Abocom WU5208 User manual

802.11b/g/n Mini-size Wireless
LAN USB2.0 Adapter
WU5208
User’s Manual

Federal Communication Commission Interference
Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no guarantee that interference
will not occur in a particular installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels
1through 11.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
End users must follow the specific operating instructions for satisfying RF exposure compliance. To
maintain compliance with FCC RF exposure compliance requirements, please follow operation
instruction as documented in this manual.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
SAR compliance has been established in typical laptop computer(s) with USB slot, and product could be
used in typical laptop computer with USB slot. Other application like handheld PC or similar device has
not been verified and may not compliance with related RF exposure rule and such use shall be
prohibited.
CE Statement:
Hereby, AboCom, declares that this device is in compliance with the essential
requirement and other relevant provisions of the R&TTE Driective 1999/5/EC.

Table of Contents
INTRODUCTION.....................................................................................1
FEATURES....................................................................................................................1
Windows 2000/XP Installation ................................................................2
INSTALL THE SOFTWARE .............................................................................................2
INSTALL THE HARDWARE ............................................................................................4
Windows Vista Installation......................................................................5
INSTALL THE SOFTWARE .............................................................................................5
INSTALL THE HARDWARE ............................................................................................7
VERIFICATION .............................................................................................................7
NETWORK CONNECTION...................................................................8
IP ADDRESS.................................................................................................................8
UTILITY CONFIGURATION FOR WINDOWS 2000/XP.................9
STATION MODE .........................................................................................................11
Profile.......................................................................................................................................11
Network....................................................................................................................................16
Link Status ...............................................................................................................................18
Advanced .................................................................................................................................20
Statistics ...................................................................................................................................21
WMM / QoS.............................................................................................................................22
WPS .........................................................................................................................................23
Radio On/Off............................................................................................................................25
About........................................................................................................................................25
UTILITY MENU LIST ..................................................................................................26
SOFT AP MODE..........................................................................................................26
Config.......................................................................................................................................26
Access Control.........................................................................................................................28
MAC Table ..............................................................................................................................29
Event Log.................................................................................................................................30
Statistics ...................................................................................................................................31
About........................................................................................................................................32
UTILITY CONFIGURATION FOR WINDOWS VISTA.................33
STATION MODE .........................................................................................................34

Profile.......................................................................................................................................34
Network....................................................................................................................................39
Link Status ...............................................................................................................................41
Advanced .................................................................................................................................42
Statistics ...................................................................................................................................43
WMM / QoS.............................................................................................................................44
WPS .........................................................................................................................................45
Radio On/Off............................................................................................................................47
About........................................................................................................................................47
UTILITY MENU LIST ..................................................................................................48
SOFT AP MODE..........................................................................................................48
Config.......................................................................................................................................48
Access Control.........................................................................................................................50
MAC Table ..............................................................................................................................51
Event Log.................................................................................................................................52
Statistics ...................................................................................................................................53
About........................................................................................................................................54
UNINSTALLATION FOR WINDOWS 2000/XP...............................55
UNINSTALLATION FOR WINDOWS VISTA .................................57

Chapter 1:
Introduction
The 802.11b/g/n Mini-size Wireless LAN USB2.0 Adapter is an IEEE802.11b/g/n USB adapter that
connects your notebook to a wireless local area. The 802.11 b/g/n Mini-size Wireless LAN USB2.0
Adapter fully complies with IEEE 802.11n and IEEE 802.11 b/g standards, delivers reliable,
cost-effective, feature rich wireless connectivity at high throughput from an extended distance.
The 802.11 b/g/n Mini-size Wireless LAN USB2.0 Adapter is a very small adapter that can connects
notebook, handheld or desktop computer equipped with USB interface for wireless network
applications. It allows you to take full advantage of your notebook’s mobility with access to real-time
information and online services anytime and anywhere.
Features
¾2T2R Mode with 300Mbps PHY Rate for both.
¾Complies with IEEE 802.11n and IEEE 802.11 b/g standards.
¾Supports WEP 64/128, WPA, WPA2.
¾Supports WMM and WMM-PS.
¾Supports WPS configuration.
¾Supports USB 2.0/1.1 interface.
¾Portable and mini-size design.
¾Compatible with Microsoft Windows Vista, XP, 2000.
- 1 -

