background image

 

 

 

 

 

Atheros Communications, Inc. 

 

 

 

COMPANY CONFIDENTIAL 

 

Remove a Configuration Profile 

1.

 

Go to the Profile Management tab.

  

2.

 

Select the profile to remove from the list of configuration profiles. 

  

3.

 

Click the 

Remove

 button.

  

Auto Profile Selection Management 

Including a profile in the auto selection feature allows the wireless adapter to 

automatically select that profile from the list of profiles and use it to connect to the 

network.  

Including a profile in auto profile selection:

 

1.

 

On the Profile Management tab, click the 

Order Profiles 

button.  

2.

 

The Auto Profile Selection Management window appears, with a list of all created 

profiles in the 

Available Profiles

 box.   

3.

 

Highlight the profiles to add to auto profile selection, then click 

Add

. The profiles 

appear in the 

Auto Selected Profiles

 box. 

Ordering the auto selected profiles:

 

1.

 

Highlight a profile in the 

Auto Selected Profiles

 box. 

2.

 

Click 

Move Up

Move Down, 

or 

Remove

 as appropriate. The first profile in the Auto 

Selected Profiles box has highest priority, and the last profile has lowest priority.  

3.

 

Click 

OK

.  

4.

 

Check the 

Auto Select Profiles 

box.  

5.

 

Save the modified configuration file.  

When auto profile selection is enabled by checking 

Auto Select Profiles

 on the Profile 

Management tab, the  adapter scans for an available network. The profile with the 

highest priority and the same SSID as one of the found networks is the one that is used 
to connect to the network. If the connection fails, the  adapter tries the next highest 

priority profile that matches the SSID, and so on. 

With auto profile selection enabled, the wireless adapter scans for available networks. 

The highest priority profile with the same SSID as a found network is used to connect to 

the network. On a failed connection, the  adapter tries with the next highest priority 
profile. 

Summary of Contents for AR5BUB173

Page 1: ...Atheros 1X1 single band 802 11b g n module Model AR5BUB173 March 2009...

Page 2: ...rom patent infringement or from any other third party right No part of this document may be reproduced adapted or transmitted in any form or by any means electronic or mechanical for any purpose excep...

Page 3: ...splay Example Error Unable to allocate memory for transfer Menu The Menu character tag is used for menu items Example Choose Edit Copy Within commands items enclosed in square brackets are optional pa...

Page 4: ...4 Atheros Communications Inc COMPANY CONFIDENTIAL Revision History Revision Description of Changes March 2009 Initial Release...

Page 5: ...eral Tab 10 Advanced Tab 10 Security Tab 11 Using EAP TLS Security 12 Using EAP TTLS Security 12 Using PEAP EAP GTC Security 13 Using PEAP MSCHAP V2 Security 14 Using LEAP Security 15 Configuring LEAP...

Page 6: ...ration 24 Infrastructure Access Point Mode 25 Infrastructure Access Point Mode Profile Configuration 25 Uninstall an Old Driver 26 Additional Security Features 26 Message Integrity Check MIC 26 Advanc...

Page 7: ...move a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode which uses an access point or ad hoc mode a group of stations participating in the wirele...

Page 8: ...the auto selected profiles 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up Move Down or Remove as appropriate The first profile in the Auto Selected Profiles box has highest p...

Page 9: ...button The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location TCP IP Configuration Configuring the TCP IP A...

Page 10: ...buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving a large number of packets then...

Page 11: ...on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options...

Page 12: ...o use EAP security In the Atheros Client Utility access the Security tab in the Profile Management window 1 On the Security tab choose the WPA WPA2 radio button OR On the Security tab choose the 802 1...

Page 13: ...riate network certificate authority from the drop down list 4 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR...

Page 14: ...down list 3 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name field to...

Page 15: ...Windows user name as the LEAP user name OR Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password...

Page 16: ...encryption key WEP Key Size Defines the size for each encryption key The options include 64 bit enter 10 digits for hexadecimal 5 ASCII characters 128 bit enter 26 digits for hexadecimal 13 digits for...

Page 17: ...e Wireless Network Configuration Properties dialog box 2 Select the check box Use Windows to configure my wireless network settings to set Zero Configuration When this check box is selected Windows XP...

Page 18: ...ions The Current Status tab does not require any configuration The following table describes the items found on the Current Status screen Profile Name The name of the current selected configuration pr...

Page 19: ...reation date of the wireless network adapter driver Client Name Name of the client computer Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics The Dia...

Page 20: ...ciation rejects the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan...

Page 21: ...Atheros Communications Inc 21 COMPANY CONFIDENTIAL October 2010 Ad Hoc Network Connected Ad Hoc Network Encryption Active...

Page 22: ...tive displays the change in statistical data since the last update Cumulative displays statistical data collected since opening the profile ACU Tools Use the Action menu to access the Atheros Client U...

Page 23: ...r disable the RF signal Manual LEAP Login Log in to LEAP manually if LEAP is set to manually prompt for user name and password on each login Reauthenticate Reauthenticate to the access point Select Pr...

Page 24: ...thin an independent basic service set IBSS as illustrated here All stations communicate directly with other stations without using an access point AP To connect to an ad hoc network configure the prof...

Page 25: ...s with the other stations through an AP as illustrated here To connect to an access point network configure the profile for access point mode Infrastructure Access Point Mode Profile Configuration To...

Page 26: ...e system 4 To complete the uninstallation remove the file ar5211 sys from the folder WINNT system32 drivers Additional Security Features These security features prevent attacks on a wireless network s...

Page 27: ...nt the wireless adapter is associated to Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to Associated AP MAC Address Displays the MAC address of t...

Page 28: ...rofessional in configuring and installing the product We hereby declare that the product will be distributed through controlled distribution channel which has special trained professional to install t...

Page 29: ...Atheros Communications Inc 29 COMPANY CONFIDENTIAL October 2010 Antenna A PCA 5216 25GC4 A2...

Page 30: ...30 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna B PCA 5216 25GC4 A2...

Page 31: ...Atheros Communications Inc 31 COMPANY CONFIDENTIAL October 2010 Antenna C MSA 7008 2G4C4...

Page 32: ...32 Atheros Communications Inc COMPANY CONFIDENTIAL Antenna D FPA 3025 25GC4...

Page 33: ...to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequ...

Page 34: ...d for example digital device emissions PC peripheral requirements etc IMPORTANT NOTE In the event that these conditions can not be met for example certain laptop configurations or co location with ano...

Page 35: ...50 ohms To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication This device is int...

Page 36: ...location IMPORTANT NOTE To comply with FCC RF exposure compliance requirements The antenna must not be co located or operating in conjunction with any other antenna or transmitter European Community...

Page 37: ...Atheros Communications Inc 37 COMPANY CONFIDENTIAL October 2010 Taiwan NCC Radio Compliance XXXXXXXXXXX...

Reviews: