User manual SMC WUSBS-N3

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual SMC WUSBS-N3. We hope that this SMC WUSBS-N3 user guide will be useful to you.


SMC WUSBS-N3 : Download the complete user guide (2013 Ko)

You may also download the following manuals related to this product:

   SMC WUSBS-N3 annexe 1 (2329 ko)
   SMC WUSBS-N3 FICHE TECHNIQUE (223 ko)

Manual abstract: user guide SMC WUSBS-N3

Detailed instructions for use are in the User's Guide.

[. . . ] USER GUIDE EZ ConnectTM N 150 Mbps N Wireless USB Adapter SMCWUSBS-N3 150 Mbps N Wireless USB Adapter User Guide 20 Mason Irvine, CA 92618 Phone: (949) 679-8000 September 2009 149100000053W E092009-AP-R01 Information furnished by SMC Networks, Inc. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice. Copyright © 2009 by SMC Networks, Inc. [. . . ] Shared ­ The shared-key approach uses Wired Equivalent Privacy (WEP) to verify client identity by distributing a shared key to clients before attempting authentication. WPA / WPA-PSK ­ Wi-Fi Protected Access (WPA) employs a combination of technologies to provide an enhanced security solution for wireless networks. The WPA Pre-shared Key (WPA-PSK) mode for small networks uses a common password phrase that must be manually distributed to all clients that want to connect to the network. WPA2 / WPA2-PSK ­ WPA2 is a further security enhancement that includes the now ratified IEEE 802. 11i wireless security standard. Encryption ­ Configure the encryption. For open and shared authentication mode, the selection options are None and WEP. For WPA, WPA2, WPA-PSK and WPA2-PSK authentication mode, the encryption type supports both TKIP and AES. None ­ No encryption is used. ­ 24 ­ CHAPTER 3 | Windows 2000/XP Configuration Wireless Utility Configuration WEP ­ Enables the Wireless USB Adapter to use WEP shared keys. Wired Equivalent Privacy (WEP) provides a basic level of security, preventing unauthorized access to the network and encrypting data transmitted between wireless clients. WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that are manually distributed to all clients that want to use the network. TKIP ­ Use Temporal Key Integrity Protocol (TKIP) keys for encryption. TKIP avoids the problems of WEP static keys by dynamically changing data encryption keys. WPA2 uses AES Counter-Mode encryption with Cipher Block Chaining Message Authentication Code (CBC-MAC) for message integrity. The AES Counter-Mode/CBCMAC Protocol (AESCCMP) provides extremely robust data confidentiality using a 128bit key. Use of AES-CCMP encryption is specified as a standard requirement for WPA2. Before implementing WPA2 in the network, be sure client devices are upgraded to WPA2-compliant hardware. 802. 1X -- Use IEEE 802. 1X (802. 1X) for user authentication and distributing dynamically generated encryption keys. IEEE 802. 1X is a standard framework for network access control that uses a RADIUS server on the local network for user authentication. The 802. 1X standard uses the Extensible Authentication Protocol (EAP) to pass user credentials (either digital certificates, usernames and passwords, or other) from the client to the RADIUS server. Figure 17: Profile - 802. 1X Configuration EAP Method (LEAP) ­ The Lightweight Extensible Authentication Protocol (LEAP) is an EAP authentication type used primarily in Cisco Aironet WLANs. It encrypts data transmissions using dynamically generated WEP keys, and supports mutual authentication. When LEAP is select, input LEAP identity, password, domain name, and select encryption type. Check the Show Password box to display password characters as you type instead of asterisks. Identity / Password ­ Configures the identity an password for authentication. Domain Name ­ Enable the wireless configuration utility to check the end of domain name. If defects are found, the connection is dropped. ­ 25 ­ CHAPTER 3 | Windows 2000/XP Configuration Wireless Utility Configuration WMM Wi-Fi Multimedia (WMM), also known as Wireless Multimedia Extensions (WME), is a Wi-Fi Alliance interoperability certification. It provides basic Quality of Service (QoS) features for IEEE 802. 11 wireless networks. Figure 18: WMM The displayed items on this page can be described as follows: WMM Enable -- Enable WMM function. [. . . ] Click to start the uninstall process. Figure 32: Windows XP Start Menu - Uninstall the Utility 2. Click Yes to uninstall the utility. Figure 33: Start the Uninstall Process ­ 40 ­ APPENDIX A | Troubleshooting Uninstalling the Utility 3. Wait while the software is uninstalled. Figure 34: Uninstall Process in Progress 4. When the uninstall process is complete, click Finish to exit. Figure 35: Uninstall Process Complete ­ 41 ­ B HARDWARE SPECIFICATIONS INTERFACE USB version 2. 0 compliant POWER +5V DC, 0. 35A over USB connection RADIO SPECIFICATIONS IEEE 802. 11n IEEE 802. 11b/g FREQUENCY North America/Taiwan NCC: 2. 412 - 2. 462 GHz Japan: 2. 412 - 2. 484 GHz Europe: 2. 412 - 2. 472 GHz MODULATION 802. 11b: CCK, QPSK, BPSK 802. 11g: BPSK, QPSK, 16QAM, 64QAM 802. 11n: BPSK, QPSK, 16QAM, 64QAM OPERATING CHANNELS North American Certification: FCC Taiwan Certification: NCC Certification: FCC; Channel: 1~11 Europe Certification: ETSI; Channel: 1~13 DATA RATES 802. 11b: 11, 5. 5, 2, 1 Mbps per channel 802. 11g: 54, 48, 36, 24, 18, 12, 9, 6 Mbps. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE SMC WUSBS-N3




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual SMC WUSBS-N3 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.