Chapter 2: Installation
Windows 2000/XP Installation
Install the Software
Caution!
Do not insert the wireless card into your computer until the InstallShield Wizard finish
installing.
1. Exit all Windows programs. Insert the included CD-ROM into your computer. The CD-ROM will
run automatically.
2. When the License Agreement screen appears, please read the contents and select “I accept the
terms of the license agreement “ then click Next to continue.
3. Select the check box to choose a Configuration Tool from the listed two choices.
zConfiguration Tool: Choose to use our configuration utility.
zMicrosoft Zero Configuration Tool: Choose to use Windows XP’s built-in Zero
Configuration Utility (ZCU).
Click Next to continue.
- 2 -

5. When you are prompted the following message, please click Install to begin the installation.
- 3 -

6. When the following screen appears, click Finish to complete the software installation.
Install the Hardware
Note: Insert the Wireless USB card when you finished your software installation.
Insert the USB Adapter into the USB Port of your computer. The system will automatically detect the
new hardware.
- 4 -

Windows Vista Installation
Install the Software
Do not insert the wireless LAN adapter into your computer until the procedures
in “Driver& Utility Installation” have been performed.
1. Insert the included CD-ROM into the CD-ROM drive of your computer.
2. When the Main Menu screen appears, click “Driver & Utility Installation” to start the software
installation.
3. When the License Agreement screen appears, please read the contents and select “I accept the
terms of the license agreement “ then click Next to continue.
- 5 -

4. When you are prompted the following message, please click Install to begin the installation.
5. When the following screen appears, click Finish to complete the software installation.
- 6 -

Install the Hardware
Note: Insert the Wireless USB card when you finished your software installation.
Insert the USB Adapter into the USB Port of your computer. The system will automatically detect the
new hardware.
Verification
To verify if the device exists in your computer and is enabled, go to Start > Control Panel > System
> Hardware > Device Manager. Expand the Network Adapters category. If the 802.11 USB
Wireless LAN Card is listed here, it means that your device is properly installed and enabled.
- 7 -

Network Connection
IP Address
Note: When assigning IP Addresses to the computers on the network, remember to
have the IP address for each computer set on the same subnet mask. If your
Broadband Router use DHCP technology, however, it won’t be necessary for you to
assign Static IP Address for your computer.
1. To configure a dynamic IP address (i.e. if your broadband Router has the DHCP technology), check
the Obtain an IP Address Automatically option.
2. To configure a fixed IP address (if you broadband Router is not DHCP supported, or when you need
to assign a static IP address), check the Use the following IP address option. Then, enter an IP
address into the empty field; for example, enter 192.168.1.1 in the IP address field, and
255.255.255.0 for the Subnet Mask.
- 8 -

Chapter 3: Utility
Configuration
Utility Configuration for Windows
2000/XP
After the Wireless adapter has been successfully installed, users can use the included Configuration
Utility to set their preference.
Go to StartJ(All) ProgramJIntelligent WirelessJIntelligent Wireless Utility.
You can also open the Configuration Utility by double clicking the icon or right clicking to select
Launch Config Utility.
- 9 -

- 10 -
- 10 -

Station Mode
Notice: Under screen resolution 800 x 600 pixels, click the triangle button at the
right down corner of the utility to expand the information of the station, the
information will not be displayed completely.
Profile
Profile can book keeping your favorite wireless setting among your home, office, and other public
hot-spot. You may save multiple profiles, and activate the correct one at your preference. The Profile
manager enables you to Add, Edit, Delete and Activate profiles.
Click this button to show the information of Status Section.
Click this button to hide the information of Status Section.
Profile Tab
Profile Name You can see a distinctive name of profile in this column. The default is PROF#
(# 1, #2, #3....)
SSID The SSID is the unique name shared among all points in your wireless
network.
Network Type Shows the network type of the device, including Infrastructure and Ad-Hoc.
Authentication Shows the authentication mode.
Encryption Shows the encryption type.
Use 802.1x Whether or not use 802.1x feature.
Tx Power Transmit power, the amount of power used by a radio transceiver to send the
signal out.
Channel Shows the selected channel that is currently in use.
Power Save
Mode Choose from CAM (Constantly Awake Mode) or PSM (Power Saving Mode.)
RTS
Threshold Shows the RTS Threshold of the device.
Fragment
Threshold Shows the Fragment Threshold of the device.
Add Click to add a profile from the drop-down screen.
- 11 -

