardware address that uniquely identifies each node of a network. Security enabled or disabled Channel used by the detected device Wireless Multimedia Enhancements (WMM) supported by the detected device. Signal strength of the detected device as a percentage The following icons may be displayed on the left side of the Network SSID column:
An antenna icon with a superscript b indicates an 802.11b AP. An antenna icon with a superscript g indicates an 802.11g AP. A circle around the icon means the adapter is connected to this network. A slash icon indicate an Ad-Hoc network. Doc. No. MV-S800245-00 Rev. C Page 40 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Site Survey Tab 3.3.3 Clicking the Filter button displays the Advanced Filter dialog box:
Site SurveyFilter Button Figure 41: Site Survey Filter Button Window 3.3.3.1 Network SSID Any SSIDif selected, no specific SSID is used when scanning for available network in the area. Find network with this SSIDif selected, the utility searches for the specified SSID. 3.3.3.2 Network BSSID Any BSSIDif selected, no specific BSSID is used when scanning for available network in the area. Find network with this BSSIDif selected, the utility searches for the specified BSSID. 3.3.3.3 Select Channel Scan all channelsall channels are scanned when searching for the available networks in the area. Scan channel Onlyonly specified channel is scanned when searching for the available networks in the area. Scan Channel to Channela range of channels are scanned when searching for the available networks in the area. Site SurveyRefresh Button 3.3.4 Clicking the Refresh button requests a survey of the wireless networks in the area. 3.3.5 Select an available network, and then click the Associate button requests to establish a connection. Site SurveyAssociate Button Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 41 J20H018 802.11b/g WLAN Module User Guide 3.4 Clicking on the Statistics tab displays the statistics of the current connect session:
Statistics Tab Figure 42: Statistics Window Signal Strength 3.4.1 The color-coded Signal Strength bar displays the signal strength of the last packet received by the adapter. Signal strength is reported as a percentage. A signal in the red indicates a bad connection. A signal in the green indicates a good connection. Doc. No. MV-S800245-00 Rev. C Page 42 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Statistics Tab 3.4.2 The Transmit window displays the information on the packets sent:
Transmit Window Figure 43: Transmit Window Table 11:
Transmit Window Description Fields Total Packet Unicast Packet Multicast Packet Single Retries Multiple Retries Failed Count RTS Success RTS Failure ACK Error Description Reports the total number of packets transmitted. Reports the number of packets transmitted by the adapter that were destine for a single network node. Reports the number of packets transmitted by the adapter that were destine for more than one network node. Reports the number of packets that require one retry before the adapter received an acknowledgement. NOTE:After the adapter sends a packet, it waits for an acknowledge from the receiving radio to confirm that the packet was successfully received. If the acknowledge is not received within a specified period of time, the adapter retransmits the packet. Reports the number of packets that require more than one retry before the adapter received an acknowledgement. Reports the number of packets that were not successfully transmitted because the adapter did not receive an acknowledgement within the specified period of time. Reports the number of RTS attempts that were successful. Reports the number of RTS attempts that were not successful. Reports the number of unicast transmit attempts for which no acknowledgement was received. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 43 J20H018 802.11b/g WLAN Module User Guide 3.4.3 Receive Window The Receive window displays the information on the packets received:
Figure 44: Receive Window Table 12: Receive Window Description Fields Total Packet Unicast Packet Multicast Packet Duplicate Frame Received Beacons Beacon Loss Descrip tion Reports the total number of packets received. Reports the number of packets received by the adapter that were destined for a single network node. Reports the number of packets received by the adapter that were destined for more than one network node. Reports the number of duplicate frames received. Reports the number of beacons received after association is established. Reports the number of missing beacons after association is established. Doc. No. MV-S800245-00 Rev. C Page 44 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Advanced Tab 3.5 Clicking on the Advanced tab displays the Advanced dialog box. Advanced Tab Figure 45: Advanced Tab Note The Advanced Tab page is not accessible when Zero Configuration is enabled. 3.5.1 Advanced TabFoxconn Wireless Card This window reports the type of Foxconn WLAN adapter installed. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 45 J20H018 802.11b/g WLAN Module User Guide 3.5.2 Advanced TabProtocol This section of the Advanced tab sets the Protocol options:
Figure 46: Protocol Window Table 13: Advanced Tab Protocol Window Description Fields Power Save Mode Preamble (802.11b) Receive Antenna Transmit Antenna Transmit Power Transmit Rate Fragment Threshold RTS/CTS Threshold Continuous Access Max Power Save Descrip tion Sets the power mode:
Sets the radio preamble (takes effect only when attaching to 802.11b networks):
Auto Short Long Sets the Receive Antenna mode, either:
Fixed at Antenna 2 Diversity On Diversity Off Sets the power mode:
Auto High Medium Low Data transmit rate The range of the data rate depends on the type of AP that the client card is connected to. The default setting is Auto. Sets the fragmentation threshold (i.e., the size that packets are fragmented into for transmission). The default setting is 2346. Sets the packet size at which the AP issues a RTS (or CTS) frame before sending the packet. The default setting is 2347. Doc. No. MV-S800245-00 Rev. C Page 46 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Advanced Tab Table 13: Advanced Tab Protocol Window Description Fields Region Code Descriptio n Sets the regulatory domains:
Default FCC/IC Spain France MKK MKK1 Israel Other NOTE: Set Default to select region as manufacture default. Set Other to customize frequency channels. Apply Changes or Default buttons Configures the options according to the changes entered or applies the default values. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 47 J20H018 802.11b/g WLAN Module User Guide 3.5.3 Advanced TabMiscellaneous Figure 47: Miscellaneous Window Table 14: Advanced Tab Miscellaneous Window Field Auto Correct if link or no connection (Use checked profiles in <Profile Manager>
Enable AutoLink Enable CCX Enable WMM Boost Mode Description Uncheck this box to disable the auto-configuration feature. Whenever there is a link loss, auto-configuration tries to establish a connection using the checked profiles in the Profile Manager window. Check this box to enable/disable the AutoLink feature (see Section 2.4 "AutoLink" on page 16). Fixed CCX enabled. Check this box to enable/disable the Wireless Multimedia Enhancements (WMM) feature. Check this box for performance enhancement. Doc. No. MV-S800245-00 Rev. C Page 48 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Configuration Utility User Interface Admin Tab 3.6 Clicking the Admin tab displays the Admin dialog box. This tab allows you to import and export profiles. Admin Tab Figure 48: Configuration Utility Window with Admin Tab 3.6.1 Admin TabImport Profiles To import a profile:
1. Click the Import Profiles button. 2. Select the path and filename of the profile. 3. Click Open. 3.6.2 Admin TabExport Profiles To export a profile:
1. Click the Export Profiles button. 2. Select or enter the path and filename of the profile. 3. Click Save. Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 49 J20H018 802.11b/g WLAN Module User Guide 3.7 Clicking on the About tab displays the About dialog box, as shown in the following example. About Tab Figure 49: About Tab Window THIS PAGE INTENTIONALLY LEFT BLANK Doc. No. MV-S800245-00 Rev. C Page 50 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Acronyms and Abbreviations Appendix A. Acronyms and Abbreviations Table 15: Acronyms and Terms Term 802.11 802.11a 802.11b 802.11g AC Ad-Hoc AES AP ATIM BBP BSS BSSID CardBus CCMP CCX CE CF CTS DGT DHCP DMA DRV DSL DSR Defin ition A family of specifications developed by the IEEE for WLAN technology. An extension to 802.11 WLAN standard that provides up to 54 Mbps transmission in the 5 GHz UNII radio band. An extension to 802.11 WLAN standard that provides up to 11 Mbps transmission in the 2.4 GHz ISM radio band. 802.11b uses DSSS modulation. An extension to 802.11 WLAN standard that provides up to 54 Mbps transmission in the 2.4 GHz ISM radio band. 802.11g uses OFDM modulation and is backwards compatible with 802.11b. Admission Control A group of computers each with wireless adapters, connected as an independent WLAN. Advanced Encryption Standard Access Point Announced Traffic Indication Message Baseband Processor Basic Service Set Basic Service Set ID The 32-bit version of the PCMCIA PC Card standard. In addition to supporting a wider bus (32 bits instead of 16 bits), CardBus also support bus mastering and operation speeds up to 33 MHz. Counter mode with Cipher Block Chaining Message protocol Cisco Compatible Extensions European health and safety label CompactFlash Clear to Send Directorate General of Telecommunications Taiwan Dynamic Host Configuration Protocol Direct Memory Access Driver Digital Subscriber Line Delayed Service Routine Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 51 J20H018 802.11b/g WLAN Module User Guide Table 15: Acronyms