Pentagram horNET Wi-Fi PCI User manual

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Table of contents
IMPORTANT INFORMATION.........................................................................4
SAFETY PRECAUTIONS........................................................................................4
INFORMATION CONCERNING WASTE ELECTRONIC EQUIPMENT........4
INTRODUCTION................................................................................................5
PACKAGE CONTENTS.............................................................................................5
SYSTEM REQUIREMENTS....................................................................................5
DEVICE OVERVIEW.................................................................................................6
INSTALLATION...................................................................................................6
ADAPTER INSTALLATION....................................................................................6
DRIVER AND UTILITY INSTALLATION............................................................7
CONFIGURATION UTILITY............................................................................8
ICON IN THE SYSTEM TRAY................................................................................8
MAIN WINDOW – STATION MODE.....................................................................9
Profile tab........................................................................................................11
Network tab................................................................................................... 1
Advanced tab................................................................................................. 5
Statistics tab.................................................................................................. 6
WMM tab.......................................................................................................... 7
WPS tab............................................................................................................ 8
SSO tab.............................................................................................................30
CCX tab.............................................................................................................31
Radio On/Off tab..........................................................................................3
About tab........................................................................................................3
Help tab............................................................................................................3
AP MODE (WINDOWS 000/XP/VISTA)......................................................33
Starting AP mode.........................................................................................33
Config tab........................................................................................................33
Access Control tab.......................................................................................36
Mac Table tab.................................................................................................37
Event Log tab................................................................................................38
Statistics tab..................................................................................................39
About tab........................................................................................................40
STA+AP MODE (WINDOWS 7).........................................................................41
Starting STA+AP mode..............................................................................41
AP tab...............................................................................................................4
TROUBLESHOOTING....................................................................................43
SPECIFICATION...............................................................................................44
3

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Important information
Safety precautions
•Do not use or store the device in dusty places, where the humidity is high or in extreme
temperatures.
•Before removing adapter from protective foil and installing it inside the computer, it's
recommended to discharge electrostatic charge from your body. To do this simply touch
grounded metal part of the computer case.
•Do not touch PCI connector contacts or any other electronic components. It's recommended
to handle adapter by its edges or bracket.
•Before installing adapter inside of the computer, make sure that it's turned off and
unplugged from power outlet.
•Do not modify or fix the device yourself in any way, it might void the guarantee.
•Do not drop or shake the device.
Information concerning waste electronic equipment
The markings on the device and in the attached documentation indicate
that it cannot be disposed of along with unsegregated general black bag
waste when withdrawn from use. The device must be recycled or processed in
another way to recover reusable materials and neutralize hazardous
components.
The users should contact recycling/recovery authorities to determine how
the device is to be disposed of in an environment-friendly manner.
4
NOTE: All information and technical data is subject to change without previous notice and/or
indication in this manual.
Copyright © 010 PENTAGRAM
All rights reserved; copying and reproduction is strictly forbidden.

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Introduction
PENTAGRAM horNET wireless network adapter is a high-performance, easy-to-install PCI 3 -bit
network adapter. The adapter can be used in Ad-Hoc mode to establish peer-to-peer
connections with other adapters for file sharing, or in infrastructure mode to provide Internet
access on home or office networks using an access point or a router.
The PENTAGRAM horNET PCI adapter supports 80 .11n compliant connectivity with a
maximum data rate of 150 Mbps. With a rich feature set, it can also interoperate with 80 .11b
(up to 11 Mbps) and 80 .11g (up to 54 Mbps) products in home or office environments.
Regardless of the mode, your data remain secure thanks to WEP, WPA (TKIP algorithm) or WPA
(AES algorithm) encryption protocols.
Adapter configuration is described in detail in the Installation and Operation Manual provided on
the supplied CD and available at
www.pentagram.eu
.
Package Contents
1. Wireless PCI [P 61 1-L7] adapter
. Manual, Drivers and Utility on CD
3. Quick Installation Guide
4. External antenna with RP-SMA connector
If any of the above items are missing, please contact your reseller.
System Requirements
You must have at least the following:
•A laptop computer/desktop PC with an available PCI slot
•Windows 000, XP, Vista, 7
•A CD-ROM Drive
•An 80 .11n, 80 .11g or 80 .11b Access Point (for infrastructure Mode) or another
80 .11n, 80 .11g or 80 .11b wireless adapter (for Ad-Hoc; Peer-to-Peer networking mode.)
5

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Device overview
1. PCI connector
. RP-SMA connector with
attached antenna
3. WPS button
4. Activity LED (Tx/Rx)
5. Link LED (Link)
Activity LED (Tx/Rx) is blinking during data transfer.
Link LED (Link) is turned on, when adapter is connected to access point.
Installation
Adapter installation
1. If your computer is powered on, shut down the operating system, then turn the computer
off and disconnect it from mains.
. Open the computer case and locate an available PCI slot on the motherboard.
3. Insert the adapter into the PCI slot.
Ensure that the card’s connector is
placed securely in the slot. It may be
necessary to apply force to the card
to ensure it is firmly seated. Attach
the adapter to the computer chassis
with a screw. Close the case.
4. Attach the external antenna to the
adapter’s antenna connector.
5. Turn the computer on and wait for
the operating system to launch. Log
on, if necessary.
6. If the
Add New Hardware Wizard
appears, click Cancel and follow steps on the next page to install adapters drivers and
utility.
6
1
34
5

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Driver and Utility installation
1. Insert the supplied CD into the CD-ROM drive. The start menu should launch automatically.
Under Windows Vista and Windows 7, you may also need to click Run: Autorun.exe in the
AutoPlay
window. When launching the start menu, you may have to click the Allow button
(Windows Vista) or Yes (Windows 7) in the
User account control
window, and enter the
name and password of the user with administrative privileges, if the current user is not
granted them.
. If the menu window does not start automatically, select menu Start > Run (in Windows
Vista and 7 systems: Start > All programs > Accessories > Run). In the Open field of the Run
window, enter
X:\Autorun.exe
(where
X
is the optical drive letter) and press Enter.
3. Select the install option to run the installer.
4. Read the license agreement and accept it by selecting the I accept the terms of the license
agreement option. Click Next >.
5. If you want to install the drivers along with the software (recommended), select the Install
driver and Ralink WLAN Utility option. If you want to install the driver alone, click Install
driver only. Click Next >.
6. (Windows 000/XP only) If you want to use the software supplied with the adapter
(recommended), select the Ralink Configuration Tool option and click Next >. If you want to
use the system wireless network wizard, select the Microsoft Zero Configuration Tool option
and click Next >.
7. Click Install to install the drivers and utility.
8. If it is necessary to reboot the computer, select Yes, I want to restart my computer now, to
restart the computer after the installation, or No, I will restart my computer later, to restart
the computer later.
9. Click Finish to complete the installer operation.
7

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Configuration utility
Icon in the system tray
When the adapter is properly connected to the computer and the drivers installed, the
configuration utility will be started with the system, and its icon will be displayed in the system
tray (next to the clock). The icon changes according to the adapter and/or wireless network
connection status.
Station mode (wireless station):
The adapter is not connected to the computer.
Either the adapter is not connected to a wireless network or the transmission is off.
The adapter is connected to a wireless network and the signal strength is good.
The adapter is connected to a wireless network and the signal strength is normal.
The adapter is connected to a wireless network and the signal strength is poor.
AP mode (access point):
The adapter is not connected to the computer.
Preparing the adapter for operation.
Adapter ready for operation.
When you place the mouse cursor over the icon, a tooltip will display with the network name
that the adapter is connected to, as well as the network's signal strength/quality.
Double click the icon to open the configuration utility main window. Right-click the icon to
display the context menu:
• Launch Config Utility – open the utility main window.
• Use ... as Configuration Utility – (Windows XP only) change the application that manages
wireless connections – the RaUI (RaConfig) tool or the system wireless connection
configuration application (Zero Configuration).
• Switch to ... Mode – switch the adapter operation mode:
•wireless station (Station or STA),
•access point (AP) – Windows 000/XP/Vista,
•wireless station and access point (STA+AP) – Windows 7.
• Open Diagnostic Testing Mode – open the window which enables basic adapter and
configuration utility diagnostics (Local Test button) and the current wireless network
connection (Network Test). Clear button clears the diagnostic window content.
• Exit – close the configuration utility icon.
8

