EnGenius Wireless USB
Adapter
2
Table of Contents
1.
INTRODUCTION ................................................................................................................4
1.1.
P
ACKAGE
C
ONTENTS
....................................................................................................4
1.2.
USB
A
DAPTER
D
ESCRIPTION
.........................................................................................5
1.3.
S
YSTEM
R
EQUIREMENTS
...............................................................................................6
1.4.
A
PPLICATIONS
..............................................................................................................7
1.5.
N
ETWORK
C
ONFIGURATION
...........................................................................................7
2.
USB ADAPTER FOR WINDOWS .......................................................................................9
2.1.
B
EFORE
Y
OU
B
EGIN
......................................................................................................9
2.2.
I
NSTALLING THE
D
RIVERS
............................................................................................ 10
2.3.
P
ROFILES
.................................................................................................................. 13
2.3.1.
I
NFRASTRUCTURE
M
ODE
............................................................................................. 14
2.3.2.
A
D
-
HOC
M
ODE
........................................................................................................... 15
2.3.3.
A
UTHENTICATION AND
S
ECURITY
.................................................................................. 16
2.3.4.
WEP Encryption ................................................................................................... 16
2.3.5.
WPA, WPA2 Authentication & TKIP, AES Encryption............................................ 17
2.3.6.
WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption ......................... 18
2.3.7.
LEAP Authentication............................................................................................. 19
2.3.8.
802.1x with PEAP................................................................................................. 20
2.3.9.
PEAP Authentication with EAP/TLS Smartcard ..................................................... 20
2.3.10.
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2 .............................. 21
2.3.11.
802.1x CA Server ............................................................................................. 22
2.4.
N
ETWORK
(S
ITE
S
URVEY
)............................................................................................ 24
2.5.
A
DVANCED
C
ONFIGURATION
........................................................................................ 26
2.6.
S
TATISTICS
................................................................................................................ 27
2.7.
WMM........................................................................................................................ 28
2.8.
WPS......................................................................................................................... 29
2.9.
CCX ......................................................................................................................... 30
2.10.
R
ADIO ON
/
OFF
............................................................................................................ 30
2.11.
A
BOUT
....................................................................................................................... 31
2.12.
U
NINSTALL THE
D
RIVERS
&
C
LIENT
U
TILITY
................................................................... 32
3.
USB ADAPTER FOR MAC OS X...................................................................................... 35
3.1.
I
NSTALLING THE
D
RIVERS
............................................................................................ 35
3.2.
P
ROFILES
.................................................................................................................. 38
3.2.1.
I
NFRASTRUCTURE
M
ODE
............................................................................................. 39
3.2.2.
A
D
-
HOC
M
ODE
........................................................................................................... 40
3.3.
A
UTHENTICATION AND
S
ECURITY
.................................................................................. 41
3.3.1.
WEP Encryption ................................................................................................... 41
3.3.2.
WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption ......................... 42
3.4.
L
INK
S
TATUS
.............................................................................................................. 43
3.5.
S
ITE
S
URVEY
............................................................................................................. 45
3.6.
S
TATISTICS
................................................................................................................ 46
3.7.
A
DVANCED
C
ONFIGURATION
........................................................................................ 46
3.8.
WPS......................................................................................................................... 47
3.9.
A
BOUT
....................................................................................................................... 49
APPENDIX A – GLOSSARY ..................................................................................................... 50
APPENDIX B – FCC INTERFERENCE STATEMENT ............................................................... 62