User manual TRENDNET TEW-645UB

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual TRENDNET TEW-645UB. We hope that this TRENDNET TEW-645UB user guide will be useful to you.


TRENDNET TEW-645UB : Download the complete user guide (2173 Ko)

You may also download the following manuals related to this product:

   TRENDNET TEW-645UB DATASHEET (1271 ko)
   TRENDNET TEW-645UB DATASHEET (393 ko)
   TRENDNET TEW-645UB DATASHEET (571 ko)
   TRENDNET TEW-645UB DATASHEET (393 ko)
   TRENDNET TEW-645UB QUICK INSTALLATION GUIDE (818 ko)
   TRENDNET TEW-645UB QUICK INSTALLATION GUIDE (1500 ko)
   TRENDNET TEW-645UB QUICK INSTALLATION GUIDE (826 ko)
   TRENDNET TEW-645UB QUICK INSTALLATION GUIDE (823 ko)
   TRENDNET TEW-645UB QUICK INSTALLATION GUIDE (825 ko)
   TRENDNET TEW-645UB DATASHEET (393 ko)
   TRENDNET TEW-645UB QUICK INSTALLATION GUIDE (820 ko)

Manual abstract: user guide TRENDNET TEW-645UB

Detailed instructions for use are in the User's Guide.

[. . . ] This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. SAR compliance has been established in typical laptop computer(s) with USB slot, and product could be used in typical laptop computer with USB slot. Other application like handheld PC or similar device has not been verified and may not compliance with related RF exposure rule and such use shall be prohibited. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. [. . . ] You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the wireless utility and entering them manually as the WEP keys in the other WLAN adapter(s). · The adapter allows you to configure up to four WEP keys and only one key is used as the default transmit key at any one time. The adapter supports up to four 64-BIT & 128-BIT WEP KEYS. 10 Chapter 2 - Getting Started This chapter introduces the Adapter and prepares you to use the Wireless Utility. 2. 1 About Your 802. 11 n/b/g WLAN USB2. 0 Adapter The Adapter is an 802. 11n, 802. 11b, and 802. 11g compliant wireless LAN adapter. With the Adapter, you can enjoy wireless mobility within almost any wireless networking environment. Your Adapter can communicate with other IEEE 802. 11n/b/g compliant wireless devices. Wire-free access to networked resources from anywhere beyond the PC with any USB host interface. Support Infrastructure & Ad-Hoc mode Delivers receiving data rate up to 300 Mbps in 11n mode. For 802. 11b/g, date rate dynamically shifts based on signal strength, for maximum availability and reliability of connection. Support both 20MHz & 40MHz bandwidth Support WEP 64/128, WPA, WPA2 encryption Support QoS ­ WMM Multi-path (1x2) design and two PCB antennas built-in design guarantee best transmitting / receiving quality. Support Windows-base wireless LAN GUI Support WPS enable on S/W utility 2. 2 Package Content 802. 11n/b/g WLAN USB2. 0 Adapter USB Cradle Installation and Manual CD Quick Start Guide Warranty/Registration Card 2. 3 System Requirement Pentium class notebook computers with at least one available USB slot Microsoft Windows Vista, XP and 2K CD-ROM drive 2. 4 Wireless Utility & Adapter Hardware Installation NOTE: If you have connected the USB Adapter to your computer, please remove it first. Follow the instructions below to install the USB Adapter and Utility. STEP 1 Insert the Driver and Utility CD into CD drive 11 STEP 2 If your CD Autorun is enabled, the installation procedures will be started. (Otherwise open your CD folder and double-click on the "setup. exe" file) STEP 3 The InstallShield Wizard prepares for installation. STEP 4 The InstallShield Wizard prompts you for confirmation. Click Next on the following menu. 12 STEP 5 In the destination Folder screen you are asked to confirm the Destination Folder for the application software. If you would like, you may change the destination folder to another location. Click Install on it. 13 STEP 7 The Install shield Wizard setup for installation. STEP 8 Click Finish to complete the client utility installation. 14 STEP 9 At this moment please insert your USB Adapter to your Laptop through the cradle. After the following window pop up, click Next on the Fund New Hardware Wizard STEP 10 Choose "Install the software automatically" , and click Next. 15 STEP 11 Click Finish to complete the installation. 16 2. 6 Using the Utility to Configure Your Network The following are explanations on how to configure and use the Utility program. After completing the installation procedure, a new icon as shown below will automatically appear in the lower right tray bar. Hold your mouse pointer over the icon, and press the right mouse button to open the Wireless Client Utility. The Wireless Client Utility window as shown below will appear. The user can now use any of the management functions available in the IEEE 802. 11 Wireless Client Utility. 17 2. 6. 1 Link Information Click the Link Information tab to see general information about the program and its operations. The Link Information tab does not require any configuration. 18 The following table describes the items found on the Link Information screen. Wireless Network Status Profile Name SSID Link Status The name of the current selected configuration profile. Displays the BSSID of the wireless network that the wireless adapter is associated to. Security Status Security Authentication TCP/IP Status IP Address Subnet Mask Gateway Displays the computer's IP address. Displays subnet mask Displays gateway address Shows the security type ­ WAP-PSK/WAP2-PSK or 802. 1X Displays the authentication mode. PEAP (EAP-MSCHAP V2) (Protected Extensible Authentication Protocol) To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and the server properties must already be set. Check with the IT manager TTLS (Tunneled Transport Layer Security) An EAP variant that provides mutual authentication using a certificate for server authentication, and via a secure TLS tunnel for the client · · · WPA-PSK/WPA2-PSK Enables WPA/WPA2 Passphrase security. The options include: · · · TLS PEAP TTLS 26 Advanced Settings After Security Settings finished, the Advanced Settings screen will be shown as following. The following table describes the items found on the Advanced Settings screen. Power Save Mode Shows the power save mode. [. . . ] As the wireless station moves from place to place, it is responsible for choosing the most appropriate AP depending on the signal strength, network utilization among other factors. SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. TEMPORAL KEY INTEGRITY PROTOCOL (TKIP) Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. USER AUTHENTICATION WPA applies IEEE 802. 1X and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE TRENDNET TEW-645UB




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual TRENDNET TEW-645UB will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.