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Main window – Station mode
In Station mode, the adapter works as a normal wireless adapter. It is possible to connect to
wireless networks in the range.
The configuration utility window in Station mode comprises three parts:
1. Tab bar – click the tab icon to display its content in the main panel. The active tab
background colour is different from that of inactive tabs. Use the arrow buttons on both
sides of the bar ( and ) to scroll it.
. Main panel – this part contains all the basic options of the selected tab.
3. Auxiliary panel – this part contains the connection information or additional options related
to the option selected in the main panel. To show the auxiliary panel, click the More ( )
button. To hide it, click the Less ( ) button.
Note: Depending on the configuration utility version and the operating system version, some
tabs can look differently and contain different options than those described in this manual.
9
3
1

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Connection information in the auxiliary panel
Connection information in the auxiliary panel contains the following items:
Status – wireless network connection status:
• RF OFF – the adapter is not connected to a computer or the transmission is off.
• Disconnected – the adapter is not connected to a wireless network.
• [SSID] <--> [BSSID] – the adapter is connected to a network with the listed IDs.
Extra Info – additional connection information.
Channel – Information on the channel (frequency) that the wireless network is using.
Authentication – Authentication type used when connecting to an active network.
Encryption – Encryption type used when connecting to an active network.
Network Type – Type of the active wireless network:
• Ad hoc – Peer-to-Peer connection with another wireless adapter.
• Infrastructure – Connection with a wireless network created with an access point or a
wireless router.
Status – Wireless network connection status
IP Address – Adapter IP address set or obtained from the DHCP server.
Sub Mask – Subnet mask set or obtained from the DHCP server.
Default Gateway – Default gateway IP address set or obtained from the DHCP server.
BW – Transmission channel width used by the 80 .11n network: 0 or 40.
GI – Guard Interval (between consecutive transmissions) used by the 80 .11n network: short or
long.
MCS – index of the wireless network connection speed.
SNR
x
– SNR
x
(signal to noise ratio) parameter value in dB.
Link Quality – Wireless network connection quality.
Signal Strength – Wireless network signal strength.
Transmit / Receive – Active connection transmission/reception parameters:
Link Speed – Connection speed for transmitting/receiving.
Throughput – Current connection throughput for transmitting/receiving.
10

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Profile tab
Enables preview, adding, edition and deletion of profiles, which facilitate switching between
various known wireless networks, e.g. at home, work or a public hotspot.
Profile List – List containing configured profiles. The first column contains the profile name, the
second – the network SSID, and the third – icons with additional network information. Icons on
the profile list have the following meaning:
Connection with the activated profile successful.
Connection with the activated profile unsuccessful.
Infrastructure type network.
Ad-Hoc type network.
Protected network.
Besides the profile lists, there is information on the profile currently selected.
Add – Click to open the configuration of a new profile in the auxiliary panel.
Edit – Click to open the configuration of the selected profile in the auxiliary panel.
Delete – Click to delete the selected profile.
Activate – Click to activate the selected profile.
11

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Profile configuration – System Config tab
On this tab you can configure the basic network parameters.
Profile Name – Name of the profile to be displayed on the list. By default PROFx.
SSID – Enter the SSID of the network that you want to connect to, or select one from the list. If
the SSID broadcasting option in the access point is off, you must enter the name manually. The
SSID is case-sensitive, so if you enter
pentagram
as the SSID, it will not be possible to connect
to a network with
Pentagram
SSID.
Network Type – Select the type of the wireless network:
• Ad Hoc – Peer-to-Peer connection with another wireless adapter
• Infrastructure – Connection with a wireless network created with an access point or a
wireless router.
TxPower – Transmission power. Lower the TxPower value to improve the connection quality
with a wireless network in some cases, e.g. when the network adapter is close to the access
point, and there are plenty of wireless networks around that can interfere with your one.
Preamble – (only Ad-Hoc mode) Select the preamble length: Auto (automatic) or Long Preamble.
Channel – (only Ad-Hoc type) Select the channel used for creating an Ad-Hoc network.
Power Save Mode – Select the power saving mode:
• CAM (Constantly Awake Mode) – The network adapter will operate fully powered when
connected to mains.
• PSM (Power Saving Mode) – The network adapter will switch to power saving mode.
RTS Threshold – Use the slider or enter the RTS Threshold value into the field. By default 347.
Fragment Threshold – Use the slider or enter the Fragment Threshold value into the field. By
default 346.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
1

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Profile configuration –Auth \ Encry tab.
On this tab you can configure the authentication and encryption parameters required for
connection with a secured wireless network. You must obtain this information from the wireless
network administrator. The tab layout depends on the value selected from the Authentication
list:
• Open – Connection to an open wireless network does not require authentication. Data in
such networks are not encrypted or the WEP protocol is used for encryption.
• Shared – Authentication is performed after the station submits the WEP key via a secure
channel (independent of the wireless communication channel 80 .11). The WEP protocol is
used for encrypting data sent in such a network as well.
• WPA (CCKM capable) and WPA (CCKM capable) – (Windows 000/XP); Authentication is
performed using an 80 .1x protocol, and the TKIP and AES algorithms are (respectively)
used for encryption of transmitted data. They are safer than WEP encryption. CCKM capable
means that the CCKM (Cisco Central Key Management) function is supported. It enables
quick switching between wireless network access points based on Cisco network hardware.
• WPA and WPA – (Windows Vista/7); Authentication is performed using an 80 .1x protocol,
and the TKIP and AES algorithms are (respectively) used for encryption of transmitted data.
They are safer than WEP encryption. These modes are incompatible with the CCKM (Cisco
Central Key Management) function, which enables quick switching between wireless
network access points based on Cisco network hardware.
• WPA-PSK and WPA -PSK – Authentication is performed after the station submits the WPA
Preshared Key. The TKIP and AES algorithms are (respectively) used for encryption of
transmitted data. They are safer than WEP encryption. These modes are incompatible with
the CCKM (Cisco Central Key Management) function, which enables quick switching between
wireless network access points based on Cisco network hardware.
• CCKM – (Windows Vista/7); Authentication is performed using an 80 .1x protocol. The
transmitted data are encrypted with (depending on the network settings) WEP, TKIP or AES
algorithms. This mode is compatible with the CCKM (Cisco Central Key Management)
function, which enables quick switching between wireless network access points based on
Cisco network hardware.
• WAPI PSK – Authentication is performed after the station submits the WAPI key. The
transmitted data are encrypted with the SMS4 algorithm. It is stronger than WEP encryption,
but not as strong as AES.
• WAPI CERT – Authentication is performed using the authenticating server – ASU
(Authentication Service Unit). The transmitted data are encrypted with the SMS4 algorithm.
It is stronger than WEP encryption, but not as strong as AES.
13

