User Manual

EUB9706 series --IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter Version 1.0
2
Table of Contents
1
INTRODUCTION......................................................................................................................................4
F
EATURES
&
B
ENEFITS
......................................................................................................................................4
P
ACKAGE
C
ONTENTS
.........................................................................................................................................5
USB
A
DAPTER
D
ESCRIPTION
............................................................................................................................5
S
YSTEM
R
EQUIREMENTS
...................................................................................................................................5
A
PPLICATIONS
....................................................................................................................................................5
N
ETWORK
C
ONFIGURATION
..............................................................................................................................6
2
USB ADAPTER FOR WINDOWS (XP & VISTA)...............................................................................7
B
EFORE
Y
OU
B
EGIN
..........................................................................................................................................7
I
NSTALLING THE
D
RIVERS
.................................................................................................................................7
P
ROFILES
..........................................................................................................................................................12
I
NFRASTRUCTURE
M
ODE
.................................................................................................................................12
A
D
-
HOC
M
ODE
.................................................................................................................................................13
A
UTHENTICATION AND
S
ECURITY
..................................................................................................................15
WEP Encryption.........................................................................................................................................15
WPA, WPA2 Authentication & TKIP, AES Encryption...........................................................................16
WPA-PSK Authentication & TKIP, AES Encryption...............................................................................16
LEAP Authentication..................................................................................................................................17
802.1x with PEAP ......................................................................................................................................18
PEAP Authentication with EAP/TLS Smartcard......................................................................................18
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2.................................................................19
802.1x CA Server........................................................................................................................................20
N
ETWORK
(S
ITE
S
URVEY
)...............................................................................................................................22
A
DVANCED
C
ONFIGURATION
..........................................................................................................................24
WPS .................................................................................................................................................................24
U
NINSTALL THE
D
RIVERS
&
C
LIENT
U
TILITY
................................................................................................26
3
USB ADAPTER FOR MAC OS X.........................................................................................................29
I
NSTALLING THE
D
RIVERS
...............................................................................................................................29
P
ROFILES
..........................................................................................................................................................31
I
NFRASTRUCTURE
M
ODE
.................................................................................................................................32
A
D
-
HOC
M
ODE
.................................................................................................................................................33
A
UTHENTICATION AND
S
ECURITY
..................................................................................................................35
WEP Encryption.........................................................................................................................................35
WPA-PSK Authentication & TKIP, AES Encryption...............................................................................36
L
INK
S
TATUS
....................................................................................................................................................36
S
ITE
S
URVEY
....................................................................................................................................................38
S
TATISTICS
.......................................................................................................................................................39
A
DVANCED
C
ONFIGURATION
..........................................................................................................................39
WPS .................................................................................................................................................................40
A
BOUT
..............................................................................................................................................................42
APPENDIX A – GLOSSARY...........................................................................................................................43
APPENDIX B – SPECIFICATIONS ..............................................................................................................55
APPENDIX C – FCC INTERFERENCE STATEMENT............................................................................56