Proxim G11FNW-PC User manual

Proxim : G11FNW-PC
WLAN 802.11b/g
User Manual

Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for
a Class B digital device, pursuant to Part 15 of the FCC Rules. These
limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee
that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of
the following measures:
-Reorient or relocate the receiving antenna.
-Increase the separation between the equipment and receiver.
-Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is
subject to the following two conditions: (1) This device may not cause
harmful interference, and (2) this device must accept any interference
received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by
the party responsible for compliance could void the user's authority to
operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated
with minimum distance of 20cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any
other antenna or transmitter.
Proxim declaredthat G11FNW-PC is limited in CH1~11 by specified firmware
controlled in USA.

This device is intended only for OEM integrators under the following
conditions:
1) The antenna must be installed such that 20cm is maintained between the
antenna and users, and
2) The transmitter module may not be co-located with any other transmitter
or antenna.
As long as 2 conditions above are met, further transmitter test will not be
required. However, the OEM integrator is still responsible for testing their
end-product for any additional compliance requirements required with this
module installed (for example, digital device emissions, PC peripheral
requirements, etc.).
IMPORTANT NOTE: In the event that these conditionscan not be met (for
example certain laptop configurations or co-location with another transmitter),
then the FCC authorization is no longer considered valid and the FCC ID can
not be used on the final product. In these circumstances, the OEM integrator
will be responsible for re-evaluating the end product (including the transmitter)
and obtaining a separate FCC authorization.
End Product Labeling
This transmitter module is authorized only for use in device where the
antenna may be installed such that 20cm may be maintained between the
antenna and users (for example :Access Point). The final end
product must be labeled in a visible area with the following: “Contains TX FCC
ID: HZB-G11FNWPC”.
Manual Information That Must be Included
The OEM integrator has to be aware not to provide information to the end
user regarding how to install or remove this RF module in the users manual of
the end product which integrate this module.
The users manual for OEM integrators must include the following information
in a prominent location “ IMPORTANT NOTE: To comply with FCC RF
exposure compliance requirements, the antenna used for this transmitter
must be installed to provide a separation distance of at least 2.5 cm from all
persons and must not be co-located or operating in conjunction with any other
antenna or transmitter.

Chapter 1 About the PROXIM WLAN 802.11b/g device...........................................3
1-1 Introduction............................................................................................................3
1-2 Using a Wireless Local Area Network...................................................................3
1-3 Features and Requirements....................................................................................4
Chapter 2 Network Configuring and Planning.............................................................5
2-1 Ad-Hoc Network....................................................................................................5
2-2 Access Point (Infrastructure) Network..................................................................6
Chapter 3 Atheros Client Utility Installation................................................................7
3-1 Atheros Client Utility Installation..........................................................................7
Chapter 4 Atheros Client Utility (ACU) Configuration.............................................10
4-1 Atheros Client Utility icon...................................................................................10
4-2 Current Status Tab...............................................................................................11
4-3 Profile Management.............................................................................................13
4-3-1 Create or Modify a Profile........................................................................14
4-3-2 Security Settings in Profile Management.................................................16
4-3-3 Advanced settings in Profile Management...............................................20
4-4 Diagnostic Tab.....................................................................................................21
4-5Action Menu ........................................................................................................22
4-5-1 Enable/Disable Radio...............................................................................22
4-5-2 Enable/Disable Tray Icon.........................................................................22
Chapter 5 Wireless Configuration using Windows XP ......................................................23
5-1 Configuring Your Wireless Networking Settings ................................................23
5-2 Advanced Wireless Settings.................................................................................23
5-3 Disabling the Radio .............................................................................................24
5-4 Help and Support Information.............................................................................24
Appendix A -Atheros Client Utility Uninstall Process.....................................................25
Appendix B -Glossary.......................................................................................................28
Appendix C –Wireless Notice...........................................................................................29

Chapter 1 About the PROXIM WLAN 802.11b/g
device
1-1 Introduction
The PROXIM WLAN 802.11b/g device allows you to access Wireless Local Area Networks
(WLANs),share a local printer and files with others in your network, access the Internet, and roam
about the office—wirelessly. This wireless Local Area Network solution is designed for both large
and small businesses, and it is scalable so that you can add users and new network features as your
networking needs grow.
The PROXIM WLAN 802.11b/g device is a 2.4Ghz WLAN technology that will operate with at a
maximum data rate of 11Mbps with 802.11b and maximum data rate of 54Mbps with 802.11g
wireless networks.ThePROXIM WLAN 802.11b/g device will automatically detect and
seamlessly roam between both 802.11b and 802.11g wireless networks.
1-2 Using a Wireless Local Area Network
A wireless LAN provides the same functionality of a wired network, but it eliminates the need to
install networking cables and other networking equipment. Not only is a wireless LANeasier to
deploy, but it also allows for mobility through “roaming.”For example the PROXIM WLAN
802.11b/g device can roam from a conference room to an office without being disconnected from
the network.

1-3 Features and Requirements
The PROXIM WLAN 802.11b/g device includes the following features:
Wireless Features
•Support for the IEEE 802.11bstandard
•Support for the IEEE 802.11g standard
•Operates within the 2.4-GHz band
•Maximum data rate of up to 11 Mbps (802.11b)
•Maximum data rate of up to 54 Mbps (802.11g)
Interoperability
•WiFi certified at 2.4GHz to ensure wireless interoperability with other WiFi (802.11b)
certified devices.
Security
•Cisco Client Extension compatibility (including LEAP)
•Wired Equivalent Privacy (WEP) encryption, operating with 64bit, 128bit or 152 bit
encryption
•AES-CCM Encryption support
•Support for Windows 802.1X supplicants

Chapter 2 Network Configuring and Planning
A wireless LAN can be configured for twodifferent modes of operation. While each method has its
advantages, one may be better suited for your needs. Review the following configurations to
determine which mode is best for you.
•Ad-Hoc Network
•Access Point (Infrastructure)Network
2-1 Ad-Hoc Network
AnAd-Hoc network is the simplest to deploy and is ideal for small offices. Ad-Hoc wireless
networks can be comprised of two or more wirelessclient configured to communicate with one
another. All Ad-hoc clients communicate directly with each other without using an access point
(AP). As a user on this type of network, you are able to quickly build up a wireless network in order
to share files with other employees, print to a sharedoffice printer, and access the Internet through
a single shared connection.
Ad-hoc networking is cost effective, because no other devices components are needed (access
points, hubs or routers) in order to setup a network. However, with peer-to-peer Ad-Hoc
networking, your computer is only able to communicate with other nearbywireless clients.
Characteristics
Networked computers send data directly to each other
Advantages
•Simple setup
•Cost efficiency
Disadvantages
Communication is limited to nearby wireless clients
Figure 2-1

2-2 Access Point (Infrastructure) Network
AnAccess Point network is also referred to as an “Infrastructure” network. The key difference
betweena wireless access point network and anAd-Hoc network is the addition of one extra
element—the Access Point. The Access Point serves as the focal point for all data traffic on your
wireless network, optimally managing all wireless data transactions.
Additionally, the wireless Infrastructure can provide access to an existing wired LAN. This link
allows computers on the infrastructure wireless LAN to access the other wired LAN’s resources
and tools, including Internet access, email delivery, file transfer, and printer sharing.
Characteristics
Networked computers communicate with each other through a dedicated AccessPoint. All
data transmitted between the computers on this wireless LAN passes through the access point.
Advantages
•Extended range: The access point extends the range of the wireless LAN. Each wireless
client computer can communicate with other computers equipped with wireless devices
that are within the range of the access point.
•Roaming: As you move throughout the building, the PROXIM WLAN 802.11b/g device
will automatically search for an access point to use, ensuring continuous communication
with the wireless network.
•Network connectivity: An access point can provide wireless LAN access to an existing
wired network by bridging the two networks together. This gives users of the wireless LAN
access to corporate email, Internet,shared printers and files.
Disadvantages
Because this network mode offers more features, it requires additional components and setup
time to deploy.
Figure 2-2

Chapter 3 Atheros Client UtilityInstallation
Note for Windows XP Users: The Windows XP operating system has abuilt-in feature
known as “Wireless Zero Configuration” which has the capabilityto configure and control
the PROXIM WLAN 802.11b/g device (See Chapter 5). Installing the Wireless LAN Client
utility will disable this Windows XP feature.For most Windows XP users, it is
recommended that they do not install the Atheros Client Utility. Installation of the Atheros
Client utility is only needed if your wireless LAN network requires Cisco Client Extension
or if you want to use Atheros Client Utility instead of Windows XP Wireless Zero
configuration services.
3-1 Atheros Client Utility Installation
1. Begin installation by starting the software setup program according to the step described
below…
•Windows 2000 –Double click the desktop icon labeled “Software Setup”.
•Windows XP -Choose Start\Programs\Software Setup
2. Click Next on the Software Setup “Welcome” dialog box.
Figure 3-1

3.Scroll down and check the Box labeled, “Atheros Client Utility”.
Figure 3-2
4. Click on the Next button.
Figure 3-3

5. Congratulations! Atheros Client Utility has been installed successfully.
Please click ‘Finish’to go to the next step.
Figure 3-4
6. The Atheros Client Utility will automatically be loaded each time your computer started. To
access the utility click on Atheros Client Utility icon in the system tray (Uninstall information
can be found in Appendix A)

Chapter4Atheros Client Utility(ACU) Configuration
The following sections describe the Atheros Client Utility(ACU). The ACU provides
quick access and friendly interface to configure the Wireless LAN settings.If you are
using Windows XP and have not installed the Atheros Client Utility, information on
configuring your PROXIMWLAN 802.11b/g device using Windows XPZero
Configuration feature can be found in Chapter 5.
4-1 Atheros Client Utility icon
The Atheros Client Utility icon will appear in the system trayeach time your computer is
restarted.To utilize the utility, double click on the ACU icon.
Figure 4-1
The Atheros Client Utility icon will display the current status of the wireless connection.
The following are the various states that can be displayed by the icon…
•Radio Disabled indicates that the PROXIM WLAN 802.11b/g radio has been
disabled through either Hardware or Software
•Yellow bars, then the signal strength is very small and the wireless connection is at
its limit of range
•Green bars indicate good or excellent signal strength is being received.
See Figure 4-1 shows the various states of the Atheros Client Utility icon.
Figure 4-2

4-2 Current Status Tab
The current status tab displays the following information about your wireless connection.
•Profile Name –The current name of the selected configuration profile.
•Network Type –The current type of wireless network thatis either Access Point or
Ad-hoc.
•Wireless Mode –The current wireless mode is the frequencyand data rate that has
been selected.
•Current Channel –Specifies the current channel that the PROXIM WLAN
802.11b/g is connected to or scanning on.
•Link Status –The link can be either connected or disconnectedto an Access point
or other wireless client.
•Encryption Type –Describes whether or not the wireless traffic is encrypting
•IP Address –The current IP address of the PROXIMWLAN 802.11b/g
Figure 4-3

The Advanced button provides more detailed information regarding your wireless
connection.
•Transmit Power Level –Provides current setting of Radio output power
•Network Name (SSID)–The wireless network name (SSID) that the device is
currently connected with
•Power Save Mode –The type of Power Savings that is configured on the device
•Frequency –The current frequency that the Wireless device is connected or
scanning on.
•Transmit Rate –The transmit rate (Mbps) for the current connection for the
wireless driver.
•Receive Rate –The receive rate (Mbps) for the current connection for the driver.
Figure 4-4

