background image

 

 

26 

 

 

 

Atheros Communications, Inc. 

 

 

 

COMPANY CONFIDENTIAL 

 

Uninstall an Old Driver 

Uninstall an old driver before upgrading to a new NDIS driver release.  

To remove the newly installed driver from the system if the system does not have 

previously installed versions of the NDIS driver, proceed to Step 4. 

1.

 

To remove the NDIS driver from the OS, go to Device Manager, right-click 

Atheros 

AR500x Wireless Network Adapter

, and choose 

Uninstall

2.

 

Click 

OK

 to uninstall the device. 

3.

 

When the device is uninstalled from Device Manager, search for and delete the 

driver files that reside in the system. 

a.

 

Go to the Start menu and choose Search > For Files or Folders. 

b.

 

Enter 

oem*.inf

 in the Search for files or folders named: field, and enter 

Atheros

 in the 

Containing text:

 field. 

c.

 

Click 

Search Now

. A few files matching these criteria are possible, if previous 

drivers have not been removed properly. 

d.

 

Choose the files that have been found and delete them from the system. 

4.

 

To complete the uninstallation, remove the file 

ar5211.sys

 from the folder 

\WINNT\system32\drivers

 Additional Security Features 

These security features prevent attacks on a wireless network's WEP keys. The wireless 
adapter automatically supports each of these features, but these features must be enabled 

on the access point. 

Message Integrity Check (MIC) 

MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone 
intercepts an encrypted message retransmits it after some alterations.  Thus the receiver 
accepts the message as legitimate.  The MIC adds some bytes to each packet to protect it 

against tampering. 

Temporal

 Key Integrity Protocol (TKIP)

 

This feature prevents attacks on WEP in which someone catches encrypted packets and 
uses their initialization vector (IV) to decipher the WEP key. TKIP removes the 

predictability to protect both unicast and broadcast WEP keys. 

Broadcast

 Key Rotation

 

EAP authentication provides dynamic unicast WEP keys for wireless adapters, but 
uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a 
dynamic broadcast WEP key and changes it at intervals.

 

Summary of Contents for AR5BUB173

Page 1: ...Atheros 1X1 single band 802 11b g n module Model AR5BUB173 March 2009...

Page 2: ...rom patent infringement or from any other third party right No part of this document may be reproduced adapted or transmitted in any form or by any means electronic or mechanical for any purpose excep...

Page 3: ...splay Example Error Unable to allocate memory for transfer Menu The Menu character tag is used for menu items Example Choose Edit Copy Within commands items enclosed in square brackets are optional pa...

Page 4: ...4 Atheros Communications Inc COMPANY CONFIDENTIAL Revision History Revision Description of Changes March 2009 Initial Release...

Page 5: ...eral Tab 10 Advanced Tab 10 Security Tab 11 Using EAP TLS Security 12 Using EAP TTLS Security 12 Using PEAP EAP GTC Security 13 Using PEAP MSCHAP V2 Security 14 Using LEAP Security 15 Configuring LEAP...

Page 6: ...ration 24 Infrastructure Access Point Mode 25 Infrastructure Access Point Mode Profile Configuration 25 Uninstall an Old Driver 26 Additional Security Features 26 Message Integrity Check MIC 26 Advanc...

Page 7: ...move a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode which uses an access point or ad hoc mode a group of stations participating in the wirele...

Page 8: ...the auto selected profiles 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up Move Down or Remove as appropriate The first profile in the Auto Selected Profiles box has highest p...

Page 9: ...button The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location TCP IP Configuration Configuring the TCP IP A...

Page 10: ...buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving a large number of packets then...

Page 11: ...on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options...

Page 12: ...o use EAP security In the Atheros Client Utility access the Security tab in the Profile Management window 1 On the Security tab choose the WPA WPA2 radio button OR On the Security tab choose the 802 1...

Page 13: ...riate network certificate authority from the drop down list 4 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR...

Page 14: ...down list 3 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name field to...

Page 15: ...Windows user name as the LEAP user name OR Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password...

Page 16: ...encryption key WEP Key Size Defines the size for each encryption key The options include 64 bit enter 10 digits for hexadecimal 5 ASCII characters 128 bit enter 26 digits for hexadecimal 13 digits for...

Page 17: ...e Wireless Network Configuration Properties dialog box 2 Select the check box Use Windows to configure my wireless network settings to set Zero Configuration When this check box is selected Windows XP...

Page 18: ...ions The Current Status tab does not require any configuration The following table describes the items found on the Current Status screen Profile Name The name of the current selected configuration pr...

Page 19: ...reation date of the wireless network adapter driver Client Name Name of the client computer Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics The Dia...

Page 20: ...ciation rejects the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan...

Page 21: ...Atheros Communications Inc 21 COMPANY CONFIDENTIAL October 2010 Ad Hoc Network Connected Ad Hoc Network Encryption Active...

Page 22: ...tive displays the change in statistical data since the last update Cumulative displays statistical data collected since opening the profile ACU Tools Use the Action menu to access the Atheros Client U...

Page 23: ...r disable the RF signal Manual LEAP Login Log in to LEAP manually if LEAP is set to manually prompt for user name and password on each login Reauthenticate Reauthenticate to the access point Select Pr...

Page 24: ...thin an independent basic service set IBSS as illustrated here All stations communicate directly with other stations without using an access point AP To connect to an ad hoc network configure the prof...

Page 25: ...s with the other stations through an AP as illustrated here To connect to an access point network configure the profile for access point mode Infrastructure Access Point Mode Profile Configuration To...

Page 26: ...e system 4 To complete the uninstallation remove the file ar5211 sys from the folder WINNT system32 drivers Additional Security Features These security features prevent attacks on a wireless network s...

Page 27: ...nt the wireless adapter is associated to Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to Associated AP MAC Address Displays the MAC address of t...

Page 28: ...rofessional in configuring and installing the product We hereby declare that the product will be distributed through controlled distribution channel which has special trained professional to install t...

Page 29: ...Atheros Communications Inc 29 COMPANY CONFIDENTIAL October 2010 Antenna A PCA 5216 25GC4 A2...

Page 30: ...30 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna B PCA 5216 25GC4 A2...

Page 31: ...Atheros Communications Inc 31 COMPANY CONFIDENTIAL October 2010 Antenna C MSA 7008 2G4C4...

Page 32: ...32 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna D FPA 3025 25GC4...

Page 33: ...to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequ...

Page 34: ...d for example digital device emissions PC peripheral requirements etc IMPORTANT NOTE In the event that these conditions can not be met for example certain laptop configurations or co location with ano...

Page 35: ...50 ohms To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication This device is int...

Page 36: ...location IMPORTANT NOTE To comply with FCC RF exposure compliance requirements The antenna must not be co located or operating in conjunction with any other antenna or transmitter European Community...

Page 37: ...Atheros Communications Inc 37 COMPANY CONFIDENTIAL October 2010 Taiwan NCC Radio Compliance XXXXXXXXXXX...

Reviews: