ALCON AOU-2410 User manual

http://www.alcon.tw
1
Long Range 802.11b/g/n USB Adapter
for OUTDOOR use
User Manual
Revision 1.0

http://www.alcon.tw
2
U
Note
Make sure there are antennas installed on each unit,
otherwise the RF will be damaged when power is on.

http://www.alcon.tw
3
FCC Notice
NOTE: This equipment has been tested and found to comply with the limits
for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits
are designed to provide reasonable protection against harmful interference in
a residential installation.
This equipment generates, uses and can radiate radio frequency energy and,
if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this equipment
does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try
to correct the interference by one or more of the following measures:
—Reorient or relocate the receiving antenna.
—Increase the separation between the equipment and receiver.
—Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
—Consult the dealer or an experienced radio/ TV technician for help.
Changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
The antenna(s) used for this transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
The manufacture is not responsible for any radio or TV interference caused by
unauthorized modifications to this equipment. Such modifications could void
the user’s authority to operate the equipment.

http://www.alcon.tw
4
Introduction
AOU-2410 wireless network adapter is a powerful 32-bit USBAdapter that
installs quickly and easily into PCs or Notebook. The Adapter can be used in
Ad-Hoc mode to connect with a wireless access point or router for access to
the internet in your enterprise or home network.
AOU-2410 wireless USB adapter connects you with 802.11n networks at up to
a 150Mbps.And for added versatility, it can also interoperate with all 802.11g
(up to 54Mbps) and 802.11b (up to 11Mbps) products found in homes,
business, and public wireless hotspots around the country. And in either mode,
your wireless communications are protected by industrial-strength WPA/WPA2,
so your data stays secured.
This manual contains information of how to install and configure your wireless
adapter to get your network started accessing the internet. It will guide you
through the correct configuration steps to get your device up and running.
Before you begin
You must have at least the following:
A laptop computer/Desktop PC with an available 32-bit USB port
At least a 300MHz processor and 32MByte of memory
Windows 2000/XP32-64/Vista32-64/Macintosh/Linux
A CD-ROM drive
Installing drivers and utilities
1. Do not connect the adapter to your computer.
2. Insert the driver and utility CD in the CD-ROM drive.
3. The setup wizard will launch automatically (under Windows Vista, you may
additionally need to select Run: Autorun.exe in the Autorun window). If
the CD-ROM autorun feature is disable. Run Autorun.exe in the CD’s root
directory.
4. Click Install AOU-2410 for your adapter. If you are using Windows Vista,
the User Account Control window may display. To proceed with the
installation, click Continue (if you are performing the installation using an
account that has no administrative privileges, you may also need to enter
the user name and password for an administrative account).
5. Select I accept the terms of the license agreement and click Next>.

http://www.alcon.tw
5
6. If you wish to install the driver with utility software (recommended), select
Install driver and Ralink WLAN Utility. If you wish to install driver only,
click Install driver only and click Next>.

http://www.alcon.tw
6
7. If you wish to use the software included with the adapter (recommended),
select Install driver and Ralink Configuration Tool and click Next>. If
you wish to use your system’s wireless network wizard, select Microsoft
Zero Configuration Tool and click Next>.

http://www.alcon.tw
7
8. Click Install to install the driver and configuration utility.
9. If a restart is required, select Yes to restart my computer now to restart the
computer after the installation or select No to restart the computer at a later
time. Click Finish to complete the setup wizard.

http://www.alcon.tw
8

http://www.alcon.tw
9
Installing the adapter
1. Turn on the computer and wait for the operating system to launch. Log
in, if necessary.
2. Plug the adapter into a USB port.
3. If the Found New Hardware Wizard window appears, select Install the
software automatically (recommended) and click Next. The driver
will be installed automatically.
Wireless adapter configuration
A configuration application is installed with adapter drivers. The application’s
icon is displayed in the system tray (next to the clock), and its appearance
depends on the adapter and/or connection status.
To launch the adapter’s configuration, double-click the application’s icon
(RaUI).
RaUI application
RaUI application window is divided into three parts:
1. Tab bar –click on Tab to display its contents in the main pane.Active Tab is
highlighted.

