Proxim 8482-WD User manual

WLAN 802.11 a/b/g
User Manual
Proxim
8482-WD

Chapter 1 About the WLAN 802.11a/b/g device.......................................................3
1-1 Introduction...........................................................................................................3
1-2 Using a Wireless Local Area Network..................................................................3
1-3 Features and Requirements...................................................................................4
Chapter 2 Network Configuring and Planning ............................................................5
2-1 Ad-Hoc Network...................................................................................................5
2-2 Access Point (Infrastructure) Network..................................................................6
Chapter 3 Atheros Client Utility Installation....................................................................7
3-1 Atheros Client Utility Installation.........................................................................7
Chapter 4 Atheros Client Utility (ACU) Configuration ............................................10
4-1 Atheros Client Utility icon..................................................................................10
4-2 Current Status Tab...............................................................................................11
4-3 Profile Management............................................................................................14
4-3-1 Create or Modify a Profile..............................................................................15
4-3-2 Security Settings in Profile Management........................................................17
4-3-3 Advanced settings in Profile Management......................................................21
4-4 Diagnostic Tab ....................................................................................................22
4-5 Action Menu .......................................................................................................23
4-5-1 Enable/Disable Radio ......................................................................................23
4-5-2 Enable/Disable Tray Icon ................................................................................23
Chapter 5 Wireless Configuration using Windows XP.....................................................24
5-1 Configuring Your Wireless Networking Settings................................................24
5-2 Advanced Wireless Settings................................................................................24
5-3 Disabling the Radio.............................................................................................25
5-4 Help and Support Information............................................................................25
Appendix A – Atheros Client Utility Uninstall Process....................................................26
Appendix B - Glossary......................................................................................................29
Appendix C –Wireless Notices .........................................................................................30

Chapter 1 About the WLAN 802.11a/b/g device
1-1 Introduction
The WLAN 802.11a/b/g device allows you to access Wireless Local Area Networks (WLANs),
share a local printer and files with others in your network, access the Internet, and roam about the
office—wirelessly. This wireless Local Area Network solution is designed for both large and small
businesses, and it is scalable so that you can add users and new network features as your
networking needs grow.
The WLAN 802.11a/b/g device is a dual band WLAN device that allows for access to both
2.4Ghz and 5Ghz WLAN technologies. The WLAN 802.11a/b/g device will operate with at a
maximum data rate of 11Mbps with 802.11b (2.4Ghz), 54Mbps with 802.11g (2.4Ghz) wireless
networks and a maximum data rate of 54Mbps with 802.11a (5Ghz) wireless networks. The
WLAN 802.11a/b/g device will automatically detect and seamlessly roam between both 802.11b
(2.4Ghz), 802.11g (2.4Ghz) and 802.11a (5Ghz) wireless networks
1-2 Using a Wireless Local Area Network
A wireless LAN provides the same functionality of a wired network, but it eliminates the need to
install networking cables and other networking equipment. Not only is a wireless LAN easier to
deploy, but it also allows for mobility through “roaming.” For example the WLAN 802.11a/b/g
device can roamfrom a conference room to anoffice without beingdisconnected fromthe network.

1-3 Features and Requirements
The WLAN 802.11a/b/g device includes the following features:
Wireless Features
•Support for the IEEE 802.11a standard
•Support for the IEEE 802.11b standard
•Operates within the 2.4-GHz band
•Operates within the 5Ghz band
•Maximum data rate of up to 54 Mbps (802.11a/g)
•Maximum data rate of up to 11 Mbps (802.11b)
Interoperability
•WiFi certified at 5Ghz to ensure wireless interoperability with other WiFi (802.11a)
certified devices.
•WiFi certified at 2.4Ghz to ensure wireless interoperability with other WiFi (802.11b)
certified devices.
Security
•Cisco Client Extension compatibility (including LEAP)
•Wired Equivalent Privacy (WEP) encryption, operating with 64bit, 128bit or 152 bit
encryption
•AES-CCM Encryption support
•Support for Windows 802.1X supplicants

Chapter 2 Network Configuring and Planning
Awireless LAN can be configured for two different modes of operation. While each method has its
advantages, one may be better suited for your needs. Review the following configurations to
determine which mode is best for you.
•Ad-Hoc Network
•Access Point (Infrastructure) Network
2-1 Ad-Hoc Network
An Ad-Hoc network is the simplest to deploy and is ideal for small offices. Ad-Hoc wireless
networks can be comprised of two or more wireless client configured to communicate with one
another. All Ad-hoc clients communicate directly with each other without using an access point
(AP). As a user on this type of network, you are able to quickly build up a wireless network in
order to share files with other employees, print to a shared office printer, and access the Internet
through a single shared connection.
Ad-hoc networking is cost effective, because no other devices components are needed (access
points, hubs or routers) in order to setup a network. However, with peer-to-peer Ad-Hoc
networking, your computer is only able to communicate with other nearby wireless clients.
Characteristics
Networked computers send data directly to each other
Advantages
•
Simple setup
•
Cost efficiency
Disadvantages
Communication is limited to nearby wireless clients
Figure 2-1

