EnGenius Wireless USB Adapter
2
Table of Contents
1. INTRODUCTION ................................................................................................................4
1.1. P
ACKAGE CONTENTS
....................................................................................................4
1.2. USB A
DAPTER DESCRIPTION
.........................................................................................5
1.3. S
YSTEM REQUIREMENTS
...............................................................................................6
1.4. A
PPLICATIONS
..............................................................................................................7
1.5. N
ETWORK CONFIGURATION
...........................................................................................7
2. USB ADAPTER FOR WINDOWS .......................................................................................9
2.1. B
EFORE YOU BEGIN
......................................................................................................9
2.2. I
NSTALLING THE DRIVERS
............................................................................................10
2.3. P
ROFILES
..................................................................................................................13
2.3.1. I
NFRASTRUCTURE MODE
.............................................................................................14
2.3.2. AD-
HOC MODE
...........................................................................................................15
2.3.3. A
UTHENTICATION AND SECURITY
..................................................................................16
2.3.4. WEP Encryption ...................................................................................................16
2.3.5. WPA, WPA2 Authentication & TKIP, AES Encryption............................................17
2.3.6. WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption.........................18
2.3.7. LEAP Authentication.............................................................................................19
2.3.8. 802.1x with PEAP.................................................................................................20
2.3.9. PEAP Authentication with EAP/TLS Smartcard.....................................................20
2.3.10. 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2 ..............................21
2.3.11. 802.1x CA Server.............................................................................................22
2.4. N
ETWORK (SITE SURVEY
)............................................................................................24
2.5. A
DVANCED CONFIGURATION
........................................................................................26
2.6. S
TATISTICS
................................................................................................................27
2.7. WMM........................................................................................................................28
2.8. WPS.........................................................................................................................29
2.9. CCX .........................................................................................................................30
2.10. R
ADIO ON/OFF
............................................................................................................30
2.11. A
BOUT
.......................................................................................................................31
2.12. U
NINSTALL THE DRIVERS & CLIENT UTILITY
...................................................................32
3. USB ADAPTER FOR MAC OS X......................................................................................35
3.1. I
NSTALLING THE DRIVERS
............................................................................................35
3.2. P
ROFILES
..................................................................................................................38
3.2.1. I
NFRASTRUCTURE MODE
.............................................................................................39
3.2.2. AD-
HOC MODE
...........................................................................................................40
3.3. A
UTHENTICATION AND SECURITY
..................................................................................41
3.3.1. WEP Encryption ...................................................................................................41
3.3.2. WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption.........................42
3.4. L
INK STATUS
..............................................................................................................43
3.5. S
ITE SURVEY
.............................................................................................................45
3.6. S
TATISTICS
................................................................................................................46
3.7. A
DVANCED CONFIGURATION
........................................................................................46
3.8. WPS.........................................................................................................................47
3.9. A
BOUT
.......................................................................................................................49
APPENDIX A – GLOSSARY.....................................................................................................50
APPENDIX B – FCC INTERFERENCE STATEMENT ...............................................................62