Resumen del contenido incluido en la página 1
ENUWI-N3
802.11n USB Wireless Adapter
User Manual
Resumen del contenido incluido en la página 2
Table of Contents 1 INTRODUCTION............................................................................................................................... 3 FEATURES & BENEFITS............................................................................................................................... 3 PACKAGE CONTENTS.................................................................................................................................. 4 USB ADAPTER DESCRIPTION ........
Resumen del contenido incluido en la página 3
Introduction The ENUWI-N3 high-speed wireless USB 2.0 client adapter is the most convenient way to let you put a desktop or a notebook computer almost anywhere without the hassle of running network cables. Now there will be no more drilling holes and eyesore exposed cables. Once you are connected, you can do anything, just like the wired network. This USB client adapter operates seamlessly in 2.4GHz frequency spectrum supporting the 802.11b, 802.11g, and 802.11n wireless standards. It’s
Resumen del contenido incluido en la página 4
Features & Benefits Features Benefits Racing Speed up to 150Mbps data rate Enjoy the Internet connection in crazy-fast (2.4GHz 802.11n technology) speed, without the bottleneck of strangling wires. Advanced power management Low power consumption. A useful feature for notebooks on battery mode that makes longer battery life and still surf the internet WPA/WPA2 (IEEE 802.11i), WPA-PSK, Powerful data security. WPA2-AES, WEP 64/128 Supported Support 1Tx-1Rx Radio With Intelligent Antenna
Resumen del contenido incluido en la página 5
System Requirements The followings are the minimum system requirements for ENUWI-N3 PC/AT compatible computer with available USB interface. Windows® 2000/XP/Windows Vista® or Mac™ OS X operating system. 30 MB of free disk space for installing the USB adapter software driver and software utility program. Applications The wireless LAN products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power
Resumen del contenido incluido en la página 6
Network managers in dynamic environments can minimize the overhead caused by moves, extensions to networks, and other changes with wireless LANs. g) Wired LAN backup Network managers implement wireless LANs to provide backup for mission-critical applications running on wired networks. h) Training or Educational facilities Training sites at corporations and students at universities use wireless connectivity to ease access to information, information exchanges, and learning. Network
Resumen del contenido incluido en la página 7
The infrastructure mode requires the use of an Access Point (AP) or a a router. In this mode, all wireless communication between two computers has to be via the AP. It doesn’t matter if the AP is stand-alone or wired to an Ethernet network. If used in stand-alone, the AP can extend the range of independent wireless LANs by acting as a repeater, which effectively doubles the distance between wireless stations. The image below depicts a network in infrastructure mode.
Resumen del contenido incluido en la página 8
setup.exe file from the CD-ROM drive. NOTE: Do not insert your ENUWI-N3 USB adapter to the USB port at this point. You will be asked to do so later on in this installation procedure. NOTE: A Welcome screen will pop up for a few seconds and will disappear and will be replace with the ENUWI-N3 Main menu screen seen below.. 8
Resumen del contenido incluido en la página 9
2. Click on Windows Driver icon to start the installation process. 3. Click on the Install button to begin the installation. 9
Resumen del contenido incluido en la página 10
4. Wait for a few seconds until the driver and client utility is installed. 10
Resumen del contenido incluido en la página 11
5. The installation is complete. Click on the Finish button. 6. Depends on your system. You will be asked to restart your computer. Click to select “Yes, I want to start my computer now.” Then click the “Finish” button. 7. After the reboot, carefully insert the ENUWI-N3 USB adapter into the available USB port. Windows will automatically detect and install the new hardware. icon is now added to the task bar or system tray similar to 8. A new Encore the picture above. Rig
Resumen del contenido incluido en la página 12
Note: Click on Use Zero Configuration as Configuration Utility if you would like to use Windows Zero Configuration (Windows XP only). 12
Resumen del contenido incluido en la página 13
Profiles The Profile tab is used to store the settings of multiple Access Points such as home, office, café, etc. When adding a profile you are required to enter a profile name and SSID as well as configure the power-saving mode, network type, RTS/fragmentation threshold and encryption/authentication settings. A profile can be configured as Infrastructure or Ad-hoc mode. The configuration settings for each mode are described below. Infrastructure Mode The infrastructure mod
Resumen del contenido incluido en la página 14
Profile: Enter a name for the profile; this does not need to be the same as the SSID. SSID: Enter the SSID of the network or select one from the drop-down list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. PSM: Select a power saving mode (PSM) option. o CAM (Continuously Active Mode): Select this option if your notebook is always connected to the power supply. o PSM
Resumen del contenido incluido en la página 15
Profile: Enter a name for the profile; this does not need to be the same as the SSID. SSID: Enter the SSID of the network or select one from the drop-down list. The SSID is a unique name shared among all points in your wireless network. The SSID must be identical for all points in the network, and is case-sensitive. Network Type: Select Ad-hoc from the drop-down list. Preamble: Select Auto from the drop-down list, unless you are aware of the preamble type (long or short) used
Resumen del contenido incluido en la página 16
Authentication and Security The Security tab allows you to configure the authentication and encryption settings such as: WEP, WPA, WPA-PSK, WPA2, and 802.1x. Each security option is described in detail below. WEP Encryption The WEP tab displays the WEP settings. Encryption is designed to make the data transmission more secure. You may select 64 or 128-bit WEP (Wired Equivalent Privacy) key to encrypt data (Default setting is Disable). WEP encrypts each frame transmitted from
Resumen del contenido incluido en la página 17
WEP Key (Hex or ASCII): Type a character string into the field. For 64-bit enter 5 alphanumeric or 10 hexadecimal characters. For 128-bit enter 13 alphanumeric or 26 hexadecimal characters. Click on the Apply button to save the changes. Show Password check box. If you want to make sure the accuracy of password you type, click the Show Password box to check it. WPA, WPA2 Authentication & TKIP, AES Encryption WPA (Wi-Fi Protected Access) was designed to improve upon the security
Resumen del contenido incluido en la página 18
key, but uses stronger TKIP encryption. EAP (Extensible Authentication Protocol) is an extension to the PPP protocol that enables a variety of authentication protocols to be used. It passes through the exchange of authentication messages, allowing the authentication software stored in a server to interact with its counterpart in the client. Authentication Type: Select WPA-PSK or WPA2-PSK from the drop-down list. Encryption: Select TKIP or AES from the drop-down list. WPA Presh
Resumen del contenido incluido en la página 19
Authentication Type: Select LEAP from the drop-down list. Identity: Enter the user name. Password: Enter the password. Domain: Enter a domain name. Encryption: Select WEP, WPA-TKIP or WPA2-AES encryption. Click on the OK button to save the changes. 802.1x with PEAP 802.1X provides an authentication framework for wireless LANs allowing a user to be authenticated by a central authority. 802.1X uses an existing protocol called EAP. EAP (Extensible Authentication Protocol
Resumen del contenido incluido en la página 20
Authentication Type: Select PEAP from the drop-down list. Protocol: If your network uses TLS or Smart Card to authenticate its users, select TLS/Smartcard from the drop down list. TLS (Transport Layer Security) is an IETF standardized authentication protocol that uses PKI (Public Key Infrastructure) certificate-based authentication of both the client and authentication server. Identity: Enter the user name. Click on the OK button to save the changes. 802.1x with TTLS with EA