2-2 Access Point (Infrastructure) Network
An Access Point network is also referred to as an “Infrastructure” network. The key difference
between a wireless access point network and an Ad-Hoc network is the addition of one extra
element—the Access Point. TheAccess Point serves as the focal point for all data traffic on your
wireless network, optimally managing all wireless data transactions.
Additionally, the wireless Infrastructure can provide access to an existing wired LAN. This link
allows computers on the infrastructure wireless LAN to access the other wired LAN’s resources
and tools, including Internet access, email delivery, file transfer, and printer sharing.
Characteristics
Networked computers communicate with each other through a dedicated Access Point. All
data transmitted between the computers on this wireless LAN passes through the access point.
Advantages
•Extended range: The access point extends the range of the wireless LAN. Each wireless
client computer can communicate with other computers equipped with wireless devices
that are within the range of the access point.
•Roaming: As you move throughout the building, the WLAN 802.11a/b/g device will
automatically search for an access point to use, ensuring continuous communication with
the wireless network.
•
Network connectivity:An access point can provide wireless LAN access to an existing
wired network by bridging the two networks together. This gives users ofthe wireless LAN
access to corporate email, Internet, shared printers and files.
Disadvantages
Because this network mode offers more features, it requires additional components and setup
time to deploy
.
Figure 2-2

Chapter 3 Atheros Client Utility Installation
Note for Windows XPUsers: The Windows XP operating system has a built-in feature
known as “Wireless Zero Configuration” which has the capability to configure and control
the WLAN 802.11a/b/g device
(See Chapter 5). Installing the Wireless LAN Client utility
will disable this Windows XP feature. For most Windows XP users, it is recommended
that they do not install the Atheros Client Utility. Installation of the Atheros Client utility
is only needed if your wireless LAN network requires Cisco Client Extension or if you
want to use Atheros Client Utility instead of Windows XP Wireless Zero configuration
services.
3-1 Atheros Client Utility Installation
1. Begin installation by starting the software setup program according to the step described
below…
•Windows 2000 – Double click the desktop icon labeled “Software Setup”.
•Windows XP - Choose Start\Programs\Software Setup
2. Click Next on the Software Setup “Welcome” dialog box.
Figure 3-1

3. Scroll down and check the Box labeled, “Atheros Client Utility”.
Figure 3-2
4. Click on the Next button.
Figure 3-3

5. Congratulations! Atheros Client Utility has been installed successfully.
Please click ‘Finish’ to go to the next step.
Figure 3-4
6. The Atheros Client Utility will automatically be loaded each time your computer started. To
access the utility click on Atheros Client Utility icon in the system tray (Uninstall information can
be found inAppendix A)

Chapter 4 Atheros Client Utility (ACU) Configuration
The following sections describe the Atheros Client Utility (ACU). The ACU provides
quick access and friendly interface to configure the Wireless LAN settings. If you are
using Windows XP and have not installed the Atheros Client Utility, information on
configuring your WLAN 802.11a/b/g device using Windows XP Zero Configuration
feature can be found in Chapter 5.
4-1 Atheros Client Utility icon
The Atheros Client Utility icon will appear in the system tray each time your computer is
restarted.
To utilize the utility, double click on the ACU icon.
Figure 4-1
The Atheros Client Utility iconwill display the current status of the wireless connection. .
The number that appears in the upper left portion of the icon indicates the current
frequency (2.4 Ghz or 5 Ghz) that the radio is operating in, when the radio is in a no link
state the frequency band will toggle between 2.4 and 5 while it is scanning through those
frequencies. The following are the various states that can be displayed by the icon…
•Radio Disabled is indicates that the WLAN 802.11 a/b/g device has been disabled
through either Hardware or Software
•Yellow bars, then the signal strength is very small and the wireless connection is at
its limit of range
•Green bars indicate good or excellent signal strength is being received.
See Figure 4-1 for the various states of the Atheros Client Utility icon.

Figure 4-2
4-2 Current Status Tab
The current status tab displays the following information about your wireless connection.
•Profile Name –
The current name of the selected configuration profile.
•Network Type – The current type of wireless network that is either Access Point or
Ad-hoc.
•Wireless Mode – The current wireless mode is the frequency and data rate that has
been selected.
•Current Channel – Specifies the current channel that the WLAN 802.11 a/b/g is
connected to or scanning on.
•Link Status – The link can be either connected or disconnected to an Access point
or other wireless client.
•Encryption Type – Describes whether or not the wireless traffic is encrypting.
•IPAddress –The current IP address of the WLAN 802.11 a/b/g device.

Figure 4-3

The Advanced button provides more detailed information regarding your wireless
connection.
•Transmit Power Level – Provides current setting of Radio output power
•Network Name (SSID) – The wireless network name (SSID) that the device is
currently connected with
•Power Save Mode – The type of Power Savings that is configured on the device
•Frequency – The current frequency that the Wireless device is connected or
scanning on.
•Transmit Rate – The transmit rate (Mbps) for the current connection for the
wireless driver.
•Receive Rate –The receive rate (Mbps) for the current connection for the driver.
Figure 4-4

4-3 Profile Management
The Profile Management tab allows the user to configure several different user defined
profiles. Each profile can be configured to match the appropriate settings of a unique
wireless network.
The Profile box lists all the configured profiles. The Details dialog describes the basic
settings (SSID, Network Type, Security Mode) of the highlighted profile. The active
profile will be displayed with the wireless icon next to it. To make a profile active,
highlight the profile and click on the Activate button. By setting a Profile active, you
configure the wireless device to search for wireless networks that match up to those
specific profile wireless settings.
Figure 4-5
The Available networks button allows the user to view a list of all available wireless
network that are within range of the WLAN 802.11 a/b/g . Each wireless network entry
displays the SSID, encryption settings, signal strength level, channel and wireless mode
information. You can create a new profile utilizing Available networks button by
highlighting the wireless network you want to create a profile for and clicking on the
Activate button.

Figure 4-6
4-3-1 Create or Modify a Profile
1. From the Profile Management tab Click on the New or Modify button
2. The Network Configuration Settings dialog box will appear
3. In the Profile Name box, type in a unique name that describes the wireless network
you are configuring the settings to connect to.
4. In the SSID boxes type in the SSID that matches up with the wireless network you
are trying to configure the profile to connect with. There are three SSID selections
(SSID1, SSID2, SSID3) available; this feature allows you to configure a single
profile to match up to 3 different SSID’s.

Figure 4-7
5. Select the Security Tab to manage the security settings associated with this profile
Figure 4-8

6. Choose the security setting that is required on the wireless network. Once the
appropriate security mode is chosen the button next to the selection will enable you
to include any additional information required by that security mode.
4-3-2 Security Settings in Profile Management
The Security Tab allows you to configure the WLAN 802.11a/b/g device to matchthe security
settings of the Wireless LAN network.
Select the appropriate security mode…
•Pre-Shared Keys – This mode is commonly referred to as WEP encryption, and
allows for setting of all four WEP keys. The pre-shared key selection also allows for
setting of a unique key, which is used with higher forms of encryption such as AES.
•LEAP – This is CCX compliant feature that allows for authentication with Cisco
access points. This mode should only be used if your Wireless LAN requires LEAP
authentication
•Externally Managed 802.1X Keys – This security mode allows for dynamic
switching of encryption keys using 802.1X authentication. This mode should only be
used if your Wireless LAN requires 802.1X authentication.
•Disabled – Use this mode when there is no security authentication or encryption is
currently enabled on your Wireless LAN network.

Figure 4-9
Setting Pre-Shared Keys
Pre-Shared keys can be defined using the “Define Pre-Shared Keys” box
Figure 4-10

Key Entry Method – Determines the entry method for an encryption key:
•Hexadecimal (0-9, A-F)
•ASCII text (any keyboard characters, A-Z, 0-9).
PreUser Key – Defines the unique encryption key for networkconfiguration security. The Pre
User key is used with many authentication mechanism and encryption
Shared Keys – Determines a set of shared encryption keys (First, Second, Third, Fourth) used
for wireless encryption and security. At least one Shared Key field must be populated to
enable security using a shared key. If more then one key is defined then Click on the radio
button to select a key as the default encryption key.
Key Length – The options for Key Length are
•64 bit encryption (10 digits)
•128 bit encryption (26 digits)
•152 bit encryption (32 digits)
The number of available characters allowed to be entered in the encryption key field will
automatically be determined by the Key length setting.
Setting LEAP authentication
LEAP authentication is a part of CCX compatibility and allows you to configure the WLAN
802.11 a/b/g device to match the work with a Wireless LAN that incorporates LEAP
authentication. This mode should only be used if your Wireless LAN requires LEAP
authentication.
To configure the LEAP settings for a particular profile select LEAP in the security mode and
click on the Define LEAP settings button to configure the settings described below.
•Username – The username that is used to log in to the LEAP network
•Password – The password used to log in to the LEAP network. This password is
encrypted using the same encryption as the encryption keys.

Figure 4-11
Figure 4-12
Table of contents
Other Proxim PCI Card manuals