Ericsson LG WP-1000N WIRELESS PCI ADAPTER User Manual 3 of 4

Ericsson-LG Co., Ltd. WIRELESS PCI ADAPTER 3 of 4

User manual 3 of 4

 44or external Registrar supports the configuration setup using PIN configuration method or PBC configuration setup using PIN configuration method or PBC configuration method through an internal or external Registrar. WPS AP List: Display the information of surrounding APs with WPS IE from last scan result. List information includes SSID, BSSID, Channel, ID (Device Password ID), Security-Enabled. Rescan: Issue a rescan command to wireless NIC to update information on surrounding wireless network. Information: Display the information about WPS IE on the selected network. List Information includes Authentication Type, Encryption Type, Config Methods, Device Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands. PIN Code: 8-digit numbers. It is required to enter PIN Code into Registrar using PIN method. Each NIC Wireless has only one PIN Code of Enrollee. Config Mode: Our station role-playing as an Enrollee or an external Registrar. WPS Profile List: Display all of credentials got from the Registrar. List information includes SSID, MAC address, Authentication and Encryption Type. If STA Enrollee, credentials are created as soon as each WPS success. If STA Registrar, RaUI creates a new credential with WPA2-PSK/AES/64Hex-Key and doesn’t change until next switching to STA Registrar.   Control items on WPS Profile List:  Î Detail: Information about Security and Key in the credential  Î Connect: Command to connect to the selected network inside credentials. The active   selected credential is as like as the active selected Profile.  Î Rotate: Command to rotate to connect to the next inside credentials  Î Disconnect: Stop WPS action and disconnect this active link. And then select the last   profile at the Profile Page of RaUI if exist. If there is an empty profile page, the driver will   select any non-security AP.  Î Delete: Delete an existing credential. And then select the next credential if exist. If   there is an empty credential, the driver will select any non-security AP. PIN: Start to add to Registrar using PIN configuration method. IF STA Registrar, remember that enter PIN Code read from you Enrollee before starting PIN.   PBC: Start to add to AP using PBC configuration method. ★ When you click PIN or PBC, please don’t do any rescan within two-minute connection. If you want to abort this setup within the interval, restart PIN/PBC or press Disconnect to stop WPS connection. WPS associate IE: Send the association request with WPS IE during WPS setup. It is optional for STA. WPS probe IE: Send the probe request with WPS IE during WPS setup. IT is optional for STA. Progress Bar: Display rate of progress from Start to Connected status. Status Bar: Display currently WPS Status.
 45[WPS Information on AP] WPS information contain authentication type, encryption type, config methods, device password ID, selected registrar, state, version, AP setup locked, UUID-E and RF bands. Authentication Type: There are three types of authentication modes supported by RaConfig. There are Open, Shared, WPA-PSK, and WPA system. Encryption Type: For Open and shared authentication mode, the selection of encryption are None and WEP. For WPA, WPA2, WPA-PSK, and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.  Config Methods: Correspond to the methods the AP supports as an Enrollee for adding external Registrars. (A bitwise OR of values)
 46Device Password ID: Indicate the method or identifies the specific password that the selected Registrar intends to use. AP in PBC mode must indicate 0x0004 within two-minute Walk time.  Selected Registrar: Indicate if the user has recently activated a Registrar to add an Enrollee. The values are “TRUE” and “FALSE” State: The current configuration state on AP. The value are “Unconfigured” and “Configured”. Version: WPS specified version. AP Setup Locked: Indicate if AP has entered a setup locked state. UUID-E: The universally unique identifier (UUID) element generated by the Enrollee. There is a value. It is 16 bytes. RF-Bands: Indicate All RF bands available on the AP. A dual-band AP must provide it. The values are “2.4GHz” and “5GHz”   3.1.8 About  About function display the wireless card and driver version information.  (1)  Connect to Ralink’s Website: WWW.RALINKTECH.COM (2)  Display Configuration Utility, Driver, and EEPROM version information (3)  Display Wireless NIC MAC Address.
 473.1.9 Link Status Link Status displays the detail information current connection  Status: Current connection status. If no connection, it will show Disconnected. Otherwise, the SSID and BSSID will show here. Extra Info: Display link status in use. Channel: Display current channel in use. Authentication: Authentication mode in use. Encryption: Encryption type in use. Network Type: Network type in use. IP Address: IP address about current connection. Sub Mask: Sub Mast about current connection. Default Gateway: Default gateway about current connection. Link Speed: Show current transmit rate and receive rate.   Throughout: Display transmits and receive throughput in unit of Mbps. Link Quality: Display Connection quality based on signal strength and Tx/Rx packet error rate. Signal Strength 1: Receive signal strength 1, user can choose to display as percentage or dBm format. Signal Strength 2: Receive signal strength 2, user can choose to display as percentage or dBm format. Signal Strength 3: Receive signal strength 3, user can choose to display as percentage or dBm format. Noise Strength: Display noise signal strength. HT: Display current HT Status in use, containing BW, GI, MCS, SNR0, and SNR1 value. (Show the information only for 802.11n wireless card)
 483.1.10 Enable AP Mode Feature in Windows 2000 OS In Windows 2000 Operation System, the local network won’t be automatically established while using Wireless PCI adapter’s AP mode. Please follow the below steps to enable Internet Connection Sharing feature first before you switch Wireless PCI adapter’s AP mode.  Step 1: After the Wireless PCI Adapter is installed properly in Windows 2000 Operation System, go to Start Î Settings Î Control Panel Î Choose “Network and Dial-up Connections” option. Right-Click your local area connection (such as another LAN Card in the same computer), and choose “Properties”.  Step 2: In “Sharing” tab, enable Internet Connection Sharing for this connection and click “OK”
 49Step 3: Back to Network and Dial-up Connection screen, right-click “Local Area Connection 2” (for 802.11n Wireless LAN card) and choose “Properties”.   Step 4: Select “Internet Protocol (TCP/IP)” and click “Properties”. You will see 802.11n Wireless PCI adapter will be automatically assigned an IP address as Access Point.   Step 5: In the System tray, now you can switch 802.11n Wireless PCI Adapter to AP Mode.
 50Step 6: After switch to AP mode, Ralink Wireless Utility will automatically pup-up. The Wireless Default SSID is assigned as “SoftAP-56”.   Step 7: To make sure your Soft AP is working properly, you need to use another computer which with Wireless LAN feature to access SoftAP-56 AP. In the below example, use another PC with Wireless feature in Vista Operation System. Go to Start Î Control Panel Î Choose “Network and Sharing Center” option Î Click “Connect to a network” to search the available networks.
 51Step 8: Select the network “SoftAP-56” and click “Connect” to establish the connection.   Step 9: After the computer is successful connected to SoftAP-56, Network and Sharing Center screen will be shown as below. Click “View Status” to see the detail.
 52Step 10: In General tab, click “Detail…”, and then you can see the current Network connection details. If this computer is successful connect to SoftAP-56 Access Point, the DHCP server will be assigned to same IP address.
 533.2 For Windows Vista   Ralink wireless utility is shown as below. There are 6 settings pages in Ralink wireless utility:   Profile Page: Manage the profile.  Link Status Page: Display current connection information.  Site Survey Page: Display the available networks.  Statistics Page: Display the packet counters  WPS Configuration Page: Connect to WPS (Wi-Fi Protected Setup) capable APs.  QoS  Page: It involves “WMM Enable”, “WMM – Power Save Enable” and DLS setup  About Page: Display Ralink driver and utility information.  3.2.1 Profile  In the “Profile”, you can view and manage the current using Available Point(s). You can Add, Delete, Edit, or Activate the current Available Point(s). Also you can duplicate the AP or set current AP as Default.
 54 Profiles Name: The Profiles List displays all the profiles and the relative settings of the profiles including Profile Name, SSID, and Channel…etc; preset to PROF* (* indicate 1,2,3,…) SSID: AP to Ad-hoc name. Channel: Channel in use for Ad-Hoc mode. Authentication: Authentication mode. Encryption: Security algorithm in use. Network Type: Network’s type, includes Infrastructure and Ad-hoc.   Indicate connection is successful on currently activated profile.   Indicate connection is failed on currently activate profile. Add/Delete/Edit Button: Click these buttons to add/delete/edit the selected profiles. Activate Button: Click ”Activate” to connect the selected profile. When a profile is activated, the adapter will be initially connected to the profile.
