User Guide
Page 3
1 Contents 2 Product Information 1 2.1 Introduction and safety information 1 2.2 Safety Information...2 2.3 System Requirements ...3 2.4 Package Contents ...4 2.5 Getting familiar with your new wireless network adapter 5 3 Driver Installation and Configuration 6 3.1 Network Adapter Installation 6 3.2 Connect to Wireless Access Point 10 3.2.1 Using Windows Zero Configuration (Windows XP 10 3.2.2 Using Windows Zero Configuration (Windows 7 13 3.3 Establish secure connection with AP by WPS 15 4 Appendix ...16 4.1 Hardware Specifications 17 4.2 Troubleshooting...18 4.3 Glossary...19
1 Contents 2 Product Information 1 2.1 Introduction and safety information 1 2.2 Safety Information...2 2.3 System Requirements ...3 2.4 Package Contents ...4 2.5 Getting familiar with your new wireless network adapter 5 3 Driver Installation and Configuration 6 3.1 Network Adapter Installation 6 3.2 Connect to Wireless Access Point 10 3.2.1 Using Windows Zero Configuration (Windows XP 10 3.2.2 Using Windows Zero Configuration (Windows 7 13 3.3 Establish secure connection with AP by WPS 15 4 Appendix ...16 4.1 Hardware Specifications 17 4.2 Troubleshooting...18 4.3 Glossary...19
User Guide
Page 13
You can also use your wireless network parameters: 1. 3.2 Connect to Wireless Access Point To use WZC to configure your wireless network, you have to connect to a wireless access point first using Windows' built-in Wireless Zero Config utility 3.2.1 Using Windows Zero Configuration (Windows XP) Windows has a built-in Control Panel. 10 Click 'Start' button (should be located at the bottom-left corner of windows desktop), click 'Control Panel', and then click 'Network and Internet Connections' in wireless network configuration utility called 'Windows Zero Configuration' (WZC).
You can also use your wireless network parameters: 1. 3.2 Connect to Wireless Access Point To use WZC to configure your wireless network, you have to connect to a wireless access point first using Windows' built-in Wireless Zero Config utility 3.2.1 Using Windows Zero Configuration (Windows XP) Windows has a built-in Control Panel. 10 Click 'Start' button (should be located at the bottom-left corner of windows desktop), click 'Control Panel', and then click 'Network and Internet Connections' in wireless network configuration utility called 'Windows Zero Configuration' (WZC).
User Guide
Page 20
... 300Mbps 11ac (80MHz): VHTMCS0-9, up to 867Mbps Securities: WEP 64/128, WPA, WPA2 and IEEE 802.1x Antenna: 2 internal PIFA antennas (2.4G/5G 2dBi) Drivers: Windows XP / Vista / 7 / 8, Linux, MAC OS LED: Link/Act/WPS TX Power: 2.4GHz: 11b(11M): 16±1.5 dBm , 11g(54M): 14±1.5 dBm 11n(20MHz,... MCS7): 14±1.5 dBm, 11n(40MHz, MCS7): 12±1.5 dBm 5GHz: 11a(54M): 12±1.5 dBm, 11n(20MHz, MCS7): 10±1.5 dBm, 11n(40MHz, MCS7): 10±1.5 dBm 11ac(80MHz, VHTMCS9): 10±1.0 dBm RX Sensitivity: 2.4GHz: 11b(11M): -79±2 dBm, 11g(54M): -65±2dBm 11n(20MHz, MCS7): -64...
... 300Mbps 11ac (80MHz): VHTMCS0-9, up to 867Mbps Securities: WEP 64/128, WPA, WPA2 and IEEE 802.1x Antenna: 2 internal PIFA antennas (2.4G/5G 2dBi) Drivers: Windows XP / Vista / 7 / 8, Linux, MAC OS LED: Link/Act/WPS TX Power: 2.4GHz: 11b(11M): 16±1.5 dBm , 11g(54M): 14±1.5 dBm 11n(20MHz,... MCS7): 14±1.5 dBm, 11n(40MHz, MCS7): 12±1.5 dBm 5GHz: 11a(54M): 12±1.5 dBm, 11n(20MHz, MCS7): 10±1.5 dBm, 11n(40MHz, MCS7): 10±1.5 dBm 11ac(80MHz, VHTMCS9): 10±1.0 dBm RX Sensitivity: 2.4GHz: 11b(11M): -79±2 dBm, 11g(54M): -65±2dBm 11n(20MHz, MCS7): -64...
User Guide
Page 23
...weaknesses of WEP security, especially the reuse of security and authenticity for replacing WEP security until manufacturers implement AES at the hardware level. 10. 5. A specific Ad hoc LAN is Wired Equivalent Privacy, a data privacy mechanism based on air? WEP is called an Infrastructure ... or stored, while making more efficient use of scrambling. What is Infrastructure? Wireless products perform the same function as with Netware, Windows 2000, or other LAN operating systems to enhance security and Access Control. What is WEP? What is involved in security. TKIP ...
...weaknesses of WEP security, especially the reuse of security and authenticity for replacing WEP security until manufacturers implement AES at the hardware level. 10. 5. A specific Ad hoc LAN is Wired Equivalent Privacy, a data privacy mechanism based on air? WEP is called an Infrastructure ... or stored, while making more efficient use of scrambling. What is Infrastructure? Wireless products perform the same function as with Netware, Windows 2000, or other LAN operating systems to enhance security and Access Control. What is WEP? What is involved in security. TKIP ...