Product Card
Contents
Introduction ............................................................................................................... 5
System Requirements ........................................................................................ 5
Profile Management ................................................................................................. 5
Create or Modify a Configuration Profile ....................................................... 5
Remove a Configuration Profile ....................................................................... 6
Auto Profile Selection Management ....................................................................... 6
Switching to a Different Configuration Profile ..................................................... 7
Import and Export Profiles ....................................................................................... 7
Importing a Profile ..................................................................................................... 7
Exporting a Profile ..................................................................................................... 7
TCP/IP Configuration .............................................................................................. 7
Configuring the TCP/IP Address for the network device: .................................... 7
General Tab ................................................................................................................ 8
Advanced Tab ............................................................................................................ 8
Security Tab ............................................................................................................... 9
Using EAP-TLS Security ................................................................................. 10
Using EAP-TTLS Security ............................................................................... 10
Using PEAP (EAP-GTC) Security .................................................................. 11
Using PEAP-MSCHAP V2 Security ............................................................... 12
Using LEAP Security ....................................................................................... 13
Configuring LEAP .................................................................................................... 13
Pre-Shared Encryption Keys .................................................................................. 14
Defining pre-shared encryption keys: ................................................................... 14
Overwriting an Existing Static WEP Key.............................................................. 14
Disabling Static WEP .............................................................................................. 14
Using WPA Passphrase Security .......................................................................... 15
Zero Configuration ................................................................................................. 15
Wireless Network Configuration ............................................................................ 15
Check the Status Information or Diagnostics ...................................................... 16
Current Status ................................................................................................... 16
Adapter Information Button .................................................................................. 17
Diagnostics Tab ....................................................................................................... 17
Transmitted Frames ................................................................................................ 18
Received Frames .................................................................................................... 18
6FDQ$YDLODEOH1HWZRUNV ....................................................................................... 18
Connecting to a different network ......................................................................... 18