 553.2.1.1  Add a profile   By either pushing the “Add” button on Profile Page or the “Add to Profile” button on Site Survey Page, it brings up the profile setting sheet which contains two setting pages -- “Configuration” page and “Authentication and Security” page.
 56 [Configuration page]    Profile Name: Name of the profile   SSID: Name of the desire network   Network Type: Network of the desired network, either infrastructure or Ad-Hoc.  Infrastructure – This operation mode requires the presence of a wireless Access   Point. All communication is done via the Access Point or Router.  Ad-Hoc – Select this mode if you want to connect to another wireless station in the   Wireless LAN network without through an Access Point or Router.   Tx-Power: The desired TX power level; the available options are 100%, 75%, 50% and Auto. If you want to lower the transmit power of the adapter for saving the power of the system, you can select the lower percentages from the list. The lower power will cause the lower signal strength and the coverage range.
 57  [Authentication and Security page]    Authentication Type: The authentication of the desired network. For infrastructure network, the available modes are Open, Shared, WPA, WPA-PSK, WPA2, and WPA2-PSK.  Open: No authentication is needed among the wireless devices.  Shared: Only Wireless device using a shared key (WEP Key identified) is allowed   to connecting each other. Setup the same key as the wireless device that the   adapter intends to connect.  WPA: WPA provides a scheme of mutual authentication using either IEEE   802.1x/Extensible Authentication Protocol (EAP) authentication or pre-shared key   (PSK) technology. It provides a high level of assurance to enterprise, small   business and home users that data will remain protected and that only authorized   users may access their networks. For enterprises that have already deployed IEEE   802.1x authentication, WPA offers the advantage of leveraging existing   authentication databases and infrastructure.  WPA-PSK – It is a special mode designed for home and small business users who   do not have access to network authentication servers. In this mode, known as   Pre-Shared Key, the user manually enters the starting password in their access   point or gateway, as well as in each wireless station in the network. WPA-PSK   takes over automatically from that point, keeping unauthorized users that don’t   have the matching password from joining the network, while encrypting the data   traveling between authorized devices.
 58 WPA2 – Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK   technology. It also includes a new advanced encryption mechanism using the   Advanced Encryption Standard (AES). AES is required to the corporate user or   government users. The different between WPA and WPA2 is that WPA2 provides   data encryption via the AES. In contrast, WPA uses Temporal Key Integrity Protocol  (TKIP).  WPA2-PSK – WPA2-PSK is also for home and small business. The difference   between WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption   via the AES. In contrast, WPA-PSK uses Temporal Key Integrity Protocol (TKIP).  Encryption: The encryption of the desired network.     -- For Open and Shared authentications, the available encryption modes are        None and WEP.   -- For WPA, WPA-PSK, WPA2 and WPA2-PSK authentications, the available       modes are TKIP and AES.   None – Disable the Encryption mode.   WEP – Enabled the WEP Data Encryption. When the item is selected, you have to    continue setting the WEP Key Length & the key Index.   TKIP – TKIP (Temporal Key Integrity Protocol) changes the temporal key every      10000 packets (a packet is a kind of message transmitted over a network). This      insures much greater security than the standard WEP security.   AES – AES has been developed to ensure the highest degree of security and      authenticity for digital information and it is the most advanced solution defined by    IEEE 802.11i for the security in the wireless network.  Note: All devices in the network should use the same encryption method to ensure   the communication.  WPA Pre-Shared Key: The WPA-PSK key can be from 8 to 64 characters and can be letters or numbers. This same key must be used on all of the wireless stations in the network.  WEP Key (Key1~Key4): The WEP keys are used to encrypt data transmitted in the wireless network. There are two types of key length: 64-bit & 128-bit. Select the default encryption key form key1 to key4 by selected the radio button.   Fill the text box by following the rule below:  64-bit – Input 10-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 5-digit   ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example:  “0123456aef” or “test1”  128-bit – Input 26-digit Hex values (in the “A-F”, “a-f, and “0-9” range) or 13-digit   ASCII characters (including “a-z” and “0-9”) as the encryption keys. For example:  “01234567890123456789abcdef” or “administrator”.