http://www.alcon.tw
10
2. Main pane –this pane displays contents of select Tab.
3. Secondary pane –this pane contains connection information or additional
options for selected in main pane option. Click More ( ) button to
show secondary pane or Less ( ) button to hide it.
Connection information contains:
Status –Connection status:
RF OFF –Adapter disconnected or RF is off.
Disconnected –Wireless connection not established.
〔SSID〕< -- > 〔BSSID〕–Connection established to network with
displayed ID’s.
Extra info –Additional information about connection.
Channel –Channel (Frequency) used by wireless network.
Authentication –Authentication method by wireless network.
Encryption–Encryption method by wireless network.
Network Type:
Ad hoc–Connection peer to peer with other wireless adapter.
Infrastructure–Connection with wireless network viaAccess Point (AP)
or wireless router.
Status–Wireless connection status.
IPAddress–IP address configured or obtained from DHCP server.
Subnet Mask–Subnet Mask configured or obtained from DHCP server.
Default Gateway–Gateway IP address configured or obtained from DHCP
server.
Link Quality: Shows link quality as a percentage bar (0~100%).
Signal Strength: Shows signal strength as a percentage bar (0~100%).
Noise Level: Shows noise level as a percentage bar (0~100%).
Transmit / Receive: Transmit / Receive as a percentage bar (0~100%).

http://www.alcon.tw
11
Profile Tab
This Tab allows you to create profiles for the most frequently used wireless
network, i.e. home network, company network or public hotspots. The profile
can be activated as required.
Profile List –This list contains configured profiles, profile name, SSID,
information. Icons on the list means as below:
Add: Click Add to create a new profile.
Edit: Click Edit to change settings for the selected profile.
Delete: Click Delete to delete the selected profile.
Activate: Click Activate to activate the selected profile.

http://www.alcon.tw
12
Profile configuration –System Config Tab
This Tab allows configuration of basic connection parameters.
Profile Name –Enter a name to identify your profile. Default is PROF1.
SSID –Enter a network service set identifier (SSID) or select from a list of
active networks. If SSID broadcast function of AP is disabled, SSID must be
entered manually.
Network Type –You can select two wireless network types:
The Infrastructure mode supports communications between a wireless
network and a wire network using an access point.
The Ad hoc mode supports peer to peer communications between two
wireless network devices.
TX Power –Set the signal transmit power to be used by the radio transmitter.
Choose the appropriate value from the drop-down list.
Preamble –Select the preamble length, default is Auto.
Channel –Select the channel to be used when establishing an Ad hoc
network.
Power Save Mode –Select the power saving mode.
Using CAM (ConstantlyAwake Mode), the network adapter will operate at
full power when connected to mains.
Using PSM (Power Saving Mode), the network adapter will enter power
saving mode.
RTS Threshold –Use the slider or enter a value for the RTS threshold in the
field provided. Default value: 2347.
Fragment Threshold –Use the slider or enter a value for the fragment
threshold in the field provided. Default value: 2346.

http://www.alcon.tw
13
Profile configuration –Auth. \ Encry. Tab
This Tab contains all Authentication and Encryption settings
Authentication:
Open –With the Open method, every wireless station can request
authentication.
Shared –With the Shared authentication, the station requesting
authentication must provide a secret key (which can be obtained from
network administrator) using a secure channel (independent of the 802.11
wireless communications channel).
LEAP –(Light Extensible Authentication Protocol) is an EAP
authentication method used primarily on CiscoAironet wireless networks.
This protocol encrypts transmitted data using dynamically generated WEP
keys, and supports two way authentications.
WPA and WPA2 –IEEE 802.1x protocol is used for authentication and
AES or TKIP for encryption.
WPA PSK and WPA2 PSK–Station requesting authentication must
provide a WPA Preshared Key. AES or TKIP are used for encryption.
Authentication: Open and Shared
Authentication –Change authentication method.
Encryption –Select None or WEP.
Use 802.1x –Check this option to use IEEE 802.1x for authentication.
IEEE 802.1x supports full user authentication and control. This will also
enable 802.1x Tab, where 802.1x can be configured.
WEP Key / Key#1 …4–When you select WEP encryption or Shared
authentication without 802.1x, you need to enter a correct WEP key.
If a 64-bit WEP key is used, enter 10 Hexadecimal characters or 5
ASCII characters.
If a 128-bit WEP key is used, enter 26 Hexadecimal characters or 13
ASCII characters.

http://www.alcon.tw
14
Authentication: LEAP
Authentication –Change authentication method.
Identity –Enter your identity for the LEAP authentication service.
Password –Enter your password for the LEAP authentication service.
Domain Name –Enter your domain name for the LEAP authentication service.
Authentication: WPA and WPA2
Authentication –Change authentication method.
Encryption –Select the encryption method to be used.
AES (Advanced Encryption System) uses symmetrical 128-bit data
block encryption.
TKIP (Temporal Key Integrity protocol) uses stronger encryption
algorithms and MIC (Message Integrity Check) to provide security
against hackers.
WPAand WPA2 use IEEE 802.1x protocol for authentication. After selecting
encryption method go to 802.1x Tab, where 802.1x settings can be configured.
Authentication: WPA-PSK and WPA2 PSK

http://www.alcon.tw
15
Authentication –Change authentication method.
Encryption –Select the encryption method to be used.
AES (Advanced Encryption System) uses symmetrical 128-bit data
block encryption.
TKIP (Temporal Key Integrity protocol) uses stronger encryption
algorithms and MIC (Message Integrity Check) to provide security
against hackers.
WPA Preshared Key –Enter the WPA preshared key (WPA-PSK and
WPA2-PSK only). The key should be 8 to 32 characters in length.

http://www.alcon.tw
16
Profile configuration –802.1x Tab
Settings on this Tab allow IEEE 802.1x protocol.All information can be
obtained from wireless network administrator. Appearance of this Tab depends
on options selected from EAP method and Tunnel Authentication lists.
PEAP –Protect ExtensibleAuthentication Protocol. PEAP transports
secured authentication data by using tunneling between PEAP clients and
an authentication server. PEAP can authenticate wireless LAN clients
using only server-side certificates, thus simplifying the implementation
and administration of secure wireless network.
TLS/Smart Card –Transport Layer Security. Provides for
certificate-based and mutual authentication of the client and the network.
It relies on client-side and server-side certificates to perform
authentication and can be used to dynamically generate user-based and
session-based WEP keys to secure subsequent communications
between the WLAN client and theAP.
TTLS –Tunnel Transport Layer Security. This security method provides
for certificate-based, mutual authentication of the client and network
through an encrypted channel. Unlike EAP-TLS, EAP-TTLS, it requires
only server-side certificates.
EAP-FAST –Flexible Authentication via secured Tunneling. It was
developed by Cisco. Instead of using a certificate, mutual authentication
is achieved by means of a PAC (Protected Access Credential) which can
be managed dynamically by the authentication server. The PAC can be
provisioned (distributed on time) to the client either manually or
automatically. Manual provisioning is delivered to the client via disk or
secured network distribution method. Automatic provisioning is an in-band,
over the air, distribution. For tunnel authentication, only support ―Generic
Toke Card‖authentication now.
MD5-Challenge –Message Digest Challenge. Challenge is an EAP
authentication type that provides base-level EAP support. It provides for
only one-way authentication, there is no mutual authentication of wireless
client and the network.
ID\PASSWORD Tab

http://www.alcon.tw
17
EAP Method –Change EAP authentication method.
Tunnel Authentication –Change tunnel authentication method.
Session Resumption –Enable/disable session resumption.
Authentication ID / Password –Identity, Password and Domain Name for
server. Only EAP-FAST authentication can key in domain name. Domain
name can be keyed in blank space.
Tunnel ID / Password:
Identity –Identity for tunnel.
Password –Password for tunnel.

http://www.alcon.tw
18
Client Certificate Tab
Use Client certification –Enable this option to use Client certificate for server
authentication and then select certificate from drop-down list. You can find
detailed information on certificate below this list.
Server Certificate Tab
Use certificate chain –Enable this option, to enable the certification feature
and select the certificate issue.
Allow intermediate certificates –Select this option to allow the use of
intermediate certificates. These certificates must be located on the certification
chain between the server certificate and the server selected from list.
Server name –Enter the name of the authentication server.

http://www.alcon.tw
19
EAP-Fast Tab
Allow unauthenticated provision mode –During the PAC can be
provisioned (distributed on time) to the client automatically. It only supported
Allow unauthenticated provision mode and use EAP-MSCHAP v2
authentication to authenticate now. It causes to continue with the
establishment of the inner tunnel even through it is made with an unknown
server.
Use protected authentication credential –During the PAC can be
provisioned to the client manually via disk or secured network distribution
method. Click Import, to browse for PAC settings file or click Remove, to stop
using current file.
File Path –A path where PAC setting file is located.

http://www.alcon.tw
20
Network Tab
Icons on list means:
Show dBm –Check this box to show signal strength on AP List as dBm
instead of percentages. This also applies to Signal Strength and Noise
Strength in secondary pane.
AP List –List of wireless networks in range. Columns contain follow
information: SSID (hidden when SSID Broadcast on AP is disabled), network
type icon (infrastructure orAd hoc) and used channel, supported 802.11
standards (i.e. 802.11g), security and signal strength. Double-click on network,
to display detailed network information in secondary pane.
Rescan –Click this button to rescan for available wireless networks.
Add to Profile –Click to create a profile for selected network. You can find
detailed information on profile configuration in previous section.
Connect –Click to connect to selected network without creating a profile.
Table of contents
Popular Adapter manuals by other brands

Trickstuff
Trickstuff PM-PM+43 manual

Epson
Epson OT-WL06 user manual

Hawking
Hawking H-WU36D Features & benefits

NETGEAR
NETGEAR A6150 user manual

Extron electronics
Extron electronics Captive Screw Plug to 3.5 mm Mini Jack Adapter CSM... Specification sheet

ProSoft Technology
ProSoft Technology inRA-x ILX34-AENWG Setup guide