GIGA BYTE TECHNOLOGY GN-WIKG Wireless mini-PCI Module User Manual GN WIKG EN

GIGA-BYTE TECHNOLOGY CO., LTD. Wireless mini-PCI Module GN WIKG EN

Contents

user manual part 3

17  2-5.  Driver & Utility Installation - Windows® XP  Step 1: When the Found New Hardware Wizard screen appears, click Cancel to exit.   Step 2:  Insert the GN-WIKG Installation CD into the CD-ROM drive. The GIGABTYE GN-WIKG Wireless Mini-PCI Adapter setup screen appears.   Step 3:  Drag your mouse over Install Wireless LAN Utility and click on it to start the utility installation program.
18  Step 4:  When the Welcome screen appears, click Next.   Step 5:  The Check Setup Information screen displays the Operating System of your computer. If it is correct, click Next to continue.
19  Step 6:  After the software utility installation is complete, click Finish.  You are now ready to install 802.1x authentication software.   Step 7:  Drag your mouse over Browse the CD and click on it.
20  Step 8:  The Windows file explorer opens. Double-click on the file “AegisI5.exe”.   Step 9:  When the AEGIS Protocol Installation window appears click the Install button to begin installing program files.   Step 10: When the message Installed Successfully appears in the dialog box, click the Close button.  Windows® XP may or may not automatically reboot your PC.
21  Chapter 3 Using the GIGABYTE WLAN Configuration Utility  The Gigabyte WLAN Utility is a powerful application that helps you to configure the GN-WIKG Wireless Mini-PCI Adapter as well as monitor the network status link. It automatically appears as an icon in the system tray at the bottom right corner of screen whenever the card is operating (see Figure 3-1). The icon displays signal strength (one green box = weak signal, 4 green boxes = strong signal) and double-clicking on it launches the utility.   Figure 3-1    Gigabyte Configuration & Monitor Utility Icon  You may also open the Gigabyte WLAN Utility from the Windows Start menu, selecting Programs and then Gigabyte WLAN Utility.  Note: Modifications to WLAN configuration settings can be done when GN-WIKG is in use or through the network configuration tool provided by Windows® when it is inactive.   3-1.  The Profile Tab  Click on the Profile tab in the Gigabyte WLAN Configuration Utility to view the values for each defined profile. Click the Add button to create a new profile (see section below for further details), the Delete button to delete a selected profile, the Edit button to modify a selected profile and click the Activate button to have a selected profile become active.  Figure 3-2 Profile Tab
22  Profile Name -   Name associated with specific wireless parameters and settings. The   icon indicates the currently active profile.  SSID – Displays the Service Set Identity (wireless network name) associated with active profile.  Channel – Displays which channel the profile is operating on.  Authentication – Displays authentication type associated with profile.  Encryption – Four encryption types currently used in the profile include “None”, “WEP”, “AES” and “TKIP”.  Network Type – Displays the wireless mode (Infrastructure or Ad-Hoc) associated with the profile.    3-1-1. Add Profile – Configuration Tab   Figure 3-3    Add Profile – Configuration Tab
23   Profile Name –   Type in a unique profile name, set the corresponding parameters and click the Apply button to add profile.  SSID – Select a defined Service Set Identity detected by the system from the drop-down list or input a new SSID (32-character maximum).  Power Saving Mode –   Select the PSM option to enable power saving feature (when no data will be transmitted) or the CAM option to have device always on.  Network Type – Displays the current wireless mode (Infrastructure or Ad-Hoc) the Mini-PCI Adapter is operating in. Infrastructure is the most common and is used when connecting your PC to a wireless access point or wireless router.    Ad-Hoc mode is used to connect to another computer without the use of a wireless access point or wireless router. In Ad-Hoc mode, the Preamble and Channel can be manually set (see Figure 3-4).  Figure 3-4   TX Power – Allows you to define the transmit power at various percentage levels with 100% being the default value.  RTS Threshold –   Define the packet size the wireless node uses to determine appropriate transmission mechanism.  Fragmentation Threshold – Define the packet length used for fragmentation. Packets larger than value will be fragmented.
24  3-1-2. Add Profile - Authentication and Security  If an authentication or security setting is configured in a wireless access point or wireless router, it is necessary for the Wireless Mini-PCI Adapter profile to match the security parameters in order to obtain access and establish a connection. Both WEP Encryption and 802.1X Authentication protocols are supported.  Figure 3-5.    Authentication and Security   Table 3-1 Authentication Type  Security  Secure Key Setting  802.1X Enabled None None None WEP Key Setting YES None None Shared WEP Key  YES TKIP None WPA AES None YES TKIP WPA-PSK Key WPA-PSK AES WPA-PSK Key NO  3-1-2-1.  Authentication and Security  Authentication –   Before a station connects to a SSID, the authentication type used by the SSID must be known. Authentication types include OPEN SYSTEM, WAP, WAP-PSK and SHARED.  Security –   To prevent unauthorized access to data transmitted on the network, WLAN card provide a data encryption of high security. The access point must have the same password and encryption to connect with you. Different authentication types have different level of security. Please refer to Table 3-1.  WEP Encryption –
25  To activate the WEP Encryption, choose WEP Encryption from the drop-down menu in the Encryption field. Then follow instructions below: 1. Select a Key. (You may specify up to 4 Keys) 2. Select data type as either Hex or ASCII. (Hex = hexadecimal) 3. Enter a WEP key. [For 64-bit: 10 hexadecimal digits, 5 ASCII; For128-bit: 26 hexadecimal digits, 13 ASCII] 4. Click OK to save the settings.  WPA-PSK Encryption –   To activate WPA-PSK (Preshared Key) Encryption using TKIP or AES, choose WPA-PSK from the drop-down menu in the Encryption field. Then follow instructions below: 1. Enter a Preshared Key. [Key may be up to 64 hexadecimal digits or from 8 to 63 ASCII digits in length] 2. Click OK to save these settings.  3-1-2-2. 802.1X Setting   To enable 802.1X Authentication, click on the Use 802.1x button (see Figure 3-5 above) and the 802.1X Setting window will open.    From the 802.1x Setting window you can configure authentication parameters such as Tunnel Protocol, ID and Password and Client Certificate or Certificate Chain.    Figure 3-6    802.1X Setting – Certification Tab      Authentication Type –   Choose authentication type from the drop-down menu. Authentication types supported include PEAP, TLS/Smart Card, TTLS, LEAP and MD5-Challenge.  Identity –   Enter the name of the user account.  Password –   The option to specify a password is only available when LEAP and MD5-Challenge are selected as the authentication types.
26   Use Client Certificate –   Check the Use Client Certificate box to confirm if the Client Certificate is correct in the authentication process. This applies only to TLS and TTLS authentication types.  Tunnel Authentication –   PEPA and TTLS use two-step authentication method. The first step is that Server sets up a Tunnel with its authentication. No option is need to be set for Station with WLAN card. The second step is to confirm the validity of Station with assigned authentication type in the Tunnel. Data needed for authentication includes Tunnel ID, Tunnel Password, Client Certificate or Server Authentication.  Protocol: Use assigned authentication type in the safe tunnel.  Tunnel Identity –   Enter name of user account.  Password –   Enter the user account password.  Figure 3-7.  Client Certificate List   Figure 3-8.  CA Server Setting
27     The CA Server is enabled only when TLS, TTLS or PEAP authentication is selected. The Client can verify if such server is reliable and then transmit Client Certificate after the verification is confirmed. (NOTE: Only available if Use Client Certificate is checked.)  Verify CA Server -   1. Confirm if the Server Certificate is issued by an assigned certificate issuer. If Allow Intermediate Authentication box is checked, the server certificate can be issued by one intermediate certificate issuer.  2. Check that the server name of server certificate matches the name entered by the user or belongs to the same domain.  Server Certificate –   Check the Server Certificate box to indicate that the Client will confirm whether the CA server is reliable.  Certificate issuer –   Specify the CA of a server certificate from the drop-down list.  Allow Intermediate Certificates –   When this option is checked, the certificate issuer can be an issuer recognized by a specific certificate issuer.    Server name –   This value can be a server name or the name of a domain where the server is located.  Server name must match exactly –   Select this option to specify that the server name of server certificate must be the same as Server Name or matches the name of domain where the server is located.  Domain name must end in specified name –   Select this option to specify that the certificate issuer must match the domain or secondary domain entered in Server Name.
28  3-2.  The Link Status Tab  The Link Status tab displays information on the current wireless network connection.  Figure 3-9.   Link Status    Status –   Displays the SSID and MAC address of the associated access point when GN-WIKG is configured in infrastructure mode.  Current Channel – Displays the wireless channel currently in use ONLY when GN-WIKG is configured in Ad-Hoc mode.  Link Speed –   Indicates the transmission data rate between associated access point and the GN-WIKG  Throughput –   Indicates the number of successfully transmitted (Tx) and received (Rx) data (in bytes per second.  Link Quality – Displays how well the GN-WIKG is communicating with wireless access point, wireless router or another wireless device.  Signal Strength –   Displays the signal strength received by RF signal processor in dBm.  Noise Level – Displays the noise level of connection.
