2. Select the profile to remove from the list of configuration profiles. 3. Click Remove. 4.3.3 Profile Auto Selection n Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network. n Including a profile in auto profile selection: 1. On the Profile Management tab, click Order Profiles. 2.
n Ordering the auto selected profiles: 1. On the Profile Management tab, click Order Profiles. 2. Highlight a profile in the Auto Selected Profiles box. 3. Click Move up or Move down as appropriate. 4. 5. 6. 7. Click OK. Check the Auto Selected Profiles box. Save the modified configuration file. With Auto Profile Selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network.
The list also provides icons that specify the Signal Strength for that profile. 4.4 Security You may select WPA, WPA Passphrase, 802.1x, Pre-Shared Key or None. 4.4.1 Using EAP-TLS Security To use EAP-TLS security in the Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click WPA/WPA2 or 802.1x. 2. Select EAP-TLS from the drop-down menu.
.4.2 Enabling EAP-TLS Security To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager. 1. Click Configure. 2. Select the appropriate certificate authority. Select Server Properties. The Server/Domain Name and the Login Name are filled in automatically from the certificate information. 3. Click OK again. 4. Activate the profile.
4.4.3 Using EAP-TTLS Security To use EAP-TTLS security in the WLAN 802.11a/b/g Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click WPA/WPA2 or 802.1x. 2. Select EAP-TTLS from the drop-down menu.
4.4.4 Enabling EAP-TTLS Security To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager. 1. Click Configure. 2. Select the appropriate certificate from the drop-down list and click OK. 3. Specify a user name for EAP authentication: ü Enter an EAP user name in the User Name field to use a separate user name and password and start the EAP authentication process. 4.
6. Enable the profile. 4.4.5 Using PEAP(EAP-GTC) Security To use PEAP-GTC security in the WLAN 802.11a/b/g Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click WPA/WPA2 or 802.1x. 2. Select PEAP(EAP-GTC) from the drop-down menu.
4.4.6 Enabling PEAP(EAP-GTC) Security To use PEAP-GTC security, the server must have the PEAP-GTC certificates, and the server properties must already be set. Check with the IT manager. 1. Click Configure. 2. Select the appropriate network certificate authority from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication: ü Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4.
ü The login name used for PEAP tunnel authentication, fills in automatically as PEAP-XXXXXXXXXX, where XXXXXXXXXX is the computer’s MAC address. Change the login name if needed. 6. Click OK. 7. Enable the profile. 4.4.7 Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security in the WLAN 802.11a/b/g Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click WPA/WPA2 or 802.1x. 2. Select PEAP- MSCHAP V2 from the drop-down menu.
4.4.8 Enabling PEAP- MSCHAP V2 Security To use PEAP-MSCHAP V2 security, the server must have the PEAP-MSCHAP V2 certificates, and the server properties must already be set. Check with the IT manager. 1. Click Configure. 2. Select the appropriate network certificate authority from the drop-down list. 3. Specify a user name for inner PEAP tunnel authentication: ü Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process. 4.
4.4.9 Using LEAP Security To use LEAP security in the WLAN 802.11a/b/g Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click WPA/WPA2 or 802.1x. 2. Select LEAP from the drop-down menu. 4.4.10 Configuring LEAP 1. Click Configure. 2.
3. 4. 5. 6. Option 1: Select to Use Temporary User Name and Password by choosing the radio button: (1) Manually Prompt for Leap User Name and Password is checked automatically. Option 2: Select to Use Saved User Name and Password by choosing the radio button: (1) Enter the user name and password. (2) Confirm the password. (3) Enter a specific domain name. Check the Include Windows Logon Domain with User Name setting to pass the Windows login domain and user name to the RADIUS server (default).
7. Enable the profile. 4.4.11 Using WPA Passphrase Security To use WEAP Passphrase security in the WLAN 802.11a/b/g Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click WPA/WPA2 Passphrase. 2. Click Configure. 3. Fill in the WPA Passphrase. 4. Click OK.
4.4.12 Using Pre-Shared Key (Static WEP) Security To use Pre-Shared Key (Static Web) security in the WLAN 802.11a/b/g Utility, access the Security tab in the Profile Management window. 1. On the Security tab, click Pre-Shared Key (Static WEP). 2. Click Configure. 3. Choose Hexadecimal or ASCII Text and then fill in the value of each WEP Key.
4.5 Display Setting To change the display settings, choose Options → Display Settings from the menu. The Display Settings dialog box contains tools to set the Signal Strength Display Units, Refresh Interval and Data Display. n Signal Strength Display Units: Sets the units used when displaying signal strength: percentage (%) or dBm. n Refresh Interval: Use the up/down arrows to set the display refresh interval in seconds. n Data Display: Sets the display to cumulative or relative.
5. Right clicking the tray icon Right-click on the tray icon to access the following options: n n n n n n n n n Help: Open the online help. Exit: Exit the Utility application. Open Adapter Utility: Launch the Utility. Preferences: Set the startup options and menu options for the Utility. Check whether the program should start automatically when Windows starts, and check the menu items that should appear on the popup menu. Enable/Disable Radio: Enable or disable the RF Signal.
6. Network Application This section consists of the network applications of 802.11a/b/g USB 2.0 Adapter, including: 1. To survey the network neighborhood 2. To share your folder with your network member(s) 3. To share your printer with your network member(s) 4. To access the shared folder(s)/file(s) of your network members(s) 5. To use the shared printer(s) of your network member(s) In fact, the network applications of WLAN 802.11a/b/g USB 2.0 Adapter are the same as they are in a wired network environment.
6.2 File Sharing 802.11a/b/g USB 2.0 Adapter allows the sharing of files between computers that are logged onto the same wireless network. If you want to share your folder “My Documents” with other computers of the wireless network, please highlight the folder “My Documents” and drag it to Shared Documents folder. Sharing files in the IEEE802.11a/b/g wireless network will be like sharing files on a wired LAN.
6.3 Using the Shared Folder If you would like to access a shared folder stored in other stations of same network, please follow the process below: 1. Double-click the “My Network Places” icon, and then double-click the computer where the shared folder is located. 2. Double-click the folder you want to connect to. 3. Now you may open the needed file(s). NOTE! If a password is required, the Windows will prompt a password column to you.