Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual MOTOROLA WU830G. We hope that this MOTOROLA WU830G user guide will be useful to you.
Lastmanuals help download the user guide MOTOROLA WU830G.
Detailed instructions for use are in the User's Guide.
[. . . ] User Guide WU830G Wireless USB Adapter
Powe
r
Link
This device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product.
FCC Compliance Class B Digital Device
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. [. . . ] The passphrase should be 8 to 63 characters long. If you use a passphrase, you need to make sure that the WEP keys generated by that passphrase match the keys on the access point. If your wireless router/wireless access point is a Motorola product, the same passphrase will generate the same WEP keys. Transmit Key There are four available WEP keys. By setting the transmit key, you can specify which key (1 to 4) to use to encrypt the wireless packets. This is also known as the key index on some access points. If WEP 64-bit encryption is selected, then this field requires ten characters. If WEP 128-bit encryption is selected, then 26 characters are required. You may have to manually enter the key if the passphrase generates WEP keys that do not match the wireless router/wireless access point.
Key 1 through Key 4
WU830G
3-15
SECTION 3
WPA-PSK Authentication
CONFIGURATION
WPA-PSK is a pre-shared key authentication method. To use this method, you need to obtain the passphrase used by the access point to which you want to connect. Packets are encrypted based on the encryption method used. The following window displays the Motorola Security Configuration with WPA-PSK Authentication:
The following table lists the fields displayed when WPA-PSK authentication is used: Field Encryption Status Passphrase Description TKIP is the encryption algorithm used on the packets. Enter the same passphrase as the access point to which you want to connect. The passphrase should be 8 to 63 characters long.
3-16
WU830G
CONFIGURATION
WPA Authentication
SECTION 3
WPA authentication provides both packet encryption and network/user authentication. The packets are encrypted using the TKIP algorithm The network is authenticated to be the network you want to connect to Your identity is authenticated by the network
This security method does not require you to obtain a WPA passphrase. The server that authenticates your identity issues a WPA passphrase automatically once it accepts your identity. There are four different (Extensible Authentication Protocol) EAP methods that you can select on this window: !EAP-TLS EAP-TTLS EAP-PEAP LEAP
WU830G
3-17
SECTION 3
CONFIGURATION
The different EAP methods have been created to support different authentication methods and their associated network security policies. Depending on which EAP method you select, different fields are active. The following example window displays the Motorola Security Configuration window with WPA Authentication and the EAP-TTLS method selected:
3-18
WU830G
CONFIGURATION
SECTION 3
The following table lists the fields displayed when WPA authentication is used: Field Encryption Status EAP Method Description TKIP is the encryption algorithm used on the packets. There are four different (Extensible Authentication Protocol) EAP methods that you can select on this window: EAP-TLS This method requires a Login Name and Certificate issued by the RADIUS server to which you are connecting. Together, the login name and the certificate enable the RADIUS server to authenticate your identity. [. . . ] The protocol of the enclosing packet is understood by each endpoint, or tunnel interface, where the packet enters and exits the network. VPNs rely on tunneling to create a secure network. Tunneling requires the following protocol types: !A carrier protocol, such as TCP, used by the network that the data travels over An encapsulating protocol, such as IPSec, L2F, L2TP, or PPTP, that is wrapped around the original data A passenger protocol, such as IP, for the original data
U
UDP User Datagram Protocol. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE MOTOROLA WU830G
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual MOTOROLA WU830G will begin.