Manuale d’uso / di manutenzione del prodotto WNC-0300 del fabbricante LevelOne
Vai alla pagina of 74
LevelOne W N C-0300 11g Wireless PC I Adapter User’s Manual Version 2.0.
Manufacturer's Disclaimer Statement The information in this document is subject to change wit hout notice and does not represent a commitment on the part of the vendor . No warr anty or representation, either expressed or implied, i s made with respect to the quality , accurac y or fitness for any particular purpose of this docume nt.
Contents 1. Introduction ............................................................................................................ 3 1.1 Product Feature .......................................................................................... 3 1.
1. Introduction 1.1 Pr oduct Feature ● Compliance with IEEE 802.11g and 802.11b standards ● Highly efficient design mechanism to provide unbeatable performance ● Achieving data rate up to 54Mbps for 802.11g and 11Mps for 802.11b with wide range coverage; high performance to de liver up to 108Mbps raw data rate for 802.
2.2 Install the WNC-0300 11g W i r e less Network PC I Adapter 2.2.1 Utility Installation 1. Before insert PC I Adapter into the PC I slot of your co m puter, please install the Utility Prog r am f i rst. Make sure that the LevelOne 11g wirel e ss Network PC I Adapter is NOT inserted into the PCI slot.
3. InstallShield Wizard will au tomatically start. Please c lick “Next” to continue. 5.
6.
7 4. Please click “Finish” NOW. 1. T u r n o f f y o ur com p ute r , a n d rem o v e t h e power cord from y o ur PC. 2. Open up the c o ver of y our P C . 3. R e m o ve the PCI slot c o ver from PC case. 4. Insert the 11g Wireless Network PCI Adapter into the empty PCI sl ot.
2. Please click “Continue Anyway” 8 2.2.2 Driver Install ation 1. Please select the first option and click “Next”..
4. T o make sure if the installation is successful, you coul d check it through the device management. 9 3. Please click “Finish”.
5. Once the installation is successful, a utility program icon will show on your desktop. T o lunch the utility , just double click the icon. 3. Configuration 3.1 Link Information The default page is as below after you lau nch the Utility program. Status: Shows the BSSID associated, which can be used to identify the wireless network.
Frequency: Shows the current frequency used for wireless network. Wireless Mode: Shows the current wireless m o de used for wireless communication. Encryption: Shows the current encryption m ode used for wireless network. TxRate: Shows the current data rate used for trans m itting.
Wireless Mode: There are two types available for selection ● Infrastructure – to establish wireless communication with LAN and other wireless clients through the use th e Access Points. ● Ad-Hoc – to establish point-to-point wi reless communication di rectly with other wireless client devices such as wireless network PCI Adapter.
3.3 Advanced This is the page where you configure S ecurity settings of your 108Mbps wireless LAN P C I Adapter Encryption: 4 options are available: Disable , Enable , WPA and WPA-PSK .
If WPA is selected, configuration is enabled. Please click the configuration. The below window is pop up. Then, please select the certificate that you like to use and enter the server name and login name If WPA-PSK is selected, click the conf iguration button.
The following will only be activated to allow for configuratio n when Encryption is enabled. Default Key: select one of the 4 keys to use. Network Ke y : enter values to these fields, eith er in HEX or ASCII formats.
Profile – You can create and manage the created profiles for Home, offices or public areas. By double-clicking on one of the create d profile, the setting will adapt to the configuration such as SSID, channel, a nd WEP settings saved by that particular profile.
● Maxi m u m Power Save – the device con s u m es the least power and only operates when there is wire less network activity. ● Power Save – the device consu m es the m oderate level of power ● Data Encryption – for WEP data encryption feature.
3.5 About US T h is page displa y s some i n f orma t ion abo u t t h e 108 M pbs w i reless L A N PC I Adapter u t ili t y , which includes th e version numbers for Driv er, Firmware and Utilit y. When th ere is new version of software av ailable for upgrade, you will be able to ident ify by version numbers.
two formats that you can use for entering the values for WEP key. It represents English letters as numbers from 0 to 127. Authentication Type: Indication of an authentica tion algorithm which can be supported by the Access Point: 1. Open System: Open System authentica tion is the sim plest of the available authentication algorithm s.
amount of time before retrying. If the netw ork is quiet and two devices access the line at exactly the same tim e, th eir signals collide. When th e collision is detected, they both back off and wait a random amount of time before retrying.
heavy interference caused by th e big size of transmission fram e. But if the frame size is too small, it will create the overhead during th e transmission. Gateway : a device that interconnects networ ks with different, incompatible communication protocols.
PSDU: PLCP service data unit Roaming: A LAN mobile user moves around an ESS and enjoys a continuous connection to an Infrastructure network. RTS: R equest T o S end. An RS-232 signal sent f rom the transm itting station to the receiving station requesting permission to transmit.
WNC-0300 Appendix Appendix A Networking Basis ...........................................25 Appendix B 802.1X Authentication Setup ....................
.
25 Go to Start menu > Control Panel > Network Connections In the menu on the left side of the window , select “ Set up a home or small office network ” Click “ Next ” to procced Click “ Next ” to continue APPENDIX A : NETWORKING BASIS This chapter will help you learn the basics of home netw orking.
26 1. Enter a short description for your computer . 2. Enter a name for y o u r c o m p u t e r t o b e recognized among the network. 3. Click “ Next ” to continue. Select the option that best describes how you connect your computer to the Internet.
27 Enter “ Workgr oup name ” for your home network. Click “ Next ” to continue” Click “ Next ” and wait for the wizard to apply the settings.
28 Yo u m a y c r e a t e a network setup disk which saves you the trouble of having to configure every PC s in your network. Select the first choice, and insert a floppy disk into you r disk drive Click “ Next ” to continue.
29 Click “ Forma t Disk ” if you wish to format the disk. Click “ Next ” to copy the necessary files to the disk. Click “ Next ” to continue with the Network Setup Wizard.
30 NOTE: Now you ma y use the Network Setup Disk you just created in any PCs in your network that you wish to setu p. Simply insert the Netw ork Setup Disk into the disk drive of a PC, and open to browse the content of the disk wi th “My Computer” or “Windows File Ma nager” .
31 Checking IP Address of Your Computer in Windows XP Sometimes you will nee d to know the IP address of th e computer that you are usin g. For example, when you w ant to make sure that your computer is in the same network domain as th at of your Access Point for you can configure and access the AP .
32 If the IP address is assigned by DHCP se rver o n the network, there are chances you might have to release the IP and acqu ire it from DHCP server again. Here is how you do it. T ype command, “ipconfig /renew” in the co mmand prompt window a nd press Enter .
33 Dynamic IP Address V.S. Static IP Address By definition Dynamic IP addresses are the IP addresses that are being automatically assigned to a network devi ce on the network. These dynamically assigned IP addresses will expire and may be changed o ver time.
34 Dynamically Assigned IP Address Static IP Address The TCP/IP Properties window appears. Select “ Obtai n an IP addr ess automatically ” if you are on a DHCP enabled network. Click “ OK ” to close the window with the changes made Select “ Use the following IP address ” Enter the IP addr ess and subnet mask fields.
35 NOTE: The IP address must be within the same r a nge as the wireless route or Access P oint. Wireless Network in Windows 2000 The TCP/IP Properties window appears. Select “ Obtain an IP address automatically ” if you are on a DHCP enabled network.
36 Wireless Network In Wind o ws 98 SE and Windows M E Go to Start menu > Settings > Control Panel > Doub le-click on Network Select TCP/IP of the network device Click “ Properties ” to continue Select “ Use the following IP address ” Enter the IP addr ess and subnet mask fields.
37 The TCP/IP Properties window appears. Select “ Obtain an IP address automatically ” if you are on a DHCP enabled network. Click “ OK ” to close the window with the changes made Select “ Specify an IP address ” Enter the IP addr ess and subnet mask fields.
38 APPENDIX B : 802.1x Authentication Setup There are three essential components to th e 802.1x infras tructure: (1) S upplicant, (2) Authenticator and (3 ) Server . The 802. 1x security supports both MD5 and TLS Extensive Authe ntication Protocol (EAP ).
39 infrastructure, each of these wireless client s would have to be authenticated by the Radius serv er , which would grant the author ized client and notified the Access P oint to open up a communi cation port to be used for the gr anted client. There are 2 Extensive A uthentication Protocol (EAP) methods s upported: (1) MD5 and (2) TLS .
40 Supplicant: Wireless Network PC Card Here is the setup for the Wireless Network PC Card under Windows XP , which is the only Operating S ystem that our driver supports for 802.1x. Microsoft is planning on supporting 802.1x securi ty in all common Windows Op er ating System including Win98SE/ME/2000 by releasing Service P ack in 2003.
41 5. Click on the “ Wireless Network ” tab. 108 M b p s Hi g h S pe e d Ne t w ork Adapter.
42 6. Click “ Properties ” of the available wireless network, which you wish to connect or configure. Please note that if you are going to ch ange to a different 802.
43 TLS Authentication 7. Select “ The key is provided for me automatically ” option 8. Click “ OK ” to close the Wireless Ne twork Properties window .
44 9. Click “ Authentication ” tab 10. Select “ Enable network access control using IEEE 802.1x ” option to enable 802.1x authentication. 11. Select “ Smart Card or other Cert ificate ” from the drop-down list bo x for EAP type.
45 TLS Authentication – Download Digital Certificate from Server In most corporations, it requires internal IT or MIS staff ’s help to ha ve the certificated downloaded to your local comp uter .
46 16. Now we are connected to the Certificate Service. Select “ Request a certificate ” , and click “ Next ” to continue. 17. Select “ User Certificate request ” , and click “ Next ” to co ntinue.
47 18. Click “ Submit >” to continue. 19. The Certificate Service is now pr ocessing the certificate request..
48 20. The certificate is issu ed by the server , click “Install this certif icate” to down load and store the certificate to your local computer .
49 22. Certificate is now installed. All the configuration and certificate down load are now complete. Let ’ s try to connect to the Access P oint us ing 8 02.1x TLS Authentication. 23. Windows XP will prompt you to select a certificate f or wireless network connection.
50 24. Select the certificate that was issued by the server (WirelessC A), and click “ OK ” to continue. 25. Check the server to make sure that it’s the ser ver that issu es certificate, and click “ OK ” to complete the authenticati on process.
51 MD5 Authentication 26. Select “ Dat a encryption (WEP enabled) ” option, but leave othe r option unselected. 27. Select the key format that you wa nt to use to k ey in yo ur Network ke y . ASCII char acters: 0~9, a~z and A~Z HEX char acters: 0~9, a~f 28.
52 30. Click “ OK ” to close the Wirel ess Network Properties window , thus make the changes effective. 31. Select “ Authentication ” tab. 32. Select “ Enable network access control using IEEE 802.1X ” to enable 802.1x authentication. 33. Select “ MD-5 Challenge ” from the drop-down list bo x for EAP type.
53 Unlike TLS, which uses digit al certificat e for validation, the M D-5 Authentication is based on the user account/password. Ther efore, you must have a valid account used by the server for validation. 35. WindowsXP will prompt y ou to ente r your use r name and password.
54 Authenticator: Wireless Network Access Point This is the web page conf iguration in the Access Point that we use. 1. Enable 802.1x secu rity by selecting “ Enable ”. 2. If MD5 EAP methods is used then you can skip step 3 and go to step 4. 3. Select the Encryption Key L ength Size rang ing from 64 to 256 Bits tha t you would lik e to use.
55 Radius Server: Window2000 Server This section to help those w ho has Windows 2000 Server installed an d wants to setup Windows2000 Server for 802 .1x authen tication, which incl udes setting up Certificate Service fo r TLS Authentication, and en able EAP-methods.
