User Guide
Page 7
... PCI Adapter User Guide Chapter 1 Introduction Thank you for choosing the TL-WN353G 54M Wireless PCI Adapter! 1.1 Overview of the Product The adapter will provide you the flexibility to install your PC in the most convenient location available, .../48/36/24/18/12/9/6Mbps or 11/5.5/2/1Mbps wireless LAN data transfer rates ¾ Provides 32-bit PCI interface ¾ Supports Ad-Hoc and Infrastructure modes ¾ Supports roaming between access points when configured in Infrastructure mode ¾ Ease to 152-bit WEP and WPA encryption for maximum throughput, or dynamic...
... PCI Adapter User Guide Chapter 1 Introduction Thank you for choosing the TL-WN353G 54M Wireless PCI Adapter! 1.1 Overview of the Product The adapter will provide you the flexibility to install your PC in the most convenient location available, .../48/36/24/18/12/9/6Mbps or 11/5.5/2/1Mbps wireless LAN data transfer rates ¾ Provides 32-bit PCI interface ¾ Supports Ad-Hoc and Infrastructure modes ¾ Supports roaming between access points when configured in Infrastructure mode ¾ Ease to 152-bit WEP and WPA encryption for maximum throughput, or dynamic...
User Guide
Page 21
... username for the 802.1x configuration, the options are Open System, Shared key and WPA-None. 3) The RTWCU does not support WPA 802.1x authentication in Windows Vista, while the Windows Zero Config Tools may satisfy your need to configure any ASCII characters to...index is necessary for the EAP type of TTLS and PEAP. • Identity - Select the tunnel: MD5, GTC, TLS, and MSCHAP-V2. Enter the identity for the authentication. TL-WN353G 54M Wireless PCI Adapter User Guide ) Note: 1) Select different authentications and data encryptions, the security configuration is different. ...
... username for the 802.1x configuration, the options are Open System, Shared key and WPA-None. 3) The RTWCU does not support WPA 802.1x authentication in Windows Vista, while the Windows Zero Config Tools may satisfy your need to configure any ASCII characters to...index is necessary for the EAP type of TTLS and PEAP. • Identity - Select the tunnel: MD5, GTC, TLS, and MSCHAP-V2. Enter the identity for the authentication. TL-WN353G 54M Wireless PCI Adapter User Guide ) Note: 1) Select different authentications and data encryptions, the security configuration is different. ...
User Guide
Page 30
Step 2: Click the Refresh button, and then the searched AP will display in the screen (shown in Figure 3-15). Select the AP name as you need, and click Select button. 24 TL-WN353G 54M Wireless PCI Adapter User Guide Figure 3-15 ) Note: The Wi-Fi Protect Setup function takes effect only when the adapter and the AP (the adapter wants to connect) must support the Wi-Fi function first. Or else, the adapter can't connect the AP. 3.8.1 PIN Step 1: Select the PIN (shown in Figure 3-16).
Step 2: Click the Refresh button, and then the searched AP will display in the screen (shown in Figure 3-15). Select the AP name as you need, and click Select button. 24 TL-WN353G 54M Wireless PCI Adapter User Guide Figure 3-15 ) Note: The Wi-Fi Protect Setup function takes effect only when the adapter and the AP (the adapter wants to connect) must support the Wi-Fi function first. Or else, the adapter can't connect the AP. 3.8.1 PIN Step 1: Select the PIN (shown in Figure 3-16).