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Authentication: Open or Shared
Authentication – Change the authentication type.
Encryption – Select the encryption algorithm: None (without encryption – only for Open
authentication type) or WEP.
Use 80 .1X – This option is only available for Open authentication and WEP encryption. Select
this option to use the 80 .1x protocol for authentication. This protocol supports real
authentication and user control. After enabling the 80 .1x protocol, you can go to 80 .1x tab
and change its parameters.
WEP Key / Key#1...4 – After selecting WEP encryption or Shared authentication, enter the
correct WEP key:
•If the WEP key is 64-bit, enter 10 hexadecimal (Hex) characters or 5 ASCII characters.
•If the WEP key is 1 8-bit, enter 6 hexadecimal (Hex) characters or 13 ASCII characters.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
Authentication: WPA(CCKM capable), WPA (CCKM capable), WPA, WPA , CCKM
Authentication – Change the authentication type.
Encryption – Select the encryption algorithm:
• AES (Advanced Encryption System) – uses symmetrical encryption of 1 8-bit blocks of data.
Default encryption algorithm for the WPA protocol.
• TKIP (Temporal Key Integrity Protocol) – uses stronger encryption algorithms, and with MIC
(Message Integrity Check) protects against hackers. Default encryption algorithm for the
WPA protocol.
• WEP (Wired Equivalent Privacy) – (only for CCKM); the simplest and the most unsafe data
encryption type in a wireless network.
14

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
WPA and WPA protocols, as well as CCKM-compatible WEP, use the 80 .1x protocol for
authentication. Hence, after you select the encryption algorithm, go to 80 .1x tab and
configure the 80 .1x protocol parameters.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
Authentication: WPA-PSK or WPA -PSK
Authentication – Change the authentication type.
Encryption – Select the encryption algorithm:
• AES (Advanced Encryption System) – uses symmetrical encryption of 1 8-bit blocks of data.
Default encryption algorithm for the WPA protocol.
• TKIP (Temporal Key Integrity Protocol) – uses stronger encryption algorithms, and with MIC
(Message Integrity Check) protects against hackers. Default encryption algorithm for the
WPA protocol.
WPA Preshared Key – Enter the WPA Preshared Key. The key should be 8-3 characters long.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
Authentication: WAPI-PSK
Authentication – Change the authentication type.
Encryption – For WAPI authentication, the only encryption algorithm available is SMS4.
WPA Preshared Key – Enter the WAPI authentication Key. The key should be a string of
hexadecimal (Hex) or ASCII characters.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
15

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Authentication: WAPI-CERT
Authentication – Change the authentication type.
Encryption – For WAPI authentication, the only encryption algorithm available is SMS4.
The WAPI protocol uses the authenticating server – ASU (Authentication Service Unit) for
authorization. Hence, after you select it, go to WAPI tab and configure its parameters.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
Profile configuration – 80 .1x tab
On this tab, you can configure the 80 .1x authentication parameters. You must obtain this
information from the wireless network administrator. The tab layout and available options
depend on values selected from EAP Method and Tunnel Authentication lists.
PEAP (Protected Extensible Authentication Protocol) – transfers, using tunnelling,
authentication data between PEAP clients and authentication server. PEAP can authenticate
clients of wireless LANs, using only server-side certificates. It simplifies deployment and
administration of a secure wireless network.
TLS/Smart Card – Transport Layer Security uses certificates and two-way client and network
authentication. TLS is based on authentication with server-side and client-side certificates. It
can also be used to dynamically generate WEP keys, based on the user or the session, which
are used to secure subsequent communications between the wireless network client and the
access point.
TTLS – Tunneled Transport Layer Security uses certificates and two-way client and network
authentication. Data required for authentication are sent via an encrypted channel. As opposed
to EAP-TLS, EAP-TTLS requires only server-side certificates.
EAP-FAST – Flexible Authentication via Secure Tunneling protocol was developed by Cisco.
Instead of using certificates, mutual authentication is effected using PAC (Protected Access
Credential), which can be dynamically managed by the authentication server. PAC can be
delivered (one-time distribution) to the client manually (distribution on a disk or via a secured
network connection) or automatically (distribution within a wireless network band).
MD5-Challenge – An EAP authentication type that delivers basic EAP support. Only one-way
authentication is supported, e.g. two-way client and network authentication is impossible. This
type is only available for Open authentication and WEP encryption.
16

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
ID \ PASSWORD tab
EAP Method – Change the EAP authentication method.
Tunnel Authentication – Change the tunnel authentication.
Session Resumption – Enable/disable session resumption.
Authentication ID / Password – Data for connection authentication:
• Identity – Enter the Identity for server.
• Password – Enter the Password for server.
• Domain Name – Enter the Domain Name for server.
Password Mode – Select the token verification method. Password mode change is only possible
for Generic Token Card tunnel authenticating:
• Soft Token – At each connection trial, a token will be generated to authenticate the station
on the authentication server
• Static Password – A static password to be entered in the Password field above.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
Client Certification tab
Use Client certificate – Select this option to use the client certificate, then select it from the list.
Below, certification information will be displayed:
• Issued To – To whom the certificate has been issued.
• Issued By – By whom the certificate has been issued.
• Expired On – Certificate expiration date.
• Friendly Name – Certificate friendly name.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
17

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Server Certification tab
Use certificate chain – Select this option to enable certification and select the certification
organization that issues the certificate.
Allow intermediate certificates – Select this option to enable intermediate certificates. They
must be present in the certification chain between the server certificate and the selected
certification organization.
Server name – Enter the authentication server name.
Server name must match – When selected, the server name must be exactly entered in
the Server name field.
Domain name must end in specified name – When selected, the server domain name must end
with the string entered in the Server name field.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
EAP FAST tab
Allow unauthenticated provision mode – Select this option to allow receiving unauthenticated
PAC.
Provisioning Tunnel – Select the protocol used by the provisioning protocol. Some protocols
require additional configuration.
Use protected authentication credential – Select this option to use a PAC file, and then
click Import button to select the file with PAC settings. Click Remove to stop using the PAC
settings file.
Import – Select the file that contains PAC settings to be imported.
Remove – Remove the PAC settings file selected on the list.
18

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
SSO tab
SSO (Single Sign-on) is a service that reduces the need of separate logins to many individual
services. Once logged in, the user has access to different services. In this case, SSO is used to
authenticate the user in the operating system (logging into the system) and in the wireless
network (authentication of the user's wireless station). The tab is unavailable in Windows
000/XP. In those systems, SSO configuration options are located on the SSO tab of the
configuration utility main navigation bar (see SSO tab on page 30).
Enable SSO (Single Sign On) – Turn on the SSO service. Then select the way in which the user
will submit the authentication data.
• Allow Machine Authentication – Select this option to authenticate the computer, not the
user.
• Authentication Type – Select the time in which wireless network authentication will take
place:
• Pre-logon – Before the user logs into the operating system.
• Post-logon – After the user logs into the operating system.
19

PENTAGRAM horNet Wi-Fi PCI [P 61 1-L7]
Profile configuration – WAPI tab
On this tab, you can configure WAPI authentication parameters. You must obtain this
information from the wireless network administrator. The wireless station can be authenticated
based on the user certificate (User Cert tab) or ASU authentication server (AS Cert tab).
User Cert tab
Use User certificate – Click the Browser button to select the file with certification information.
Below, information on the selected certificate will be displayed:
• Issued To – To whom the certificate has been issued.
• Issued By – By whom the certificate has been issued.
• Expired On – Certificate expiration date.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
AS Cert tab
Use Client certificate – Click the Browser button to select the file with certification information.
Below, information on the selected certificate will be displayed:
• Issued To – To whom the certificate has been issued.
• Issued By – By whom the certificate has been issued.
• Expired On – Certificate expiration date.
OK – Save the settings and close the profile configuration.
Cancel – Close the profile configuration without saving the settings.
0
Other manuals for horNET Wi-Fi PCI
4
This manual suits for next models
1
Table of contents
Other Pentagram Adapter manuals