and Terms Term DSSS DTIM EAP EAPOL EAP-TLS ESSID G Protection GUI IAPP IBSS ICV IEEE LAN MAC MIC MSDU NAS NDIS NIC OCB OFDM OID OS PCI PCMCIA PEAP PHY PMK PSK PWK QoS RADIUS Defin ition Direct Sequence Spread Spectrum. DSSS is one of two types of spread spectrum radio. The other is frequency-hopping spread spectrum (FHSS). Delivery Traffic Indication Message Extensible Authentication Protocol EAP Over LAN EAP Transport Layer Security (RFC2716) Extended Service Set Identifier Secures the 802.11g clients traffic in an environment where both 80211g and 802.11b clients are transmitting. Graphical User Interface International Association of Privacy Professionals Independent Basic Service Set (Ad-Hoc) Integrity Check Vector Institute of Electrical and Electronics Engineers Local Area Network Medium Access Controller Message integrity check MAC Service Data Unit Network Access Server Network Driver Interface Specification Network Interface Card Offset Codebook Block mode Orthogonal Frequency Division Multiplexing Object Identifier Operating System Peripheral Component Interconnect Personal Computer Memory Card International Association Protected EAP Physical Layers Pairwise Master Key Pre-Shared Keys Pair Wise Key Quality of Service Remote Authentication Dial In User Service Doc. No. MV-S800245-00 Rev. C Page 52 CONFIDENTIAL Document Classification: Proprietary Copyright 2005 Foxconn May 26, 2005, 2.00 Acronyms and Abbreviations Table 15: Acronyms and Terms Term RF RSN RSSI RTS SoC SPI SSID TCP/IP TIM TKIP TLS TSC UART USB WAN WDS WEP Wi-Fi WLAN WMM WOW WPA WPA2 WPA2-PSK WPA-PSK WZC Defin ition Radio Frequency Robust Secure Network Received Signal Strength Indication Request to Send System-on-Chip Serial Peripheral Interface Service Set Identifier. A 32-character unique identifier attached to the header of packets sent over a WL/AN that acts as a password when a mobile device tries to connect to the BSS. Transmission Control Protocol/Internet Protocol Traffic Information Map Temporal Key Integrity Protocol Transport Layer Security Transmit Sequence Counter Universal Asynchronous Receiver / Transmitter Universal Serial Bus Wide Area Network Wireless Distribution System Wired Equivalent Privacy. A security protocol for WLANs defined in the IEEE 802.11 standard. Wireless Fidelity (IEEE 802.11) Wireless Local Area Network Wi-Fi Multimedia Enhancements Wake on Wireless Wi-Fi Protected Access Wi-Fi Protected Access 2. The next generation of Wi-FI security, based on the final 802.11i standard. Wi-Fi Protected Access 2-Pre-shared Keys Wi-Fi Protect Access-Pre-shared Keys Wireless Zero Configuration System Copyright 2005 Foxconn May 26, 2005, 2.00 CONFIDENTIAL Document Classification: Proprietary Doc. No. MV-S800245-00 Rev. C Page 53 Federal Communication Commission Interference Statement the in accordance with This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
-
-
-
that Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from to which the receiver is connected.
-
Consult the dealer or an experienced radio/TV technician for help. This device is intended only for OEM integrators under the following 1) The antenna must be installed such that 20 cm is maintained between the antenna and users, and or antenna. 2) The transmitter module may not be co-located with any other transmitter As long as 2 conditions above are met, further transmitter test will not be required. However, the OEM integrator is still responsible for testing their end-
product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc.). IMPORTANT NOTE: In the event that these conditions can not be met (for example certain laptop configurations or co-location with another transmitter), then the FCC authorization is no longer considered valid and the FCC ID can not be used on the final product. In these circumstances, the OEM integrator will be responsible for re-evaluating the end product (including the transmitter) and obtaining a separate FCC authorization. Labeling Rule for the End Product Which Integrate this Module This transmitter module is authorized only for use in device where the antenna may be installed such that 20 cm may be maintained between the antenna and users The final end product must be labeled in a visible area with the following statement: Contains TX FCC ID: MCLJ20H018. Information Needed to be Included in the Users Manual of the End Product The users manual for OEM integrators must include the following information in a prominent location IMPORTANT NOTE: To comply with FCC RF conditions:
exposure compliance requirements, the antenna used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. IC statement
"This device has been designed to operate with an antenna having a maximum gain of [2] dB. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is [ 50 ] ohms."
"To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication".
This product uses the FCC Data API but is not endorsed or certified by the FCC