4-3Profile Management
The Profile Management tab allows the user to configure several different user defined
profiles. Each profile can be configured to match the appropriate settings of a unique
wireless network.
The Profile box lists all the configured profiles. The Details dialog describes the basic
settings (SSID, Network Type, Security Mode) of the highlighted profile. The active
profile will be displayed with the wireless icon next to it. To make a profile active,
highlight the profile and click on the Activate button. By setting a Profile active, you
configure the wireless device to search for wireless networks that match up to those
specific profile wireless settings.
Figure 4-5
The Available networks button allows the user to view a list of all available wireless
networkthat are within range of the PROXIM WLAN 802.11b/g . Each wireless network
entry displays the SSID, encryption settings, signalstrength level, channel and wireless
mode information.You can create a new profile utilizing Available networks button by
highlighting the wireless network you want to create a profile for and clicking on the
Activate button.

Figure 4-6
4-3-1Create or Modify a Profile
1. From the Profile Management tab Click on the New or Modify button
2. The Network Configuration Settings dialog box will appear
3. In the Profile Name box, type in a unique name that describes the wireless network
you are configuring the settings to connect to.
4. In the SSID boxes type in the SSID that matches up with the wireless network you
are trying to configure the profile to connect with. There are three SSID selections
(SSID1, SSID2, SSID3) available; this featureallows you to configure a single
profile to match up to 3 different SSID’s.

Figure 4-7
5. Select the Security Tabto manage the security settings associated with this profile
Figure 4-8

6. Choose the security setting that is required on the wireless network. Once the
appropriate security mode is chosen the buttonnext to the selection will enable you
to include any additional information required by that security mode.
4-3-2 Security Settings in Profile Management
The Security Tab allows you to configure the PROXIMWLAN 802.11b/g device to match the
security settings of the Wireless LAN network.
Select the appropriate security mode…
•Pre-Shared Keys –This mode is commonly referred to as WEPencryption, and
allows for setting of all four WEP keys. The pre-shared key selection also allows for
setting of a unique key, which is used with higher forms of encryption such as AES.
•LEAP–This is CCX compliant feature thatallows for authentication with Cisco
access points. This mode should only be used if your Wireless LAN requires LEAP
authentication
•Externally Managed 802.1X Keys –This security mode allows for dynamic
switching of encryption keys using 802.1X authentication. This mode should only be
used if your Wireless LAN requires 802.1X authentication.
•Disabled–Use this mode when there is no security authentication or encryption is
currently enabled on your Wireless LAN network.

Figure 4-9
Setting Pre -Shared Keys
Pre-Shared keys can be defined using the “Define Pre-Shared Keys” box
Figure 4-10

Key Entry Method–Determines the entry method for an encryption key:
•Hexadecimal (0-9, A-F)
•ASCII text (any keyboard characters, A-Z, 0-9).
PreUserKey–Defines the unique encryption key for network configuration security. ThePre
User key is used with many authentication mechanismand encryption
SharedKeys –Determines a set of shared encryption keys(First, Second, Third, Fourth) used
for wireless encryption and security. At least one Shared Key field must be populated to enable
security using a shared key. If more then one key is defined then Click on the radio button to
select a key as the default encryption key.
Key Length –The options for Key Length are
•64 bit encryption (10 digits)
•128 bit encryption (26 digits)
•152 bit encryption (32 digits)
The number of available charactersallowed to be entered in the encryption key field will
automatically be determined by the Key length setting.
Setting LEAP authentication
LEAP authentication is a part of CCX compatibility and allows you to configure the PROXIM
WLAN 802.11b/g device to match the work with a Wireless LAN that incorporates LEAP
authentication.This mode should only be used if your Wireless LAN requires LEAP
authentication.
To configure the LEAP settings for a particular profile select LEAP in the security mode and
click on the Define LEAP settings button to configure the settings described below.
•Username –The username that is used to log in to the LEAP network
•Password –The password used to log in to the LEAP network. This password is
encrypted using the same encryption as the encryption keys.
Table of contents
Other Proxim Wireless Router manuals