TRENDnet Network Card TEW 603PI User Manual

1
Download from Www.Somanuals.com. All Manuals Search And Download.  
CE Mark Warning  
This is a Class B product. In a domestic environment, this product may cause radio interference, in which  
case the user may be required to take adequate measures.  
This transmitter must not be co-located or operation in conjunction with any other antenna or transmitter.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Table of Contents  
Federal Communications Commission (FCC) Interference statement  
CE Mark Warning  
2
3
Getting Started with the TEW-603PI  
5
Hardware and Wireless Utility  
About Your Super G Wireless MIMO PCI Adapter  
Package Content  
6
6
6
System Requirement  
6
LED Definition  
6
Product Outline  
7
Overview of the Wireless Client Utility  
Working with Profiles  
8
9
Checking for Available Access Points  
Disabling the Wireless Client Utility  
16  
17  
Exploring the Wireless Client Utility Screens  
The Network Screen  
19  
19  
22  
23  
25  
26  
The Profile Screen  
The SiteSurvey Screen  
The Options Screen  
The Version Screen  
Configuring Wireless Security  
27  
Configuring Security  
27  
Glossary  
35  
Appendix  
37  
37  
39  
Maintenance  
Troubleshooting  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Getting Started with the TEW-603PI  
Congratulations on purchasing the TEW-603PI! This manual provides information for setting up  
and configuring the TEW-603PI. This manual is intended for both home users and professionals.  
It is not required to read some of the more technical information in this manual (such as in  
“Wireless LAN Networking” and “Configuring Wireless Security”) to operate and enjoy the  
TEW-603PI. It is included for your reference only.  
The following conventions are used in this manual:  
THE NOTE SYMBOL INDICATES ADDITIONAL INFORMATION ON THE TOPIC AT  
HAND.  
NOTE  
THE TIP SYMBOL INDICATES HELPFULL INFORMATION AND TIPS TO IMPROVE  
YOUR NETWORK EXPERIENCE.  
THE CAUTION SYMBOL ALERTS YOU TO SITUATIONS THAT MAY DEGRADE  
YOUR NETWORKING EXPERIENCE OR COMPROMISE YOUR SECURITY.  
LIKE NOTES AND TIPS, THE IMPORTANT SYMBOL INDICATES INFORMATION  
THAT CAN IMPROVE NETWORKING. THIS INFORMATION SHOULD NOT BE OVER-  
LOOKED.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Hardware and Wireless Utility  
This chapter introduces the Adapter and prepares you to use the Wireless Utility.  
About Your Wireless MIMO PCI Adapter  
The Adapter is an IEEE 802.11b, and 802.11g compliant wireless LAN adapter.  
With the Adapter, you can enjoy wireless mobility within almost any wireless  
networking environment.  
The following lists the main features of your Card.  
9
9
9
9
9
Your Adapter can communicate with other IEEE 802.11b/g compliant wireless devices.  
Automatic rate selection.  
Standard data transmission rates up to 54 Mbps.  
Proprietary Atheros transmission rates of 108 Mbps  
Offers 64-bit, 128-bit and 152-bit WEP (Wired Equivalent Privacy) data encryption for network  
security.  
9
9
9
Supports IEEE802.1x and WPA (Wi-Fi Protected Access).  
Two built-in external antennas.  
Driver support for Windows XP/2000.  
Package Content  
¾
¾
¾
¾
Super G Wireless MIMO PCI Adapter  
Two external antennas  
Installation and Manual CD  
Quick Start Guide  
System Requirement  
z
z
z
Pentium class desktop computers with at least one available PCI slot  
Microsoft Windows XP or 2K  
CD-ROM drive  
LED Definition  
The following table describes the LEDs on the Super G Wireless MIMO PCI Adapter  
STATUS  
POWER OFF  
POWER ON  
POWER LED  
OFF  
Slow Blinking  
LINK LED  
OFF  
OFF  
Radio on without association Two LEDs slow blinking mutually  
Associated without traffic  
Associated with traffic  
Two LEDs slow blinking together  
Two LEDs blinking together per traffic amount  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Fixed Antenna  
LINK LED  
POWER LED  
R-SMA Connector  
Side view of the PCI Adapter from bracket.  
Product Outline  
Fixed  
Antenna  
LEDs  
R-SMA Connector  
PCI Interface  
golden fingers  
Wireless MIMO PCI Adapter  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
Overview of the Wireless Client Utility  
The Wireless Client Utility is included on the CD that shipped with the TEW-603PI. Install the utility  
as described in the Quick Start Guide before attaching the TEW-603PI to your computer.  
BE SURE TO INSTALL THE WIRELESS CLIENT UTILITY BEFORE YOU ATTACH  
THE TEW-603PI TO YOUR COMPUTER. ATTACHING THE TEW-603PI  
BEFORE THE UTILITY IS INSTALLED COULD CAUSE THE INSTALLATION TO FAIL.  
IMPORTANT  
When the TEW-603PI is installed, it is configured to automatically  
load when you start your computer. The utility icon displays in the  
system tray at the bottom-right corner of your screen.  
Double-click the TEW-603PI icon in the system tray, the following  
Network screen opens:  
There are five screens in the utility.  
The Network Screen  
The Profile Screen  
The SiteSurvey Screen  
The Options Screen  
The Version Screen  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
The Link Information pane provides information on your current connection. This same pane  
shows at the bottom of all screens so you are always aware of your connection status.  
WHEN THE TEW-603PI IS NOT CONNECTED TO YOUR COMPUTER, MOST  
SETTINGS IN THE WIRELESS CLIENT UTILITY ARE UNAVAILABLE. SETTINGS OR  
BUTTONS THAT ARE NOT AVAILABLE ARE GRAYED OUT.  
NOTE  
Working with Profiles  
A profile is a record of the configuration you use to connect to a particular access point. Without  
profiles, you would have to reconfigure the TEW-603PI each time you change access points.  
Using the Profile screen you can configure the TEW-603PI to access your home network and your  
office network. Each configuration is saved as a profile. Then when you go from the office to your  
home you just select the appropriate profile.  
CREATING A PROFILE  
Refer to the following to add a profile.  
1. Click Profile.  
2. Click Add. The Wireless Client Utility Profile Wizard opens.  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Type a descriptive name for the profile such as Home or CoffeShop.  
4. Click the drop-down arrow at Network Mode and select Infrastructure or Ad-Hoc. Choose  
Infrastructure when connecting to an access point or wireless router. You will need to know the  
SSID of the access point.  
Choose Ad-Hoc when connecting directly to another computer without using an access point.  
You can type anything for the SSID as long as the same SSID is used on the computer you are  
connecting to.  
5. In the SSID pane click Browse. The utility performs a site survey and displays the results.  
The SSID (Service Set IDentifier) is the name assigned to a wireless Wi-Fi network. All devices  
must use this case-sensitive name, which is a text string up to 32 bytes long, in order to  
communicate.  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
6. Select the SSID you want to connect to and click Add To Profile.  
7. Click Next. The WLAN Security Configuration screen appears.  
This screen reflects the security settings detected of the access point you want to connect to.  
Security settings vary in complexity and you may have to consult your network administrator for  
this information. See “Configuring Wireless Security” for more information.  
8. Select the Security Mode from the drop-down list and then select the appropriate settings for  
the security mode.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
9. Click Next.  
10. Click Save to complete the wizard and save the new profile. (If you do not want to activate  
the profile, uncheck the Apply this profile now checkbox.)  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
MODIFYING PROFILES  
You may need to modify settings for a profile, for example, if you purchase a new router, or if your  
office administrator provides you with new security settings. Refer to the following to modify a profile.  
1. Open the Wireless Client Utility and click Profile.  
2. Select the profile you want to modify and click Properties.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3. Make the changes you want to the Basic Settings and click Advanced Settings.  
Unless you have a thorough understanding of wireless networking, it is recommended that  
you leave these settings at the defaults.  
4. Click WLAN Security. (Refer to “Configuring Wireless Security” for more details on security  
settings.)  
Click the drop-down arrow at Security Mode to choose from the following settings:  
Disabled (No Encryption)  
All data sent between the access point and the client is left unencrypted and may be viewed  
by other wireless devices.  
WEP (Wired Equivalent Privacy)  
Encrypts all traffic sent between the access point and the client using a shared key. When  
using WEP encryption, only access points and PCs using the same WEP Key can communi-  
cate with each other.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WPA/WPA2  
WPA encrypts all traffic between the access point and the client using either TKIP or AES  
encryption. Depending on the authentication protocol selected, each client must authenticate  
using their own unique username, password, and security certificate.  
WPA-PSK/WPA2-PSK  
WPA-PSK is a compromise between WPA and WEP. Like WEP, it uses a pre-shared key that  
every user of the network must have in order to send and receive data. Like WPA, it uses either  
TKIP or AES.  
IT IS RECOMMEDED THAT YOU USE WPA OR WPA-PSK WHENEVER POSSIBLE.  
WPA (WI-FI PROTECTED ACCESS) PROVIDES STRONGER ENCRYPTION THAN  
THE EARLIER WEP (WIRED EQUIVALENT PRIVACY) METHOD.  
IMPORTANT  
5. Make the changes you want and click TCP/IP Config.  
Select the Use IP Changer checkbox. This allows you to bypass your existing wireless TCP/  
IP settings and configure TCP/IP settings for each profile.  
Use DHCP  
DHCP (Dynamic Host Configuration Protocol) automatically assign IP addresses. Check this  
radio button if your router is set to DHCP.  
Use static IP below  
Check this radio button if you have to enter a static IP address.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Checking for Available Access Points  
To scan for access points using the TEW-603PI, refer to the following.  
1. Open the Wireless Client Utility and click SiteSurvey.  
2. Available wireless networks are listed. Click Refresh anytime to update the list.  
3. Select the network you want and click Connect. Or click Add To Profile if you want to con-  
nect later.  
For details about any of the listed access points, select it from the list and click Detailed Info  
to see the following screen. (You can also double-click an access point to view the Detailed  
Info screen.  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Disabling the Wireless Client Utility  
You may need to have Windows manage your wireless network settings. In that case, you should  
disable the Wireless Client Utility. To disable the Wireless Client Utility refer to the following.  
1. Open the Wireless Client Utility and click Options.  
2. Select the Let Windows manage this wireless adapter check box and click Apply Now.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Exploring the Wireless Client Utility Screens  
This section covers the following topics:  
The Network Screen  
The Profile Screen  
The SiteSurvey Screen  
The Options Screen  
The Version Screen  
The Network Screen  
The Wireless Client Utility is included on the CD that shipped with the TEW-603PI. Install the utility  
as described in the Quick Start Guide before attaching the TEW-603PI to your computer.  
BE SURE TO INSTALL THE WIRELESS CLIENT UTILITY BEFORE YOU ATTACH  
THE TEW-603PI TO YOUR COMPUTER. ATTACHING THE TEW-603PI  
BEFORE THE UTILITY IS INSTALLED COULD CAUSE THE INSTALLATION TO FAIL.  
IMPORTANT  
When the TEW-603PI is installed, it is configured to automatically load when you start your computer.  
The utility icon displays in the system tray at the bottom-right corner of your screen.  
Double-click the TEW-603PI icon in the system tray, the following Network screen opens:  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WIRELESS SETTING  
The Wireless Setting pane settings are described below  
Shows the current profile you have selected. If you have not  
Current Profile  
added a profile, only Default shows. The settings shown in the  
Network screen are for the current profile. Click the dropdown  
arrow to select another profile.  
Press to reconnect to the current access point.  
Reconnect (button)  
Network Mode  
Shows the current network mode. Infrastructure or ad-hoc  
mode. (See Note below for more information.)  
Security  
Shows the security status.  
Shows the authentication required.(See “Configuring Wireless  
Security”)  
Authentication  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
WIRELESS SYSTEMS WORK IN INFRASTRUCTURE MODE OR PEER-TO-PEER MODE.  
IN INFRASTRUCTURE MODE, WIRELESS DEVICES COMMUNICATE TO A WIRED LAN  
VIAACCESS POINTS. IN AD-HOC MODE (ALSO KNOWN AS PEERTO-PEER MODE),  
WIRELESS DEVICES COMMUNICATE WITH EACH OTHER DIRECTLY AND DO NOT USE  
AN ACCESS POINT.  
TCP/IP SETTING  
The TCP/IP Setting pane settings are described below.  
IP Address  
Shows the current network IP address.  
Subnet Mask  
Gateway  
Shows the current subnet mask status.  
Shows the current gateway.  
Shows the current network DNS address.  
DNS Server  
Click to release the current TCP/IP settings.  
IP Release (button)  
IP Renew (button)  
Click to renew the TCP/IP settings.  
LINK INFORMATION  
The Link Information pane settings are described below. The Link Information pane shows the  
network status.  
Shows the current SSID (Service Set IDentifier). This is the  
name assigned to a wireless Wi-Fi network. All devices must  
use this case-sensitive name in order to communicate.  
SSID  
Status  
Shows the current connection status.  
Link Speed  
Shows the speed of the current connection. Tx is the transmit  
speed; Rx the receive speed.  
Shows the signal strength of the current connection. (See Tip  
below for more information.)  
Shows the ID of the current BSS. (See Note below for more  
information.)  
Signal Level  
BSSID  
Channel  
Shows the network channel.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
THE LINK INFORMATION PANEL IS SHOWN IN ALL SCREENS SO YOU CAN  
ALWAYS SEE THE STATUS OF YOUR CURRENT CONNECTION. MONITOR THIS  
SETTING AS YOU MOVE AROUND TO ATTAIN A SUITABLE SIGNAL.  
WIRELESS SYSTEMS WORK IN INFRASTRUCTURE MODE OR AD-HOC  
(PEER-TO-PEER) MODE. IN INFRASTRUCTURE MODE, WIRELESS DEVICES  
COMMUNICATE TO A WIRED LAN VIAACCESS POINTS. EACH ACCESS POINT AND  
ITS WIRELESS DEVICES ARE KNOWN AS A BASIC SERVICE SET (BSS). IN  
AD-HOC MODE (ALSO KNOWN AS PEER-TO-PEER MODE), WIRELESS DEVICES  
COMMUNICATE WITH EACH OTHER DIRECTLY AND DO NOT USE AN ACCESS  
POINT. THIS IS AN INDEPENDENT BSS (IBSS).  
NOTE  
The Profile Screen  
A profile is a record of the configuration you use to connect to a particular access point. Without  
profiles, you would have to reconfigure the TEW-603PI each time you change access points.  
Using the Profile screen you can configure the TEW-603PI to access your home network and  
your office network. Each configuration is saved as a profile.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PROFILE LIST  
The Profile List pane settings are described below.  
Shows the name of the profile that you assigned. If only default  
displays, no profiles have been added.  
Name  
SSID  
Shows the name (usually the equipment vendor's name)  
assigned to a wireless Wi-Fi network. (The keyword “ANY”  
means any available network.)  
IP Address  
Shows the IP address.  
Add (button)  
Click to add a profile.  
Remove (button)  
Click to remove the selected profile.  
Click to view properties for the selected profile.  
Click to apply changes after modifying settings.  
Use the Up/Down buttons to move the selected profile to the  
Properties (button)  
Apply (button)  
Up (button)  
top of the list or to the bottom. When in the Network screen,  
the TEW-603PI attempts to connect to the network at the top of  
Down (button)  
this  
list first  
The SiteSurvey Screen  
Use the SiteSurvey screen to scan for available networks in your vicinity.  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
AVAILABLE NETWORKS  
The Available Networks pane settings are described below.  
Shows the name (usually the equipment vendor's name)  
SSID  
assigned to a wireless Wi-Fi network.  
