User manual MOTOROLA WIRELESS USB ADAPTER-WU830G

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual MOTOROLA WIRELESS USB ADAPTER-WU830G. We hope that this MOTOROLA WIRELESS USB ADAPTER-WU830G user guide will be useful to you.


MOTOROLA WIRELESS USB ADAPTER-WU830G : Download the complete user guide (2388 Ko)

You may also download the following manuals related to this product:

   MOTOROLA WIRELESS USB ADAPTER-WU830G WARRANTY (42 ko)
   MOTOROLA WIRELESS USB ADAPTER-WU830G QUICK START (236 ko)

Manual abstract: user guide MOTOROLA WIRELESS USB ADAPTER-WU830G

Detailed instructions for use are in the User's Guide.

[. . . ] User Guide WU830G Wireless USB Adapter Powe r Link This device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. FCC Compliance Class B Digital Device This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. [. . . ] No additional fields become active. WU830G 3-13 SECTION 3 Shared Authentication CONFIGURATION The following window displays the Motorola Security Configuration with Shared Authentication: 3-14 WU830G CONFIGURATION SECTION 3 The following table describes the encryption status and the fields that become active with that encryption status: Encryption Status WEP 64-bit or WEP 128-bit Description Select the same encryption that is used by your access point. Passphrase Some access points/wireless clients can use a passphrase instead of WEP keys. If you use a passphrase, you need to make sure that the WEP keys generated by that passphrase match the keys on the access point. If your wireless router/wireless access point is a Motorola product, the same passphrase will generate the same WEP keys. By setting the transmit key, you can specify which key (1 to 4) to use to encrypt the wireless packets. If WEP 64-bit encryption is selected, then this field requires ten characters. If WEP 128-bit encryption is selected, then 26 characters are required. You may have to manually enter the key if the passphrase generates WEP keys that do not match the wireless router/wireless access point. Key 1 through Key 4 WU830G 3-15 SECTION 3 WPA-PSK Authentication CONFIGURATION WPA-PSK is a pre-shared key authentication method. To use this method, you need to obtain the passphrase used by the access point to which you want to connect. The following window displays the Motorola Security Configuration with WPA-PSK Authentication: The following table lists the fields displayed when WPA-PSK authentication is used: Field Encryption Status Passphrase Description TKIP is the encryption algorithm used on the packets. Enter the same passphrase as the access point to which you want to connect. The passphrase should be 8 to 63 characters long. 3-16 WU830G CONFIGURATION WPA Authentication SECTION 3 WPA authentication provides both packet encryption and network/user authentication. The packets are encrypted using the TKIP algorithm The network is authenticated to be the network you want to connect to Your identity is authenticated by the network This security method does not require you to obtain a WPA passphrase. The server that authenticates your identity issues a WPA passphrase automatically once it accepts your identity. There are four different (Extensible Authentication Protocol) EAP methods that you can select on this window: !EAP-TLS EAP-TTLS EAP-PEAP LEAP WU830G 3-17 SECTION 3 CONFIGURATION The different EAP methods have been created to support different authentication methods and their associated network security policies. Depending on which EAP method you select, different fields are active. The following example window displays the Motorola Security Configuration window with WPA Authentication and the EAP-TTLS method selected: 3-18 WU830G CONFIGURATION SECTION 3 The following table lists the fields displayed when WPA authentication is used: Field Encryption Status EAP Method Description TKIP is the encryption algorithm used on the packets. There are four different (Extensible Authentication Protocol) EAP methods that you can select on this window: EAP-TLS This method requires a Login Name and Certificate issued by the RADIUS server to which you are connecting. Together, the login name and the certificate enable the RADIUS server to authenticate your identity. You can also choose to authenticate the identity of the RADIUS server by enabling the Validate Server Certificate check box. The four TTLS Protocols are: PAP CHAP MS CHAP MS CHAP v2 You can also choose to authenticate the RADIUS server identity by checking the Validate Server Certificate check box. WU830G 3-19 SECTION 3 EAP Method continued EAP-PEAP CONFIGURATION This method requires a Login Name and Password. [. . . ] Switch On an Ethernet network, a switch filters frames based on the MAC address, in a manner similar to a bridge. A switch is more advanced because it can connect more than two segments. WU830G 5-11 SECTION 5 T TCP GLOSSARY Transmission Control Protocol on OSI transport layer four, provides reliable transport over the network for data transmitted using IP (network layer three). It is an end-to-end protocol defining rules and procedures for data exchange between hosts on top of connectionless IP. TCP uses a timer to track outstanding packets, checks error in incoming packets, and retransmits packets if requested. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE MOTOROLA WIRELESS USB ADAPTER-WU830G




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual MOTOROLA WIRELESS USB ADAPTER-WU830G will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.