Hawking HWPG1 User manual


Trademarks & Copyright
Windows 98SE/ME/2000/XP are registered trademarks of Microsoft Corp. All other brands and
product names are trademarks of their respective companies.
No part of this publication may be reproduced in any form or by any means or used to make any
derivative (such as translation, transformation or adaptation) without the express written consent of the
manufacturer as stipulated by the United States Copyright Act of 1976.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses, and
can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the
equipment off and on, the user is encouraged to try to correct the interference by one or more of
the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
4. Consult the dealer or an experienced radio technician for help.
FCC Caution
This equipment must be installed and operated in accordance with provided instructions and a
minimum 20 cm spacing must be provided between computer mounted antenna and person’s
body (excluding extremities of hands, wrist and feet) during wireless modes of operation.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation. Any changes
or modifications not expressly approved by the party responsible for compliance could void the
authority to operate equipment.
Federal Communication Commission (FCC) Radiation Exposure Statement
This equipment complies with FCC radiation exposure set forth for an uncontrolled environment. In
order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human
proximity to the antenna shall not be less than 20cm (8 inches) during normal operation.
The antenna(s) used for this transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE
EUROPEAN PARLIAMENT AND THE COUNCIL of March 9, 1999 on radio equipment and
telecommunication terminal Equipment and the mutual recognition of their conformity (R&TTE)
The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications
Terminal Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
Safety
This equipment is designed with the utmost care for the safety of those who install and use it.
However, special attention must be paid to the dangers of electric shock and static electricity

when working with electrical equipment. All guidelines of this and of the computer manufacture
must therefore be allowed at all times to ensure the safe use of the equipment.
EU Countries Intended for Use
The ETSI version of this device is intended for home and office use in Austria,
Belgium, Denmark, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg,
the Netherlands, Portugal, Spain, Sweden, and the United Kingdom.
The ETSI version of this device is also authorized for use in EFTA member states: Iceland,
Liechtenstein, Norway, and Switzerland.
CE Mark Warning
This is a Class B product. In a domestic environment, this product may cause radio interference, in
which case the user may be required to take adequate measures.
HAWKING LIMITED WARRANTY
Hawking Technology guarantees that every HWPG1 Wireless-G PCI Card is free from
physical defects in material and workmanship under normal use for two (2) years from the
date of purchase. If the product proves defective during this two-year warranty period, call
Hawking Customer Service in order to obtain a Return Authorization number. Warranty is for
repair or replacement only. Hawking Technology does not issue any refunds. BE SURE
TO HAVE YOUR PROOF OF PURCHASE. RETURN REQUESTS CAN NOT BE
PROCESSED WITHOUT PROOF OF PURCHASE. When returning a product, mark the
Return Authorization number clearly on the outside of the package and include your original
proof of purchase.
IN NO EVEN SHALL HAWKING TECHNOLOGY’S LIABILTY EXCEED THE PRICE PAID
FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR
CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT, ITS
ACCOMPANYING SOFTWARE OR ITS DOCUMENTATION. Hawking Technology makes
no warranty or representation, expressed, implied or statutory, with respect to its products or
the contents or use of this documentation and all accompanying software, and specifically
disclaims its quality, performance, merchantability, or fitness for any particular purpose.
Hawking Technology reserves the right to revise or updates its products, software, or
documentation without obligation to notify any individual or entity. Please direct all inquiries
© Hawking Technologies, 2006. All rights reserved.
All trademarks herein are the property of their respective owners.

CONTENTS
1INTRODUCTION.............................................................................1
1.1 Features ..............................................................................................................1
1.2 Specifications..................................................................................................... 1
1.3 Package Contents ............................................................................................... 2
2INSTALLATION PROCEDURE .....................................................3
3CONFIGURATION UTILITY .........................................................8
3.1 Site Survey ....................................................................................................... 10
3.2 Profile............................................................................................................... 11
3.2.1 Configure the Profile........................................................................................12
3.2.1.0 Configuration ...................................................................................................12
3.2.1.1 Authentication vs. Security..............................................................................15
3.2.1.2 802.1x Setting-Certification.............................................................................18
3.2.1.3 802.1x Setting-CA Server ................................................................................ 20
3.3 Link Status........................................................................................................20
3.4 Statistics ...........................................................................................................22
3.5 Advanced..........................................................................................................22
3.6 About................................................................................................................25
3.7 Setting Up A Static IPAddress.........................................................................25
3.8 Turbo Mode......................................................................................................27
3.9 WMM Function................................................................................................ 28
4TROUBLESHOOTING..................................................................30

1 Introduction
Thank you for purchasing the Hawking Technologies Wireless 802.11g PCI card. This card complies
with the IEEE 802.11g standard, which capable of supporting up to 108Mbps high-speed wireless
networking. It is also backwards compatible with IEEE 802.11b devices. The HWPG1 is a quality high
performance wireless product and has been tested to outperform the competition.
For wireless security issues, this card supports 64/128-bit WEP data encryption that protects your
wireless network from eavesdropping. It also supports the WPA (Wi-Fi Protected Access) security
standard that combines IEEE 802.1x and TKIP (Temporal Key Integrity Protocol) technologies. Client
users are required to authorize before accessing to APs or AP Routers, and the data transmitted in the
network is encrypted/decrypted by a dynamically changed secret key. This card also has built-in an
AES engine which ensure the highest degree of security and authenticity for digital information and it is
the most advanced solution defined by IEEE 802.11i for security in wireless networks.
The power consumption of the card is also very low. Furthermore, this card provides several levels of
power saving modes allowing the user to optimize the battery life of their notebooks.
1.1 Features
•Works with both IEEE 802.11b and IEEE 802.11g products.
•Supports Turbo Mode to enhance the data transfer speed within the specific wireless
network.
•High-speed transfer data rate - up to 108Mbps.
•High throughput allows for the transfer of data heavy multi-media files.
•Supports 64/128-bit WEP Data Encryption, WPA (TKIP with IEEE 802.1x), WPA2 (AES with
IEEE 802.1x)..
•Automatic fallback increases data security and reliability.
•Supports the most popular operating systems: Windows 98SE/Me/2000/XP.
•Supports the 32-bit PCI interface.
1.2 Specifications
•Standard: IEEE 802.11b/g
•Interface: 32-bit PCI
•Frequency Band: 2.4000 ~ 2.4835GHz (Industrial Scientific Medical Band)
•Modulation: OFDM with BPSK, QPSK, 16QAM, 64QAM (11g) BPSK, QPSK, CCK (11b)
•Data Rate: 54/48/36/24/18/12/11/9/6/5.5/2/1Mbps auto fallback
•Security: 64/128-bit WEP Data Encryption, WPA (TKIP with IEEE 802.1x), WPA2 (AES with
IEEE 802.1x). (Note: WPA2 is enabled with Windows 2000/XP).
1

•Antenna: External detachable 2dbi dipole antenna (Connector: RP-SMA connector, Cable
Length: 94 cm).
•Drivers: Windows 98SE/Me/2000/XP
•LEDs: TX/RX, Link
•Transmit Power: 16dBm~18dBm
•Power consumption: Tx: 350mA, Rx: 250mA
•Receive Sensitivity: 54Mbps OFDM, 10% PER, -70dBm, 11Mbps CCK, 8% PER, -86dBm,
1Mbps BPSK, 8% PER, -92dBm
•Dimension: 19(H) x 130(W) x 121(D) mm
•Temperature: 32~131°F (0 ~55°C)
•Humidity: Max. 95% (NonCondensing)
•Certification: FCC, CE, IC
1.3 Package Contents
Before you begin the installation, please check the items of your package. The package should include
the following items:
•One Wireless-G PCI Card
•One CD (Driver/Utility/User’s Manual.)
•One Quick Installation Guide
•One Dipole Antenna
If any of the above items is missing, contact your supplier as soon as possible.
2

2 Installation Procedure
Before you proceed with the installation, please notice following descriptions.
Note1: The following installation was operated under Windows XP. (Procedures are similar for
Windows 98SE/Me/2000.)
Note2: If you have installed a Wireless PCI Card driver & utility before, please uninstall them
first before continuing with the HWPG1 software installation.
Software Installation
A. Insert the Installation CD into to your CD-ROM Drive. When an autoloader screen appears, click on
the “Driver & Utility Setup” to initiate the installation.
B. The installation is preparing to setup.
3

C. Click “Yes” to process the installation if you accept the license agreement.
D. Choose “Hawking Configuration Tool” and click next.
4

E. The system will automatically detect the card and display “Hardware Installation” screen. Click
“Continue Anyway” to continue.
F. Please wait while the HWPG1 is configuring your software installation.
5

G. At this point, please click “Finish” and move on to the Hardware installation.
Hardware Installation
A. Turn off your computer and remove its cover.
B. Insert the PCI card to an available PCI slot firmly.
C. Secure this card to the rear of the computer chassis and put back the cover.
D. Secure the antenna to the antenna connector of the card.
E. Restart your computer.
Software Installation [Continue]
A. After you have restarted your computer, a Found New Hardware Wizard will prompt you to
install the software. Select “Install the software automatically [Recommended]” and click
“Next.”
B. Please wait while the wizard searches…..
6