System Configuration tab:
Profile Name: User can enter profile name, or use default name defined by
system. The default is PROF# (# 1, #2, #3....).
SSID: The SSID is the unique name shared among all points in your wireless
network. The name must be identical for all devices and points attempting to
connect to the same network. User can use pull-down menu to select from
available APs.
Power Save Mode:
•CAM (Constantly Awake Mode): When this mode is selected, the power
supply will be normally provided even when there is no throughput.
•PSM (Power Saving Mode): When this mode is selected, this device will
stay in power saving mode even when there is high volume of throughput.
Network Type: There are two types, Infrastructure and Ad-hoc modes.
Under Ad-hoc mode user can also choose the preamble type, the available
preamble type includes Auto and Long. In addition to that, the channel field
will be available for setup in Ad-hoc mode.
•The Infrastructure is intended for the connection between wireless network
cards and an Access Point. With the wireless adapter, you can connect
wireless LAN to a wired global network via an Access Point.
•The Ad-hoc lets you set a small wireless workgroup easily and quickly.
Equipped with the wireless adapter, you can share files and printers between
each PC and laptop.
Tx Power: Transmit power, the amount of power used by a radio transceiver to
send the signal out. Select the Tx power percentage from the pull-down list
including Auto, 100%, 75%, 50%, 25%, 10% and Lowest.
Preamble: This function will show up when Ad-hoc network type be selected.
A preamble is a signal used in wireless environment to synchronize the
transmitting timing including Synchronization and Start frame delimiter. Select
from the pull-down menu to change the Preamble type into Auto or Long.
RTS Threshold: User can adjust the RTS threshold number by sliding the bar
or key in the value directly. The default value is 2347. RTS/CTS Threshold is a
mechanism implemented to prevent the “Hidden Node” problem. If the
“Hidden Node” problem is an issue, users have to specify the packet size. The
- 12 -

RTS/CTS mechanism will be activated if the data size exceeds the value you set.
This value should remain at its default setting of 2347. Should you encounter
inconsistent data flow, only minor modifications of this value are
recommended.
Fragment Threshold: User can adjust the Fragment threshold number by
sliding the bar or key in the value directly. The default value is 2346. The
mechanism of Fragmentation Threshold is used to improve the efficiency when
high traffic flows along in the wireless network. If your Wireless LAN Adapter
often transmits large files in wireless network, you can enter new Fragment
Threshold value to split the packet. The value can be set from 256 to 2346.
Authentication and Security tab:
Authentication Type: There are several types of authentication modes
including Open, Shared, Leap, WPA, WPA-PSK, WPA2 and WPA2-PSK.
•Open: If your access point/wireless router is using "Open” authentication,
then the wireless adapter will need to be set to the same authentication type.
•Shared: Shared key is when both the sender and the recipient share a secret
key.
•LEAP: Light Extensible Authentication Protocol. It is an EAP authentication
type used primarily in Cisco Aironet WLANs. It encrypts data transmissions
using dynamically generated WEP keys, and supports mutual authentication
(only with CCX mode enabled.)
•WPA/ WPA-PSK/ WPA2/ WPA2-PSK: WPA or WPA-PSK
authentications offer two encryption methods, TKIP and AES. For
WPA-PSK, select the type of algorithm TKIP or AES and then enter a WPA
Shared Key of 8-64 characters in the WPA Pre-shared Key field.
Encryption Type: For Open and Shared authentication mode, the selection of
encryption type are None and WEP. For WPA, WPA2, WPA-PSK and
WPA2-PSK authentication mode, the encryption type supports both TKIP and
AES.
WPA Pre-shared Key: This is the shared secret between AP and STA. For
WPA-PSK and WPA2-PSK authentication mode, this field must be filled with
character longer than 8 and less than 64 lengths.
WEP Key: Only valid when using WEP encryption algorithm. The key must
match with the AP’s key. There are several formats to enter the keys.
•Hexadecimal (128bits): 26 Hex characters (0~9, a~f).
•ASCII (128bits): 13 ASCII characters.
Show Password: Check this box to show the password you en02tered.
802.1x Setting: When user use radius server to authenticate client certificate for
WPA authentication mode (WPA authentication do not support EAP Method-
- 13 -

