User's Guide

Firmware Upgrade 17
Log File Path is the current path to store the log files. The field is disabled when
logging is not turned on. Use Browse to select a Log File Path.
View Log Files selects the log file to view in the default browser.
Firmware Upgrade The Adapter Firmware Upgrade tool lets you download and install firmware
updates that you have downloaded from the 3Com Customer Support Web site at
http://support.3com.com
.
To run the Card Upgrade utility:
1 Open the Start menu.
2 Select Programs.
3 Select 3Com Wireless LAN.
4 Select Wireless LAN Upgrade Utility.
The Upgrade Utility lets you view information on the current firmware version of
the currently installed card and install firmware updates by selecting a firmware
and CIS file downloaded from the 3Com Web site.
Firmware loaded in adapter displays the version information for the current
firmware on the adapter.
Primary Firmware Filename lets you specify a new firmware binary to load on
the adapter.
Pbrowse opens a browser so you can select a primary firmware file. The new
selection updates the Firmware Filename field.
Secondary Firmware Filename lets you specify a new firmware binary to load
on the adapter.
Sbrowse opens a browser so you can select a secondary firmware file. The new
selection updates the Firmware Filename field.
CIS Filename lets you specify a new CIS binary to load on the adapter.
Cbrowse opens a browser so you can select a CIS file. The new selection
updates the Firmware Filename field.
Update initiates the update of the firmware on the adapter based using the
Firmware and CIS files specified.
Encryption The client and access point can be set for encryption to provide a level of security
to the data stream between the client and its associated AP.
Encryption
Configuration
Requirements
The encryption level (open, 40-bit, or 128-bit) must be the same on the
wireless client and the access point.
All Shared Keys on the wireless client must be the same as those on the access
point with which the client will associate. They must match exactly (key order
and hex-digit sequence).
The selected keys do not need to be the same among different clients and/or
access points.
Exhibit 8: User's Manual