User's Manual
Table Of Contents
- Intel(R) PROSet/Wireless WiFi Connection Utility User's Guide
- Use the Intel(R) PROSet/Wireless WiFi Connection Utility
- Main Window
- Taskbar Icon and Menu Commands
- Connection Status Icons
- Wireless Network Overview
- Connect to a WiFi Network
- Network Connection Details
- Network Properties
- Personal Security
- Use Wi-Fi Protected Setup*
- Turn Wireless Radio On or Off
- Application Settings (Tools menu)
- Administrator Tool
- Adapter Settings
- Advanced Statistics (Advanced menu)
- Exclude List Management
- Profile Management
- Profile Wizard General Settings
- Security Overview
- Enterprise Security
- Application Settings (Administrator Tool)
- Administrator Password
- Advanced Settings
- Set up Profile Security
- Configure Profiles for Network (Infrastructure) Operating Mode
- Administrator Tool Settings
- Intel(R) Wireless Troubleshooter (Tools menu)
- Manual Diagnostics Tool
- Wireless Event Viewer
- Regulatory Information
- Specifications
- Customer Support
- Warranty Information
- Glossary
EAP-SIM
Extensible Authentication Protocol-Subscriber Identity Module (EAP-
SIM) authentication can be used with:
● Network Authentication types: Open, Shared, and WPA*-Enterprise,
WPA2*-Enterprise.
● Data Encryption types: None, WEP and CKIP.
A SIM card is a special smart card that is used by Global System for Mobile
Communications (GSM) based digital cellular networks. The SIM card is
used to validate your credentials with the network
EAP-TLS
A type of authentication method that uses EAP and a security
protocol called the Transport Layer Security (TLS). EAP-TLS uses
certificates that use passwords. EAP-TLS authentication supports
dynamic WEP key management.
EAP-TTLS A type of authentication method that uses EAP and Tunneled Transport
Layer Security (TTLS). EAP-TTLS uses a combination of certificates and
another security method such as passwords.
Encryption Scrambling data so that only the authorized recipient can read it. Usually a
key is needed to interpret the data.
FHSS Frequency-Hop Spread Spectrum. Technology used in radio transmission.
Incompatible with DSSS.
File and
printer sharing
A capability that allows a number of people to view, modify, and print the
same file(s) from different computers.
Fragmentation
threshold
The threshold at which the wireless adapter breaks the packet into multiple
frames. This determines the packet size and affects the throughput of the
transmission.
GHz
(Gigahertz)
A unit of frequency equal to 1,000,000,000 cycles per second.
Host computer The computer that is directly connected to the Internet via a modem or
network adapter.
Infrastructure
network
A wireless network centered around an access point. In this environment,
the access point not only provides communication with the wired network,
but also mediates wireless network traffic in the immediate neighborhood.
IEEE Institute of Electrical and Electronics Engineers (IEEE) is an organization
involved in defining computing and communications standards.
Internet
Protocol (IP)
address
The address of a computer that is attached to a network. Part of the
address designates which network the computer is on, and the other part
represents the host identification.
LAN (Local
Area Network)
A high-speed, low-error data network covering a relatively small
geographic area.