Atheros Communications, Inc.
•
v
COMPANY CONFIDENTIAL
August 2010
Contents
Introduction .......................................................................................................... 8
System Requirements .................................................................................... 8
Profile Management ............................................................................................. 8
Create or Modify a Configuration Profile .................................................... 8
Remove a Configuration Profile ................................................................... 9
Auto Profile Selection Management
.................................................................... 9
Switching to a Different Configuration Profile ................................................ 10
Import and Export Profiles
................................................................................. 10
Importing a Profile
.............................................................................................. 10
Exporting a Profile
.............................................................................................. 10
TCP/IP Configuration ....................................................................................... 10
Configuring the TCP/IP Address for the network device:
................................ 10
General Tab......................................................................................................... 11
Advanced Tab..................................................................................................... 11
Security Tab ........................................................................................................ 12
Using EAP-TLS Security.............................................................................. 13
Using EAP-TTLS Security ........................................................................... 13
Using PEAP (EAP-GTC) Security ............................................................... 14
Using PEAP-MSCHAP V2 Security............................................................ 15
Using LEAP Security ................................................................................... 16
Configuring LEAP
............................................................................................... 16
Pre-Shared Encryption Keys.............................................................................. 17
Defining pre-shared encryption keys:
............................................................... 17
Overwriting an Existing Static WEP Key
.......................................................... 17
Disabling Static WEP
......................................................................................... 18
Using WPA Passphrase Security....................................................................... 18
Zero Configuration............................................................................................. 18
Wireless Network Configuration
........................................................................ 18
Check the Status Information or Diagnostics ................................................... 19
Current Status .............................................................................................. 19
Adapter Information Button.............................................................................. 20
Diagnostics Tab .................................................................................................. 20
Transmitted Frames
........................................................................................... 21
Received Frames
............................................................................................... 21
Scan Available Networks
................................................................................... 21
Connecting to a different network
..................................................................... 21