2
Table of Contents
1 INTRODUCTION............................................................................................................................... 3
FEATURES & BENEFITS............................................................................................................................... 3
PACKAGE CONTENTS.................................................................................................................................. 4
USB ADAPTER DESCRIPTION ..................................................................................................................... 4
SYSTEM REQUIREMENTS ............................................................................................................................ 5
APPLICATIONS............................................................................................................................................ 5
NETWORK CONFIGURATION ....................................................................................................................... 6
2 ENUWI-N3 USB ADAPTER FOR WINDOWS® (XP & WINDOWS VISTA®).......................... 7
BEFORE YOU BEGIN ................................................................................................................................... 7
INSTALLING DRIVERS................................................................................................................................. 7
PROFILES.................................................................................................................................................. 13
INFRASTRUCTURE MODE.......................................................................................................................... 13
AD-HOC MODE......................................................................................................................................... 14
AUTHENTICATION AND SECURITY............................................................................................................ 16
WEP Encryption ................................................................................................................................. 16
WPA, WPA2 Authentication & TKIP, AES Encryption....................................................................... 17
WPA-PSK Authentication & TKIP, AES Encryption .......................................................................... 17
LEAP Authentication .......................................................................................................................... 18
802.1x with PEAP............................................................................................................................... 19
PEAP Authentication with EAP/TLS Smartcard................................................................................. 19
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2............................................................. 20
802.1x CA Server................................................................................................................................21
NETWORK (SITE SURVEY)........................................................................................................................ 23
ADVANCED CONFIGURATION ................................................................................................................... 25
WPS™..................................................................................................................................................... 25
UNINSTALL THE DRIVERS & CLIENT UTILITY .......................................................................................... 27
3 ENUWI-N3 USB ADAPTER FOR MAC™ OS X.......................................................................... 32
INSTALLING THE DRIVERS........................................................................................................................ 32
PROFILES.................................................................................................................................................. 34
INFRASTRUCTURE MODE.......................................................................................................................... 35
AD-HOC MODE......................................................................................................................................... 37
AUTHENTICATION AND SECURITY............................................................................................................ 38
WEP Encryption ................................................................................................................................. 38
WPA-PSK Authentication & TKIP, AES Encryption .......................................................................... 39
LINK STATUS............................................................................................................................................ 40
SITE SURVEY............................................................................................................................................ 41
STATISTICS............................................................................................................................................... 42
ADVANCED CONFIGURATION ................................................................................................................... 42
WPS™..................................................................................................................................................... 43
ABOUT...................................................................................................................................................... 45
APPENDIX A – GLOSSARY.................................................................................................................... 46
APPENDIX B – SPECIFICATIONS........................................................................................................ 58
APPENDIX C – FCC INTERFERENCE STATEMENT ....................................................................... 59