802.11n 2T3R Wireless PCI Adapter USER MANUAL 1.0.0 2009 Table of Contents 1. Software Installation Chapter IV Management Guide Chapter I Overview Chapter II Introduction the 2T3R Wireless PCI Adapter Chapter III Installation Guide 1. Making a Basic Network Connection 1.1 Select a configuration tool 1.2 To connect with Microsoft Zero Configuration tool 1.3 To connect with 802.11n Wireless LAN Utility 2. Introduction to the 802.11n Wireless LAN Utility 2.1 Interfaces 2.2 Information 2.3 Profile 2.4 Network 2.5 Advanced 2.6 Statistics 3 3 5
................................................................................................................................... 5 10
................................................................................................................................... 10
......................................................................................................................................................... 10
......................................................................................................................................................... 11
......................................................................................................................................................... 12
................................................................................................................................... 13
......................................................................................................................................................... 13
......................................................................................................................................................... 14
......................................................................................................................................................... 14
......................................................................................................................................................... 18
......................................................................................................................................................... 19
......................................................................................................................................................... 20
.................................................................................................................................................. 20
.................................................................................................................................................. 21
......................................................................................................................................................... 21
......................................................................................................................................................... 22 23
................................................................................................................................... 23
......................................................................................................................................................... 24
......................................................................................................................................................... 26
......................................................................................................................................................... 27
......................................................................................................................................................... 28
......................................................................................................................................................... 29
......................................................................................................................................................... 30
................................................................................................................................... 31 Chapter V Appendix 1. AP mode management guide 1.1 Config 1.2 Security Setting 1.3 Access Control 1.4 MAC Table 1.5 Event Log 1.6 Statistics 2. Troubleshooting 2.6. Statistics Transmit 2.6. Statistics Receive 2.7 WMM 2.8 WPS
-2-
1 2 Overview Overview Thank you for purchasing this product. Read this chapter to know about your 802.11n 2T3R Wireless PCI Adapter. Unpacking information Before getting started, please verify that your package includes the following items:
1.One 802.11n 2T3R Wireless PCI Adapter. 2.One Utility/ Manual CD. 3.Three 2 dbi Antenna Introduction the 2T3R Wireless PCI Adapter PCI Adapter The 802.11n 2T3R Wireless PCI adapter provides users to launch 802.11n 2T3R wireless network at 300 Mbps in the 2.4GHz band, which is also compatible with 802.11b/g wireless devices at 11/54 Mbps. You can configure this adapter with ad-hoc mode to connect to other 2.4GHz wireless computers, or with Infrastructure mode to connect to a wireless AP or router for accessing to Internet. This adapter includes a convenient Utility for scanning available networks and saving preferred networks that users usually connected with. Security encryption can also be configured by this utility.
-3-
Key Features Complies with IEEE 802.11n/b/g wireless standard Supports driver for Windows 2000, XP and Vista. 2.4GHz Frequency band, MIMO 2T3R Supports QoS: WMM, WMM-PS Complies with PCI 2.3 or Mini PCI type III Support wireless data encryption with 64/128-bit WEP, WPA, WPA2 High Speed transfer data rate up to 300 Mbps Supports Multiple BSSID Supports auto-installation and diagnostic utilities.
-4-
Installation Guide 3 3.1 Installation Guide Software Installation Note: The following driver installation guide uses Windows XP as the presumed operation system. The procedures and screens in Windows 2000 and Vista are familiar with Windows XP. 1. Insert this product to your computer. The system finds the newly installed device automatically. Click cancel to close this window. 2. Insert the CD-Rom that came with this product to your CD-Rom drive. The menu window pops up automatically. Please click the Driver Installation button of this product. Note: If the CD-Rom fails to auto-run, please click on "My Computer" > your CD-
Rom Drive > Driver folder then double-click the "Setup" icon to start this menu. 3. Select if you are going to configure your wireless network with this device or with Microsoft Zero Configuration tool. Note: This can be changed after installing this software.
-5-
-6-
Installation Guide 4. Click the Install button to start installing.
-7-
-8-
Installation Guide 5. Click the "Finish" button to complete installation.
-9-
4 Management Guide Read this chapter to understand the management interface of the device and how to manage the device. 4.1 Making a Basic Network Connection 4.1.1 Select a configuration tool In the following instruction for making a network connection, we use the utility we provide to configure your wireless network settings. Note:
You could use either the software we provide or Microsoft Zero Configuration tool to configure this adapter. To switch between the two configuration tools, please right click on the icon on system tray to select.
-10-
Management Guide 4.1.2 To connect with Microsoft Zero Configuration tool After specifying the Microsoft Zero Configuration tool to configure your wireless network, right click on the Networks to specify your wireless network. icon on system tray. Select View available wireless The tool shows the available wireless networks. Select your demanding network to connect with. To connect to a wireless network with more security settings, please click Change advanced settings to be compatible with your wireless network security settings.
-11-
4.1.3 To connect with 802.11n Wireless LAN Utility We provide this utility for users to connect to a wireless network easily. It provides more information and configuration for this adapter. As default, the utility is started automatically upon starting your computer and connects to a connectable wireless network with best signal strength. Please refer to the following chapters to get information regarding to the functions of this utility.
-12-
Management Guide 4.2 4.2.1 Introduction to the 802.11n Wireless LAN Utility Note: The Utility in Windows Vista is different from the following. For instructions on using the utility included in Windows Vista please refer to the instruction in Appendix. Interfaces This Utility is basically consisted of three parts:
1. Functional buttons: on top of the window. You can click each button to access each configuration window. 2. Configuration column: Center of the utility window. Make your changes for each 3. Status information: bottom of the utility window. Shows the connection status and function in this part. system information.
-13-
4.2.2 Information Encryption type in use. Shows the connecting status. Also shows the SSID while connecting to a valid network. Display link status in use Display current channel in use IP address of current connection Sub mask of current connection Default gateway of current connection Show current transmit rate and receive rate Status Extra Info Channel Authentication Authentication mode in use. Encryption Network Type Network type in use IP Address Sub Mask Default Gateway Link Speed Throughput Display transmit and receive throughput in Mbps Link Quality Signal Strength 1 Signal Strength 2 Signal Strength 3 Noise StrengthDisplay noise signal strength HT Display connection quality based on signal strength and TX/RX packet error rate. Receive signal strength 1, user can choose to display as percentage or dBm format. Receive signal strength 2, user can choose to display as percentage or dBm format. Receive signal strength 3, user can choose to display as percentage or dBm format. Display current HT status in use, containing BW, GI, MCS, SNR0, and SNR1 value. 4.2.3 Profile This profile page allows users to save different wireless settings, which helps users to get access to wireless networks at home, office or other wireless network environments quickly.
-14-
Management Guide To add a new profile:
1. Click the Add button. The add profile window pops up. Note: you could also add a new profile quickly by selecting an available network in the Network function then press the Add to Profile button. 2. Fill in information for this profile in the system config section:
Profile Name Choose a name for this profile, or use default name defined by system. Fill in the intended SSID name or use the drop list to select from available Aps. SSID Power Save Mode Choose from CAM (Constantly Awake Mode) or PSM (Power Saving Mode). There are two types, infrastructure and 802.11 Ad-hoc mode. Under Ad-hoc mode, you could also choose the preamble type; the available preamble type includes auto and long. In addition to that, the channel field will be available for setup in Ad-hoc mode. For adjusting the RTS threshold number by sliding the bar or key in the value directly. The default value is 2347. Adjust the Fragment threshold number by sliding the bar or key in the value directly. The default value is 2346. Network Type RTS Threshold Fragment Threshold 3. Select an encryption type and fill in the corresponding wireless network
-15-
information:
Authentication Type Encryption Type 802.1x WPA Pre-shared Key WEP Key There are 7 types of authentication modes supported by RaUI including open, Shared, LEAP, WPA and WPA-PSK, WPA2 and WPA2-PSK For open and shared authentication mode, the selection of encryption type are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES. Use 802.1x to make WPA and WPA2 certification. This functions only works when connecting to a WPA and WPA2 supported device. This is the shared secret between AP and STA. For WPA-PSK and WPA2-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 length. Only valid when using WEP encryption algorithm. The key must matched AP's key. 4. Specify the 802.1x information if you are using the 802.1X certification method. Users that dont use this function or connecting to an open-wireless network please skip this part. EAP method:
Tunnel Authentication: Select a Tunnel authentication mode. To select an EAP method.
-16-
Management Guide Select to enable this function or unmark it to disable. Session Resumption:
ID \ PASSWORD Authentication ID / Password: Identity, password and domain name for server. Only "EAP-FAST" and "LEAP" authentication can key in domain name. Domain name can be keyed in blank space. Tunnel ID / Password: Identity and Password for server. Client Certification Use Client certificate: Client certificate for server authentication. EAP Fast
-17-
Allow unauthenticated provision mode: Mark to enable unauthenticated provision mode. Use protected authentication credential: Mark to use protected authentication credential. Server Certification Use Certificate chain: Mark the checkbox to enable using certification chain. Allow intimidate certificates: Mark to allow intimidate certification. Server name: Enter an authentication sever name. 4.2.4 Network This network lists the available wireless networks. The utility connects to a wireless network with best signal strength automatically. You can change the connecting network by clicking on the network name and click the Connect button. To see detail information of each network, please double click on each item to pop up the information window. SSID, Channel and Signal buttons Signal buttons Click each button to sort the listing networks by SSID, channel and Signal strength. channel and Signal strength.
-18-
Management Guide Show dBm Rescan Connect Add to Profile Mark the checkbox to show the signal strength in dBm. To rescan available wireless networks. Click this button to connect to a designated network. Click this button to add a network to profile after selecting a network. 4.2.5 Advanced This page provides advanced configurations to this adapter. Please refer to the following chart for definitions of each item. Click the drop list to select a wireless mode. Wireless mode Enable TX Burst Select to enable connecting to a TX Burst supported device. Enable TCP Window Size Fast Roaming at __ dBm Show Authentication Status Dialog Mark the checkbox to enable TCP window size, which help enhance throughput. Mark the checkbox to enable fast roaming. Specify the transmit power for fast roaming. Mark the checkbox to show Authentication Status Dialog while connecting to an AP with authentication. Authentication Status Dialog displays the process about 802.1x authentication
-19-
Enable CCX
(Cisco Compatible extensions) Select to enable CCX. This function can only be applied when connecting to a Cisco compatible device. Statistics 4.2.6 4.2.6.1 Statistics Transmit Statistics page displays the detail counter information based on 802.11 MIB counters. This page translates the MIB counters into a format easier for user to understand. Successfully retransmitted frames numbers Frames successfully sent. Frames Transmitted Successfully Frames Retransmitted Successfully Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS RTS Frames Fail To Receive CTS Failed to receive CTS after sending RTS Restart Counter Reset counters to zero Frames failed transmit after hitting retry limit Successfully receive CTS after sending RTS frame
-20-
Management Guide 4.2.6.2 Statistics Receive Frames Received Successfully Frames Received With CRC Error Frames Dropped Due To Out-of-
Resource Duplicate Frames Received Frames received successfully Frames received with CRC error Frames dropped due to resource issue Duplicate received frames. 4.2.7 WMM This page allows users to activate the WMM function for this device. Please note that this function only works while connecting to a WMM compatible device. WMM Enable WMM - Power Save Enable Direct Link Setup Enable Enable Wi-Fi Multi-Media. Enable WMM Power Save. Please enable WMM before configuring this function. Enable DLS (Direct Link Setup). Please enable WMM before configuring this function.
-21-
4.2.8 WPS WPS Configuration: The primary goal of Wi-Fi Protected Setup (Wi-Fi Simple Configuration) is to simplify the security setup and management of Wi-Fi networks. This adapter supports the configuration setup using PIN configuration method or PBC configuration method through an internal or external Registrar. Config Mode Enrollee or an external Registrar. WPS AP List Rescan Information PIN Code Table of Credentials Detail Connect Rotate Disconnect Delete Display the information of surrounding APs with WPS IE from last scan result. List information include SSID, SSID, Channel, ID
(Device Password ID), Security-Enabled. Click to rescan the wireless networks. Display the information about WPS IE on the selected network. List information include Authentication Type, Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands. 8-digit numbers. It is required to enter PIN Code into Registrar using PIN method. Each Network card has only one PIN Code of Enrollee. Display all of credentials got from the Registrar. List information includes SSID, MAC Address, Authentication and Encryption Type. If STA Enrollee, credentials are created as soon as each WPS success. If STA Registrar, RaUI creates a new credential with WPA2-PSK/AES/64Hex-Key and doesn't change until next switching to STA Registrar. Information about Security and Key in the credential. Command to connect to the selected network inside credentials. Command connect to the next network inside credentials. Stop WPS action and disconnect this active link. And then select the last profile at the Profile Page of RaUI if exist. If there is an empty profile page, the driver will select any non-secue AP. Delete an existing credential. And then select the next credential if exist. If there is an empty credential, the driver will select any non-
security AP.
-22-
Management Guide Start to add to Registrar using PIN configuration method. Start to add to AP using PBC configuration method. Send the association request with WPS IE during WPS setup. It is optional for STA. PIN PBC WPS associate IE WPS probe IE Send the probe request with WPS IE during WPS setup. It is Progress Bar Display rate of progress from Start to Connected status. Status Bar Display currently WPS Status. optional for STA. Note: When you click PIN or PBC, please don't do any rescan within two-minute connection. If you want to abort this setup within the interval, restart PIN/PBC or press Disconnect to stop WPS action. 5 5.1 Appendix AP mode management guide This adapter can be configured as AP mode. To function this adapter as an AP, icon on system tray and select Switch to AP mode. please right click the Please refer to the following introduction to information about this AP-mode utility. Note: In Windows XP, it provides WPA support at hotfix Q815485 However, you have to make sure that hotfix Q815485 (require XP SP1 installed) has been installed in your system before you can start using WPA features. You can check the installation of hotfix in add/remove software page under control panel.
-23-
5.1.1 Config This page provides overall configuration to this adapter. Please find the following items for identification to each field. 1. SSID: AP name of user type. User also can select [Use Mac Address] to display it. 2. Wireless Mode: Select wireless mode. 802.11 b/g mix, 802.11b only, 802.11g only, 802.11 b/g/n mix mode are supported. When wireless card is 802.11n, system default is 802.11 b/g/n mix; Otherwise system default is 802.11 b/g mix
(802.11 b/g/n mix selection item only exists for b/g/n adapter). 3. Country Region Code: eight countries to choose. Country channel list:
Classification Range
-24-
Appendix 0: FCC (Canada) 1: ETSI 2: SPAIN 3: FRANCE 4: MKK 5: MKKI (TELEC) 6: ISRAEL 7: ISRAEL CH1 ~ CH11 CH1 ~ CH13 CH10 ~ CH11 CH10 ~ CH13 CH14 ~ CH14 CH1 ~ CH14 CH3 ~ CH9 CH5 ~ CH13 4. Wireless Protection: Auto, on, and off. System default is auto. a. Auto: STA will dynamically change as AP announcement. b. On: Always send frame with protection. c. Off: Always send frame without protection. 5. Beacon (ms): The time between two beacons. System default is 100 ms. 6. TX Power: Manually force the AP transmits power. System default is 100%. 7. TX Rate: Manually force the Transmit using selected rate. Default is auto. 8. Idle Time: Manually force the Idle Time using selected value. Default is 300. 9. Channel: Manually force the AP using the channel. System default is channel 1. 10.Use Mac Address: Use MAC address of used wireless card to be AP name. System default is APX (X is last number of Mac Address). 11.Security Setting: Authentication mode and encryption algorithm used within the AP. System default is no authentication and encryption. 12.No forwarding among wireless clients: No beacon among wireless client, clients can share information each other. System default is no forwarding. 13.Hide SSID: Prevent this AP from recognized in wireless network. This is disabled as default. 14.Allow BW40 MHz: Allow BW40 MHz capability. 15.Default: Use system default value. 16.Apply: Apply the above changes.
-25-
5.1.2 Security Setting This page pops up after clicking the Security Settings button. Please follow the instructions below:
Authentication Type Select to be open or WPA-PSK system. Encryption Type WPA Pre-shared Key Group Rekey Interval WEP Key Select an encryption type from the drop list. A shared string between AP and STA. For WPA-PSK authentication mode, this field must be filled with character longer than 8 and less than 32 length. (PCI only) Only valid when using WPA-PSK encryption algorithm. The key will change compliance with seconds or beacon that user set. (PCI device only) Only valid when using WEP encryption algorithm. The key must match the key on AP. There are several formats to enter the keys. a. Hexadecimal (40bits): 10 Hex characters. b. Hexadecimal (128bits): 32Hex characters. c. ASCII (40bits): 5 ASCII characters. d. ASCII (128bits): 13 ASCII characters.
-26-
5.1.3 Access Control This function filters users to use this device by designating MAC address. Please refer to the following chart for introduction. Appendix Access Policy MAC Address Access List Delete Remove All Apply Choose a method to process access control from the drop list to determine the MAC addresses that you designated are allowed to access the AP or not. Add allowed (or denied) MAC addresses to the MAC address list. Display all Mac Addresses that you designated. Delete Mac addresses that you selected. Remove all Mac address in Access List. Apply changes.
-27-
5.1.4 MAC Table This page displays the station detail information of current connection. MAC Address AID Power Saving Mode Check if the connected station supports power saving. The station MAC address of current connection. Raise value by current connection.
-28-
5.1.5 Event Log Record Soft AP all event time and message. Appendix Event Time
(yy/mm/dd-hh:mm:
ss) Message Record event time. All event messages.
-29-
5.1.6 Statistics Statistics page displays the detail counter information based on 802.11 MIB counters. Frames that successfully sent. Frames Transmitted Successfully Frames Fail To Receive ACK After All Retries RTS Frames Successfully Receive CTS RTS Frames Fail To Counts of CTS that fail to be received after sending RTS Counts of CTS that successfully received after sending RTS frame. Frames that failed to transmit after hitting retry limit.
-30-
Appendix Receive CTS Frames Retransmitted Successfully Frames Received Successfully Frames Received With CRC Error Frames Dropped Due To Out-of-
Resource Duplicate Frames Received Reset Counters frame. Successfully retransmitted frames numbers. Frames received successfully. Frames received with CRC error. Frames dropped due to resource issue. Duplicate received frames. Reset counters to zero. 5.2 Troubleshooting If you encounter any problem when youre using this wireless network card, dont panic! Before you call your ealer of purchase for help, please check this troubleshooting table, the solution of your problem could be very simple, and you can solve the problem by yourself!
Scenario I cant find any wireless access point Nothing happens when I click Launch config utilities Solution 1. Click Rescan for few more times and see if you can find any wireless access point or wireless device. 2. Please move closer to any known wireless access point. 3. Ad hoc function must be enabled for the wireless device you wish to establish a direct wireless link. 4. Please adjust the position of network card
(you may have to move your computer if youre using a notebook computer) and click Rescan button for few more times. If you can find the wireless access point or wireless device you want to connect by doing this, try to move closer to the place where the wireless access point or wireless device is located. 1. Please make sure the wireless network card is firmly inserted into your computers PCI slot. If the Wireless configuration utilitys icon is black, the network card is not detected by your computer. Switch the computer off and insert the card again. If this doesnt work, contact the dealer of purchase for help. 2. Reboot the computer and try again. 3. Remove the driver and re-install. 4. Contact the dealer of purchase for help. I can not establish connection 1. Click Connect for few more times.
-31-
with a certain wireless access point. The network is slow / having problem when transferring large files 2. If the SSID of access point you wish to connect is hidden, you have to input correct SSID of the access point you wish to connect. Please contact the owner of access point to ask for correct SSID. 3. You have to input correct passphrase /
security key to connect an access point with encryption. Please contact 4. the owner of access point to ask for correct passphrase / security key. The access point you wish to connect only allows network cards with specific MAC address to establish connection. Please go to About tab and write the value of Phy_Addess down, then present this value to the owner of access point so he /
she can add the MAC address of your network card to his / her access points list. 1. Move closer to the place where access point is located. tab. 2. Enable Wireless Protection in Advanced 3. Try a lower TX Rate in Advanced tab. 4. Disable Tx Burst in Advanced tab. 5. Enable WMM in QoS tab if you need to use multimedia / telephony related applications. 6. Disable WMM Power Save Enable in QoS tab. 7. There could be too much people using the same radio channel. Ask the owner of the access point to change the channel number. Please try one or more solutions listed above.
-32-
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This device and its antenna(s) must not be co-located or operating in conjunction with any other antenna or transmitter. IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible.