User's Manual
Table Of Contents
- Chapter I: Product Information
- CHAPTER II: Driver Installation and Configuration
- 2-1 Network Adapter Installation
- 2-2 Connect to Wireless Access Point
- 2-2-1 Using Realtek Utility
- NOTE: If you insert the USB wireless network adapter into an USB 3.0 port and connect to an 11ac AP, device driver will doing auto USB mode switch and shown the message as below photo, or you will heard sounds of USB insert or unplug, this is the norm...
- 2-2-2 Using Windows Zero Configuration
- 2-3 Connection Profile Management
- 2-3-1 Add a New Profile
- 2-3-2 Remove an Existing Profile
- If you have added a profile before, and you wish to change the content of the profile, you can use this function. Please select a profile from the list first, then click ‘Edit’ button. You’ll be provided with the contents of selected profile, and you ...
- 2-3-4 Make a Copy of an Existing Profile
- 2-4 View Network Statistics, General Information, and Status
- 2-4-1 General Information
- 2-4-2 Status
- 2-5 Miscellaneous Settings
- 2-6 Establish a Secure Connection with AP by WPS
- 3-1 Switch to AP Mode and Station Mode
- 3-1-2 Setup Soft-AP Security
- 3-2 Advanced Settings
- 3-3 Wireless Statistics
- 3-4 Internet Connection Sharing (ICS)
- 4-1 Hardware Specification
- 4-2 Troubleshooting
- 4-3 Glossary
54
a branch or SOHO operation.
5. What is Infrastructure?
An integrated wireless and wireless and wired LAN is called an
Infrastructure configuration. Infrastructure is applicable to enterprise
scale for wireless access to central database, or wireless application
for mobile workers.
6. What is BSS ID?
A specific Ad hoc LAN is called a Basic Service Set (BSS).
Computers in a BSS must be configured with the same BSS ID.
7. What is WEP?
WEP is Wired Equivalent Privacy, a data privacy mechanism based
on a 40 bit shared key algorithm, as described in the IEEE 802 .11
standard.
8. What is TKIP?
TKIP is a quick-fix method to quickly overcome the inherent
weaknesses in WEP security, especially the reuse of encryption keys.
TKIP is involved in the IEEE 802.11i WLAN security standard, and
the specification might be officially released by early 2003.
9. What is AES?
AES (Advanced Encryption Standard), a chip-based security, has
been developed to ensure the highest degree of security and
authenticity for digital information, wherever and however
communicated or stored, while making more efficient use of
hardware and/or software than previous encryption standards. It is
also included in IEEE 802.11i standard. Compare with AES, TKIP is
a temporary protocol for replacing WEP security until manufacturers
implement AES at the hardware level.
10. Can Wireless products support printer sharing?
Wireless products perform the same function as LAN products.
Therefore, Wireless products can work with Netware, Windows
2000, or other LAN operating systems to support printer or file
sharing.
11. Would the information be intercepted while transmitting on air?
WLAN features two-fold protection in security. On the hardware
side, as with Direct Sequence Spread Spectrum technology, it has
the inherent security feature of scrambling. On the software side,
WLAN series offer the encryption function (WEP) to enhance
security and Access Control. Users can set it up depending upon
their needs.