background image

 

Atheros Communications, Inc. 

 

 

 

17

 

COMPANY CONFIDENTIAL 

 

October 2010 

Using WPA Passphrase Security 

To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in 
the Profile Management window.  

1.

 

On the Security tab, choose the WPA Passphrase radio button.  

2.

 

Click on the

 Configure 

button. 

3.

 

Fill in the WPA Passphrase.  

4.

 

Click 

OK

Zero Configuration 

This section describes the operation of the Atheros Client Utility (ACU) and Windows 

XP Wireless Configuration Service (WZCS).  

Wireless Network Configuration 

The Windows WZCS is a service that manages the wireless connection in a largely 

dynamic way. Only minimal connection information must be identified and configured.  

To set Zero Configuration on Windows XP, take the following steps:  
1.

 

In Windows XP, open the Wireless Network Configuration Properties dialog box.  

2.

 

Select the check box 

Use Windows to configure my wireless network settings

 to set 

Zero Configuration.  

When this check box is selected, Windows XP takes control of these settings for all 
configuration profiles:  

 

SSID 

 

Security keys 

 

Ad hoc settings 

Note that Windows XP takes control of these settings for all configuration profiles, thus users can 

not ( create new profiles with different settings while using Windows Zero Configuration.

 

The Zero Configuration settings override all configuration profiles, even when you select 
other options. However, the ACU does still control the following settings when Zero 

Configuration is set:  

 

Power settings 

 

Active/Passive scanning (where applicable) 

 

Transmit power 

 

Wireless band 

 

Short/Long preamble (802.11b) 

When Zero Configuration is in use, a pop-up message is displayed on the ACU when 

you attempt to create or edit a configuration profile from the Profile Management tab of 

the ACU. 

Summary of Contents for AR5BUB173

Page 1: ...Atheros 1X1 single band 802 11b g n module Model AR5BUB173 March 2009...

Page 2: ...rom patent infringement or from any other third party right No part of this document may be reproduced adapted or transmitted in any form or by any means electronic or mechanical for any purpose excep...

Page 3: ...splay Example Error Unable to allocate memory for transfer Menu The Menu character tag is used for menu items Example Choose Edit Copy Within commands items enclosed in square brackets are optional pa...

Page 4: ...4 Atheros Communications Inc COMPANY CONFIDENTIAL Revision History Revision Description of Changes March 2009 Initial Release...

Page 5: ...eral Tab 10 Advanced Tab 10 Security Tab 11 Using EAP TLS Security 12 Using EAP TTLS Security 12 Using PEAP EAP GTC Security 13 Using PEAP MSCHAP V2 Security 14 Using LEAP Security 15 Configuring LEAP...

Page 6: ...ration 24 Infrastructure Access Point Mode 25 Infrastructure Access Point Mode Profile Configuration 25 Uninstall an Old Driver 26 Additional Security Features 26 Message Integrity Check MIC 26 Advanc...

Page 7: ...move a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode which uses an access point or ad hoc mode a group of stations participating in the wirele...

Page 8: ...the auto selected profiles 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up Move Down or Remove as appropriate The first profile in the Auto Selected Profiles box has highest p...

Page 9: ...button The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location TCP IP Configuration Configuring the TCP IP A...

Page 10: ...buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving a large number of packets then...

Page 11: ...on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options...

Page 12: ...o use EAP security In the Atheros Client Utility access the Security tab in the Profile Management window 1 On the Security tab choose the WPA WPA2 radio button OR On the Security tab choose the 802 1...

Page 13: ...riate network certificate authority from the drop down list 4 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR...

Page 14: ...down list 3 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name field to...

Page 15: ...Windows user name as the LEAP user name OR Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password...

Page 16: ...encryption key WEP Key Size Defines the size for each encryption key The options include 64 bit enter 10 digits for hexadecimal 5 ASCII characters 128 bit enter 26 digits for hexadecimal 13 digits for...

Page 17: ...e Wireless Network Configuration Properties dialog box 2 Select the check box Use Windows to configure my wireless network settings to set Zero Configuration When this check box is selected Windows XP...

Page 18: ...ions The Current Status tab does not require any configuration The following table describes the items found on the Current Status screen Profile Name The name of the current selected configuration pr...

Page 19: ...reation date of the wireless network adapter driver Client Name Name of the client computer Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics The Dia...

Page 20: ...ciation rejects the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan...

Page 21: ...Atheros Communications Inc 21 COMPANY CONFIDENTIAL October 2010 Ad Hoc Network Connected Ad Hoc Network Encryption Active...

Page 22: ...tive displays the change in statistical data since the last update Cumulative displays statistical data collected since opening the profile ACU Tools Use the Action menu to access the Atheros Client U...

Page 23: ...r disable the RF signal Manual LEAP Login Log in to LEAP manually if LEAP is set to manually prompt for user name and password on each login Reauthenticate Reauthenticate to the access point Select Pr...

Page 24: ...thin an independent basic service set IBSS as illustrated here All stations communicate directly with other stations without using an access point AP To connect to an ad hoc network configure the prof...

Page 25: ...s with the other stations through an AP as illustrated here To connect to an access point network configure the profile for access point mode Infrastructure Access Point Mode Profile Configuration To...

Page 26: ...e system 4 To complete the uninstallation remove the file ar5211 sys from the folder WINNT system32 drivers Additional Security Features These security features prevent attacks on a wireless network s...

Page 27: ...nt the wireless adapter is associated to Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to Associated AP MAC Address Displays the MAC address of t...

Page 28: ...rofessional in configuring and installing the product We hereby declare that the product will be distributed through controlled distribution channel which has special trained professional to install t...

Page 29: ...Atheros Communications Inc 29 COMPANY CONFIDENTIAL October 2010 Antenna A PCA 5216 25GC4 A2...

Page 30: ...30 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna B PCA 5216 25GC4 A2...

Page 31: ...Atheros Communications Inc 31 COMPANY CONFIDENTIAL October 2010 Antenna C MSA 7008 2G4C4...

Page 32: ...32 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna D FPA 3025 25GC4...

Page 33: ...to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequ...

Page 34: ...d for example digital device emissions PC peripheral requirements etc IMPORTANT NOTE In the event that these conditions can not be met for example certain laptop configurations or co location with ano...

Page 35: ...50 ohms To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication This device is int...

Page 36: ...location IMPORTANT NOTE To comply with FCC RF exposure compliance requirements The antenna must not be co located or operating in conjunction with any other antenna or transmitter European Community...

Page 37: ...Atheros Communications Inc 37 COMPANY CONFIDENTIAL October 2010 Taiwan NCC Radio Compliance XXXXXXXXXXX...

Reviews: