background image

 

 

Uninstall an Old Driver 

Uninstall an old driver before upgrading to a new NDIS driver release.  

To remove the newly installed driver from the system if the system does not have 
previously installed versions of the NDIS driver, proceed to Step 4. 

1.

 

To remove the NDIS driver from the OS, go to Device Manager, right-click 

Acer 

AR500x Wireless Network Adapter

, and choose 

Uninstall

2.

 

Click 

OK

 to uninstall the device. 

3.

 

When the device is uninstalled from Device Manager, search for and delete the 
driver files that reside in the system. 

a.

 

Go to the Start menu and choose Search > For Files or Folders. 

b.

 

Enter 

oem*.inf

 in the Search for files or folders named: field, and enter 

Acer

 

in the 

Containing text:

 field. 

c.

 

Click 

Search Now

. A few files matching these criteria are possible, if previous 

drivers have not been removed properly. 

d.

 

Choose the files that have been found and delete them from the system. 

4.

 

To complete the uninstallation, remove the file 

ar5211.sys

 from the folder 

\WINNT\system32\drivers

 Additional Security Features 

These security features prevent attacks on a wireless network's WEP keys. The wireless 
adapter automatically supports each of these features, but these features must be enabled 
on the access point. 

Message Integrity Check (MIC) 

MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone 
intercepts an encrypted message retransmits it after some alterations.  Thus the receiver 
accepts the message as legitimate.  The MIC adds some bytes to each packet to protect it 
against tampering. 

Temporal

 Key Integrity Protocol (TKIP)

 

This feature prevents attacks on WEP in which someone catches encrypted packets and 
uses their initialization vector (IV) to decipher the WEP key. TKIP removes the 
predictability to protect both unicast and broadcast WEP keys. 

Broadcast

 Key Rotation

 

EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses 
static broadcast keys. In broadcast WEP key rotation, the access point supplies a 
dynamic broadcast WEP key and changes it at intervals. 

 

Содержание Atheros AR5B95

Страница 1: ...Acer Gateway PackardBell 802 11n Adapter Model AR5B95 802 11n Adapter Dec 2008 ...

Страница 2: ...or by any means electronic or mechanical for any purpose except as expressly set forth in a written agreement signed by Acer Acer or its affiliates may have patents or pending patent applications trademarks copyrights maskwork rights or other intellectual property rights that apply to the ideas material and information expressed herein No license to such rights is provided except as expressly set ...

Страница 3: ...play Example Error Unable to allocate memory for transfer Menu The Menu character tag is used for menu items Example Choose Edit Copy Within commands items enclosed in square brackets are optional parameters or values that the user can choose to specify or omit Within commands items enclosed in braces are options from which the user must choose Within commands the vertical bar separates options An...

Страница 4: ...iv Acer Communications Inc Dec 2008 COMPANY CONFIDENTIAL Revision History Revision Description of Changes Dec 2008 Initial Release ...

Страница 5: ... TCP IP Configuration 9 Configuring the TCP IP Address for the network device 9 General Tab 10 Advanced Tab 10 Security Tab 11 Using EAP TLS Security 12 Using EAP TTLS Security 12 Using PEAP EAP GTC Security 13 Using PEAP MSCHAP V2 Security 14 Using LEAP Security 15 Configuring LEAP 15 Pre Shared Encryption Keys 16 Defining pre shared encryption keys 16 Overwriting an Existing Static WEP Key 16 Di...

Страница 6: ... 22 Tray Icon 23 Color 24 Quality 24 RSSI 24 Ad Hoc Mode 24 Ad Hoc Mode Profile Configuration 24 Infrastructure Access Point Mode 25 Infrastructure Access Point Mode Profile Configuration 25 Uninstall an Old Driver 26 Additional Security Features 26 Message Integrity Check MIC 26 Advanced Status Information 27 Compliance 28 Industry Canada Notice 錯誤 尚未定義書籤 Avis de Conformité à la Réglementation d ...

Страница 7: ...different profile Remove a profile Connect to a Different Network The wireless network adapter works in either infrastructure mode which uses an access point or ad hoc mode a group of stations participating in the wireless LAN Create or Modify a Configuration Profile To add a new configuration profile click New on the Profile Management tab To modify a configuration profile select the configuratio...

Страница 8: ...les 1 Highlight a profile in the Auto Selected Profiles box 2 Click Move Up Move Down or Remove as appropriate The first profile in the Auto Selected Profiles box has highest priority and the last profile has lowest priority 3 Click OK 4 Check the Auto Select Profiles box 5 Save the modified configuration file When auto profile selection is enabled by checking Auto Select Profiles on the Profile M...

Страница 9: ...tton The Export Profile window appears 3 Browse to the directory to export the profile to 4 Click Save The profile is exported to the specified location TCP IP Configuration Configuring the TCP IP Address for the network device 1 After configuring the wireless network adapter properties open the Control Panel and open Network and Dial up Connections 2 Find the Local Area Connection associated with...

Страница 10: ...if any messages are waiting Normal uses maximum when retrieving a large number of packets then switches back to power save mode after retrieving the packets Off turns power saving off thus powering up the wireless adapter continuously for a short message response time Network Type Specifies the network as either infrastructure or ad hoc 802 11b Preamble Specifies the preamble setting in 802 11b Th...

Страница 11: ...ires IT administration Choosing 802 1x opens the 802 1x EAP type drop down menu The options include EAP FAST EAP TLS EAP TTLS PEAP EAP GTC PEAP EAP MSCHAP V2 LEAP If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association Note If the Lock c...

Страница 12: ... choose the WPA WPA2 radio button OR On the Security tab choose the 802 1x radio button 2 Choose EAP TTLS from the drop down menu Enabling EAP TTLS security To use EAP TTLS security the machine must already have the EAP TTLS certificates downloaded onto it Check with the IT manager 1 If EAP TTLS is supported choose EAP TTLS from the drop down menu on the right then click the Configure button 2 Sel...

Страница 13: ...name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process 5 Choose Token or Static Password depending on the user database Note that Token uses a hardware token device or the Secure Computing SofToken program version 1...

Страница 14: ...r name for inner PEAP tunnel authentication Check Use Windows User Name to use the Windows user name as the PEAP user name OR Enter a PEAP user name in the User Name field to use a separate user name and start the PEAP authentication process 4 Click Advanced and Leave the server name field blank for the client to accept a certificate from any server with a certificate signed by the authority liste...

Страница 15: ...dows user name as the LEAP user name OR Check Manually Prompt for LEAP User Name and Password to manually login and start the LEAP authentication process Select to Use Saved User Name and Password by choosing the radio button Specify the LEAP user name password and domain to save and use 3 Enter the user name and password 4 Confirm the password 5 Specify a domain name Check the Include Windows Log...

Страница 16: ...ize Defines the size for each encryption key The options include 64 bit enter 10 digits for hexadecimal 5 ASCII characters 128 bit enter 26 digits for hexadecimal 13 digits for ASCII 152 bit enter 32 digits hexadecimal 16 digits for ASCII 4 Click OK for the changes to take effect Overwriting an Existing Static WEP Key 1 Click the Pre Shared Key radio button on the Security tab 2 Click on Configure...

Страница 17: ...reless Network Configuration Properties dialog box 2 Select the check box Use Windows to configure my wireless network settings to set Zero Configuration When this check box is selected Windows XP takes control of these settings for all configuration profiles SSID Security keys Ad hoc settings Note that Windows XP takes control of these settings for all configuration profiles thus users can not cr...

Страница 18: ...b does not require any configuration The following table describes the items found on the Current Status screen Profile Name The name of the current selected configuration profile Set up the configuration name on the General tab Link Status Shows whether the station is associated to the wireless network Wireless Mode Displays the wireless mode Configure the wireless mode on the Advanced tab IP Add...

Страница 19: ...ation date of the wireless network adapter driver Client Name Name of the client computer Diagnostics Tab The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics The Diagnostics tab does not require any configuration It lists these receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter Multicast packets transmitted and re...

Страница 20: ...r of AP authentication rejects received by the wireless network adapter Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks On this list click Refresh to refresh the list at any time Connecting to a different network Highlight a network name and click the...

Страница 21: ...Acer Communications Inc xxi COMPANY CONFIDENTIAL Dec 2008 Ad Hoc Network Connected Ad Hoc Network Encryption Active ...

Страница 22: ...ange in statistical data since the last update Cumulative displays statistical data collected since opening the profile ACU Tools Use the Action menu to access the Acer Client Utility tools Enable Disable Radio Enable or disable the RF Signal on all Acer station reference designs Enable Disable Tray Icon Enable or disable the tray icon Troubleshooting Run the optional Troubleshooting Utility Manua...

Страница 23: ...isable the RF signal Manual LEAP Login Log in to LEAP manually if LEAP is set to manually prompt for user name and password on each login Reauthenticate Reauthenticate to the access point Select Profile Click a configuration profile name to switch to If no configuration profile exists for a connection add a profile Show Connection Status This window displays connection information Active Profile D...

Страница 24: ...trated here All stations communicate directly with other stations without using an access point AP To connect to an ad hoc network configure the profile for ad hoc mode Ad Hoc operation may be limited by Hardware to meet regulatory requirements Ad Hoc Mode Profile Configuration To configure a profile in ad hoc mode change the Network Type in the Profile Management s Advanced tab For ad hoc mode mo...

Страница 25: ...rough an AP as illustrated here To connect to an access point network configure the profile for access point mode Infrastructure Access Point Mode Profile Configuration To configure a profile in infrastructure access point mode change the Network Type in the Advanced tab For access point mode modify the settings Power Save Mode 802 11b Preamble if using 802 11b Wireless Mode 802 11 Authentication ...

Страница 26: ...uninstallation remove the file ar5211 sys from the folder WINNT system32 drivers Additional Security Features These security features prevent attacks on a wireless network s WEP keys The wireless adapter automatically supports each of these features but these features must be enabled on the access point Message Integrity Check MIC MIC prevents bit flip attacks on encrypted packets In a bit flip at...

Страница 27: ...the wireless adapter is associated to Associated AP IP Address Shows the IP address of the access point the wireless adapter is associated to Associated AP MAC Address Displays the MAC address of the access point the wireless adapter is associated to Power Save Mode Shows the power save mode Power management is disabled in ad hoc mode Configure the power save mode on the Advanced tab Current Power...

Страница 28: ...its for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy If not installed and used in accordance with the instructions it may cause harmful interference to radio communications However there is no guarant...

Страница 29: ...adio interference to the licensed service this device is intended to be operated indoors and away from windows to provide maximum shielding Equipment or its transmit antenna that is installed outdoors is subject to licensing Pour empecher que cet appareil cause du brouillage au service faisant l objet d une licence il doit etre utilize a l interieur et devrait etre place loin des fenetres afin de ...

Страница 30: ...pliance 2 4GHz Operation 低功率電波輻性電機管理辦法 第十二條經型式認證合格之低功率射頻電機 非經許可 公司 商號或使 用者均不得擅自變更頻率 加大功率或變更原設計之特性及功能 第十四條低功率射頻電機之使用不得影響飛航安全及干擾合法通信 經發 現有干擾現象時 應立即停用 並改善至無干擾時方得繼續使用 前項合法通信 指依電信規定作業之無線電信 低功率射頻電機須忍受合法通信 或工業 科學及醫療用電波輻射性電機設備之干擾 ...

Отзывы: