Detailed instructions for use are in the User's Guide.
[. . . ] USER GUIDE
EZ ConnectTM N 150 Mbps N Wireless USB Adapter
SMCWUSBS-N3
150 Mbps N Wireless USB Adapter User Guide
20 Mason Irvine, CA 92618 Phone: (949) 679-8000
September 2009 149100000053W E092009-AP-R01
Information furnished by SMC Networks, Inc. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice.
Copyright © 2009 by SMC Networks, Inc. [. . . ] Shared The shared-key approach uses Wired Equivalent Privacy (WEP) to verify client identity by distributing a shared key to clients before attempting authentication. WPA / WPA-PSK Wi-Fi Protected Access (WPA) employs a combination of technologies to provide an enhanced security solution for wireless networks. The WPA Pre-shared Key (WPA-PSK) mode for small networks uses a common password phrase that must be manually distributed to all clients that want to connect to the network. WPA2 / WPA2-PSK WPA2 is a further security enhancement that includes the now ratified IEEE 802. 11i wireless security standard.
Encryption Configure the encryption. For open and shared authentication mode, the selection options are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES.
None No encryption is used.
24
CHAPTER 3 | Windows 2000/XP Configuration
Wireless Utility Configuration
WEP Enables the Wireless USB Adapter to use WEP shared keys. Wired Equivalent Privacy (WEP) provides a basic level of security, preventing unauthorized access to the network and encrypting data transmitted between wireless clients. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. TKIP Use Temporal Key Integrity Protocol (TKIP) keys for encryption. TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys. WPA2 uses AES Counter-Mode encryption with Cipher Block Chaining Message Authentication Code (CBC-MAC) for message integrity. The AES Counter-Mode/CBCMAC Protocol (AESCCMP) provides extremely robust data confidentiality using a 128bit key. Use of AES-CCMP encryption is specified as a standard requirement for WPA2. Before implementing WPA2 in the network, be sure client devices are upgraded to WPA2-compliant hardware.
802. 1X -- Use IEEE 802. 1X (802. 1X) for user authentication and distributing dynamically generated encryption keys. IEEE 802. 1X is a standard framework for network access control that uses a RADIUS server on the local network for user authentication. The 802. 1X standard uses the Extensible Authentication Protocol (EAP) to pass user credentials (either digital certificates, usernames and passwords, or other) from the client to the RADIUS server.
Figure 17: Profile - 802. 1X Configuration
EAP Method (LEAP) The Lightweight Extensible Authentication Protocol (LEAP) is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication. When LEAP is select, input LEAP identity, password, domain name, and select encryption type. Check the Show Password box to display password characters as you type instead of asterisks. Identity / Password Configures the identity an password for authentication. Domain Name Enable the wireless configuration utility to check the end of domain name. If defects are found, the connection is dropped.
25
CHAPTER 3 | Windows 2000/XP Configuration
Wireless Utility Configuration
WMM Wi-Fi Multimedia (WMM), also known as Wireless Multimedia Extensions
(WME), is a Wi-Fi Alliance interoperability certification. It provides basic Quality of Service (QoS) features for IEEE 802. 11 wireless networks.
Figure 18: WMM
The displayed items on this page can be described as follows: WMM Enable -- Enable WMM function. [. . . ] Click to start the uninstall process.
Figure 32: Windows XP Start Menu - Uninstall the Utility
2. Click Yes to uninstall the utility.
Figure 33: Start the Uninstall Process
40
APPENDIX A | Troubleshooting
Uninstalling the Utility
3. Wait while the software is uninstalled.
Figure 34: Uninstall Process in Progress
4. When the uninstall process is complete, click Finish to exit.
Figure 35: Uninstall Process Complete
41
B
HARDWARE SPECIFICATIONS
INTERFACE USB version 2. 0 compliant POWER +5V DC, 0. 35A over USB connection RADIO SPECIFICATIONS IEEE 802. 11n
IEEE 802. 11b/g
FREQUENCY North America/Taiwan NCC: 2. 412 - 2. 462 GHz
Japan: 2. 412 - 2. 484 GHz Europe: 2. 412 - 2. 472 GHz
MODULATION 802. 11b: CCK, QPSK, BPSK
802. 11g: BPSK, QPSK, 16QAM, 64QAM 802. 11n: BPSK, QPSK, 16QAM, 64QAM
OPERATING CHANNELS North American Certification: FCC
Taiwan Certification: NCC Certification: FCC; Channel: 1~11 Europe Certification: ETSI; Channel: 1~13
DATA RATES 802. 11b: 11, 5. 5, 2, 1 Mbps per channel
802. 11g: 54, 48, 36, 24, 18, 12, 9, 6 Mbps. [. . . ]