User's Manual
Contents
Introduction ............................................................................................................... 6
System Requirements ........................................................................................ 6
Profile Management ................................................................................................. 6
Create or Modify a Configuration Profile ...................................................... 6
Remove a Configuration Profile ...................................................................... 7
Auto Profile Selection Management ....................................................................... 7
Switching to a Different Configuration Profile ..................................................... 8
Import and Export Profiles ....................................................................................... 8
Importing a Profile ..................................................................................................... 8
Exporting a Profile ..................................................................................................... 8
TCP/IP Configuration ............................................................................................. 8
Configuring the TCP/IP Address for the network device: ................................... 8
General Tab ................................................................................................................ 9
Advanced Tab ........................................................................................................... 9
Security Tab ............................................................................................................. 10
Using EAP-TLS Security ................................................................................. 11
Using EAP-TTLS Security ............................................................................... 11
Using PEAP (EAP-GTC) Security .................................................................. 12
Using PEAP-MSCHAP V2 Security .............................................................. 13
Using LEAP Security ....................................................................................... 14
Configuring LEAP .................................................................................................... 14
Pre-Shared Encryption Keys ................................................................................. 15
Defining pre-shared encryption keys: .................................................................. 15
Overwriting an Existing Static WEP Key ............................................................. 15
Disabling Static WEP .............................................................................................. 15
Using WPA Passphrase Security .......................................................................... 16
Zero Configuration ................................................................................................. 16
Wireless Network Configuration ........................................................................... 16
Check the Status Information or Diagnostics ..................................................... 17
Current Status ................................................................................................... 17
Adapter Information Button ................................................................................. 18
Diagnostics Tab ....................................................................................................... 18
Transmitted Frames ................................................................................................ 19
Received Frames .................................................................................................... 19
Scan Available Networks ....................................................................................... 19
Connecting to a different network ......................................................................... 19