Rosewill RNX-N2X User Manual

Page 2

Advertising
background image

Wireless Adapter

RNX-N2X User Manual

2

1. INTRODUCTION......................................................................................................................... 4

1.1

F

EATURES

&

B

ENEFITS

............................................................................................................. 4

1.2

P

ACKAGE

C

ONTENTS

............................................................................................................... 5

1.3

USB

A

DAPTER

D

ESCRIPTION

.................................................................................................... 5

1.4

S

YSTEM

R

EQUIREMENTS

.......................................................................................................... 5

2. USB ADAPTER FOR WINDOWS VISTA................................................................................... 5

2.1

B

EFORE

Y

OU

B

EGIN

................................................................................................................ 5

2.2

I

NSTALLING THE

D

RIVERS

.......................................................................................................... 5

2.3

P

ROFILES

................................................................................................................................ 8

2.3.1 Infrastructure Mode ...................................................................................................... 8

2.3.2 Ad-hoc Mode................................................................................................................ 9

2.4

A

UTHENTICATION AND

S

ECURITY

............................................................................................. 10

2.4.1 WEP Encryption.......................................................................................................... 10

2.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption ................................................. 11

2.4.3 WPA-PSK Authentication & TKIP, AES Encryption .................................................... 12

2.5

N

ETWORK

............................................................................................................................. 13

2.6

S

ITE SURVEY

......................................................................................................................... 14

2.7

S

TATISTICS

............................................................................................................................ 15

2.8

WPS.................................................................................................................................... 16

2.9

A

BOUT

.................................................................................................................................. 17

2.10

U

NINSTALL THE

D

RIVERS

&

C

LIENT

U

TILITY

............................................................................ 18

3. USB ADAPTER FOR WINDOWS 2000/XP............................................................................. 21

3.1

B

EFORE

Y

OU

B

EGIN

.............................................................................................................. 21

3.1

I

NSTALLING THE

D

RIVERS

........................................................................................................ 21

3.3

P

ROFILES

.............................................................................................................................. 24

3.3

P

ROFILES

.............................................................................................................................. 24

3.3.1 Infrastructure Mode .................................................................................................... 24

3.3.2 Ad-hoc Mode.............................................................................................................. 26

3.4

A

UTHENTICATION AND

S

ECURITY

............................................................................................. 26

3.4.1 WEP Encryption.......................................................................................................... 27

3.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption ................................................. 28

3.4.3 WPA-PSK Authentication & TKIP, AES Encryption .................................................... 29

3.4.4 LEAP Authentication................................................................................................... 30

3.4.5 802.1x with PEAP ....................................................................................................... 31

3.4.5.1 PEAP Authentication with EAP/TLS Smartcard..................................................................31

3.4.6 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2 ...................................... 32

3.4.7 802.1x CA Server........................................................................................................ 33

3.5

N

ETWORK

............................................................................................................................. 35

3.5.1 Site Survey.................................................................................................................. 37

3.6

A

DVANCED

C

ONFIGURATION

................................................................................................... 38

3.7

S

TATISTICS

............................................................................................................................ 38

3.8

WMM

(W

IRELESS

M

ULTIMEDIA

).............................................................................................. 40

3.9

WPS.................................................................................................................................... 40

3.10

A

BOUT

................................................................................................................................ 42

3.11

R

ADIO

................................................................................................................................. 42

3.12

U

NINSTALL THE

D

RIVERS

&

C

LIENT

U

TILITY

............................................................................ 43

4. USB ADAPTER FOR MAC OS 10.3/10.4/10.5 ....................................................................... 44

4.1

I

NSTALLING THE

D

RIVERS

........................................................................................................ 44

4.2

P

ROFILES

............................................................................................................................... 47

Advertising