C. Now, you have completed the software installation. Select Finish.
7

3 Configuration Utility
The Configuration Utility is a powerful application that helps you configure the PCI card and monitor the
link status and the statistics during the communication process.
When the card is installed, the configuration utility will be displayed automatically. This card will auto
connect to wireless device which has better signal strength and no wireless security setting.
The Configuration Utility appears as an icon on the system tray of Windows while the card is running.
You can open the utility by double-click on the icon.
The icon in your system tray will
display different colors to help you
distinguish the status of your
wireless network. Follow the table
to the right to understand what each
color means.
8

Right click the icon, there are some items for you to operate the configuration utility.
Launch Configuration Utilities
Select “Launch Configuration Utilities” to open the Configuration Utility tool.
Use Zero Configuration as Configuration Utility
Select “Use Zero Configuration as Configuration Utility” to use Windows XP built-in wireless
configuration utility (Windows Zero Configuration) to configure the card.
Exit
Select “Exit” to close the Configuration Utility tool.
In Windows XP, there is a “Windows Zero Configuration Tool” for you to setup wireless clients. By
default, this “Windows Zero Configuration Tool” is enabled. If you want to use the Utility for the card,
please follow one of the ways as below.
First Way
Right click the icon in the system tray and select “Use RaConfig as Configuration Utility”.
Second Way
A. Right click the icon and select “View Available Wireless Networks.”
(note: the icon here may display differently.
B. Right click on the icon and select “View Available Wireless Networks”
C. Select the available wireless network
9

Note: If “Wireless Zero Configuration” is enabled, you can only configure the advance setting or
check the link status and statistics from the configuration utility of the card.
3.1 Site Survey
When you open the Configuration Utility, the system will scan all wireless channels to find all access
points/stations within the accessible range of your card and automatically connect to the wireless
device with the highest signal strength. When using the “Site Survey” option, all nearby networks will be
listed. You can change your connection to another network or you may add one of the networks to your
own profile list.
10

Parameter Description
Available Networks This list shows all available wireless networks within range of your
card. It also displays the information of the networks including the
SSID, BSSID, Signal Strength, Channel, Encryption,
Authentication and Network Type. If you want to connect to any
networks on the list, double-click the item on the list, and the card
will automatically connect to the selected network.
Rescan Button Click “Rescan” button to collect the information of all the wireless
networks nearby.
Connect Button Click “Connect” to connect to the selected network.
Add to Profile Button Add the selected network to Profiles list.
3.2 Profile
The “Profiles List” is for you to manage the networks you connect to frequently. You are able to
Add/Delete/Edit/Activate a profile.
11

3.2.1 Configure the Profile
3.2.1.0 Configuration
Parameter Description
Profile Name Define a recognizable profile name for you to identify the different
networks.
SSID The SSID (up to 32 printableASCII characters) is the unique
name identified in a WLAN. The ID prevents the unintentional
merging of two co-located WLANs.
12

You may specify a SSID for the card and then only the device with
the same SSID can interconnect to the card. If you want to add
one of the networks nearby to the profile list, pull down the menu,
all the networks nearby will be listed and you can add one of them
to the profile list.
Power Saving Mode The power saving function is only available when the network type
is in Infrastructure.
CAM (Constantly Awake Mode) – The card will always set in
active mode.
Power Saving Mode – Enable the card in the power saving mode
when it is idle.
Parameter Description
Network Type Infrastructure – This operation mode requires the presence of an
802.11 Access Point. All communication is done via the Access
Point or Router.
Ad-Hoc – Select this mode if you want to connect to another
wireless station in the Wireless LAN network without going
through an Access Point or Router. Peer to Peer.
Transmit Power
If you wish to lower the transmit power of the card to save the
power of your system, you can select the lower percentages from
the list.
Ad Hoc Wireless Mode When the card is set inAd Hoc (Peer to Peer Mode), you can
designate the wireless connection mode for theAd Hoc network.
802.11 B only – This card can be compatible with both 802.11g
and 802.11b wireless stations. If there are only 802.11b wireless
stations in the network, you can set the card to this mode.
802.11 B/G mix – If you have a mix of 802.11b and 802.11g
wireless stations in your network, it is recommended to setting
then card to this mode. This mode is also the default setting.
802.11 G only – This card can be compatible with both 802.11g
and 802.11b wireless stations. If there are only 802.11g wireless
stations in the network, you can set the card to this mode.
13

Preamble Type The preamble defines the length of the CRC block for
communication among wireless stations. This option is only active
in the Ad Hoc network.
There are two modes includingAuto and Long Preamble. If
“Auto“ mode is selected, the card will auto switch the preamble
mode depending on the wireless stations which the card is
connecting to.
RTS Threshold Minimum packet size required for an RTS (Request To Send). For
packets smaller than this threshold, an RTS is not sent and the
packet is transmitted directly to the wireless network. Select a
setting within a range of 0 to 2312 bytes. Minor change is
recommended.
Fragment Threshold The value defines the maximum size of packets; any packet size
larger than the value will be fragmented. If you have decreased
this value and experience high packet error rates, you can
increase it again, but it will likely decrease overall network
performance. Select a setting within a range of 256 to 2312 bytes.
Minor change is recommended.
Channel This setting is only available for Ad Hoc mode. Select the number
of the radio channel used for the networking. The channel setting
should be the same with the network you are connecting to.
14

3.2.1.1 Authentication vs. Security
Parameter Description
Authentication Type This setting has to be consistent with the wireless networks that
the card intends to connect to. All security keys within a network
must match to allow successful communications.
Open – No authentication is needed among the wireless network.
Shared – Only wireless stations using a shared key (WEP Key
identified) are allowed to connecting each other.
LEAP – LEAP is a pre-EAP, Cisco-proprietary protocol, with many
of the features of EAP protocols. Cisco controls the ability of other
vendors to implement this protocol, so it should be selected for
use only when limited vendor choice for client, access-point, and
server products is not a concern. When you have set up LEAP
authentication, you have to enter the user name and password of
your computer.
WPA – WPA provides a scheme of mutual authentication using
either IEEE 802.1x/Extensible Authentication Protocol (EAP)
authentication or pre-shared key (PSK) technology. It provides a
high level of assurance to enterprises, small businesses and
home users that data will remain protected and that only
authorized users may access their networks. For enterprises that
have already deployed IEEE 802.1x authentication, WPA offers
the advantage of leveraging existing authentication databases
and infrastructure.
WPA-PSK – It is a special mode designed for home and small
business users who do not have access to network authentication
servers. In this mode, known as Pre-Shared Key, the user
manually enters the starting password in their access point or
gateway, as well as in each wireless station in the network.
WPA-PSK takes over automatically from that point, keeping
unauthorized users that don't have the matching password from
joining the network, while encrypting the data traveling between
authorized devices.
WPA2 – Like WPA, WPA2 supports IEEE 802.1 x/EAP
authentications or PSK technology. It also includes a new
advanced encryption mechanism using theAdvanced Encryption
Standard (AES). AES is required to the corporate user or
government users. The difference between WPAand WPA2 is that
WPA2 provides data encryption via theAES. In contrast, WPA
uses Temporal Key Integrity Protocol (TKIP).
WPA2-PSK – WPA2-PSK is also for home and small business.
15

The difference between WPA-PSK and WPA2-PSK is that
WPA2-PSK provides data encryption via theAES. In contrast,
WPA-PSK uses Temporal Key Integrity Protocol (TKIP).
802.1x Setting When you have set the Authentication Type to Open, Shared,
WPA or WPA2, you can also enable IEEE 802.1x setting to use
the authentication server or certification server to authenticate
client users.
Parameter Description
Encryption Mode None – Disable the WEP Data Encryption.
WEP – Enable the WEP Data Encryption. When the item is
selected, you have to continue setting the WEP Encryption keys.
TKIP – TKIP (Temporal Key Integrity Protocol) changes the
temporal key every 10,000 packets (a packet is a kind of message
transmitted over a network.) This insures much greater security
than the standard WEP security.
AES – AES has been developed to ensure the highest degree of
security and authenticity for digital information and it is the most
advanced solution defined by IEEE 802.11i for the security in the
wireless network.
Note: All devices in the network should use the same encryption
method to ensure the communication.
WPA Pre-Shared Key The WPA-PSK key can be from eight to 64 characters and can be
letters or numbers. This same key must be used on all of the
wireless stations in the network.
WEP Key
(Key1 ~ Key4) The WEP keys are used to encrypt data transmitted in the
wireless network. There are two types of key length: 64-bit and
128-bit. Select the default encryption key from Key 1 to Key 4 by
selected the radio button.
Fill the text box by following the rules below.
64-bit – Input 10-digit Hex values (in the “A-F”, “a-f” and “0-9”
range) or 5-digitASCII characters (including “a-z” and “0-9”) as
the encryption keys. For example: “0123456aef“ or “test1”.
16
Other manuals for HWPG1
2
Table of contents
Other Hawking PCI Card manuals