EnGenius Wireless USB Adapter User Manual

EnGenius
Wireless USB Adapter
User Manual
Version: 1.0
EnGenius Wireless USB Adapter
2
Table of Contents
1. INTRODUCTION ................................................................................................................4
1.1. P
ACKAGE CONTENTS
....................................................................................................4
1.2. USB A
DAPTER DESCRIPTION
.........................................................................................5
1.3. S
YSTEM REQUIREMENTS
...............................................................................................6
1.4. A
PPLICATIONS
..............................................................................................................7
1.5. N
ETWORK CONFIGURATION
...........................................................................................7
2. USB ADAPTER FOR WINDOWS .......................................................................................9
2.1. B
EFORE YOU BEGIN
......................................................................................................9
2.2. I
NSTALLING THE DRIVERS
............................................................................................10
2.3. P
ROFILES
..................................................................................................................13
2.3.1. I
NFRASTRUCTURE MODE
.............................................................................................14
2.3.2. AD-
HOC MODE
...........................................................................................................15
2.3.3. A
UTHENTICATION AND SECURITY
..................................................................................16
2.3.4. WEP Encryption ...................................................................................................16
2.3.5. WPA, WPA2 Authentication & TKIP, AES Encryption............................................17
2.3.6. WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption.........................18
2.3.7. LEAP Authentication.............................................................................................19
2.3.8. 802.1x with PEAP.................................................................................................20
2.3.9. PEAP Authentication with EAP/TLS Smartcard.....................................................20
2.3.10. 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2 ..............................21
2.3.11. 802.1x CA Server.............................................................................................22
2.4. N
ETWORK (SITE SURVEY
)............................................................................................24
2.5. A
DVANCED CONFIGURATION
........................................................................................26
2.6. S
TATISTICS
................................................................................................................27
2.7. WMM........................................................................................................................28
2.8. WPS.........................................................................................................................29
2.9. CCX .........................................................................................................................30
2.10. R
ADIO ON/OFF
............................................................................................................30
2.11. A
BOUT
.......................................................................................................................31
2.12. U
NINSTALL THE DRIVERS & CLIENT UTILITY
...................................................................32
3. USB ADAPTER FOR MAC OS X......................................................................................35
3.1. I
NSTALLING THE DRIVERS
............................................................................................35
3.2. P
ROFILES
..................................................................................................................38
3.2.1. I
NFRASTRUCTURE MODE
.............................................................................................39
3.2.2. AD-
HOC MODE
...........................................................................................................40
3.3. A
UTHENTICATION AND SECURITY
..................................................................................41
3.3.1. WEP Encryption ...................................................................................................41
3.3.2. WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption.........................42
3.4. L
INK STATUS
..............................................................................................................43
3.5. S
ITE SURVEY
.............................................................................................................45
3.6. S
TATISTICS
................................................................................................................46
3.7. A
DVANCED CONFIGURATION
........................................................................................46
3.8. WPS.........................................................................................................................47
3.9. A
BOUT
.......................................................................................................................49
APPENDIX A – GLOSSARY.....................................................................................................50
APPENDIX B – FCC INTERFERENCE STATEMENT ...............................................................62
EnGenius Wireless USB Adapter
3
EnGenius Wireless USB Adapter
4
1. Introduction
The high-speed wireless USB 2.0 client adapter is the most convenient way to let you put a desktop/notebook computer almost anywhere without the hassle of running network cables. Now you don’t need to suffer from drilling holes and exposed cables. Once you are connected, you can do anything, just like the wired network. It’s the best way to add wireless capability to your existing wired network.
To protect your wireless connectivity, the high-speed wireless USB 2.0 client adapter can encrypt all wireless transmissions with industrial standard encryption and authentication allowing you to experience the most secure wireless connectivity available.
The EnGenius Wireless USB Adapter implements 11N technology which extremely improves wireless signal for your computer than existing wireless 802.11b/g technology. The incredible speed of EnGenius USB adapter makes heavy traffic networking activities more flexible and takes the wireless into practical road. You could enjoy the racing speed of wireless connection, surfing on Internet without string wires.
Adding EnGenius Wireless USB Adapter to your laptop or desktop PC provides an excellent performance and cost-effective solution for doing media-centric activities such as streaming video and gaming.
1.1. Package Contents
Please make sure that none of the items listed below are missing. Do not discard the packing materials, in case of return; the unit must be shipped in its original package.
Wireless LAN USB Adapter x 1
CD-ROM with Drivers and User’s Manual Included x 1
Quick Installation Guide x 1
EnGenius Wireless USB Adapter
5
1.2. USB Adapter Description
A standard USB adapter can fit into any USB interface.
EUB9703
EUB9706, EUB9705 & EUB9801
EUB9707
PWR and LINK
LED Indicator
WPS button
PWR and LINK
LED Indicator
PWR and LINK
LED Indic
ator
WPS button
EnGenius Wireless USB Adapter
6
1.3. System Requirements
The following are the minimum system requirements in order to use the USB adapter.
