Rosewill RNX-N100 Network Card User Manual


 
Wireless Adapter RNX-N100 User Manual
2
CONTENTS
1. INTRODUCTION......................................................................................................................... 4
1.1 FEATURES & BENEFITS.............................................................................................................. 4
1.2 PACKAGE CONTENTS ................................................................................................................ 5
1.3 USB ADAPTER DESCRIPTION .................................................................................................... 5
1.4 SYSTEM REQUIREMENTS........................................................................................................... 5
2. USB ADAPTER FOR WINDOWS 2000/XP/VISTA .................................................................... 5
2.1 BEFORE YOU BEGIN ................................................................................................................. 5
2.2 INSTALLING THE DRIVERS .......................................................................................................... 5
2.3 PROFILES................................................................................................................................. 7
2.3.1 Infrastructure Mode .......................................................................................................8
2.3.2 Ad-hoc Mode................................................................................................................. 8
2.4 AUTHENTICATION AND SECURITY................................................................................................ 9
2.4.1 WEP Encryption........................................................................................................... 10
2.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption .................................................. 10
2.4.3 WPA-PSK Authentication & TKIP, AES Encryption ..................................................... 11
2.5 NETWORK.............................................................................................................................. 12
2.6 SITE SURVEY .......................................................................................................................... 14
2.7 STATISTICS............................................................................................................................. 14
2.8 WPS..................................................................................................................................... 15
2.9 ABOUT .................................................................................................................................. 16
2.10 UNINSTALL THE DRIVERS & CLIENT UTILITY............................................................................. 16
3. USB ADAPTER FOR WINDOWS 2000/XP.............................................................................. 18
3.1 BEFORE YOU BEGIN ............................................................................................................... 18
3.2 INSTALLING THE DRIVERS ........................................................................................................ 18
3.3 PROFILES............................................................................................................................... 21
3.3.1 Infrastructure Mode ..................................................................................................... 21
3.3.2 Ad-hoc Mode...............................................................................................................23
3.4 AUTHENTICATION AND SECURITY.............................................................................................. 23
3.4.1 WEP Encryption........................................................................................................... 24
3.4.2 WPA, WPA2 Authentication & TKIP, AES Encryption .................................................. 25
3.4.3 WPA-PSK Authentication & TKIP, AES Encryption ..................................................... 26
3.4.4 LEAP Authentication.................................................................................................... 27
3.4.5 802.1x with PEAP ....................................................................................................... 28
3.4.5.1 PEAP Authentication with EAP/TLS Smartcard...................................................................28
3.4.6 802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2 ...................................... 29
3.4.7 802.1x CA Server........................................................................................................ 30
3.5 NETWORK.............................................................................................................................. 32
3.5.1 Site Survey................................................................................................................... 34
3.6 ADVANCED CONFIGURATION .................................................................................................... 35
3.7 STATISTICS............................................................................................................................. 35
3.8 WMM (WIRELESS MULTIMEDIA)............................................................................................... 37
3.9 WPS..................................................................................................................................... 37
3.10 ABOUT................................................................................................................................39
3.11 RADIO ................................................................................................................................. 39
3.12 UNINSTALL THE DRIVERS & CLIENT UTILITY............................................................................. 40
4. USB ADAPTER FOR MAC OS 10.3/10.4/10.5....................................................................... 42
4.1 INSTALLING THE DRIVERS ........................................................................................................ 42
4.2 PROFILES............................................................................................................................... 44