background image

Wireless Adapter 

RNX-N100                                                                                                                        User Manual

 

 

38 

 

 

 

Rescan:

 Click on this button to view a list of Access Points in the area. 

 

WPS Information:

 Display the information about WPS on the selected network. List 

information include Authentication Type, Encryption Type, Config Methods, Device 
Password ID, Selected Registrar, State, Version, AP Setup Locked, UUID-E and RF Bands 

 

Pin Code:

 8-digit numbers. It is required to enter PIN Code into 

Registrar

 using PIN method. 

When RNX-N2X is 

Enrollee

, you can use "Renew" button to re-generate new PIN Code.

 

 

Config Mode: 

The RNX-N2X role-playing as an 

Enrollee 

or an external 

Registrar 

 

Detail: 

Information about Security and Key in the credential.

 

 

Connect: 

Command to connect to the selected network inside credentials. The active 

selected credential is as like as the active selected Profile. 

 

Rotate:

 Command to rotate to connect to the next network inside credentials.

 

 

Disconnect:

 Stop WPS action and disconnect this active link. And then select the last 

profile at the Profile Page of RaUI if exist. If there is an empty profile page, the driver will 
select any non-security AP.

 

 

Export Profile:

 Export all credentials to Profile.

 

 

PBC:

 Start to add to AP using PBC configuration method.

 

 

WPS Associate IE:

 Send the association request with WPS IE during WPS setup. It is 

optional for RNX-2X

 

 

WPS Probe IE: 

Send the probe request with WPS IE during WPS setup. It is optional for 

RNX-2X 

 

Click on the 

OK

 button if you have made any changes. 

 

Summary of Contents for User for RNX-N100 RNX-N100

Page 1: ...Wireless Adater RNX N100 User Manual...

Page 2: ...Y 16 3 USB ADAPTER FOR WINDOWS 2000 XP 18 3 1 BEFORE YOU BEGIN 18 3 2 INSTALLING THE DRIVERS 18 3 3 PROFILES 21 3 3 1 Infrastructure Mode 21 3 3 2 Ad hoc Mode 23 3 4 AUTHENTICATION AND SECURITY 23 3 4...

Page 3: ...NTICATION AND SECURITY 47 4 3 1 WEP Encryption 47 4 3 2 WPA PSK Authentication TKIP AES Encryption 47 4 4 LINK STATUS 48 4 5 SITE SURVEY 49 4 6 STATISTICS 50 4 7 ADVANCED CONFIGURATION 51 4 8 ABOUT 53...

Page 4: ...networking activities more flexible and takes the wireless into practical road You could enjoy the racing speed of wireless connection surfing on Internet without string wires Adding Rosewill RNX N10...

Page 5: ...nimum system requirements in order to use the USB adapter PC AT compatible computer with a USB interface Windows 2000 XP Vista or MAC OS 10 3 10 4 10 5 operating system 30 MB of free disk space for in...

Page 6: ...Once the setup begins you will see the InstallShield Wizard Select Rosewill Configuration Tool and then click on the Next button Click on the Install button to begin the installation The installation...

Page 7: ...Configuration Utility if you would like to use Windows Zero Config 2 3 PROFILES The Profile tab is used to store the settings of multiple Access Points such as home office caf etc When adding a profi...

Page 8: ...ame as the SSID SSID Enter the SSID of the network or select one from the drop down list The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all p...

Page 9: ...SSID is a unique name shared among all points in your wireless network The SSID must be identical for all points in the network and is case sensitive Network Type Select Ad hoc from the drop down list...

Page 10: ...ion key or pass phrase The following information is included in this tab as the image depicts below Authentication Type Select Open or Shared from the drop down list Encryption Select WEP from the dro...

Page 11: ...rough the exchange of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client Authentication Type Select WPA or WPA2 from the dro...

Page 12: ...rver to interact with its counterpart in the client Authentication Type Select WPA or WPA2 from the drop down list Encryption Select TKIP or AES from the drop down list WPA Preshared key Enter a pass...

Page 13: ...l that the client is using infrastructure mode Link Speed The current rate at which the client is transmitting and receiving Throughput bytes sec Displays the Tx transmit and Rx receive kilo bytes per...

Page 14: ...ryption on the Access Point this includes WEP TKIP AES or None Authentication displays the authentication on the Access Point this includes WPA WPA PSK WPA2 or Unknown Network Type Indicates whether t...

Page 15: ...or WiFi Protected Setup By pressing this button the security settings of the device will automatically synchronize with other wireless devices on your network that support Wi Fi Protected Setup Rescan...

Page 16: ...sion and date 2 10 UNINSTALL THE DRIVERS CLIENT UTILITY If the USB client adapter installation is unsuccessful for any reason the best way to solve the problem may be to completely uninstall the USB a...

Page 17: ...nual 17 Click on the Yes button to confirm the un installation process The un installation process is complete Select Yes I want to restart my computer now radio button and then click on the Finish bu...

Page 18: ...e archived on the hard disk in C WINDOWS OPTIONS CABS directory 3 2 INSTALLING THE DRIVERS Follow the steps below in order to install the USB adapter drivers Insert the CD ROM that was provided to you...

Page 19: ...river and client utility is installed The installation is complete Click on the Finish button Carefully insert the USB adapter into the USB port Windows will then detect and install the new hardware A...

Page 20: ...Wireless Adapter RNX N100 User Manual 20 then click on Launch Config Utilities Note Click on Use Zero Configuration as Configuration Utility if you would like to use Windows Zero Config...

Page 21: ...tings A profile can be configured as Infrastructure or Ad hoc mode The configuration settings for each mode are described below 3 3 1 Infrastructure Mode The infrastructure mode requires the use of an...

Page 22: ...s option if your notebook uses its battery power This option minimizes the battery usage while the network is idle Network Type Select Infrastructure from the drop down list TX Power Select a transmit...

Page 23: ...as the SSID SSID Enter the SSID of the network or select one from the drop down list The SSID is a unique name shared among all points in your wireless network The SSID must be identical for all poin...

Page 24: ...WEP Wired Equivalent Privacy key to encrypt data Default setting is Disable WEP encrypts each frame transmitted from the radio using one of the Keys from a panel When you use WEP to communicate with...

Page 25: ...ion WPA Wi Fi Protected Access was designed to improve upon the security features of WEP Wired Equivalent Privacy The technology is designed to work with existing Wi Fi products that have been enabled...

Page 26: ...a Pre Shared Key mode that does not require an authentication server Access to the Internet and the rest of the wireless network services is allowed only if the pre shared key of the computer matches...

Page 27: ...based authentication between a wireless client and a RADIUS server LEAP is one of several protocols used with the IEEE 802 1X standard for LAN port access control LEAP also delivers a session key to t...

Page 28: ...e Authentication Protocol is an extension to the PPP protocol that enables a variety of authentication protocols to be used It passes through the exchange of authentication messages allowing the authe...

Page 29: ...ith TTLS with EAP MD5 MS CHAP MS CHAPv2 802 1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority 802 1X uses an existing protocol called...

Page 30: ...Enter the password Click on the OK button to save the changes 3 4 7 802 1x CA Server Depending on the EAP in use only the server or both the server and client may be authenticated and require a certi...

Page 31: ...Wireless Adapter RNX N100 User Manual 31...

Page 32: ...ertificate the signature is verified against a list of trusted certificate authorities If this parameter is true then the client will also accept a signature from a trusted intermediate certificate au...

Page 33: ...is using infrastructure mode Authentication Displays the authentication type Encryption Displays the encryption type Network Type Displays the network type infrastructure or ad hoc IP Address Display...

Page 34: ...among all points in your wireless network The SSID must be identical for all points in the network and is case sensitive Channel Displays the channel number of the Access Point Encryption Displays the...

Page 35: ...mode of 802 11g Selecting auto will dynamically send frames with and without protection Select On to send a frame without protection and Off to send it with protection Enable Tx BURST Click the check...

Page 36: ...Wireless Adapter RNX N100 User Manual 36 included is frames transmitted received successfully transmitted successfully without and after retry received with CRC error duplicate frames received etc...

Page 37: ...does not provide guaranteed throughput It is suitable for simple applications that require QoS such as Wi Fi Voice over IP VoIP phone WMM Enable Choose to enable or disable WMM WMM Power Save Enable C...

Page 38: ...n about Security and Key in the credential Connect Command to connect to the selected network inside credentials The active selected credential is as like as the active selected Profile Rotate Command...

Page 39: ...bout tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card firmware version and date 3 11 RADI...

Page 40: ...and repeat the installation procedure again Follow the steps below in order to uninstall the client utility Click on Start Rosewill Wireless Uninstall Rosewill Wireless USB Adapter The un installation...

Page 41: ...Wireless Adapter RNX N100 User Manual 41...

Page 42: ...he steps below in order to install the USB adapter drivers Insert the CD ROM that was provided to you in this package The setup should run automatically If the setup does not run automatically then yo...

Page 43: ...Wireless Adapter RNX N100 User Manual 43 Select the Macintosh HD and then click on the Continue button...

Page 44: ...l as configure the power saving mode network type RTS fragmentation threshold and encryption authentication settings A profile can be configured as Infrastructure or Ad hoc mode The configuration sett...

Page 45: ...lect a transmit power from the drop down list If your notebook is connected to external power then select 100 or auto if not select one of the lower values for power saving RTS Threshold Place a check...

Page 46: ...ower values for power saving Preamble Select Auto from the drop down list unless you are aware of the preamble type long or short used in each station Ad hoc wireless mode Select a wireless mode from...

Page 47: ...nicate with the other wireless clients all the wireless devices in this network must have the same encryption key or pass phrase The following information is included in this tab as the image depicts...

Page 48: ...change of authentication messages allowing the authentication software stored in a server to interact with its counterpart in the client Authentication Type Select WPA or WPA2 from the drop down list...

Page 49: ...d The current rate at which the client is transmitting and receiving Throughput bytes sec Displays the Tx transmit and Rx receive kilo bytes per second Link Quality In infrastructure mode this bar dis...

Page 50: ...nt this includes WEP TKIP AES or None Authentication displays the authentication on the Access Point this includes WPA WPA PSK WPA2 or Unknown Network Type Indicates whether the SSID is a Station Ad h...

Page 51: ...l 51 retry received with CRC error duplicate frames received etc 4 7 ADVANCED CONFIGURATION The Advanced tab is used to configure the wireless mode 802 11b only 802 11g only or 802 11b g mixed B G pro...

Page 52: ...he wireless network uses both 11b 11g and 11n stations and APs Tx Rate The transmit rate should be set to auto however you may manually select a transmit rate from the drop down list Tx BURST Click th...

Page 53: ...00 User Manual 53 4 8 ABOUT The About tab displays information about the device such as the network driver version and date configuration utility version and date and the NIC Network Interface Card fi...

Page 54: ...and receive RF signals AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple...

Page 55: ...something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A progr...

Page 56: ...sers on the Local Network but that is not protected by the same security as the Local Network DHCP Dynamic Host Configuration Protocol Used to automatically assign IP addresses from a predefined pool...

Page 57: ...ork that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network with different...

Page 58: ...ulticast group membership to adjacent routers IIS Internet Information Server is a WEB server and FTP server provided by Microsoft IKE Internet Key Exchange is used to ensure security for VPN connecti...

Page 59: ...from the one point to another on a network Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network A group of computers in a building that usually acce...

Page 60: ...st Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network Layer The third layer of the OSI model which handles the...

Page 61: ...ltiple computers to a remote server over Ethernet PPTP Point to Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communicat...

Page 62: ...HO Small Office Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line interface that allows for secure connections to remote computers SSID Service Set Identifier is a name for...

Page 63: ...Resource Locator is a unique address for files accessible on the Internet USB Universal Serial Bus UTP Unshielded Twisted Pair V Virtual Private Network VPN A secure tunnel over the Internet to connec...

Page 64: ...entication as well as encryption Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802 11...

Page 65: ...PSK DQPSK CCK Operating Channels 11 for North America 14 for Japan 13 for Europe Receive Sensitivity Typical 2 412 2 472G IEEE802 11b 1Rx 91dBm 1Mbps 87dBm 11Mbps 2 412 2 472G IEEE802 11g 2Rx 90dBm 6M...

Page 66: ...the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help F...

Reviews: