Wireless Adapter RNX-EasyN1 User Manual
1
Table of Contents
1 INTRODUCTION .................................................................................................................... 2
FEATURES & BENEFITS ................................................................................................................... 2
PACKAGE CONTENTS...................................................................................................................... 3
USB ADAPTER DESCRIPTION .......................................................................................................... 3
SYSTEM REQUIREMENTS................................................................................................................. 3
APPLICATIONS................................................................................................................................4
NETWORK CONFIGURATION............................................................................................................. 4
2 USB ADAPTER FOR WINDOWS (XP & VISTA).................................................................... 6
BEFORE YOU BEGIN ....................................................................................................................... 6
INSTALLING THE DRIVERS ................................................................................................................ 6
PROFILES ...................................................................................................................................... 9
INFRASTRUCTURE MODE................................................................................................................. 9
AD-HOC MODE ............................................................................................................................ 10
AUTHENTICATION AND SECURITY ................................................................................................... 12
WEP Encryption.................................................................................................................... 12
WPA, WPA2 Authentication & TKIP, AES Encryption .......................................................... 13
WPA-PSK Authentication & TKIP, AES Encryption.............................................................. 13
LEAP Authentication............................................................................................................. 14
802.1x with PEAP ................................................................................................................. 15
PEAP Authentication with EAP/TLS Smartcard ................................................................... 15
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2................................................ 16
802.1x CA Server .................................................................................................................. 17
NETWORK (SITE SURVEY).............................................................................................................. 19
ADVANCED CONFIGURATION.......................................................................................................... 21
WPS........................................................................................................................................... 21
UNINSTALL THE DRIVERS & CLIENT UTILITY .................................................................................... 24
3 USB ADAPTER FOR MAC OS X......................................................................................... 27
INSTALLING THE DRIVERS .............................................................................................................. 27
PROFILES .................................................................................................................................... 30
INFRASTRUCTURE MODE............................................................................................................... 31
AD-HOC MODE ............................................................................................................................ 33
AUTHENTICATION AND SECURITY ................................................................................................... 34
WEP Encryption.................................................................................................................... 34
WPA-PSK Authentication & TKIP, AES Encryption.............................................................. 35
LINK STATUS ............................................................................................................................... 36
SITE SURVEY ............................................................................................................................... 38
STATISTICS .................................................................................................................................. 39
ADVANCED CONFIGURATION.......................................................................................................... 39
ABOUT ........................................................................................................................................ 41
APPENDIX A – GLOSSARY ......................................................................................................... 42
APPENDIX B – SPECIFICATIONS............................................................................................... 55
APPENDIX C – FCC INTERFERENCE STATEMENT.................................................................. 56