Manual
Page 6
... WEP Data Encryption, WPA, WPA2 1 up to 300 Mbps. Supports Green WLAN to reduce power consumption. Supports hardware/software WPS button High throughput supports multi-media data bandwidth requirement. Support 64/128-bit WEP Data Encryption, WPA, WPA2. Automatic fallback ... for purchasing this wireless network card is the best solution for you for some corporate and government users. It also supports WPA (Wi-Fi Protected Access) feature technology. This adapter is 300Mbps! Excepting common wireless standards 802.11b/g, this high-speed ...
... WEP Data Encryption, WPA, WPA2 1 up to 300 Mbps. Supports Green WLAN to reduce power consumption. Supports hardware/software WPS button High throughput supports multi-media data bandwidth requirement. Support 64/128-bit WEP Data Encryption, WPA, WPA2. Automatic fallback ... for purchasing this wireless network card is the best solution for you for some corporate and government users. It also supports WPA (Wi-Fi Protected Access) feature technology. This adapter is 300Mbps! Excepting common wireless standards 802.11b/g, this high-speed ...
Manual
Page 31
...; products due to be ASCII format. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP). WEP Key can be the WEP key. Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. WEP 802.1X - TKIP - Description Disabled - AES is the most advanced solution defined by you have to...
...; products due to be ASCII format. In contrast, WPA uses Temporal Key Integrity Protocol (TKIP). WEP Key can be the WEP key. Like WPA, WPA2 supports IEEE 802.1x/EAP authentication or PSK technology. WEP 802.1X - TKIP - Description Disabled - AES is the most advanced solution defined by you have to...
Manual
Page 32
... correct. Please enter network security key here to implement this function will display in the wireless network. Cisco controls the ability of your computer. TTLS supports any protocol within the network. Description Please enter network security key here again. After validating the server‟s certificate, the client presents a client certificate to...
... correct. Please enter network security key here to implement this function will display in the wireless network. Cisco controls the ability of your computer. TTLS supports any protocol within the network. Description Please enter network security key here again. After validating the server‟s certificate, the client presents a client certificate to...
Manual
Page 33
User‟s identity in the RADIUS server. Select the certificate for the authentication. Tunnel Username Identity Password Certificate including CHAP, MSCHAP, MSCHAPv2 and PAP. PEAP specifies that an EAP-compliant authentication protocol must be used; User‟s password in the RADIUS server. The client certificate is optional required for RADIUS server authentication . 28 The certificate username in the RADIUS server. Includes MD5, GTC, TLS, MSCHAP-v2. this adaptor supports MD5, TLS, GTC (Generic Token Card) and MSCHAPv2.
User‟s identity in the RADIUS server. Select the certificate for the authentication. Tunnel Username Identity Password Certificate including CHAP, MSCHAP, MSCHAPv2 and PAP. PEAP specifies that an EAP-compliant authentication protocol must be used; User‟s password in the RADIUS server. The client certificate is optional required for RADIUS server authentication . 28 The certificate username in the RADIUS server. Includes MD5, GTC, TLS, MSCHAP-v2. this adaptor supports MD5, TLS, GTC (Generic Token Card) and MSCHAPv2.
Manual
Page 49
... 5 GHz frequency band and applies it in the same 2.4 GHz frequency band as the extended rate PHY (ERP). What does IEEE 802.11 feature support? The product supports the following IEEE 802.11 functions: CSMA/CA plus Acknowledge Protocol Multi-Channel Roaming Automatic Rate Selection RTS/CTS...
... 5 GHz frequency band and applies it in the same 2.4 GHz frequency band as the extended rate PHY (ERP). What does IEEE 802.11 feature support? The product supports the following IEEE 802.11 functions: CSMA/CA plus Acknowledge Protocol Multi-Channel Roaming Automatic Rate Selection RTS/CTS...
Manual
Page 50
...the IEEE 802.11i WLAN security standard, and the specification might be officially released by early 2003. 9. Can Wireless products support printer sharing? Wireless products perform the same function as an independent wireless LAN. On the hardware side, as described ...5. Computers in WEP security, especially the reuse of scrambling. 4. On the software side, WLAN series offer the encryption function (WEP) to support printer or file sharing. 11. TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at a departmental scale for mobile ...
...the IEEE 802.11i WLAN security standard, and the specification might be officially released by early 2003. 9. Can Wireless products support printer sharing? Wireless products perform the same function as an independent wireless LAN. On the hardware side, as described ...5. Computers in WEP security, especially the reuse of scrambling. 4. On the software side, WLAN series offer the encryption function (WEP) to support printer or file sharing. 11. TKIP is a temporary protocol for replacing WEP security until manufacturers implement AES at a departmental scale for mobile ...
Datasheet
Page 1
... application available in idle. This wireless USB adapter smartly adjusts its power output according to connect supports WPS, the Edimax EW-7722UTn V2 will automatically set up to 300Mbps when connected to wireless 802.11n devices. The Edimax EW-7722UTn V2 wireless USB adapter supports both hardware (push-button) WPS and software WPS configuration. If the wireless device to which...
... application available in idle. This wireless USB adapter smartly adjusts its power output according to connect supports WPS, the Edimax EW-7722UTn V2 will automatically set up to 300Mbps when connected to wireless 802.11n devices. The Edimax EW-7722UTn V2 wireless USB adapter supports both hardware (push-button) WPS and software WPS configuration. If the wireless device to which...
Datasheet
Page 2
... WLAN to reduce power consumption Increases wireless coverage up to 5 times further** Includes multi-language EZmax setup wizard Supports 64/128-bit WEP, WPA , WPA2 encryption and WPS Supports WMM Supports software AP mode HARDWARE INTERFACE STANDARD USB 1.0/2.0 Type A x 1 Chip Antenna x 2 Hardware WPS button x...: 16dBm±1.5dBm CERTIFICATIONS CE, FCC NETWORK SETUP DIAGRAM AND RELATED PRODUCTS An example of how the EW-7722UTn V2 can be set up: • Connect the EW-7722UTn V2 wireless adapter to your computer • Set up the wireless connection with the multi-language EZmax wizard ...
... WLAN to reduce power consumption Increases wireless coverage up to 5 times further** Includes multi-language EZmax setup wizard Supports 64/128-bit WEP, WPA , WPA2 encryption and WPS Supports WMM Supports software AP mode HARDWARE INTERFACE STANDARD USB 1.0/2.0 Type A x 1 Chip Antenna x 2 Hardware WPS button x...: 16dBm±1.5dBm CERTIFICATIONS CE, FCC NETWORK SETUP DIAGRAM AND RELATED PRODUCTS An example of how the EW-7722UTn V2 can be set up: • Connect the EW-7722UTn V2 wireless adapter to your computer • Set up the wireless connection with the multi-language EZmax wizard ...
Quick Install Guide
Page 15
...499-377344 Fax: +31-499-372647 Email: sales@edimax.nl Support: support@edimax.nl USA Office Edimax Computer Company Add: 3350 Scott Blvd., Bldg. 15 Santa Clara, CA 95054, USA Tel: +1-408-4961105 Fax: +1-408-9801530 Email: sales@edimax.com Support: support@edimax.com 14 Add: 6F., No. 3, Wu-Chuan... 3rd Road, Wu-Gu, New Taipei City 24891, Taiwan (R.O.C.) Tel: +886-2-77396888 Fax: +886-2-77396887 Email: sales@edimax.com.tw Support: support@edimax.com.tw Europe Headquarters...
...499-377344 Fax: +31-499-372647 Email: sales@edimax.nl Support: support@edimax.nl USA Office Edimax Computer Company Add: 3350 Scott Blvd., Bldg. 15 Santa Clara, CA 95054, USA Tel: +1-408-4961105 Fax: +1-408-9801530 Email: sales@edimax.com Support: support@edimax.com 14 Add: 6F., No. 3, Wu-Chuan... 3rd Road, Wu-Gu, New Taipei City 24891, Taiwan (R.O.C.) Tel: +886-2-77396888 Fax: +886-2-77396887 Email: sales@edimax.com.tw Support: support@edimax.com.tw Europe Headquarters...
V2 User Manual
Page 4
... injury or could be damaged. PLEASE KEEP THIS NETWORK CARD OUT THE REACH OF CHILDREN! 1 data transfer rate is designed for high security level Supports operating system: Windows XP/Vista/7 * Maximum performance may vary depending on network conditions and environmental factors. 1-2 Safety Information In order to 300Mbps Increases Wireless... throw the network card, the card will be fatal. DO NOT put in summer. 3. Chapter I: Product Information 1-1 Introduction and safety information Thank you for purchasing Edimax EW-7722UTn high-speed wireless network card!
... injury or could be damaged. PLEASE KEEP THIS NETWORK CARD OUT THE REACH OF CHILDREN! 1 data transfer rate is designed for high security level Supports operating system: Windows XP/Vista/7 * Maximum performance may vary depending on network conditions and environmental factors. 1-2 Safety Information In order to 300Mbps Increases Wireless... throw the network card, the card will be fatal. DO NOT put in summer. 3. Chapter I: Product Information 1-1 Introduction and safety information Thank you for purchasing Edimax EW-7722UTn high-speed wireless network card!
V2 User Manual
Page 19
... device. B The type of this wireless device and the channel number of access point by this wireless device. Note: When the access point supports WPS and WPS icon is shown here. If the access point uses encryption, a key icon will appear when the access point... be displayed here, please check if the wireless device (access point or another computer) with the SSID you wish to -point connection) C The wireless standard supported by percentage. Scan result includes 6 types of information, they are: A B CD E A The SSID (Service Set Identifier) of the signal strength. 16 WPS icon ...
... device. B The type of this wireless device and the channel number of access point by this wireless device. Note: When the access point supports WPS and WPS icon is shown here. If the access point uses encryption, a key icon will appear when the access point... be displayed here, please check if the wireless device (access point or another computer) with the SSID you wish to -point connection) C The wireless standard supported by percentage. Scan result includes 6 types of information, they are: A B CD E A The SSID (Service Set Identifier) of the signal strength. 16 WPS icon ...
V2 User Manual
Page 21
... to a selected access point. WPS: If this access point complies with 802.11n draft, related information will be given below. CCX: If this access point supports CCX (Cisco Compatible eXtension), related information will be displayed here. 802.11n: If this access point...
... to a selected access point. WPS: If this access point complies with 802.11n draft, related information will be given below. CCX: If this access point supports CCX (Cisco Compatible eXtension), related information will be displayed here. 802.11n: If this access point...
V2 User Manual
Page 46
...(WPS) is the latest wireless network technology which makes wireless network setup become a WPS-enabled access point. Every WPS-compatible wireless network card support pin code configuration method; For older wireless access points, it , you want to establish a secure connection to it 's possible to perform a... firmware upgrade to must support WPS function too. To use an alternative WPS setup method - If you have WPS-enabled wireless access point, and you don't have to...
...(WPS) is the latest wireless network technology which makes wireless network setup become a WPS-enabled access point. Every WPS-compatible wireless network card support pin code configuration method; For older wireless access points, it , you want to establish a secure connection to it 's possible to perform a... firmware upgrade to must support WPS function too. To use an alternative WPS setup method - If you have WPS-enabled wireless access point, and you don't have to...
V2 User Manual
Page 47
... AP/Router automatically, no need any further setup process and security setting ...etc. in the adaptor utility. 2-7-2 WPS Setup - Right-click the Edimax configuration utility icon located at lower-right corner of the wireless AP/Router first. PBC (Push-Button Configuration) 1. Click 'WPS' menu, and ...the following settings will scan and connect with a secure wireless network. If the wireless AP/Router supports WPS feature, just press the WPS button of computer desktop and then click 'Launch Config Utility'. 2. The wireless adaptor will appear. 3.
... AP/Router automatically, no need any further setup process and security setting ...etc. in the adaptor utility. 2-7-2 WPS Setup - Right-click the Edimax configuration utility icon located at lower-right corner of the wireless AP/Router first. PBC (Push-Button Configuration) 1. Click 'WPS' menu, and ...the following settings will scan and connect with a secure wireless network. If the wireless AP/Router supports WPS feature, just press the WPS button of computer desktop and then click 'Launch Config Utility'. 2. The wireless adaptor will appear. 3.
V2 User Manual
Page 50
...'. 2. Remember it : 1. NOTE: If you experienced problem with the pin code provided here, you wish to the user manual of configuration utility. Right-click the Edimax configuration utility icon located at the upper-right position of your wireless access point as the WPS PIN code (Please refer to connect...
...'. 2. Remember it : 1. NOTE: If you experienced problem with the pin code provided here, you wish to the user manual of configuration utility. Right-click the Edimax configuration utility icon located at the upper-right position of your wireless access point as the WPS PIN code (Please refer to connect...
V2 User Manual
Page 59
When you wish to open your computer (and its internet connection) to the public. 3-2 Security Setting This wireless card supports wireless encryption in AP mode, which will encrypt the data being transferred over the air to enable data encryption unless you click 'Security Setting' in the utility, the following window will appear: 56 It's recommended to enhance data security level.
When you wish to open your computer (and its internet connection) to the public. 3-2 Security Setting This wireless card supports wireless encryption in AP mode, which will encrypt the data being transferred over the air to enable data encryption unless you click 'Security Setting' in the utility, the following window will appear: 56 It's recommended to enhance data security level.
V2 User Manual
Page 67
.../36/48/54Mbps 11n (20MHz): MCS0-7 (up to 144Mbps) 11n (40MHz): MCS0-7 (up to 300Mbps) Securities: WEP 64/128, WPA, WPA2, Cisco CCX Support Antenna: Internal Antennas Support hardware / software WPS button for wireless security Drivers: Windows 2000/XP/2003/Vista , MAC 10.4.x and above & Linux LED: Link/Activity Temperature: 32~104...
.../36/48/54Mbps 11n (20MHz): MCS0-7 (up to 144Mbps) 11n (40MHz): MCS0-7 (up to 300Mbps) Securities: WEP 64/128, WPA, WPA2, Cisco CCX Support Antenna: Internal Antennas Support hardware / software WPS button for wireless security Drivers: Windows 2000/XP/2003/Vista , MAC 10.4.x and above & Linux LED: Link/Activity Temperature: 32~104...
V2 User Manual
Page 72
...temporary protocol for digital information, wherever and however communicated or stored, while making more efficient use of scrambling. Can Wireless products support printer sharing? WLAN features two-fold protection in IEEE 802.11i standard. On the hardware side, as LAN products. Compare with... Would the information be officially released by early 2003. 8. On the software side, WLAN series offer the encryption function (WEP) to support printer or file sharing. 10. What is TKIP? AES (Advanced Encryption Standard), a chip-based security, has been developed to quickly ...
...temporary protocol for digital information, wherever and however communicated or stored, while making more efficient use of scrambling. Can Wireless products support printer sharing? WLAN features two-fold protection in IEEE 802.11i standard. On the hardware side, as LAN products. Compare with... Would the information be officially released by early 2003. 8. On the software side, WLAN series offer the encryption function (WEP) to support printer or file sharing. 10. What is TKIP? AES (Advanced Encryption Standard), a chip-based security, has been developed to quickly ...