56 5. Select “ Enterprise root CA ” , an d click “ Next ” to continue. 6. Enter the information th at you want for your Certificate Service, and click “ Next ” to continue.
57 7. Go to Start > Program > Administrative Tools > Certificate Authority 8. Right-click on the “ Policy Setting ” , select “ new ” 9. Select “ Certificate to Issue ” 10. Select “ Authenticated Session ” and “ Smartc ard Logon ” by holding down to the Ctrl key , and click “ OK ” to continue.
58 11. Go to Start > Program > Administrative Tools > Active Direct ory Users and Computers . 12. Right-click on domain, and select ” Properties ” to continue.
59 14. Go to “Computer Configurati on” > “Security Se ttings” > “ Public Key Policies ” 15. Right-click “ Automatic Certificate Request Setting ” , and select “ New ” 16.
60 17. The Automatic Certif icate Request Setup Wizard will guide you throu gh the Automatic Certificate Request setup, simply click “ Next ” through to the last step. 18. Click “ Finish ” to complete the A utomatic Certificate R equest Setup 19.
61 Adding Internet Authentication Service 21. Go to Start > Control Panel > Add or Remove Progra ms 22. Select “ Add/Remove Windows Co mponents ” from th e panel on the left. 23. Select “I nternet Authentication Service ” , and click “OK” to install.
62 Setting Internet Authentication Service 24. Go to Start > Program > Administr ative T ools > Int ernet Authentication Service 25. Right-click “ Client ” , and select “ New Client ” 26.
63 27. Click “ Finish ” to complete adding of the Acces s Point. 28. In the Internet Authentication Service, right -click “ Remote Access Policies ” 29.
64 30. Select “ Day-And-Time-Restriction ” , and click “ Add ” to continue. 31. Unless you want to specify the active duration for 802.1x authentication, click “ OK ” to accept to have 802.
65 32. Select “ Grant remote access permission ” , and click “ Next ” to continue. 33. Click “ Edit Profile ” to open up.
66 For TLS Authentication Setup (Steps 34 ~ 38) 34. Select “ Authentication ” T ab 35. Enable “ Extensible Authentication Prot ocol ” , and select “ Sm art Card or other Certificate ” for .
67 36. Go to Start > Program > Administr ative T ools > Active Directory Us ers and Computers 37. Select “ Users ” , and double-cl ick on the user that can be newly created or currently existing , who will be configured t o have the rights to obtain digital certificate remotely .
68 38. Go to the “ Dial-in ” tab, and check “ Allow access ” o ption for Re mote Access Permission and “ No Callback ” for Callback Options.
69 For MD5 Authentication (Steps 39 ~ 54) 39. Go to Start > Program > Administr ative T ools > Active Directory Us ers and Computers . 40. Right-click on the domain, and select “ Properties ” 41. Select “ Group Policy ” tab, and click “ Edit ” to edit the Group Po licy .
70 42. Go to “Computer Configuration” > “W indo ws Settings” > “Security Se ttings” > “ Account Policies” > “ Password Policies ” 43. Click “ Define this policy setting ” , select “ Enabled ” , and click “ OK ” to continue.
71 44. Go to Start > Program > Administr ative T ools > Active Directory Us ers and Computers . 45. Go to Users . Right-click on the user that yo u are granting access, and select “ Properties ” 46. Go to “ Account ” tab, and enable “ Store pas sword using re versible encryption ” 47.
72 48. Go to Start > Program > Administr ative T ools > Int ernet Authentication Service . 49. Go to Remote Access Policies 50. Make sure that MD 5 is moved up to Order 1 51.
73 52. Go to “ Authentication ” tab 53. Enable “ Extensible Authentication Prot ocol ” 54. Select “ MD5-Challenge ” for EAP type list..
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il LevelOne WNC-0300 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del LevelOne WNC-0300 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso LevelOne WNC-0300 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul LevelOne WNC-0300 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il LevelOne WNC-0300, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del LevelOne WNC-0300.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il LevelOne WNC-0300. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo LevelOne WNC-0300 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.