Qualcomm Atheros, Inc.
•
v
COMPANY CONFIDENTIAL
July 2013
Contents
Create or Modify a Configuration Profile ....................................................... 7
Auto Profile Selection Management
....................................................................... 8
....................................................................................... 9
Configuring the TCP/IP Address for the network device:
.................................... 9
Using PEAP (EAP-GTC) Security .................................................................. 13
Using PEAP-MSCHAP V2 Security ............................................................... 15
Defining pre-shared encryption keys:
................................................................... 17
Overwriting an Existing Static WEP Key
............................................................. 17
.............................................................................................. 18
Wireless Network Configuration
............................................................................ 18
................................................................................................ 21
....................................................................................... 21
Connecting to a different network
......................................................................... 21