User manual INTELLINET WIRELESS 150N USB ADAPTER 524698

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual INTELLINET WIRELESS 150N USB ADAPTER 524698. We hope that this INTELLINET WIRELESS 150N USB ADAPTER 524698 user guide will be useful to you.


INTELLINET WIRELESS 150N USB ADAPTER 524698 : Download the complete user guide (4814 Ko)

Manual abstract: user guide INTELLINET WIRELESS 150N USB ADAPTER 524698

Detailed instructions for use are in the User's Guide.

[. . . ] Wireless 150N UsB AdApter User mANUAl Model 524698 INT-524698-UM-0809-01 Thank you for purchasing the INTELLINET NETWORK SOLUTIONSTM Wireless 150N USB Adapter, Model 524698. The Wireless 150N USB Adapter is a compact high-speed adapter that allows you to connect your notebook or desktop PC to wireless networks at faster speeds than ever before. Transfer or receive digital images, videos and MP3 files by connecting to the wireless network with link speeds of up to 150 Mbps using the latest in wireless technology. This adapter is also compatible with 802. 11b and 802. 11g wireless access points and wireless routers, giving you the flexibility to start upgrading your wireless network without the need to replace existing equipment. [. . . ] When an AP acting as an authenticator detects a wireless station on the LAN, it sends an EAP request for the user's identity to the device. In turn, the device responds with its identity, and the AP relays this identity to an authentication server (typically an external RADIUS server). 15 CONFIGURATION IEEE 802. 1x Access Client IEEE 802. 1x Access Client 1 RADIUS Client RADIUS Client 1 3 RADIUS Server RADIUS Server 3 22 1 Client requests to log in to the network 2 Log in with username and password Access Point 4 4 (Internet Authentication 3 Username and password sent to RADIUS server 4 User login to the LAN approved orService) denied Windows 2000 IAS (1) Client requests to login the (3) Send username, password to 802. 1x setting/CertiFiCation network. EAP Method: The EAP authentication protocols supported by this (4) Approve wireless access (2) adapter require that settings be consistent with theor deny user Login with username, login connect. · PEAP & TTLS: These protocols are similar and easier to use than TLS (below) in that they specify a stand-alone authentication protocol to be used within an encrypted tunnel. TTLS supports any protocol within its tunnel, including CHAP, MS-CHAP, MS-CHAPv2, PAP and EAP-MD5. PEAP specifies that an EAP-compliant authentication protocol be used; this adapter supports EAP-MSCHAP v2, EAP-TLS/ Smart Card and Generic Token Card. · TLS/Smart Card: This is the most secure of the EAP protocols, but isn't easy to use: It requires that digital certificates be exchanged in 16 CONFIGURATION the authentication phase. The server presents a certificate to the client and, after validating the server's certificate, the client presents a client certificate to the server for validation. Client Certification: A client certificate is required for TLS, but is optional for TTLS and PEAP. This forces a client certificate to be selected from the appropriate Windows Certificate Store and made available to the RADIUS server for certification. Tunneled Authentication/Protocol: When the authentication type is PEAP or TTLS, select a protocol for building the encrypted tunnel. Tunnel Authentication: Select one of three options from the dropdown menu: "EAP-MSCHAPv2, " "EAP-TLS/Smart card" or "Generic Token Card. " 802. 1x setting/Ca server Use certificate chain: When the Extensible Authentication Protocol (EAP) authentication type -- such as TLS, TTLS or PEAP -- is selected and requires certification to tell the client what credentials to accept from the authentication server in order to verify the server, you need to enable this function. Choose the preferred server from the drop-down menu to issue the certificate. If "Any Trusted CA" is selected, any CA (certification authority) on the list (which is provided by the Microsoft Certificate Store) is permitted. Allow intermediate certificates: A server designates an issuer as a trusted root authority by placing the issuer's self-signed certificate, CONFIGURATION 17 which contains the issuer's public key, into the trusted root certification authority certificate store of the host computer. Intermediate or subordinate certification authorities are trusted only if they have a valid certification path from a trusted root certification authority. Server name must match exactly: When selected, the server name must exactly match the server name found on the certificate. Domain name must end in specified name: When this is selected, the server name field identifies a domain. The certificate must use a server name belonging to this domain or one of its sub-domains (e. g. , zeelans. com, where the server is blueberry. zeelans. com), but it may be any name used in the certificate name field. STATISTIcS This screen enables you to view/compare the transmit and receive statistical information of the connection. To reset the counters, click "Reset Counter. " ADvANCED This screen enables you to configure more advanced settings, such as the wireless mode and the protection mode. · 802. 11 B/G mix: If you have a mix of 802. 11b and 802. 11g wireless stations in your network, it is recommended that the adapter be set 18 CONFIGURATION to this mode. · 802. 11 B only: Though the adapter is compatible with both 802. 11g and 802. 11b wireless stations, if there are only 802. 11b wireless stations in the network, you can set the adapter to this mode. [. . . ] In this mode, known as Pre-Shared Key, you manually enter the starting password in your access point or gateway, as well as in each wireless station in the network. WPA-PSK automatically takes over from that point, keeping unauthorized users who don't 28 SoftAp have the matching password from joining the network, while encrypting the data traveling between authorized devices. · WPA-PSK/WPA2-PSK: When selecting this mode, the AP supports both WPA-PSK and WPA2-PSK. · TKIP: The Temporal Key Integrity Protocol changes the temporal key every 10, 000 packets (a kind of message transmitted over a network. ) This ensures much greater security than standard WEP security. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE INTELLINET WIRELESS 150N USB ADAPTER 524698




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual INTELLINET WIRELESS 150N USB ADAPTER 524698 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.