EnGenius Wireless USB Adapter
2
Table of Contents
1.
INTRODUCTION ................................................................................................................4
1.1.
P
ACKAGE
C
ONTENTS
....................................................................................................4
1.2.
USB
A
DAPTER
D
ESCRIPTION
.........................................................................................5
1.3.
S
YSTEM
R
EQUIREMENTS
...............................................................................................6
1.4.
A
PPLICATIONS
..............................................................................................................7
1.5.
N
ETWORK
C
ONFIGURATION
...........................................................................................7
2.
USB ADAPTER FOR WINDOWS.......................................................................................9
2.1.
B
EFORE
Y
OU
B
EGIN
......................................................................................................9
2.2.
I
NSTALLING THE
D
RIVERS
............................................................................................10
2.3.
P
ROFILES
..................................................................................................................13
2.3.1.
I
NFRASTRUCTURE
M
ODE
.............................................................................................14
2.3.2.
A
D
-
HOC
M
ODE
...........................................................................................................15
2.3.3.
A
UTHENTICATION AND
S
ECURITY
..................................................................................16
2.3.4.
WEP Encryption...................................................................................................16
2.3.5.
WPA, WPA2 Authentication & TKIP, AES Encryption............................................17
2.3.6.
WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption.........................18
2.3.7.
LEAP Authentication.............................................................................................19
2.3.8.
802.1x with PEAP.................................................................................................20
2.3.9.
PEAP Authentication with EAP/TLS Smartcard.....................................................20
2.3.10.
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2..............................21
2.3.11.
802.1x CA Server.............................................................................................22
2.4.
N
ETWORK
(S
ITE
S
URVEY
)............................................................................................24
2.5.
A
DVANCED
C
ONFIGURATION
........................................................................................26
2.6.
S
TATISTICS
................................................................................................................27
2.7.
WMM........................................................................................................................28
2.8.
WPS.........................................................................................................................29
2.9.
CCX .........................................................................................................................30
2.10.
R
ADIO ON
/
OFF
............................................................................................................30
2.11.
A
BOUT
.......................................................................................................................31
2.12.
U
NINSTALL THE
D
RIVERS
&
C
LIENT
U
TILITY
...................................................................32
3.
USB ADAPTER FOR MAC OS X......................................................................................35
3.1.
I
NSTALLING THE
D
RIVERS
............................................................................................35
3.2.
P
ROFILES
..................................................................................................................38
3.2.1.
I
NFRASTRUCTURE
M
ODE
.............................................................................................39
3.2.2.
A
D
-
HOC
M
ODE
...........................................................................................................40
3.3.
A
UTHENTICATION AND
S
ECURITY
..................................................................................41
3.3.1.
WEP Encryption...................................................................................................41
3.3.2.
WPA-PSK & WPA2-PSK Authentication & TKIP, AES Encryption.........................42
3.4.
L
INK
S
TATUS
..............................................................................................................43
3.5.
S
ITE
S
URVEY
.............................................................................................................45
3.6.
S
TATISTICS
................................................................................................................46
3.7.
A
DVANCED
C
ONFIGURATION
........................................................................................46
3.8.
WPS.........................................................................................................................47
3.9.
A
BOUT
.......................................................................................................................49
APPENDIX A – GLOSSARY.....................................................................................................50
APPENDIX B – FCC INTERFERENCE STATEMENT ...............................................................62