Mode  
Strength  
Ch  
Shows the signal type (802.11b/g).  
Shows the signal strength.  
Shows the network channel.  
Security  
Shows the security status.  
Refresh (button)  
Detailed Info (button)  
Click to refresh the list of currently available networks.  
Click to view properties for the selected network. (See  
Detailed Info. Screen below.)  
Connect (button)  
Click to connect to the selected network. (The network is not  
added to the profile list.)  
Add To Profile (button)  
Click to add the network to the profile list.  
DETAILED INFO. SCREEN  
For details about any of the listed access points, select it from the list and click Detailed Info to  
see the following screen. (You can also double-click an access point to view the Detailed Info  
screen.  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The Options Screen  
By default, the Wireless Client Utility configures your wireless settings. Use this screen to disable  
the Wireless Client Utility.  
OPTIONS  
The Options pane settings are described below.  
When you check the Let Windows manage this wireless  
adapter checkbox, Windows Zero Configuration manages  
your wireless settings. The Wireless Client Utility still  
shows the link status of the adapter.  
Let Windows manage  
this wireless adapter  
(tick box)  
Apply Now (button)  
Click to execute the changes.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The Version Screen  
This screen displays the software and hardware information of the adapter. You cannot make  
changes to this screen.  
Reference the Version screen if you need to contact technical support. See “Maintenance”.  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuring Wireless Security  
This chapter covers the configuration of security options in the 802.11 Wireless Client Utility.  
Configuring Security  
When you create a profile you need to configure the security settings with the information provided  
by the administrator. You modify security settings by selecting the profile and clicking Properties.  
CONFIGURING WEP  
Refer to the following to modify WEP settings.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1. In the Properties window, click WLAN Security.  
2. Click the drop-down arrow at Security Mode and choose WEP.  
3. Click the Use Static WEP checkbox.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4. Click Configure. The WEP Configuration screen appears.  
Select the encryption to match your access point: 64,  
WEP Method  
128, or 152-bit. The encryption level must match the  
encryption level used by your access point.  
Authentication  
Options are Auto, Open System, and Shared. For most  
installations choose Auto.  
A WEP Key is automatically generated as you type in  
any Passphrase of your choice. Use this feature when  
you have used a Passphrase to generate your WEP key  
on your access point.  
Make Key using Pass-  
Phrase  
Manual Input (ASCII)  
Manual Input (HEX)  
Default Key  
Generate your own WEP Key (4 keys maximum) using  
ASCII characters.  
Generate your own WEP Key using hexadecimal  
characters.  
Four keys are used for decryption; you have to choose a  
default key from them for encryption. Make sure access  
point uses same WEP key.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING WPA & WPA2  
Refer to the following to configure WPA / WPA2.  
1. Click the drop-down arrow at Security Mode and choose WPA / WPA2.  
2. Click the drop-down arrow at Encryption Method and choose TKIP or AES.  
To configure 802.1X (authentication protocol) for WPA, see “Configuring 802.1X ”.  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING WPA-PSK & WPA2-PSK  
Refer to the following to configure WPA-PSK / WPA2-PSK  
1. Click the drop-down arrow at Security Mode and choose WPA-PSK / WPA2-PSK.  
2. Click the drop-down arrow at Encryption Method and choose TKIP or AES. (Most access  
points use TKIP for WPA-PSK.)  
3. At PSK Passphrase enter the same pass phrase used to configure the WPA-PSK on your  
access point.  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING 802.1X  
You need to know if your access point supports 802.1X and then apply the configuration here.  
1. Choose the EAP method under Authentication protocol.  
2. Options for User Information depend on the EAP method chosen.  
CONFIGURING 802.1X PEAP  
Refer to the following to configure PEAP.  
1. At WPA security mode, click Configure button next to Authentication Protocol.  
2. Select Inner PEAP protocol.  
3. Click Save to finish and return to the previous screen.  
4. Type in a unique User ID and Password under User Information.  
5. If your network uses a user server certificate click Configure Certificate (see Note below).  
The following window appears:  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Check this box if your network requires user certification and  
then select the certificate from the drop-down menu.  