29  3-3.  The Site Survey Tab  The Site Survey” tab shows you the list of available access points and/or peer-to-peer stations. You can double click SSID that you want to connect or highlight the access point and click the Connect button.   Figure 3-10.   Site Survey     BSSID –   Displays the MAC address of the access point.  Signal Strength –   Displays the access point signal strength.  Channel –   Displays the current broadcast channel used by the access point.  Encryption – The security method used by the access point.  Authentication – The authentication type used by the access point.  Network Type – Informs you if an access point (infrastructure) or other wireless node (802.11 Ad Hoc) is connected.
30  3-4. “Statistics” Setting  The Statistics tab shows you the number of packets sent and received by the Wireless PCI Adapter.   Figure 3-11.   Statistics
31  3-5.  The Advanced Tab  The Advanced tab includes fields of various parameters to review or change drivers. Just click “Apply” button to apply any parameter change to the driver in the tab. A reboot is not needed for the WLAN card (see Figure 3-12)  Figure 3-12.   Advance   Wireless Mode: Sets infrastructure Protocols, including 802.11 B/G mix and 802.11 B Only. Ad Hoc Wireless Mode: Sets Ad Hoc Wireless Protocols, including 802.11 B/G mix, 802.11 B Only and 802.11 G Only. TX Burst: The longest interval between frames is normally one DIFS while frames are transmitted. When this setting is open, the longest interval between frames is one SIFS that means the system is allowed to transmit higher capacity of data in one interval. B/G Protection: 802.11b uses CCK modulation. 802.11g uses OFDM while CCK modulation for 802.11b is compatible. To prevent data collision between two stations with 802.11b and 802.11g within range of the same Access Point, it is necessary to set 11B/G Protection. This setting only functions when 802.11 B/G mix is selected as Wireless Mode. Three setting are available: AUTO, EABLE and DISABLE. This is a mechanism implemented to prevent the “Hidden Node” problem, “Hidden Note” is a situation in which two stations are within range of the same Access Point, but are not within range of each other. Therefore, they are hidden nodes for each other and can not detect each other. This mechanism is a way to prevent data collision when WLAN equipments require transmission. TX Rate: This option adjusts settings of TX Rate according to the setting of “Infrastructure Wireless Mode”. Signal Control: To turn off transferring signals, click on “Turn Off RF” icon on the bottom right corner of the screen. Click “Turn On RF” to transfer signal again. TX Turbo rate and Use short slot time: currently does not support.
32  3-6. The About Tab  The About tab displays information about current drivers and physical MAC address.  Figure 3-13.   About
33  Chapter 4 Troubleshooting  This troubleshooting guide lists questions and possible solutions to some common problems which you may encounter while installing or using GIGABYTE Wireless Mini-PCI Adapter.   Cannot Enable 802.1x, WPA or WPA-PSK    Windows XP / 2000: 1. Run the AegisI5.exe file found on the GN-WIKG installation CD. 2. Click “Install”.    Windows 98SE / ME: 1. Run AegisI2.exe file found on the GN-WIKG installation CD. 2. Click “Install”.    Cannot Establish Connection to a Wireless Network    Make sure the SSID for the Wireless Mini-PCI Adapter is the same as the wireless access point or wireless router.   Make sure the security settings are the same as that of wireless access point / router. If WEP or WPA encryption is enabled, check if the WEP or WPA keys for the GN-WIKG match.     Check that the MAC address of the Wireless Mini-PC Adapter is included in the access point/router’s Authorization Table.      Can Connect to an Access Point, but Cannot Access the Internet    Make sure the security settings are the same as that of wireless access point / router. If WEP or WPA encryption is enabled, check if the WEP or WPA keys for the GN-WIKG match.     Verify the network settings (IP address, subnet mask, gateway, and DNS) of your computer.   Check that the proxy server of the WEB browser is correctly set.   Poor Link Quality and Weak Signal Strength    Keep the Wireless Mini-PCI Adapter away from microwave ovens and large metal objects to avoid radio interference.   Locate the Wireless Mini-PC Adapter as near to the access point as possible.
34  Chapter 5 Hardware Specifications   1. System Host Interface Mini-PCI Type III B Operating Voltages 3.3V+-5% 2. RF Characteristics Frequency Bands  2412-2484 MHz (subject to local regulations) Modulation Technology  OFDM and DSSS Modulation Techniques  64QAM, 16QAM, QPSK, BPSK, CCK, DQPSK, DBPSK Date Rates  54, 48, 36, 18,12, 9, 11, 6, 5.5, 2, and 1 Mbps, auto fallback Typical Power    Receive:240 mA; Transmit:400 mA Peak Output Power  Targeted at 20dBm @ Nominal Temp Range at antenna connector Receive sensitivity  Targeted at -68dBm @54Mbps;  -85dBm@11Mbps Antenna connectors  Two antenna connectors for supporting antenna diversity 3.Safety Regulation and Operating Environment   EMC certification FCC Part 15 (USA)   Temperature Range Operating: 0 ~ 55 deg C, Storing: -20 ~ 65 deg C Humidity 10% ~ 90% Non-condensing 4. Software Support Driver Windows 98SE/ME/2000/XP Security  64/128 bit WEP; AES;802.1x client and WPA for Windows XP Roaming Seamless roaming among 802.11b/g access points. Management Utility Monitors the network situation. 5. Mechanical Dimensions  59mmx44mmx4mm Weight    12± 1 g Packaging Packaging specially used by Gigabyte. *This specification is subject to change without notice.

Navigation menu