 593.2.1.2  Edit a profile  Selecting an exiting profile then clicking the “Edit” button on Profile Page brings up the profile setting sheet filled with the profile information for user modification.  3.2.1.3  Delete a profile  Selecting an exiting profile then clicking the “Delete” button on Profile Page to deletes the profile.
 603.2.1.4  Active a profile   Selecting an exiting profile then clicking the “Active” button on Profile Page activates the profile.
 613.2.2 Link Status  In this section, you can immediately monitor the current connected link status, such as Link Speed, Throughput, Link Quality, Signal Strength, Noise Level …etc.  Status: Current connection status. If no connection, it will show Disconnected. Otherwise, the SSID and BSSID will show here. Extra Info: Display the link status and current channel in use. Channel: Display the number of the radio channel and the frequency used for the networking. Link Speed (Mbps): Display the transmission and reception rate of the network. The maximum transmission rate is 54Mbps. Throughput (Kbits/sec): Display transmits and receives throughout in unit of K bits/sec. Link Quality: Display connection quality based on signal strength and TX/RX packet error rate. dBm: If you want to know the signal strength in the unit of dBm, select the check box. Signal Strength: Receive signal strength, user can choose to display as percentage or dBm format. Signal Strength2: Receive signal strength 2, user can choose to display as percentage or dBm format.
 62Noise Level: Display the noise signal strength. HT: Display current HT status in use, containing BW, GI, MCS, SNR0, and SNR1 value. (show the information only for 802.11n wireless card.)  3.2.3 Site Survey  When you open the Configuration Utility, the system will scan all the channels to find all the access points/stations within the accessible range of your adapter and automatically connect to the wireless device with the highest signal strength. From the “Site Survey”, all the network nearby will be listed. You can change the connection to another network or add one of the networks to your own profile list.  SSID: Name of BBS of IBSS network. BSSID: MAC address of AP or randomly generated of IBSS. Signal: Receive signal strength of specified network. Channel: Channel in use. Encryption: Encryption algorithm used within than BBS or IBSS. Valid value includes WEP, TKIP, AES, and Not Use. Authentication: Authentication mode used within then network, including Unknown,
 63WPA-PSK, WPA2-PSK, WPA and WPA2. Network Type: Network type in use, Infrastructure or Ad-Hoc. Rescan:  Issue a rescan command to wireless NIC to update information on surrounding wireless network. Re-Scanning: Clicking the re-scan button to perform the re-scanning action. Add to Profile: Add the selected AP to Profile setting. It will bring up profile page and save user’s setting to a new profile.  [Connect A Network] (1) When Raconfig first ran, it will select the best AP to connect automatically. (2) If user wants to connect to other AP, he can double-click mouse on the intended AP to make connection. (3) If the intended network has encryption other than “Not Use”, Raconfig will bring up the security page and let use input the appropriate information to make the connection.   This icon indicates the change is successful.  ☉Example 1: Open and Non-Encrypted  Step 1 – Choose “Open” authentication type  Step 2 – Choose “None” encryption type   Step 3 – After the profile is saved, click “Activate” button on Profile Page to activate the  profile.
 64  ☉ Example 2: WEP-Encrypted  Step 1 – Choose “Open” or “Shared” authentication type  Step 2 – Choose “WEP” encryption type  Step 3 –Enter the WEP KEY
 65 Step 4 –After the profile is saved, click the “Activate” button on Profile Page to active the  profile.  ☉ Example 3: WPA-PSK/WPA2-PSK  Step 1 – Choose “WPA-PSK” or “WPA2-PSK” authentication type  Step 2 – Choose “TKIP” or “AES” encryption type  Step 3 –Enter the pre-shared KEY

Navigation menu