User's Manual

3
Table of Contents
REGULATORY INFORMATION...................................................................... 錯誤! 尚未定義書籤。
1. WELCOME............................................................................................................................................... 5
1.1 KIT CONTENTS...................................................................................................................................... 5
1.2 MAIN FEATURES OF 802.11A/B/G USB 2.0 ADAPTER ......................................................................... 5
1.3 WIRELESS NETWORKING SCENARIOS.................................................................................................. 6
2. QUICK START GUIDE .......................................................................................................................... 8
2.1 INSTALLATION....................................................................................................................................... 8
2.2 CONNECTING TO AN EXISTING NETWORK........................................................................................... 9
3. STEP-BY-STEP INSTRUCTIONS ......................................................................................................10
3.1 INSTALLATION.....................................................................................................................................10
3.2 CONNECTING TO A NETWORK.............................................................................................................15
3.3 CREATING AN AD HOC NETWORK .....................................................................................................19
3.4 REMOVING YOUR 802.11 A/B/G USB 2.0 ADAPTER...........................................................................21
3.5 UNINSTALLATION................................................................................................................................22
4. USING THE UTILITY ..........................................................................................................................24
4.1 CURRENT STATUS ...............................................................................................................................24
4.2 DIAGNOSTICS ......................................................................................................................................25
4.3 PROFILE MANAGEMENT.....................................................................................................................27
4.3.1 Creating or Modifying a Configuration Profile................................................. 28
4.3.2 Removing a Profile......................................................................................... 30
4.3.3 Profile Auto Selection..................................................................................... 31
4.3.4 Switching Profiles........................................................................................... 32
4.4 SECURITY............................................................................................................................................33
4.4.1 Using EAP-TLS Security................................................................................. 33
4.4.2 Enabling EAP-TLS Security ............................................................................ 34
4.4.3 Using EAP-TTLS Security............................................................................... 35
4.4.4 Enabling EAP-TTLS Security .......................................................................... 36
4.4.5 Using PEAP(EAP-GTC) Security .................................................................... 37
4.4.6 Enabling PEAP(EAP-GTC) Security................................................................ 38
4.4.7 Using PEAP-MSCHAP V2 Security ................................................................. 39
4.4.8 Enabling PEAP- MSCHAP V2 Security............................................................ 40
4.4.9 Using LEAP Security...................................................................................... 41
4.4.10 Configuring LEAP........................................................................................ 41