PC/AT compatible computer with a USB interface.
Windows or Mac OS operating system.
40 MB of free disk space for installing the USB adapter driver and utility.
EnGenius Wireless USB Adapter
7
1.4. Applications
The wireless LAN products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of wireless LANs:
a) Difficult-to-wire environments
There are many situations where wires cannot be laid easily. Historic buildings, older buildings, open areas and across busy streets make the installation of LANs either impossible or very expensive.
b) Temporary workgroups
Consider situations in parks, athletic arenas, exhibition centers, disaster­recovery, temporary offices and construction sites where one wants a temporary WLAN established and removed.
c) The ability to access real-time information
Doctors/nurses, point-of-sale employees, and warehouse workers can access real-time information while dealing with patients, serving customers and processing information.
d) Frequently changed environments
Show rooms, meeting rooms, retail stores, and manufacturing sites where frequently rearrange the workplace.
e) Small Office and Home Office (SOHO) networks
SOHO users need a cost-effective, easy and quick installation of a small network.
f) Wireless extensions to Ethernet networks
Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs.
g) Wired LAN backup
Network managers implement wireless LANs to provide backup for mission-critical applications running on wired networks.
h) Training/Educational facilities
Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning.
1.5. Network Configuration
To better understand how the wireless LAN products work together to create a wireless network, it might be helpful to depict a few of the possible wireless LAN PC card network configurations. The wireless LAN products can be configured as:
a) Ad-hoc (or peer-to-peer) for departmental or SOHO LANs. b) Infrastructure for enterprise LANs.
a) Ad-hoc (peer-to-peer) Mode
This is the simplest network configuration with several computers equipped with the PC Cards that form a wireless network whenever they
EnGenius Wireless USB Adapter
8
are within range of one another. In ad-hoc mode, each client is peer-to­peer, would only have access to the resources of the other client and does not require an access point. This is the easiest and least expensive way for the SOHO to set up a wireless network. The image below depicts a network in ad-hoc mode.
b) Infrastructure Mode
The infrastructure mode requires an Access Point (AP). In this mode, all wireless communication between two computers has to go through the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations. The image below depicts a network in infrastructure mode.
EnGenius Wireless USB Adapter
9
2. USB Adapter for Windows
2.1. Before You Begin
During the installation, Windows may need to copy systems files from its installation CD. Therefore, you may need a copy of the Windows installation CD at hand before installing the drivers. On many systems, instead of a CD, the necessary installation files are archived on the hard disk in C:\WINDOWS \OPTIONS\CABS directory.
Wi-Fi Alliance certification recommends WPA2 AES to be the security mechanism under 11N mode. System driver will automatically bring down wireless data rate to 54Mbps if other security method such as WEP or WPA is used under 11n mode.
If your 11N router is using security mechanism other than WPA2 AES, you are recommended to disable security setting or change it to WPA2 AES to fully utilize 11N capability. This policy has no effect if connecting with b/g only wireless access point.
EnGenius Wireless USB Adapter
10
2.2. Installing the Drivers
Insert the CD provided in the package into your DVD/CD-ROM. The setup should run automatically. If the setup does not start shortly, please manually browse the file index.html with a standard file or web browser.
1. Click on Windows Driver to start the install process.
2. Once the setup begins you will see the InstallShield Wizard. Select Install driver and EnGenius WLAN Utility and then click on the Next> button.
EnGenius Wireless USB Adapter
11
3. Click on the Install button to begin the installation.
4. Wait for a few seconds until the driver and client utility is installed.
EnGenius Wireless USB Adapter
12
5. The installation is complete. Click on the Finish button.
6. Carefully insert the USB adapter into the USB port. Windows will then detect and install the new hardware.
7. An EG icon will then appear in the system tray. Right click on the EG icon and then click on Launch Config Utility.
Note: Click on Use Zero Configuration as Configuration Utility if you would like to use Windows Zero Configuration (XP only feature).
EnGenius Wireless USB Adapter
13
2.3. Profiles
The Profile tab is used to store the settings of multiple Access Points such as home, office, café, etc. When adding a profile you are required to enter a profile name and SSID as well as configure the power-saving mode, network type, RTS/fragmentation threshold and encryption/authentication settings. A profile can be configured as Infrastructure or Ad-hoc mode. The configuration settings for each mode are described below.
EnGenius Wireless USB Adapter
14
2.3.1. Infrastructure Mode
Profile: Enter a name for the profile; this does not need to be the same
as the SSID.
SSID: Enter the SSID of the network or select one from the drop-down
list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive.
PSM: Select a power saving mode (PSM) option.
o CAM (Continuously Active Mode): Select this option if your
notebook is always connected to the power supply.
o PSM (Power Saving Mode): Select this option if your notebook
uses its battery power. This option minimizes the battery usage while the network is idle.
Network Type: Select Infrastructure from the drop-down list.
TX Power: Select a transmit power from the drop-down list. If your
notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving.
RTS Threshold: Place a check in this box if you would like to enable
RTS Threshold. Any packet larger than the specified value (bytes) will send RTS/CTS handshake packets.
Fragment Threshold: Place a check in this box if you would like to
enable Fragment Threshold. Any packet larger than the specified value (bytes) will be fragmented.
Click on the OK button to save the changes.
EnGenius Wireless USB Adapter
15
2.3.2. Ad-hoc Mode
Profile: Enter a name for the profile; this does not need to be the same
as the SSID.
SSID: Enter the SSID of the network or select one from the drop-down
list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive.
Network Type: Select Ad-hoc from the drop-down list.
Preamble: Select Auto from the drop-down list, unless you are aware of
the preamble type (long or short) used in each station.
Channel: Displays the channel number of the Access Point.
TX Power: Select a transmit power from the drop-down list. If your
notebook is connected to external power then select 100% or auto, if not, select one of the lower values for power saving.
Click on the OK button to save the changes.
EnGenius Wireless USB Adapter
16
2.3.3. Authentication and Security
The Security tab allows you to configure the authentication and encryption settings such as: WEP, WPA, WPA-PSK, WPA2, WAPI and 802.1x. Each security option is described in detail below.
2.3.4. WEP Encryption
The WEP tab displays the WEP settings. Encryption is designed to make the data transmission more secure. You may select 64 or 128-bit WEP (Wired Equivalent Privacy) key to encrypt data (Default setting is Disable). WEP encrypts each frame transmitted from the radio using one of the Keys from a panel. When you use WEP to communicate with the other wireless clients, all the wireless devices in this network must have the same encryption key or passphrase. The following information is included in this tab, as the image depicts below.
Wi-Fi Alliance certification recommends WPA2 AES to be the security mechanism under 11N mode. System driver will automatically bring down wireless data rate to 54Mbps if other security method such as WEP or WPA is used under 11n mode.
If your 11N router is using security mechanism other than WPA2 AES, you are recommended to disable security setting or change it to WPA2 AES to fully utilize 11N capability. This policy has no effect if connecting with b/g only wireless access point.
EnGenius Wireless USB Adapter
17
Authentication Type: Select Open or Shared from the drop-down list.
Encryption: Select WEP from the drop-down list.
WEP Key (Hex or ASCII): Type a character string into the field. For 64-bit
enter 5 alphanumeric or 10 hexadecimal characters. For 128-bit enter 13 alphanumeric or 26 hexadecimal characters.
Click on the OK button to save the changes.
Show Password check box. If you want to make sure the accuracy of
password you type, click the Show Password box to check it.
2.3.5. WPA, WPA2 Authentication & TKIP, AES Encryption
WPA (Wi-Fi Protected Access) was designed to improve upon the security features of WEP (Wired Equivalent Privacy). This is used along with 802.1x security setting. The technology is designed to work with existing Wi-Fi products that have been enabled with WEP. WPA provides improved data encryption through the Temporal Key Integrity Protocol (TKIP), which scrambles the keys using a hashing algorithm and by adding an integrity-checking feature which makes sure that keys haven’t been tampered with. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.
EnGenius Wireless USB Adapter
18
Authentication Type: Select WPA or WPA2 from the drop-down list.
Encryption: Select TKIP or AES from the drop-down list.
Click on the OK button to save the changes.
Show Password check box. If you want to make sure the accuracy of
password you type, click the Show Password box to check it.
2.3.6. WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption
WPA–PSK (Pre-shared Key) is used in a Pre Shared Key mode that does not require an authentication server. Access to the Internet and the rest of the wireless network services is allowed only if the pre-shared key of the computer matches that of the Access Point. This approach offers the simplicity of the WEP key, but uses stronger TKIP encryption. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client.
EnGenius Wireless USB Adapter
19
Authentication Type: Select WPA-PSK or WPA2-PSK from the drop-down
list.
Encryption: Select TKIP or AES from the drop-down list.
WPA Preshared key: Enter a pass phrase which is between 8 and 32
characters long.
Click on the OK button to save the changes.
2.3.7. LEAP Authentication
LEAP (Lightweight Extensible Authentication Protocol) also known as Cisco­Wireless EAP provides username/password-based authentication between a wireless client and a RADIUS server. LEAP is one of several protocols used with the IEEE 802.1X standard for LAN port access control. LEAP also delivers a session key to the authenticated station, so that future frames can be encrypted with a key that is different than keys used by others sessions. Dynamic key delivery eliminates one big vulnerability; static encryption keys that are shared by all stations in the WLAN. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client
Loading...
+ 43 hidden pages