User Manual
Atheros Communications, Inc. • v
COMPANY CONFIDENTIAL August 2010
Contents
Introduction.......................................................................................................... 8
System Requirements .................................................................................... 8
Profile Management............................................................................................. 8
Create or Modify a Configuration Profile.................................................... 8
Remove a Configuration Profile ................................................................... 9
Auto Profile Selection Management.................................................................... 9
Switching to a Different Configuration Profile ................................................ 10
Import and Export Profiles ................................................................................. 10
Importing a Profile .............................................................................................. 10
Exporting a Profile .............................................................................................. 10
TCP/IP Configuration ....................................................................................... 10
Configuring the TCP/IP Address for the network device:................................ 10
General Tab......................................................................................................... 11
Advanced Tab..................................................................................................... 11
Security Tab ........................................................................................................ 12
Using EAP-TLS Security.............................................................................. 13
Using EAP-TTLS Security ........................................................................... 13
Using PEAP (EAP-GTC) Security............................................................... 14
Using PEAP-MSCHAP V2 Security............................................................ 15
Using LEAP Security ................................................................................... 16
Configuring LEAP............................................................................................... 16
Pre-Shared Encryption Keys.............................................................................. 17
Defining pre-shared encryption keys: ............................................................... 17
Overwriting an Existing Static WEP Key .......................................................... 17
Disabling Static WEP ......................................................................................... 18
Using WPA Passphrase Security....................................................................... 18
Zero Configuration............................................................................................. 18
Wireless Network Configuration........................................................................ 18
Check the Status Information or Diagnostics................................................... 19
Current Status .............................................................................................. 19
Adapter Information Button.............................................................................. 20
Diagnostics Tab .................................................................................................. 20
Transmitted Frames ........................................................................................... 21
Received Frames ............................................................................................... 21
Scan Available Networks ................................................................................... 21
Connecting to a different network ..................................................................... 21