User manual TRENDNET TEW-642EC

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual TRENDNET TEW-642EC. We hope that this TRENDNET TEW-642EC user guide will be useful to you.


TRENDNET TEW-642EC : Download the complete user guide (8554 Ko)

You may also download the following manuals related to this product:

   TRENDNET TEW-642EC DATA SHEET (931 ko)
   TRENDNET TEW-642EC DATA SHEET (1886 ko)
   TRENDNET TEW-642EC DATA SHEET (926 ko)
   TRENDNET TEW-642EC DATA SHEET (932 ko)
   TRENDNET TEW-642EC QUICK INSTALLATION GUIDE (2524 ko)
   TRENDNET TEW-642EC QUICK INSTALLATION GUIDE (1680 ko)
   TRENDNET TEW-642EC QUICK INSTALLATION GUIDE (1683 ko)
   TRENDNET TEW-642EC QUICK INSTALLATION GUIDE (1683 ko)
   TRENDNET TEW-642EC DATA SHEET (924 ko)
   TRENDNET TEW-642EC QUICK INSTALLATION GUIDE (1762 ko)

Manual abstract: user guide TRENDNET TEW-642EC

Detailed instructions for use are in the User's Guide.

[. . . ] FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. [. . . ] Click Next on the following menu. 7 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Install on it. STEP 7 At the Software Installation menu click Continue Anyway. 8 STEP 8 Click Finish to complete the client utility installation. STEP 9 At this moment please insert your Card to your Laptop, after the following window pop up, click Next on the Fund New Hardware Wizard 9 STEP 10 Choose "Install the software automatically" and click Next. STEP 11 Click "Continue Anyway". STEP 12 Click Finish to complete the installation. 10 2. 6 Windows Vista installation Important!DO NOT install the PC Adapter in the computer until instructed to. Step 1 Insert the Utility & Driver CD-ROM into your computer's CD-ROM Drive and then click Install Driver & Utility. Step 2 Shut down the computer. Step 3 Insert PC Card firmly into a notebook PC and then turn ON the computer and wait until the Windows desktop appears. 11 Step 4 Click Locate and install driver software (recommended). 12 Step 5 Click on Next to continue. Step 6 Click on Close to exit. 13 2. 6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and double click the left mouse button to open the Wireless Client Utility. The Wireless Client Utility window as shown below will appear. The user can now use any of the management functions available in the IEEE 802. 11 Wireless Client Utility. 14 2. 7. 1 Link Information Click the Link Information tab to see general information about the program and its operation. The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name The name of the current selected configuration profile. Link Status Shows whether the station is associated to the wireless network. The options include: Infrastructure (access point) Ad Hoc Wireless Mode Displays the wireless mode. 802. 11g, 11b or 11n Link Speed Displays the current transmit rate in Mbps. BSSID Displays the MAC address of the access point the wireless card is associated to. Channel 15 Control Channel Channel number of the control 20MHz channel Extension Channel To locate the 40MHz channel on combination with the control channel Channel Width 20MHz only or 40/20MHz channel support Security Status Security Shows the security type ­ Disable, WEP, WPA/WPA2, WPA-PSK/WPA2-PSK or 802. 1X Authentication Displays the authentication mode. Subnet Mask Displays subnet mask Gateway Displays gateway address 2. 7. 2 Site Survey Click the Site Survey tab to see available infrastructure and ad hoc networks. On this screen, click Refresh to refresh the list at any time. Connecting to a different network Hold your mouse pointer over the network icon, and click the right mouse button to select the network. 16 Click the Connect button to connect the available network. If no configuration profile exists for that network, the Profile Settings window opens to ask to create a profile for the network. Follow the procedures to create profile for that network. 2. 7. 3 Profile To add a new configuration profile, click Add on the Profile tab. To modify a configuration profile, select the configuration from the Profile list and click the Edit button. 17 Scan Available Networks Click the Browse button on the Profile Settings screen to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. To configure a profile for Ad-Hoc or Infrastructure mode, select the Network Type field on the Profile Settings. 18 Click Next to continue the profile setting. To define the security mode, select the security button of the desired security mode. WEP This card support two modes of WEP, include: 64 Bits 128 Bits Both 64-Bit & 128-Bit modes support Passphrase. The options include: TLS (Transport Layer Security) is a Point-to-Point Protocol (PPP) extension supporting additional authentication methods within PPP. Transport Layer Security (TLS) provides for mutual authentication, integrity-protected cipher suite negotiation, and key exchange between two endpoints. PEAP (EAP-GTC) (Protected Extensible Authentication Protocol) authenticates wireless LAN clients using only server-side digital certificates by creating an encrypted SSL/TLS tunnel between the client and the authentication server. [. . . ] During this period, the wireless stations maintain uninterrupted connection to the network. As the wireless station moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization among other factors. SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. TEMPORAL KEY INTEGRITY PROTOCOL (TKIP) Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. USER AUTHENTICATION WPA applies IEEE 802. 1X and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE TRENDNET TEW-642EC




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual TRENDNET TEW-642EC will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.