background image

 

Atheros Communications, Inc. 

 

 

 

15

 

COMPANY CONFIDENTIAL 

 

October 2010 

Using LEAP Security 

To use security In the Atheros Client Utility, access the Security tab in the Profile 
Management window. LEAP security requires that all infrastructure devices (e.g. access 

points and servers) are configured for LEAP authentication. Check with the IT manager.  

Configuring LEAP 

 

On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the 

drop-down menu.  

 

OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the 

drop-down menu. 

1.

 

Click the 

Configure

 button. 

2.

 

Specify a user name and password.  Select to 

Use Temporary User Name and 

Password

 by choosing the radio button:  

 

Check 

Use Windows User Name

 to use the Windows user name as the LEAP 

user name. 

 

OR: Check 

Manually Prompt for LEAP User Name and Password 

to 

manually login and start the LEAP authentication process.  

Select to 

Use Saved User Name and Password

 by choosing the radio button:  

 

Specify the LEAP user name, password, and domain to save and use.   

3.

 

Enter the user name and password.  

4.

 

Confirm the password.  

5.

 

Specify a domain name:  

 

Check the 

Include Windows Logon Domain with User Name

 setting to pass 

the Windows login domain and user name to the RADIUS server. 

(default)

 

 

OR: Enter a specific domain name. 

6.

 

If desired, check 

No Network Connection Unless User Is Logged In 

to force the 

wireless adapter to disassociate after logging off.  

7.

 

Enter the LEAP authentication timeout time (between 30 and 500 seconds) to 

specify how long LEAP should wait before declaring authentication failed, and 

sending an error message.  The default is 90 seconds.  

8.

 

Click 

OK

.  

9.

 

Enable the profile. 

 

 

Summary of Contents for AR5BUB173

Page 1: ...Atheros 1X1 single band 802 11b g n module Model AR5BUB173 March 2009...

Page 2: ...rom patent infringement or from any other third party right No part of this document may be reproduced adapted or transmitted in any form or by any means electronic or mechanical for any purpose excep...

Page 3: ...splay Example Error Unable to allocate memory for transfer Menu The Menu character tag is used for menu items Example Choose Edit Copy Within commands items enclosed in square brackets are optional pa...

Page 4: ...4 Atheros Communications Inc COMPANY CONFIDENTIAL Revision History Revision Description of Changes March 2009 Initial Release...

Page 5: ...eral Tab 10 Advanced Tab 10 Security Tab 11 Using EAP TLS Security 12 Using EAP TTLS Security 12 Using PEAP EAP GTC Security 13 Using PEAP MSCHAP V2 Security 14 Using LEAP Security 15 Configuring LEAP...

Page 6: ...ration 24 Infrastructure Access Point Mode 25 Infrastructure Access Point Mode Profile Configuration 25 Uninstall an Old Driver 26 Additional Security Features 26 Message Integrity Check MIC 26 Advanc...

Page 7: ...move a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode which uses an access point or ad hoc mode a group of stations participating in the wirele...

Page 8: ...the auto selected profiles 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up Move Down or Remove as appropriate The first profile in the Auto Selected Profiles box has highest p...

Page 9: ...button The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location TCP IP Configuration Configuring the TCP IP A...

Page 10: ...buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving a large number of packets then...

Page 11: ...on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options...

Page 12: ...o use EAP security In the Atheros Client Utility access the Security tab in the Profile Management window 1 On the Security tab choose the WPA WPA2 radio button OR On the Security tab choose the 802 1...

Page 13: ...riate network certificate authority from the drop down list 4 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR...

Page 14: ...down list 3 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name field to...

Page 15: ...Windows user name as the LEAP user name OR Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password...

Page 16: ...encryption key WEP Key Size Defines the size for each encryption key The options include 64 bit enter 10 digits for hexadecimal 5 ASCII characters 128 bit enter 26 digits for hexadecimal 13 digits for...

Page 17: ...e Wireless Network Configuration Properties dialog box 2 Select the check box Use Windows to configure my wireless network settings to set Zero Configuration When this check box is selected Windows XP...

Page 18: ...ions The Current Status tab does not require any configuration The following table describes the items found on the Current Status screen Profile Name The name of the current selected configuration pr...

Page 19: ...reation date of the wireless network adapter driver Client Name Name of the client computer Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics The Dia...

Page 20: ...ciation rejects the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan...

Page 21: ...Atheros Communications Inc 21 COMPANY CONFIDENTIAL October 2010 Ad Hoc Network Connected Ad Hoc Network Encryption Active...

Page 22: ...tive displays the change in statistical data since the last update Cumulative displays statistical data collected since opening the profile ACU Tools Use the Action menu to access the Atheros Client U...

Page 23: ...r disable the RF signal Manual LEAP Login Log in to LEAP manually if LEAP is set to manually prompt for user name and password on each login Reauthenticate Reauthenticate to the access point Select Pr...

Page 24: ...thin an independent basic service set IBSS as illustrated here All stations communicate directly with other stations without using an access point AP To connect to an ad hoc network configure the prof...

Page 25: ...s with the other stations through an AP as illustrated here To connect to an access point network configure the profile for access point mode Infrastructure Access Point Mode Profile Configuration To...

Page 26: ...e system 4 To complete the uninstallation remove the file ar5211 sys from the folder WINNT system32 drivers Additional Security Features These security features prevent attacks on a wireless network s...

Page 27: ...nt the wireless adapter is associated to Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to Associated AP MAC Address Displays the MAC address of t...

Page 28: ...rofessional in configuring and installing the product We hereby declare that the product will be distributed through controlled distribution channel which has special trained professional to install t...

Page 29: ...Atheros Communications Inc 29 COMPANY CONFIDENTIAL October 2010 Antenna A PCA 5216 25GC4 A2...

Page 30: ...30 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna B PCA 5216 25GC4 A2...

Page 31: ...Atheros Communications Inc 31 COMPANY CONFIDENTIAL October 2010 Antenna C MSA 7008 2G4C4...

Page 32: ...32 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna D FPA 3025 25GC4...

Page 33: ...to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequ...

Page 34: ...d for example digital device emissions PC peripheral requirements etc IMPORTANT NOTE In the event that these conditions can not be met for example certain laptop configurations or co location with ano...

Page 35: ...50 ohms To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication This device is int...

Page 36: ...location IMPORTANT NOTE To comply with FCC RF exposure compliance requirements The antenna must not be co located or operating in conjunction with any other antenna or transmitter European Community...

Page 37: ...Atheros Communications Inc 37 COMPANY CONFIDENTIAL October 2010 Taiwan NCC Radio Compliance XXXXXXXXXXX...

Reviews: