User Manual

WL-343v2 001 IEEE802.11b/g/n Wireless LAN USB 2.0 Client Adapter Version 1.2
2
Table of Contents
1
INTRODUCTION......................................................................................................................................4
F
EATURES
&
B
ENEFITS
......................................................................................................................................4
P
ACKAGE
C
ONTENTS
.........................................................................................................................................5
USB
A
DAPTER
D
ESCRIPTION
............................................................................................................................5
S
YSTEM
R
EQUIREMENTS
...................................................................................................................................5
A
PPLICATIONS
....................................................................................................................................................5
N
ETWORK
C
ONFIGURATION
..............................................................................................................................6
2
USB ADAPTER FOR WINDOWS (XP & VISTA)...............................................................................7
B
EFORE
Y
OU
B
EGIN
..........................................................................................................................................7
I
NSTALLING THE
D
RIVERS
.................................................................................................................................7
P
ROFILES
..........................................................................................................................................................11
I
NFRASTRUCTURE
M
ODE
.................................................................................................................................11
A
UTHENTICATION AND
S
ECURITY
..................................................................................................................13
WEP Encryption.........................................................................................................................................13
WPA, WPA2 Authentication & TKIP, AES Encryption...........................................................................14
WPA-PSK Authentication & TKIP, AES Encryption...............................................................................14
LEAP Authentication..................................................................................................................................15
802.1x with PEAP ......................................................................................................................................16
PEAP Authentication with EAP/TLS Smartcard......................................................................................16
802.1x with TTLS with EAP-MD5, MS-CHAP, MS-CHAPv2.................................................................17
802.1x CA Server........................................................................................................................................18
N
ETWORK
(S
ITE
S
URVEY
)...............................................................................................................................20
A
DVANCED
C
ONFIGURATION
..........................................................................................................................22
WPS .................................................................................................................................................................22
U
NINSTALL THE
D
RIVERS
&
C
LIENT
U
TILITY
................................................................................................24
3
USB ADAPTER FOR MAC OS X.........................................................................................................27
I
NSTALLING THE
D
RIVERS
...............................................................................................................................27
P
ROFILES
..........................................................................................................................................................29
I
NFRASTRUCTURE
M
ODE
.................................................................................................................................30
A
UTHENTICATION AND
S
ECURITY
..................................................................................................................32
WEP Encryption.........................................................................................................................................32
WPA-PSK Authentication & TKIP, AES Encryption...............................................................................33
L
INK
S
TATUS
....................................................................................................................................................33
S
ITE
S
URVEY
....................................................................................................................................................35
S
TATISTICS
.......................................................................................................................................................36
A
DVANCED
C
ONFIGURATION
..........................................................................................................................36
WPS .................................................................................................................................................................37
A
BOUT
..............................................................................................................................................................39
APPENDIX A – GLOSSARY...........................................................................................................................40
APPENDIX B – FCC INTERFERENCE STATEMENT............................................................................52