Use user certificate  
Validate server certificate  
Server name:  
Check this box if your network requires server certification and  
then select the certificate authority from the drop-down menu.  
Type in the name of the server that is used for 802.1X  
authentication.  
Server name should  
match exactly  
Check this box if the server name should exactly match the  
name in the certificate.  
6. Click OK to apply the settings.  
Note: Server Certificates require a wired connection to the network so you  
can obtain the certificate(s) from the certificate authority. Your network  
administrator can provide on certificate management.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING 802.1X EAP-TLS  
1. At Security Mode select WPA from the drop-down menu.  
2. At Authentication Protocol select TLS from the drop-down menu.  
3. TLS requires both server and user certification. Click Configure Certificate (see Note  
below). The following window appears:  
Check this box if your network requires user certification and  
then select the certificate from the drop-down menu.  
Use user certificate  
Check this box if your network requires server certification and  
then select the certificate authority from the drop-down menu.  
Validate server certificate  
Server name:  
Type in the name of the server that is used for 802.1X  
authentication.  
Check this box if the server name should exactly match the name  
in the certificate.  
Server name should match  
exactly  
4. Click OK to apply the settings.  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
For unfamiliar terms used below, look for entries elsewhere in the glossary.  
AD-HOC (IBSS)  
Ad-hoc mode does not require an AP or a wired network. A network that transmits wireless  
from computer to computer without the use of a base station (access point).  
Two or more wireless stations communicate directly to each other. An ad-hoc network may  
sometimes be referred to as an Independent Basic Service Set (IBSS).  
CHANNEL  
A radio frequency used by a wireless device is called a channel.  
EAP AUTHENTICATION  
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the  
IEEE802.1X transport mechanism in order to support multiple types of user authentication. By  
using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless  
station and a RADIUS server perform authentication.  
ENCRYPTION  
The reversible transformation of data from the original to a difficult-to-interpret format. Encryp-  
tion is a mechanism for protecting confidentiality, integrity, and authenticity of data. It uses an  
encryption algorithm and one or more encryption keys.  
FRAGMENTATION THRESHOLD  
This is the maximum data fragment size that can be sent before the packet is fragmented into  
smaller packets.  
IEEE 802.1X  
The IEEE 802.1X standard outlines enhanced security methods for both the authentication of  
wireless stations and encryption key management. Authentication can be done using an external  
RADIUS server.  
INFRASTRUCTURE (BSS)  
When a number of wireless stations are connected using a single AP, you have a Basic Ser-  
vice Set (BSS).  
ROAMING  
In an infrastructure network, wireless stations are able to switch from one BSS to another as  
they move between the coverage areas. During this period, the wireless stations maintain  
uninterrupted connection to the network. This is roaming. As the wireless station moves from  
place to place, it is responsible for choosing the most appropriate AP depending on the signal  
strength, network utilization among other factors.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SSID  
The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wire-  
less network. Wireless devices must have the same SSID to communicate with each other.  
TEMPORAL KEY INTEGRITY PROTOCOL (TKIP)  
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and  
distributed by the authentication server.  
USER AUTHENTICATION  
WPA applies IEEE 802.1X and Extensible Authentication Protocol (EAP) to authenticate wire-  
less clients using an external RADIUS database. If you do not have an external RADIUS server,  
use WPA-PSK (WPA -Pre-Shared Key) that only requires a single (identical) password entered  
into each access point, wireless gateway and wireless client. As long as the passwords match,  
clients will be granted access to a WLAN.  
WEP  
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between  
the TEW-603PI and the AP or other wireless stations to keep network communications private.  
Both the wireless stations and the access points must use the same WEP key for data  
encryption and decryption.  
WPA  
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11 i security specification draft.  
Key differences between WPA and WEP are user authentication and improved data encryption.  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix  
This section provides maintenance and troubleshooting procedures. The following topics are  
discussed:  
See “Maintenance”  
See “Troubleshooting”  
Maintenance  
Installing a newer version of the Wireless Client Utility may improve the performance of the  
TEW-603PI. Before installing the new version, you must uninstall the old one.  
CHECKING THE WIRELESS CLIENT UTILITY VERSION  
To check the current Wireless Client Utility, open the utility on the Version screen. In the S/W  
Information pane, note the Utility Version number.  
If you need to contact technical support, you will need to provide the S/W  
Information. Be sure to check the screen in the utility that is installed on  
your computer and not the screen shown in this manual.  
IMPORTANT  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
UNINSTALLING THE WIRELESS CLIENT UTILITY  
Refer to the following to uninstall (remove) the Wireless Client Utility from your computer.  
1. Click Start -> All Programs (Windows 2000 Programs) -> 802.11 Wireless Network  
Adapter -> Uninstall.  
2. When prompted, click Yes to remove the driver and utility software.  
3. Click Finish to complete the uninstallation.  
4. Reboot your computer if prompted.  
UPGRADING THE WIRELESS CLIENT UTILITY  
Contact your dealer or technical support for details on downloading the current Wireless Client  
Utility. Refer to the following to upgrade the Wireless Client Utility.  
1. Double-click the Setup.exe file that you downloaded. The installation wizard screen opens.  
2. Click Next to continue.  
3. Click Next in the Choose Destination Location screen.  
4. Click Install to begin the installation.  
5. Click Finish to exit the wizard and complete the installation.  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Troubleshooting  
PROBLEMS STARTING THE 802.11g WIRELESS CLIENT UTILITY PROGRAM  
PROBLEM  
CORRECTIVE ACTION  
Windows does not Make sure the TEW-603PI is properly inserted into the PCI slot and then restart  
auto-detect the  
TEW-603PI.  
your computer.  
Perform a hardware scan by clicking Start, Settings, Control Panel and then  
double-click Add/Remove Hardware. (Steps may vary depending on Windows  
version).  
Follow the on-screen instructions to search for the TEW-603PI (Wireless 802.11  
USB Network Adapter) and install the driver.  
Check for possible hardware conflicts. In Windows, click Start, Settings, Control  
Panel, System, Hardware and then click Device Manager. Verify the status of the  
TEW-603PI (Wireless 802.11 USB Network Adapter) under Network Adapter.  
(Steps may vary depending on the Windows version).  
Install the TEW-603PI in another computer. If the error persists, there may be a  
hardware problem. In this case, please contact your local dealer for support.  
PROBLEMS WITH THE LINK STATUS  
PROBLEM  
CORRECTIVE ACTION  
The link quality and/or  
signal strength is poor all  
the time from the status  
bar.  
Search and connect to another AP with a better link quality using the Site  
Survey screen.  
Change the channel used by your AP.  
Move your computer closer to the AP or the peer computer(s) within the  
transmission range.  
There may be too much radio interference (for example microwave or  
another AP using the same channel) around your wireless network.  
Relocate or reduce the radio interference.  
PROBLEMS WITH SECURITY SETTINGS  
“Disconnected” (meaning  
authentication failure)  
Shown in the Status Bar  
Make sure your AP/Router has the same setting as your client adapter and  
follow AP/Router’s security settings.  
LED PWR and LINK are  
on but cannot receive or  
sending data and connect  
to network  
Make sure your AP/Router has the same setting as your client adapter and  
follow AP/Router’s security settings.  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Problems Communicating With Other Computers  
PROBLEM  
CORRECTIVE ACTION  
The TEW-603PI  
computer cannot  
communicate with the other  
computer.  
Make sure you are connected to the network.  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Infrastructure  
Make sure that the AP and the associated computers are turned on and  
working properly.  
Make sure the TEW-603PI computer and the associated AP use the same  
SSID.  
Change the AP and the associated wireless clients to use another radio  
channel if interference is high.  
Make sure that the computer and the AP share the same security option  
and key. Verify the settings in the Profile Security Settings screen.  
Ad-Hoc (IBSS) Verify that the peer computer(s) is turned on.  
Make sure the TEW-603PI computer and the peer computer(s) are using  
the same SSID and channel.  
Make sure that the computer and the peer computer(s) share the same  
security option and key.  
Change the wireless clients to use another radio channel if interference is  
high.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Limited Warranty  
TRENDware warrants its products against defects in material and workmanship, under  
normal use and service, for the following lengths of time from the date of purchase.  
Wireless Products – 3 Years Warranty  
If a product does not operate as warranted above during the applicable warranty period,  
TRENDware shall, at its option and expense, repair the defective product or part, deliver  
to customer an equivalent product or part to replace the defective item, or refund to  
customer the purchase price paid for the defective product. All products that are  
replaced will become the property of TRENDware. Replacement products may be new  
or reconditioned.  
TRENDware shall not be responsible for any software, firmware, information, or memory  
data of customer contained in, stored on, or integrated with any products returned to  
TRENDware pursuant to any warranty.  
There are no user serviceable parts inside the product. Do not remove or attempt to  
service the product by any unauthorized service center. This warranty is voided if (i)  
the product has been modified or repaired by any unauthorized service center, (ii) the  
product was subject to accident, abuse, or improper use (iii) the product was subject to  
conditions more severe than those specified in the manual.  
Warranty service may be obtained by contacting TRENDware office within the applicable  
warranty period for a Return Material Authorization (RMA) number, accompanied by a  
copy of the dated proof of the purchase. Products returned to TRENDware must be  
pre-authorized by TRENDware with RMA number marked on the outside of the package,  
and sent prepaid, insured and packaged appropriately for safe shipment.  
WARRANTIES EXCLUSIVE: IF THE TRENDWARE PRODUCT DOES NOT OPERATE  
AS WARRANTED ABOVE, THE CUSTOMER’S SOLE REMEDY SHALL BE, AT  
TRENDWARE’S OPTION, REPAIR OR REPLACEMENT. THE FOREGOING  
WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER  
WARRANTIES, EXPRESSED OR IMPLIED, EITHER IN FACT OR BY OPERATION OF  
LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OF  
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. TRENDWARE  
NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT  
ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION  
MAINTENANCE OR USE OF TRENDWARE’S PRODUCTS.  
TRENDWARE SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING  
AND EXAMINATION DISCLOSE THAT THE ALLEGED DEFECT IN THE PRODUCT  
DOES NOT EXIST OR WAS CAUSED BY CUSTOMER’S OR ANY THIRD PERSON’S  
MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED  
ATTEMPTS TO REPAIR OR MODIFY, OR ANY OTHER CAUSE BEYOND THE RANGE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER  
HAZARD.  
LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW TRENDWARE  
ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY LIABILITY, WHETHER  
BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), FOR INCIDENTAL,  
CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND,  
OR FOR LOSS OF REVENUE OR PROFITS, LOSS OF BUSINESS, LOSS OF  
INFORMATION OR DATE, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN  
CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE,  
PERFORMANCE, FAILURE, OR INTERRUPTION OF THE POSSIBILITY OF SUCH  
DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND  
OF THE PURCHASE PRICE PAID, AT TRENDWARE’S OPTION. THIS DISCLAIMER  
OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY  
PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE.  
Governing Law: This Limited Warranty shall be governed by the laws of the state of  
California.  
AC/DC Power Adapter, Cooling Fan, and Power Supply carry 1 Year Warranty  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Download from Www.Somanuals.com. All Manuals Search And Download.  

TechniSat Car Stereo System Car Radio User Manual
Topaz Systems Car Amplifier AM1 User Manual
Tripp Lite Surge Protector DEU2 TEL User Manual
Tunturi Home Gym Alpha 150 User Manual
Tyan Computer Switch B5102 User Manual
Vector Automobile Parts DK080706 User Manual
ViewSonic Flat Panel Television VS13915 1M User Manual
Vizio Video Games VP42 User Manual
Vulcan Hart Food Warmer VB150 ML 126552 User Manual
Weber Gas Grill 55283 User Manual