User Manual

3
Table of Contents
REGULATORY INFORMATION.............................................................................................................2
1. WELCOME...............................................................................................................................................5
1.1 KIT CONTENTS......................................................................................................................................5
1.2 MAIN FEATURES OF 802.11G USB 2.0 ADAPTER................................................................................5
1.3 WIRELESS NETWORKING SCENARIOS..................................................................................................6
2. QUICK START TO WIRELESS NETWORKING ............................................................................8
2.1 INSTALLATION.......................................................................................................................................8
2.2 CONNECTING TO AN EXISTING NETWORK...........................................................................................9
3. STEP-BY-STEP INSTRUCTIONS......................................................................................................10
3.1 INSTALLATION.....................................................................................................................................10
3.2 CONNECTING TO A NETWORK.............................................................................................................15
3.3 CREATING AN AD HOC NETWORK .....................................................................................................19
3.4 REMOVING YOUR 802.11G USB 2.0 ADAPTER..................................................................................21
3.5 UNINSTALLATION................................................................................................................................22
4. USING THE UTILITY..........................................................................................................................24
4.1 CURRENT STATUS ...............................................................................................................................24
4.2 DIAGNOSTICS......................................................................................................................................25
4.3 PROFILE MANAGEMENT.....................................................................................................................28
4.3.1 Creating or Modifying a Configuration Profile......................................................................28
4.3.2 Removing a Profile....................................................................................................................32
4.3.3 Profile Auto Selection................................................................................................................32
4.3.4 Switching Profiles......................................................................................................................33
4.4 SECURITY............................................................................................................................................34
4.4.1 Using EAP-TLS Security...........................................................................................................34
4.4.2 Enabling EAP-TLS Security......................................................................................................34
4.4.3 Using EAP-TTLS Security.........................................................................................................34
4.4.4 Enabling EAP-TTLS Security...................................................................................................35
4.4.5 Using PEAP(EAP-GTC) Security.............................................................................................36
4.4.6 Enabling PEAP(EAP-GTC) Security.......................................................................................36
4.4.7 Using PEAP-MSCHAP V2 Security.........................................................................................37
4.4.8 Enabling PEAP- MSCHAP V2 Security...................................................................................37
4.4.9 Using LEAP Security.................................................................................................................38
4.4.10 Configuring LEAP...................................................................................................................39