User manual EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR. We hope that this EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR user guide will be useful to you.


EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR : Download the complete user guide (1009 Ko)

Manual abstract: user guide EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR

Detailed instructions for use are in the User's Guide.

[. . . ] 802. 11g Turbo Wireless LAN USB Adaptor User Manual Version: 1. 0 (November, 2005) COPYRIGHT Copyright ©2005/2006 by this company. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of this company This company makes no representations or warranties, either expressed or implied, with respect to the contents hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any software described in this manual is sold or licensed "as is". Should the programs prove defective following their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the software. [. . . ] WPA-PSK ­ It is a special mode designed for home and small business users who do not have access to network authentication servers. In this mode, known as Pre-Shared Key, the user manually enters the starting password in their access point or gateway, as well as in each wireless stations in the network. WPA-PSK takes over automatically from that point, keeping unauthorized users that don't have the matching password from joining the network, while encrypting the data traveling between authorized devices. WPA2 ­ Like WPA, WPA2 supports IEEE 802. 1x/EAP authentication or PSK technology. It also includes a new advanced encryption mechanism using the Advanced Encryption Standard (AES). The difference between WPA and WPA2 is that WPA2 provides data encryption via the AES. The difference between WPA-PSK and WPA2-PSK is that WPA2-PSK provides data encryption via the AES. In contrast, WPA-PSK uses Temporal Key Integrity Protocol (TKIP). 802. 1x Setting When you have set the Authentication Type to Open, Shared, WPA or WPA2, you can also enable IEEE 802. 1x setting to use the authentication server or certification server to authenticate client users. 14 Parameter Encryption Mode Description None ­ Disable the encryption mode. When the item is selected, you have to continue setting the WEP Encryption keys. TKIP ­ TKIP (Temporal Key Integrity Protocol) changes the temporal key every 10, 000 packets (a packet is a kind of message transmitted over a network. ) This ensures much greater security than the standard WEP security. AES ­ AES has been developed to ensure the highest degree of security and authenticity for digital information and it is the most advanced solution defined by IEEE 802. 11i for the security in the wireless network. Note: All devices in the network should use the same encryption method to ensure the communication. WPA Pre-Shared Key The WPA-PSK key can be from 8 to 64 characters and can be letters or numbers. This same key must be used on all of the wireless stations in the network. The WEP keys are used to encrypt data transmitted in the wireless network. Select the default encryption key from Key 1 to Key 4 by selected the radio button. 64-bit ­ Input 10-digit Hex values (in the "A-F", "a-f" and "0-9" range) or 5-digit ASCII characters (including "a-z" and "0-9") as the encryption keys. 128-bit ­ Input 26-digit Hex values (in the "A-F", "a-f" and "0-9" range) or 13-digit ASCII characters (including "a-z" and "0-9") as the encryption keys. For example: "01234567890123456789abcdef" or "administrator". WEP Key (Key1 ~ Key4) 15 The IEEE 802. 1X specification describes a protocol that can be used for authenticating both clients and servers on a network. The authentication algorithms and methods are those provided by the Extensible Authentication Protocol (EAP), a method of authentication that has been in use for a number of years on networks that provide Point-to-Point Protocol (PPP) support as many internet service providers and enterprises do. When an AP acting as an authenticator detects a wireless station on the LAN, it sends an EAP-Request for the user's identity to the device. (EAP, or the Extensible Authentication Protocol, is an authentication protocol that runs before network layer protocols transmit data over the link. ) In turn, the device responds with its identity, and the AP relays this identity to an authentication server, which is typically an external RADIUS server. An example for MD5 Authentication IEEE 802. 1x Access Client 1 RADIUS Client 3 RADIUS Server Access Point 2 4 Windows 2000 IAS (Internet Authentication Service) (1) Client requests to login the network. [. . . ] Infrastructure is applicable to enterprise scale for wireless access to central database, or wireless application for mobile workers. 25 6. What is BSS ID A specific Ad hoc LAN is called a Basic Service Set (BSS). What is WEP WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40 bit shared key algorithm, as described in the IEEE 802 . 11 standard. TKIP is a quick-fix method to quickly overcome the inherent weaknesses in WEP security, especially the reuse of encryption keys. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual EDIMAX EW-7318UG WIRELESS LAN USB ADAPTOR will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.