Product Manual
Page 2
...Product Overview 3 Package Contents 3 System Requirements 3 Introduction 4 Features 5 Hardware Overview 6 Installation 7 Getting Started 7 Remove Existing Installations 7 Disable Other Wireless Adapters 8 Wireless Installation Considerations 10 Adapter Installation 11 Configuration 17 D-Link Wireless Connection Manager 17 Wireless Networks 18 Wi-Fi Protected Setup...XP 29 Wireless Security 30 What is WPA 30 Configure WPA/WPA2 Passphrase 31 Using the D-Link Connection Manager 31 Using Windows® Vista 33 Using the Windows® XP Utility 35 Configure WPA/WPA2 (RADIUS ...
...Product Overview 3 Package Contents 3 System Requirements 3 Introduction 4 Features 5 Hardware Overview 6 Installation 7 Getting Started 7 Remove Existing Installations 7 Disable Other Wireless Adapters 8 Wireless Installation Considerations 10 Adapter Installation 11 Configuration 17 D-Link Wireless Connection Manager 17 Wireless Networks 18 Wi-Fi Protected Setup...XP 29 Wireless Security 30 What is WPA 30 Configure WPA/WPA2 Passphrase 31 Using the D-Link Connection Manager 31 Using Windows® Vista 33 Using the Windows® XP Utility 35 Configure WPA/WPA2 (RADIUS ...
Product Manual
Page 5
D-Link DWA-140 User Manual You may also use 802.1x for your workspace to a wireless network using WPA/WPA2 (Wi-Fi Protected Access) providing you a much higher level of Plug & Play installation. • Fully 802.11g compatible. • Draft 802.11n compliant. • Powered by the USB port; Section 1 - Product Overview Features •...
D-Link DWA-140 User Manual You may also use 802.1x for your workspace to a wireless network using WPA/WPA2 (Wi-Fi Protected Access) providing you a much higher level of Plug & Play installation. • Fully 802.11g compatible. • Draft 802.11n compliant. • Powered by the USB port; Section 1 - Product Overview Features •...
Product Manual
Page 30
... more secure public key encryption system to authenticate your wireless router or access point. This key must be sniffed out and stolen. D-Link DWA-140 User Manual 30 The 2 major improvements over WEP: • Improved data encryption through the Extensible Authentication Protocol (EAP). WPA2...This section will show you can access the network. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that only authorized network users can include symbols (!?*&_) and spaces. EAP is an alpha-numeric password between 8 and 63 characters...
... more secure public key encryption system to authenticate your wireless router or access point. This key must be sniffed out and stolen. D-Link DWA-140 User Manual 30 The 2 major improvements over WEP: • Improved data encryption through the Extensible Authentication Protocol (EAP). WPA2...This section will show you can access the network. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that only authorized network users can include symbols (!?*&_) and spaces. EAP is an alpha-numeric password between 8 and 63 characters...
Product Manual
Page 46
.... * Not supported with wireless USB Adapters. D-Link DWA-140 User Manual 46 All the adapters must be in Ad-Hoc mode to product manual for peer-to-peer communication, using wireless network adapters on how to your wireless network by turning on the WPA or WEP security feature on the router. Secure your...
.... * Not supported with wireless USB Adapters. D-Link DWA-140 User Manual 46 All the adapters must be in Ad-Hoc mode to product manual for peer-to-peer communication, using wireless network adapters on how to your wireless network by turning on the WPA or WEP security feature on the router. Secure your...
User Manual
Page 2
... Contents Table of Contents Product Overview 3 Package Contents 3 System Requirements 3 Introduction 4 Features 5 Hardware Overview 6 Installation 7 Getting Started 7 Remove Existing Installations 7 Disable Other Wireless Adapters 8 Wireless Installation Considerations 10 Adapter Installation 11 Configuration 17 D-Link Wireless Connection Manager 17 Wireless Networks 18 Wi-Fi Protected Setup (WPS 19 My Wireless... Users 48 Statically Assign an IP address 49 Windows® XP/2000 Users 49 Windows Vista® Users 50 Technical Specifications 51 D-Link DWA-140 User Manual 2
... Contents Table of Contents Product Overview 3 Package Contents 3 System Requirements 3 Introduction 4 Features 5 Hardware Overview 6 Installation 7 Getting Started 7 Remove Existing Installations 7 Disable Other Wireless Adapters 8 Wireless Installation Considerations 10 Adapter Installation 11 Configuration 17 D-Link Wireless Connection Manager 17 Wireless Networks 18 Wi-Fi Protected Setup (WPS 19 My Wireless... Users 48 Statically Assign an IP address 49 Windows® XP/2000 Users 49 Windows Vista® Users 50 Technical Specifications 51 D-Link DWA-140 User Manual 2
User Manual
Page 5
... the best reception possible. • Supports Infrastructure networks via an access point • User-friendly configuration and diagnostic utilities. * Using a USB 1.1 port will adversely affect throughput. Product Overview Features • Compact size for placement anywhere. • Convenience of security for wireless authentication. • Position the DWA-140 almost anywhere in ...) providing you a much higher level of Plug & Play installation. • Fully 802.11g compatible. • Draft 802.11n compliant. • Powered by the USB port; D-Link DWA-140 User Manual 5
... the best reception possible. • Supports Infrastructure networks via an access point • User-friendly configuration and diagnostic utilities. * Using a USB 1.1 port will adversely affect throughput. Product Overview Features • Compact size for placement anywhere. • Convenience of security for wireless authentication. • Position the DWA-140 almost anywhere in ...) providing you a much higher level of Plug & Play installation. • Fully 802.11g compatible. • Draft 802.11n compliant. • Powered by the USB port; D-Link DWA-140 User Manual 5
User Manual
Page 31
... can access the network. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that was designed to improve the security features of security you can access the network. D-Link DWA-140 User Manual 31 WPA-PSK/WPA2-PSK uses a passphrase or key to ensure that only authorized...
... can access the network. TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that was designed to improve the security features of security you can access the network. D-Link DWA-140 User Manual 31 WPA-PSK/WPA2-PSK uses a passphrase or key to ensure that only authorized...
User Manual
Page 47
...All wireless clients will connect to an access point or wireless router. • Ad-Hoc - D-Link DWA-140 User Manual 47 An Ad-Hoc* network contains only clients, such as the DWA-140 ... to your wireless network by turning on the WPA or WEP security feature on each computer. Wireless Basics Security Don't let you next-door neighbors or intruders connect to... communicate. * Not supported with wireless USB Adapters. Wireless Modes There are basically two modes of networking: • In frastructure - Unfortunately...
...All wireless clients will connect to an access point or wireless router. • Ad-Hoc - D-Link DWA-140 User Manual 47 An Ad-Hoc* network contains only clients, such as the DWA-140 ... to your wireless network by turning on the WPA or WEP security feature on each computer. Wireless Basics Security Don't let you next-door neighbors or intruders connect to... communicate. * Not supported with wireless USB Adapters. Wireless Modes There are basically two modes of networking: • In frastructure - Unfortunately...