MD5-Challenge).
802.1x tab:
EAP Method:
•PEAP: Protect Extensible Authentication Protocol. PEAP transport securely
authentication data by using tunnelling between PEAP clients and an
authentication server. PEAP can authenticate wireless LAN clients using
only server-side certificates, thus simplifying the implementation and
administration of a secure wireless LAN.
•TLS / Smart Card: Transport Layer Security. Provides for certificate-based
and mutual authentication of the client and the network. It relies on
client-side and server-side certificates to perform authentication and can be
used to dynamically generate user-based and session-based WEP keys to
secure subsequent communications between the WLAN client and the
access point.
•TTLS: Tunnelled Transport Layer Security. This security method provides
for certificate-based, mutual authentication of the client and network
through an encrypted channel. Unlike EAP-TLS, EAP-TTLS requires only
server-side certificates.
•EAP-FAST: Flexible Authentication via Secure Tunnelling. It was
developed by Cisco. Instead of using a certificate, mutual authentication is
achieved by means of a PAC (Protected Access Credential) which can be
managed dynamically by the authentication server. The PAC can be
provisioned (distributed one time) to the client either manually or
automatically. Manual provisioning is delivery to the client via disk or a
secured network distribution method. Automatic provisioning is an in-band,
over the air, distribution. For tunnel authentication, only support "Generic
Token Card" authentication now.
•MD5-Challenge: Message Digest Challenge. Challenge is an EAP
authentication type that provides base-level EAP support. It provides for
only one-way authentication - there is no mutual authentication of wireless
client and the network. (Only Open and Shared authentication mode can use
this function.)
- 14 -

Tunnel Authentication:
•Protocol: Tunnel protocol, List information including EAP-MSCHAP v2,
EAP-TLS/ Smart Card, and Generic Token Card.
•Tunnel Identity: Identity for tunnel.
•Tunnel Password: Password for tunnel.
Session Resumption: Reconnect the signal while broken up, to reduce the
packet and improve the transmitting speed. User can click the box to enable or
disable this function.
ID\PASSWORD tab:
ID/ PASSWORD: Identity and password for server.
•Authentication ID / Password: Identity, password and domain name for
server. Only "EAP-FAST" EAP method and "LEAP" authentication can key
in domain name. Domain name can be keyed in blank space.
•Tunnel ID / Password: Identity and Password for server.
Show Password: Check this box to show the password you entered.
OK: Click to save settings and exit this page.
Cancel: Click to call off the settings and exit.
Client Certification tab:
Use Client certificate: Choose to enable server authentication.
OK: Click to save settings and exit this page.
Cancel: Click to call off the settings and exit.
Server Certification tab:
Use certificate chain: Choose use server that issuer of certificates.
- 15 -

Allow intimidate certificates: It must be in the server certificate chain between
the server certificate and the server specified in the certificate issuer must be
field.
Server name: Enter an authentication sever root.
Server name must match: Click to enable or disable this function.
Domain name must end in specified name: Click to enable or disable this
function.
OK: Click to save settings and exit this page.
Cancel: Click call off the settings and exit.
Delete Click to delete an existing profile.
Edit Click to edit a profile.
Activate Click to make a connection between devices.
Network
The Network page displays the information of surrounding APs from last scan result. The tab lists the information
including SSID, Network type, Channel, Wireless mode, Security-Enabled and Signal.
Network Tab
Sorted by Indicate that AP list are sorted by SSID, Channel or Signal.
Show dBm Check the box to show the dBm of the AP list.
SSID Shows the name of BSS network.
Network Type Network type in use, Infrastructure for BSS, Ad-Hoc for IBSS network.
Channel Shows the currently used channel.
Wireless mode AP support wireless mode. It may support 802.11b, 802.11g or 802.11n wireless
mode.
Encryption Shows the encryption type currently in use. Valid value includes WEP, TKIP,
AES, Not Use and WPS.
Signal Shows the receiving signal strength of specified network.
Rescan Click to refresh the AP list.
Add to Profile Select an item on the list and then click to add it into the profile list.
Connect Select an item on the list and then click to make a connection.
- 16 -
Table of contents
Other Abocom Adapter manuals

Abocom
Abocom WCU5102 User manual

Abocom
Abocom WU5204 User manual

Abocom
Abocom FE1500 User manual

Abocom
Abocom WU5206 User manual

Abocom
Abocom UFT128 User manual

Abocom
Abocom BSM202 User manual

Abocom
Abocom USB Home PhoneLine 1Mbps Network Adapter User manual

Abocom
Abocom UFE1000C User manual

Abocom
Abocom FE2500 User manual

Abocom
Abocom WU5502S User manual

Abocom
Abocom UFE2000 User manual

Abocom
Abocom BM560 User manual

Abocom
Abocom UBT1000H User manual

Abocom
Abocom HP2000 User manual

Abocom
Abocom HB2100 User manual

Abocom
Abocom FE1200 User manual

Abocom
Abocom 802.11b/g Wireless LAN USB 2.0 Module... User manual

Abocom
Abocom WU5202 User manual

Abocom
Abocom WU5200 User manual

Abocom
Abocom PLE0085I User manual