Atheros AR5BXB63 User Manual Download Page 5

 

Atheros Communications, Inc. 

 

 

 

COMPANY CONFIDENTIAL 

 

July 2006 

Contents 

Introduction ...............................................................................................................7 

System Requirements ........................................................................................7 

Profile Management .................................................................................................7 

Create or Modify a Configuration Profile.......................................................7 
Remove a Configuration Profile.......................................................................8 

Auto Profile Selection Management.......................................................................8 

Switching to a Different Configuration Profile.....................................................9 

Import and Export Profiles ......................................................................................9 

Importing a Profile....................................................................................................9 

Exporting a Profile ....................................................................................................9 

TCP/IP Configuration..............................................................................................9 

Configuring the TCP/IP Address for the network device:.................................9 

General Tab..............................................................................................................10 

Advanced Tab..........................................................................................................10 

Security Tab .............................................................................................................11 

Using EAP-TLS Security .................................................................................12 
Using EAP-TTLS Security ...............................................................................12 
Using PEAP (EAP-GTC) Security ..................................................................13 
Using PEAP-MSCHAP V2 Security...............................................................14 
Using LEAP Security .......................................................................................15 

Configuring LEAP ..................................................................................................15 

Pre-Shared Encryption Keys..................................................................................16 

Defining pre-shared encryption keys:..................................................................16 

Overwriting an Existing Static WEP Key ............................................................16 

Disabling Static WEP..............................................................................................16 

Using WPA Passphrase Security ..........................................................................17 

Zero Configuration .................................................................................................17 

Wireless Network Configuration..........................................................................17 

Check the Status Information or Diagnostics......................................................18 

Summary of Contents for AR5BXB63

Page 1: ...Atheros 802 11b g Adapter Model AR5BXB63 802 11b g Adapter July 2006...

Page 2: ...r transmitted in any form or by any means electronic or mechanical for any purpose except as expressly set forth in a written agreement signed by Atheros Atheros or its affiliates may have patents or...

Page 3: ...play Example Error Unable to allocate memory for transfer Menu The Menu character tag is used for menu items Example Choose Edit Copy Within commands items enclosed in square brackets are optional par...

Page 4: ...iv Atheros Communications Inc Feb 2006 COMPANY CONFIDENTIAL Revision History Revision Description of Changes July 2006 Initial Release...

Page 5: ...9 TCP IP Configuration 9 Configuring the TCP IP Address for the network device 9 General Tab 10 Advanced Tab 10 Security Tab 11 Using EAP TLS Security 12 Using EAP TTLS Security 12 Using PEAP EAP GTC...

Page 6: ...23 Color 24 Quality 24 RSSI 24 Ad Hoc Mode 24 Ad Hoc Mode Profile Configuration 24 Infrastructure Access Point Mode 25 Infrastructure Access Point Mode Profile Configuration 25 Uninstall an Old Driver...

Page 7: ...h to a different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode which uses an access point or ad hoc mode a group of stations...

Page 8: ...ering the auto selected profiles 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up Move Down or Remove as appropriate The first profile in the Auto Selected Profiles box has high...

Page 9: ...tton The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location TCP IP Configuration Configuring the TCP IP Add...

Page 10: ...nt to buffer incoming messages for the wireless adapter The adapter periodically polls the access point to see if any messages are waiting Normal uses maximum when retrieving a large number of packets...

Page 11: ...A WPA2 Passphrase security Click on the Configure button and fill in the WPA WPA2 Passphrase 802 1x Enables 802 1x security This option requires IT administration Choosing 802 1x opens the 802 1x EAP...

Page 12: ...login name are filled in automatically from the certificate information Click OK 3 Click OK 4 Activate the profile Using EAP TTLS Security To use EAP security In the Atheros Client Utility access the...

Page 13: ...puter goes into standby or hibernate mode check Always Resume the Secure Session 3 Select the appropriate network certificate authority from the drop down list 4 Specify a user name for inner PEAP tun...

Page 14: ...drop down list 3 Specify a user name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name fie...

Page 15: ...Windows user name as the LEAP user name OR Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password...

Page 16: ...ault encryption key WEP Key Size Defines the size for each encryption key The options include 64 bit enter 10 digits for hexadecimal 5 ASCII characters 128 bit enter 26 digits for hexadecimal 13 digit...

Page 17: ...Wireless Network Configuration Properties dialog box 2 Select the check box Use Windows to configure my wireless network settings to set Zero Configuration When this check box is selected Windows XP...

Page 18: ...tion about the program and its operations The Current Status tab does not require any configuration The following table describes the items found on the Current Status screen Profile Name The name of...

Page 19: ...rk adapter driver Driver Date Creation date of the wireless network adapter driver Client Name Name of the client computer Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive...

Page 20: ...Association rejects the number of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the...

Page 21: ...Atheros Communications Inc 21 COMPANY CONFIDENTIAL July 2006 Ad Hoc Network Connected Ad Hoc Network Encryption Active...

Page 22: ...Relative displays the change in statistical data since the last update Cumulative displays statistical data collected since opening the profile ACU Tools Use the Action menu to access the Atheros Cli...

Page 23: ...Disable Radio Enable or disable the RF signal Manual LEAP Login Log in to LEAP manually if LEAP is set to manually prompt for user name and password on each login Reauthenticate Reauthenticate to the...

Page 24: ...n menu Ad Hoc Mode In ad hoc mode a wireless network adapter works within an independent basic service set IBSS as illustrated here All stations communicate directly with other stations without using...

Page 25: ...ce set BSS as a station and communicates with the other stations through an AP as illustrated here To connect to an access point network configure the profile for access point mode Infrastructure Acce...

Page 26: ...om the system 4 To complete the uninstallation remove the file ar5211 sys from the folder WINNT system32 drivers Additional Security Features These security features prevent attacks on a wireless netw...

Page 27: ...the wireless adapter is associated to Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to Associated AP MAC Address Displays the MAC address of the...

Page 28: ...nd found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residentia...

Page 29: ...dio interference to the licensed service this device is intended to be operated indoors and away from windows to provide maximum shielding Equipment or its transmit antenna that is installed outdoors...

Page 30: ...30 Atheros Communications Inc July 2006 COMPANY CONFIDENTIAL Taiwan DGT Radio Compliance 2 4GHz Operation...

Page 31: ...Atheros Communications Inc 31 COMPANY CONFIDENTIAL July 2006 Atheros Communications Incorporated 5480 Great America Parkway Santa Clara CA 95054 t 408 773 5200 f 408 773 9940 www atheros com...

Reviews: