AzureWave AW-NB086 User manual

AW-NB086
Product
name
:
WIFI/ BT Combo slim module
© 2000–2011 by Azurewave Technologies. Inc.,. All rights
reserved.
Notice
The information in this document has been carefully reviewed and is believed to be
accurate.
Nonetheless, this document is subject to change without notice, and Azurewave
Technologies. Inc., assumes no responsibility for any inaccuracies that may be contained in
this
document, and makes no commitment to update or to keep current the contained
information,
or
to notify a person or organization of any updates. Azurewave reserves the
right to make changes,
at
any time, in order to improve reliability, function or design and to
attempt to supply the
best
product possible. Azurewave does not represent that products
described herein are free from
patent
infringement or from any other third party
right.
No part of this document may be reproduced, adapted or transmitted in any form or by
any
means, electronic or mechanical, for any purpose, except as expressly set forth in a
written
agreement signed by Azurewave. Azurewave or its affiliates may have patents or pending
patent
applications, trademarks, copyrights, mask work rights or other intellectual property
rights
that
apply to the ideas, material and information expressed herein. No license to such
rights
is
provided except as expressly set forth in a written agreement signed by
Azurewave.
AZUREWAVE MAKES NO WARRANTIES OF ANY KIND WITH REGARD TO THE
CONTENT
OF
THIS DOCUMENT. IN NO EVENT SHALL AZUREWAVE BE LIABLE FOR
DIRECT,
INDIRECT,
SPECIAL, INCIDENTAL SPECULATORY OR CONSEQUENTIAL
DAMAGES ARISING
FROM
THE USE OR INABILITY TO USE THIS PRODUCT OR
DOCUMENTATION, EVEN
IF
ADVISED
OF THE POSSIBLITY OF SUCH DAMAGES. IN
PARTICULAR, AZUREWAVE
SHALL
NOT HAVE LIABILITY FOR ANY HARDWARE,
SOFTWARE, OR DATA TRANSMITTED
OR
OTHERWISE USED WITH THE PRODUCT,
INCLUDING THE COSTS OF
REPAIRING,
REPLACING, INTEGRATING, INSTALLING
OR RECOVERING SUCH
HARDWARE,
SOFTWARE OR DATA. AZUREWAVE
SPECIFICALLY DISCLAIMS THE IMPLIED
WARRANTIES
OF MERCHANTIBILITY AND
FITNESS FOR A PARTICULAR PURPOSE AS THEY
MIGHT
OTHERWISE APPLY TO THIS
DOCUMENT AND TO THE IDEAS, MATERIAL
AND
INFORMATION EXPRESSED
HEREIN.

Document Conventions
Text
Conventions
bold Bold type within paragraph text indicates commands, file
names,
directory names, paths, output, or returned
values.
Example: The DK_Client package will not function unless
you
use the wdreg_install batch
file.
italic Within commands, italics indicate a variable that the user
must
specify.
Example: mem_alloc
s
i
z
e
_
in
_
b
y
t
e
s
Titles of manuals or other published documents are also set
in
italics.
Courier The Courier font indicates output or
display.
Example:
Error:Unable to allocate memory for
transfer!
Menu The Menu character tag is used for menu
items.
Example: Choose Edit >
Copy
.
[ ] Within commands, items enclosed in square brackets are
optional
parameters or values that the user can choose to specify or
omit.
{ } Within commands, items enclosed in braces are options
from
which the user must
choose.
| Within commands, the vertical bar separates
options.
… An ellipsis indicates a repetition of the preceding
parameter.
> The right angle bracket separates successive menu
selections.
Example: Start > Programs > DK >
wdreg_ins
t
all
.
Notices
NOTE: This message denotes neutral or positive information that calls
ou
t
important points to the text. A note provides information that may apply
only
in special
cases
.
Azurewave Technologies. Inc., •
iii
COMPANY CONFIDENTIAL January
2011

Revision History
Revision Description of
Changes
Aug 2011 Initial
Release
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Contents
Introduction ..........................................................................................................
8
System Requirements ....................................................................................
8
Profile
Management
.............................................................................................
8
Create or Modify a Configuration
Profile
....................................................
8
Remove a Configuration Profile ...................................................................
9
Auto Profile Selection Management....................................................................
9
Switching to a Different Configuration Profile ................................................
10
Import and Export Profiles .................................................................................
10
Importing a Profile ..............................................................................................
10
Exporting a Profile ..............................................................................................
10
TCP/IP Configuration .......................................................................................
10
Configuring the TCP/IP Address for the network
device
:
................................
10
General Tab.........................................................................................................
11
Advanced Tab.....................................................................................................
11
Security Tab ........................................................................................................
12
Using EAP-TLS Security..............................................................................
13
Using EAP-TTLS Security ...........................................................................
13
Using PEAP (EAP-GTC)
Security
...............................................................
14
Using PEAP-MSCHAP V2 Security............................................................
15
Using LEAP Security ...................................................................................
16
Configuring
LEAP
...............................................................................................
16
Pre-Shared Encryption Keys..............................................................................
17
Defining pre-shared encryption keys: ...............................................................
17
Overwriting an Existing Static WEP Key ..........................................................
17
Disabling Static WEP .........................................................................................
18
Using WPA Passphrase
Security
.......................................................................
18
Zero Configuration.............................................................................................
18
Wireless Network
Con
f
igura
t
ion
........................................................................
18
Check the Status Information or
Diagnostics
...................................................
19
Current Status ..............................................................................................
19
Adapter Information Button..............................................................................
20
Diagnostics Tab ..................................................................................................
20
Transmitted Frames...........................................................................................
21
Received Frames ...............................................................................................
21
Scan
A
v
a
il
a
b
l
e
Networks
...................................................................................
21
Connecting to a different network .....................................................................
21
Azurewave Technologies. Inc., •
v
COMPANY CONFIDENTIAL January
2011

Display Settings
..................................................................................................23
ACU
Tools
...........................................................................................................23
Tray
I
con..............................................................................................................24
Color
.....................................................................................................................25
Quali
t
y
..................................................................................................................25
RSSI*
...................................................................................................................25
Ad Hoc
Mode
......................................................................................................25
Ad Hoc Mode Profile Configuration
..........................................................25
Infrastructure (Access Point) Mode
...................................................................26
Infrastructure (Access Point) Mode Profile
Configuration........................26
Uninstall an Old
Driver
......................................................................................27
Additional Security Features
.............................................................................27
Message Integrity Check (MIC)
.........................................................................27
Bluetooth Adapter Installation and
Operation
.................................................28
Getting
Started..............................................................................................28
Installing the Bluetooth
Suite
..............................................................................28
Downloading the Bluetooth
Suite
...............................................................28
Copying Bluetooth Suite from the
CD
........................................................29
Launching the Bluetooth
Suite...........................................................................32
Introduction to the Bluetooth Suite
...................................................................34
Menu
Bar.......................................................................................................35
Search For
Device...................................................................................35
Bluetooth
Configuration........................................................................35
Bluetooth Help
Topics
...........................................................................35
Bluetooth Exchange Folder
...................................................................36
Bluetooth Places Panel
.................................................................................36
Uninstalling the Bluetooth
Suite
........................................................................37
Connecting to an HID Device
............................................................................39
Setup
Requirements............................................................................................39
Launching the Bluetooth
Suite...........................................................................39
Connecting to a Sync
Device
..............................................................................42
Setup
Requirements............................................................................................42
Launching the Synchronization Process
...........................................................43
Advanced Status
I
nformation
............................................................................47
Regulatory Compliance Notices ....................................... 錯誤!
尚未定義書籤。
USA-Federal Communications Commission
(FCC)
........ 錯誤!
尚未定義書籤。
European Community — CE
No
t
ice
:
................................ 錯誤!
尚未定義書籤。
Taiwan NCC Radio
Compliance
:
...................................... 錯誤!
尚未定義書籤。
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

2.4GHz Operation........................................................錯誤!
尚未定義書籤。
Azurewave Technologies. Inc., •
vii
COMPANY CONFIDENTIAL January
2011

Introduction
The Azurewave 802.11n + Bluetooth Adapter supports 802.11n and Bluetooth
EDR2.0
operation. The card uses the Azurewave Client Utility (ACU) which is a user-mode
utility
designed to edit and add profiles for selected Azurewave network interface
adapters.
System
Requirements
Laptop/ PC
containing:
32-bit PCI Express
Bus
32 MB memory or
greater
300 MHz processor or
higher
Microsoft Windows 2000, Windows Millennium Edition, Windows 98
Second
Edition, Windows XP, or Windows NT 4.0 (with Service Pack
6)
Profile Management
Configure the wireless network adapter (wireless card) from the Profile Management
tab
of
the Azurewave Client
Utility.
Add a
profile
Edit a
profile
Import a
Profile
Export a
Profile
Order
profiles
Switch to a different
profile
Remove a
profile
Connect
to a
Different
Network
The wireless network adapter works in either infrastructure mode (which uses an
access
point) or ad hoc mode (a group of stations participating in the wireless
LAN).
Create or Modify a Configuration
Profile
To add a new configuration profile, click New on the Profile Management tab. To modify a
configuration profile, select the configuration from the Profile list and click the
Modify
button.
The Profile Management dialog box displays the General tab. In profile
management:
Edit the General
tab.
Edit
the Security
tab.
Edit the Advanced
tab.
To configure a profile for ad hoc or access point (infrastructure) mode, edit the
Network
Type field on the advanced
tab.
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Note that the ACU only allows the creation of 16 configuration profiles. After
the
creation of 16 profiles, clicking the New button displays an error message. Remove
an
old profile or modify an existing profile for a new
use.
Remove a Configuration
Profile
1. Go to the Profile Management
t
a
b
.
2. Select the profile to remove from the list of configuration
pr
o
file
s
.
3. Click the Remove
button.
Auto Profile Selection Management
Including a profile in the auto selection feature allows the wireless adapter
to
automatically select that profile from the list of profiles and use it to connect to
the
network.
Including a profile in auto profile
se
l
ect
ion
:
1. On the Profile Management tab, click the Order Profiles
button.
2. The Auto Profile Selection Management window appears, with a list of all
created
profiles in the Available Profiles
box.
3. Highlight the profiles to add to auto profile selection, then click Add. The
profiles
appear in the Auto Selected Profiles
box.
Ordering the auto selected
p
r
o
f
il
es:
1. Highlight a profile in the Auto Selected Profiles
box.
2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the
Auto
Selected Profiles box has highest priority, and the last profile has lowest
priority.
3. Click
OK.
4. Check the Auto Select Profiles
box.
5. Save the modified configuration
file.
When auto profile selection is enabled by checking Auto Select Profiles on the
Profile
Management tab, the adapter scans for an available network. The profile with
the
highest priority and the same SSID as one of the found networks is the one that is
used
to
connect to the network. If the connection fails, the adapter tries the next
highest
priority profile that matches the SSID, and so
on.
With auto profile selection enabled, the wireless adapter scans for available networks. The
highest priority profile with the same SSID as a found network is used to connect to the
network. On a failed connection, the adapter tries with the next highest priority profile.
Azurewave Technologies. Inc., •
i
x
COMPANY CONFIDENTIAL January
2011

Switching to a Different Configuration Profile
1. To switch to a different profile, go to the Profile Management
tab.
2. Click on the profile name in the Profile
List.
3. Click the Activate
button.
The Profile List provides icons that specify the operational state for that profile. The
list
also provides icons that specify the signal strength for that
profile.
Import and Export Profiles
Importing a
P
r
o
f
il
e
1. From the Profile Management tab, click the Import button. The Import
Profile
window
appears.
2. Browse to the directory where the profile is
located.
3. Highlight the profile
name.
4. Click Open. The imported profile appears in the profiles
list.
Exporting a
P
r
o
f
il
e
1. From the Profile Management tab, highlight the profile to
export.
2. Click the Export button. The Export Profile window
appears.
3. Browse to the directory to export the profile
to.
4. Click Save. The profile is exported to the specified
location.
TCP/IP Configuration
Configuring the TCP/IP Address for the network
d
ev
i
ce:
1. After configuring the wireless network adapter properties, open the Control Panel
and
open Network and Dial-up
Connections.
2. Find the Local Area Connection associated with the wireless network adapter.
Right-
click that connection, and click
Properties.
3. Select Internet Protocol (TCP/IP) and click
Properties.
4. Click the radio button Use the following IP address, then enter an IP address and
Subnet
mask. Assigning an IP address and Subnet mask allows stations to operate in access point
mode (infrastructure mode) or in ad hoc mode and to have Internet access.
Default
gateway and DNS server information is also required. IP configuration
information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is
usually obtained
from the corporate IT
staff.
5. Click OK to
finish.
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

General Tab
In the Azurewave Client Utility, access the General tab by clicking New or Modify on
the
Profile Management tab. Edit the fields in the General tab to configure the
configuration
profile. Make sure to also edit the Security and Advanced
tabs.
Profile Name Identifies the configuration profile. This name must
be
unique. Profile names are not case
sensitive.
Client Name Identifies the client
machine.
Network Names (SSIDs) The IEEE 802.11 wireless network name. This field has
a
maximum limit of 32
characters.
Configure up to three SSIDs (SSID1, SSID2, and
SS
I
D3).
Advanced Tab
In the Azurewave Client Utility, access the Advanced tab by clicking New or Modify on
the
Profile Management tab, then clicking the Advanced tab in Profile Management. Edit
the fields in the Advanced tab of Profile Management to configure the
profile.
Transmit
Power
L
eve
l
Power
S
ave
Mode
Selects the transmit power level in mW. Actual transmit power
m
a
y
be
limited by
har
dw
are.
S
pe
c
if
y
:
Maximum mode causes the access point to buffer
in
com
in
g
messages
for the wireless adapter. The adapter periodically
p
o
ll
s
the access
point to see if any messages are
w
ai
t
in
g
.
Normal uses maximum when retrieving a large number
o
f
packets,
then switches back to power save mode after
re
t
rie
v
in
g
the packets.
Off turns power saving off, thus powering up
t
he
wireless adapter
continuously for a short message
re
s
p
o
n
s
e
t
i
m
e.
Network Type Specifies the network as either infrastructure or ad
h
oc
.
802
.
11
b
P
ream
bl
e
A
u
t
h
e
n
t
i
cat
ion
Mode
Specifies the preamble setting in 802.11b. The default setting
i
s
S
h
o
r
t
&
Long (access point mode), which allows both short and
l
o
n
g
headers in
the 802.11b frames. The adapter can only use short
ra
d
i
o
headers if the
access point supports and uses them. Set to Long
O
nl
y
to override
allowing short
fra
m
e
s
.
Select the mode the wireless adapter uses to authenticate to an
A
P:
Auto causes the adapter to attempt authentication using
s
hare
d
,
but
switches it to open authentication if shared
fail
s
.
Open enables an adapter to attempt authentication regardless
o
f
its
WEP settings. It will only associate with the access point if
t
he
WEP
keys on both the adapter and the access point
m
a
tc
h.
Shared only allows the adapter to associate with access
p
o
in
ts
t
ha
t
have the same
W
E
P
k
e
y
.
For infrastructure (access point) networks, click the Preferred APs button to specify up
to
four access points to which the adapter should attempt to
associate.
Azurewave Technologies. Inc., •
x
i
COMPANY CONFIDENTIAL January
2011

Security Tab
In the Azurewave Client Utility, access the Security tab by clicking New or Modify on
the
Profile Management tab. Click the Security tab in the Profile Management
window.
Edit the fields in the Security tab of Profile Management to configure the profile.
To
define
the security mode, select the radio button of the desired security mode. Make
sure
to
also edit the General and Advanced
tabs.
WP
A
/WP
A2
Enables the use of Wi-Fi Protected Access
(WPA).
Choosing WPA/WPA2 opens the WPA/WPA2 EAP
drop-down
menu. The options
include:
EAP-FAST
EAP-TLS
EAP-TTLS
PEAP
(EAP-GTC)
PEAP (EAP-MSCHAP
V2)
LEAP
WP
A
/WP
A2
P
ass
ph
rase
Enables WPA/WPA2 Passphrase security. Click on the
Configure
button and fill in the WPA/WPA2
Passphrase.
802
.
1x
Enables 802.1x security. This option requires IT
administration.
Choosing 802.1x opens the 802.1x EAP type drop-down menu.
The
options
include:
EAP-FAST
EAP-TLS
EAP-TTLS
PEAP
(EAP-GTC)
PEAP (EAP-MSCHAP
V2)
LEAP
If the access point that the wireless adapter is associating to
has
WEP set to Optional and the client has WEP enabled, make sure
that
Allow Association to Mixed Cells is checked on the Security Tab
to
allow association. Note: If the Lock checkbox is checked, you
cannot
change any values in this profile. See your system
administrator.
P
re-
Sh
are
d
Key
(Static
WEP
)
Enables the use of pre-shared keys that are defined on both
the
access point and the
station.
To define pre-shared encryption keys, choose the Pre-Shared
Key
radio button and click the Configure button to fill in the Define
Pre-
Shared Keys
window.
If the access point that the wireless adapter is associating to
has
WEP set to Optional and the client has WEP enabled, make sure
that
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Allow Association to Mixed Cells is checked on the Security Tab
to
allow
association.
None
No security (not
recommended).
Using EAP-TLS
Security
To use EAP-TLS security In the Azurewave Client Utility, access the Security tab in
the
Profile Management
window.
1. On the Security tab, choose the WPA radio
button.
OR: On the Security tab, choose the 802.1x radio
button.
2. Choose EAP-TLS from the drop-down
menu.
Enabling EAP-TLS
sec
u
r
i
ty:
To use EAP-TLS security, the machine must already have the EAP-TLS
certificates
downloaded onto it. Check with the IT
manager.
1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the
right,
then click the Configure
button.
2. Select the appropriate certificate authority from the list. The server/domain name and
the login name are filled in automatically from the certificate information. Click OK.
3. Click
OK.
4. Activate the
profile.
Using EAP-TTLS
Security
To use EAP security In the Azurewave Client Utility, access the Security tab in the
Profile
Management
window.
1. On the Security tab, choose the WPA/WPA2 radio
button.
OR: On the Security tab, choose the 802.1x radio
button.
2. Choose EAP-TTLS from the drop-down
menu.
Enabling EAP-TTLS
sec
u
r
i
ty:
To use EAP-TTLS security, the machine must already have the EAP-TTLS
certificates
downloaded onto it. Check with the IT
manager.
1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the
right,
then click the Configure
button.
2. Select the appropriate certificate from the drop-down list and click
OK.
3. Specify a user name for EAP
authentication:
Check Use Windows User Name to use the Windows user name as the EAP
user
name.
OR: Enter an EAP user name in the User Name field to use a separate user
name
and password and start the EAP authentication
process.
4. Click Advanced
and:
Leave the server name field blank for the client to accept a certificate from
any
server
with a certificate signed by the authority listed in the Network
Certificate
Authority drop-down list.
(
r
e
c
omm
en
d
e
d)
Azurewave Technologies. Inc., •
x
iii
COMPANY CONFIDENTIAL January
2011

Enter the domain name of the server from which the client will accept
a
certificate.
Change the login name if
needed.
5. Click
OK.
6. Enable the
profile.
Using PEAP (EAP-GTC)
Security
To use PEAP (EAP-GTC) security In the Azurewave Client Utility, access the Security tab
in
the Profile Management
window.
1. On the Security tab, choose the WPA radio
button.
OR: On the Security tab, choose the 802.1x radio
button.
2. Choose PEAP (EAP-GTC) from the drop-down
menu.
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and
the
server properties must already be set. Check with the IT
manager.
1. Click the Configure
button.
2. To avoid the need to log on again after resuming operation (for example, after
your
computer goes into standby or hibernate mode), check Always Resume the
Secure
Session.
3. Select the appropriate network certificate authority from the drop-down
list.
4. Specify a user name for inner PEAP tunnel
authentication:
Check Use Windows User Name to use the Windows user name as the
PEAP
user
name.
OR: Enter a PEAP user name in the User Name field to use a separate user
name
and
start the PEAP authentication
process.
5. Choose Token or Static Password, depending on the user
database.
Note that Token uses a hardware token device or the Secure Computing
SofToken
program (version 1.3 or later) to obtain and enter a one-time password
during
authentication.
6. Click Settings...
and:
Leave the server name field blank for the client to accept a certificate from
any
server
with a certificate signed by the authority listed in the Network
Certificate
Authority drop-down list.
(
r
e
c
omm
en
d
e
d)
Enter the domain name of the server from which the client will accept
a
certificate.
The login name used for PEAP tunnel authentication fills in automatically
as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's
MAC
address. Change the login name if
needed.
7. Click
OK.
8. Enable the
profile.
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Using PEAP-MSCHAP V2
Security
To use PEAP-MSCHAP V2 security In the Azurewave Client Utility, access the Security
tab in
the Profile Management
window.
1. On the Security tab, choose the WPA radio
button.
OR: On the Security tab, choose the 802.1x radio
button.
2. Choose PEAP (EAP-MSCHAP V2) from the drop-down
menu.
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP
certificates,
and the server properties must already be set. Check with the IT
manager.
1. Click the Configure
button.
2. Select the appropriate certificate from the drop-down
list.
3. Specify a user name for inner PEAP tunnel
authentication:
Check Use Windows User Name to use the Windows user name as the
PEAP
user
name.
OR: Enter a PEAP user name in the User Name field to use a separate user
name
and
start the PEAP authentication
process.
4. Click Advanced
and:
Leave the server name field blank for the client to accept a certificate from
any
server
with a certificate signed by the authority listed in the Network
Certificate
Authority drop-down list.
(
r
e
c
omm
en
d
e
d)
Enter the domain name of the server from which the client will accept
a
certificate.
The login name used for PEAP tunnel authentication fills in automatically
as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's
MAC
address. Change the login name if
needed.
5. Click
OK.
6. Enable the
profile.
Azurewave Technologies. Inc., •
xv
COMPANY CONFIDENTIAL January
2011

Using LEAP
Security
To use security In the Azurewave Client Utility, access the Security tab in the
Profile
Management window. LEAP security requires that all infrastructure devices (e.g.
access
points
and servers) are configured for LEAP authentication. Check with the IT
manager.
Configuring
LE
A
P
On the Security tab, choose the WPA radio button. Choose WPA-LEAP from
the
drop-
down
menu.
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from
the
drop-
down
menu.
1. Click the Configure
button.
2. Specify a user name and password. Select to Use Temporary User Name
and
Password by choosing the radio
button:
Check Use Windows User Name to use the Windows user name as the
LEAP
user
name.
OR: Check Manually Prompt for LEAP User Name and Password
to
manually login and start the LEAP authentication
process.
Select to Use Saved User Name and Password by choosing the radio
button:
Specify the LEAP user name, password, and domain to save and
use.
3. Enter the user name and
password.
4. Confirm the
password.
5. Specify a domain
name:
Check the Include Windows Logon Domain with User Name setting to
pass the
Windows login domain and user name to the RADIUS server.
(d
e
f
a
u
l
t
)
OR: Enter a specific domain
name.
6. If desired, check No Network Connection Unless User Is Logged In to force
the
wireless adapter to disassociate after logging
off.
7. Enter the LEAP authentication timeout time (between 30 and 500 seconds)
to
specify
how long LEAP should wait before declaring authentication failed,
and
sending an
error message. The default is 90
seconds.
8. Click
OK.
9. Enable the
profile.
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Pre-Shared Encryption Keys
Defining pre-shared encryption
keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security
tab.
2. Click the Configure
button.
3. Fill in the fields in the Define Pre-Shared Keys dialog
box:
Key Entry Determines the entry method for an encryption key: hexadecimal
(0-9,
A-F), or ASCII text (all keyboard characters except
spaces).
En
cry
p
t
ion
Keys
WEP
Keys
(1-4)
WEP
Key
Si
ze
Selects the default encryption keys used. Only allows the selection for a
shared First, Second, Third, or Fourth key whose corresponding field
has been
completed.
Defines a set of shared encryption keys for network
configuration
security. At least one Shared Key field must be populated to
enable
security using a shared
key.
Click on the radio button to set the key as the default encryption
key.
Defines the size for each encryption key. The options
include:
64-bit (enter 10 digits for hexadecimal, 5 ASCII
characters)
128-bit (enter 26 digits for hexadecimal, 13 digits for
ASC
II
)
152-bit (enter 32 digits hexadecimal, 16 digits for
ASC
II
)
4. Click OK for the changes to take
effect.
Overwriting an Existing Static
WEP
Key
1. Click the Pre-Shared Key radio button on the Security
tab.
2. Click on
Configure.
3. In the window, all existing static WEP keys are displayed as asterisks for
security
reasons. Click in the field of the existing static WEP key to
overwrite.
4. Delete the asterisks in that
field.
5. Enter a new
key.
6. Make sure to select the Transmit Key button to the left of this key is selected for
the
key to transmit
packets.
7. Click
OK.
Azurewave Technologies. Inc., •
xv
ii
COMPANY CONFIDENTIAL January
2011

Disabling Static
WEP
To disable static WEP for a particular profile, Select any other security option
o
n
t
he
Profile Management tab to automatically disable static
W
E
P
OR: choose None on the Security tab to disable security, and click
O
K
(n
ot
re
comm
en
d
e
d
).
Using WPA Passphrase Security
To use WPA Passphrase security In the Azurewave Client Utility, access the Security tab
in
the Profile Management
window.
1. On the Security tab, choose the WPA Passphrase radio
button.
2. Click on the Configure
button.
3. Fill in the WPA
Passphrase.
4. Click
OK.
Zero Configuration
This section describes the operation of the Azurewave Client Utility (ACU) and
Windows
XP Wireless Configuration Service
(WZCS).
Wireless Network
C
on
f
igu
rat
ion
The Windows WZCS is a service that manages the wireless connection in a
largely
dynamic way. Only minimal connection information must be identified and
configured.
To set Zero Configuration on Windows XP, take the following
steps:
1. In Windows XP, open the Wireless Network Configuration Properties dialog
box.
2. Select the check box “Use Windows to configure my wireless network settings” to
set
Zero
Configuration.
When this check box is selected, Windows XP takes control of these settings for
all
configuration
profiles:
SS
I
D
Security
keys
Ad hoc
settings
Note
that
Windows
XP
takes control of these settings for
all
configuration profiles,
thus
users
can
not
(
create new profiles with different settings while
using
Windows Zero
C
o
n
f
i
g
u
r
a
t
i
o
n
.
The Zero Configuration settings override all configuration profiles, even when you
select
other options. However, the ACU does still control the following settings when
Zero
Configuration is
set:
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Power
settings
Active/Passive scanning (where
applicable)
Transmit
power
Wireless
band
Short/Long preamble
(802.11b)
When Zero Configuration is in use, a pop-up message is displayed on the ACU when you
attempt to create or edit a configuration profile from the Profile Management tab of the
ACU.
To turn Zero Configuration off on Windows XP, take the following
steps:
1. In Windows XP, open the Wireless Network Configuration Properties dialog
box.
2. Clear the check box “Use Windows to configure my wireless network settings” to
set
Zero Configuration. When this check box is cleared, all profile settings are
controlled
by the configuration profile, which is set up from the ACU Profile Management
tab.
Check the Status Information or Diagnostics
The Azurewave client utility includes a number of tools to display current diagnostics
and
status
information.
Check current
status
Check driver
information
Check receive and transmit
diagnostics
Current
Status
The Current Status tab contains general information about the program and
its
operations. The Current Status tab does not require any configuration. The
following
table describes the items found on the Current Status
screen.
Profile Name The name of the current selected configuration profile. Set up
the
configuration name on the General
tab.
Link Status Shows whether the station is associated to the wireless
network.
Wireless Mode Displays the wireless mode. Configure the wireless mode on
the
Advanced
tab.
IP Address Displays the computer's IP
address.
Network Type The type of network the station is connected to. Options
include:
Infrastructure (access
point)
Ad
Hoc
Configure the network type on the Advanced
tab.
Azurewave Technologies. Inc., •
x
i
x
COMPANY CONFIDENTIAL January
2011

C
u
rre
n
t
C
h
a
nn
e
l
Shows the currently connected
channel.
Server
Base
d
A
u
t
h
e
n
t
i
cat
ion
Shows whether server based authentication is
used.
Data
En
cry
p
t
ion
Displays the encryption type the driver is using. Configure
the
encryption type on the Security
tab.
Sign
a
l
S
tre
ng
t
h
Shows the strength of the
signal.
Click the Advanced button to see the advanced status
diagnostics.
Adapter Information Button
The Adapter Information button contains general information about the
network
interface card (the wireless network adapter) and the network driver
interface
specification (NDIS) driver. Access the adapter information from the Diagnostics
tab.
Card
Name
Name of the wireless network
a
d
ap
t
er.
MAC
A
dd
ress
MAC address of the wireless network
a
d
ap
t
er.
Dr
i
ver
Driver name and path of the wireless network
a
d
ap
t
er
d
ri
v
er.
Driver
V
ers
ion
Version of the wireless network adapter
d
ri
v
er.
Driver
Date
Creation date of the wireless network adapter
d
ri
v
er.
Client
Name
Name of the client
com
pu
t
er.
Diagnostics Tab
The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics.
The
Diagnostics tab does not require any configuration. It lists these receive and
transmit
diagnostics for frames received by or transmitted by the wireless network
adapter:
Multicast packets transmitted and
received
Broadcast packets transmitted and
received
Unicast packets transmitted and
received
Total bytes transmitted and
received
The Adapter Information button has general information about the wireless
network
adapter and NDIS driver. The Advanced Statistics button to shows statistics
for
diagnostics for frames received by or transmitted to the wireless network
adapter:
Azurewave Technologies. Inc.,
8F.,No.94,BaozhongRd.,Xiandian,Taipei,Taiwan231

Transmitted
F
rames
F
ra
m
e
s
t
ran
sm
i
tt
e
d
O
K
Frames
re
t
rie
d
F
ra
m
e
s
d
r
o
ppe
d
N
o
ACK
fra
m
e
s
ACK
fra
m
e
s
RTS
fra
m
e
s
C
lear-
to
-
s
en
d
(
CTS
)
fra
m
e
s
No CTS
fra
m
e
s
Retried
RTS
fra
m
e
s
R
e
t
rie
d
d
a
t
a
fra
m
e
s
Received
F
rames
Frames
re
c
ei
v
e
d
O
K
B
ea
co
n
s
Frames with
err
o
r
s
CRC
err
o
r
s
E
n
c
r
y
p
t
i
o
n
err
o
r
s
D
upli
c
a
t
e
frames
A
P
m
i
sm
a
tc
he
s
Data rate
m
i
sm
a
tc
he
s
Authentication
t
i
m
e-
o
u
t
Authentication rejects: the number of
A
P
authentication
failures received by the
wireless
network adapter
Association
t
i
m
e-
o
u
t
Association rejects: the number of AP authentication
re
j
e
cts
received by the wireless network
a
d
ap
t
er
Standard MIC
O
K
Standard
MIC
err
o
r
s
CKIP
MIC
O
K
CKIP MIC
err
o
r
s
Scan
A
v
a
il
a
b
l
e
N
e
tw
o
rk
s
Click the Scan button on the Profile Management tab to scan for available
infrastructure
and ad hoc networks. On this list, click Refresh to refresh the list at any
time.
Connecting to a different
n
et
wo
rk
Highlight a network name and click the Activate button to connect an
available
network. If no configuration profile exists for that network, the Profile
Management
window opens to the General tab. Fill in the profile name and click OK to create
the
configuration profile for that
network.
I
nfrastructure
(AP)
Network
Connected
I
nfrastructure
(AP)
Network
Azurewave Technologies. Inc., •
xx
i
COMPANY CONFIDENTIAL January
2011
Table of contents
Other AzureWave Control Unit manuals

AzureWave
AzureWave AW-NM230NF-H User manual

AzureWave
AzureWave AW-BT252 User manual

AzureWave
AzureWave AW-CB511NF User manual

AzureWave
AzureWave AW-NM333 User manual

AzureWave
AzureWave AW-CU427-P User manual

AzureWave
AzureWave AW-CU277 User manual

AzureWave
AzureWave AW-CU544 Guide

AzureWave
AzureWave AW-WD089 User manual

AzureWave
AzureWave AW-HM482 User manual

AzureWave
AzureWave AW-CU300A V3 User manual