User Manual
EUB9706 series --IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter  Version 1.0 
                      2 
Table of Contents 
1
INTRODUCTION......................................................................................................................................4
F
EATURES 
&
B
ENEFITS
......................................................................................................................................4
P
ACKAGE 
C
ONTENTS
.........................................................................................................................................5
USB
A
DAPTER 
D
ESCRIPTION
............................................................................................................................5
S
YSTEM 
R
EQUIREMENTS
...................................................................................................................................5
A
PPLICATIONS
....................................................................................................................................................5
N
ETWORK 
C
ONFIGURATION
..............................................................................................................................6
2
USB ADAPTER FOR WINDOWS (XP & VISTA)...............................................................................7
B
EFORE 
Y
OU 
B
EGIN
..........................................................................................................................................7
I
NSTALLING THE 
D
RIVERS
.................................................................................................................................7
P
ROFILES
..........................................................................................................................................................12
I
NFRASTRUCTURE 
M
ODE
.................................................................................................................................12
A
D
-
HOC 
M
ODE
.................................................................................................................................................13
A
UTHENTICATION AND 
S
ECURITY
..................................................................................................................15
WEP Encryption.........................................................................................................................................15
WPA, WPA2 Authentication & TKIP, AES Encryption...........................................................................16
WPA-PSK Authentication & TKIP, AES Encryption...............................................................................16
LEAP Authentication..................................................................................................................................17
802.1x with PEAP ......................................................................................................................................18
PEAP Authentication with EAP/TLS Smartcard......................................................................................18
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2.................................................................19
802.1x CA Server........................................................................................................................................20
N
ETWORK 
(S
ITE 
S
URVEY
)...............................................................................................................................22
A
DVANCED 
C
ONFIGURATION
..........................................................................................................................24
WPS .................................................................................................................................................................24
U
NINSTALL THE 
D
RIVERS 
&
C
LIENT 
U
TILITY
................................................................................................26
3
USB ADAPTER FOR MAC OS X.........................................................................................................29
I
NSTALLING THE 
D
RIVERS
...............................................................................................................................29
P
ROFILES
..........................................................................................................................................................31
I
NFRASTRUCTURE 
M
ODE
.................................................................................................................................32
A
D
-
HOC 
M
ODE
.................................................................................................................................................33
A
UTHENTICATION AND 
S
ECURITY
..................................................................................................................35
WEP Encryption.........................................................................................................................................35
WPA-PSK Authentication & TKIP, AES Encryption...............................................................................36
L
INK 
S
TATUS
....................................................................................................................................................36
S
ITE 
S
URVEY
....................................................................................................................................................38
S
TATISTICS
.......................................................................................................................................................39
A
DVANCED 
C
ONFIGURATION
..........................................................................................................................39
WPS .................................................................................................................................................................40
A
BOUT
..............................................................................................................................................................42
APPENDIX A – GLOSSARY...........................................................................................................................43
APPENDIX B – SPECIFICATIONS ..............................................................................................................55
APPENDIX C – FCC INTERFERENCE STATEMENT............................................................................56










