![Atheros ARS42-SB Скачать руководство пользователя страница 5](http://html1.mh-extra.com/html/atheros/ars42-sb/ars42-sb_manual_2998457005.webp)
Atheros Communications, Inc.
•
5
COMPANY CONFIDENTIAL
May 2011
Contents
Introduction ............................................................................................................... 7
System Requirements ........................................................................................ 7
Profile Management ................................................................................................. 7
Create or Modify a Configuration Profile ....................................................... 7
Remove a Configuration Profile ....................................................................... 8
Auto Profile Selection Management
....................................................................... 8
Switching to a Different Configuration Profile ..................................................... 9
Import and Export Profiles
....................................................................................... 9
Importing a Profile
..................................................................................................... 9
Exporting a Profile
..................................................................................................... 9
TCP/IP Configuration .............................................................................................. 9
Configuring the TCP/IP Address for the network device:
.................................... 9
General Tab .............................................................................................................. 10
Advanced Tab .......................................................................................................... 10
Security Tab ............................................................................................................. 11
Using EAP-TLS Security ................................................................................. 12
Using EAP-TTLS Security ............................................................................... 12
Using PEAP (EAP-GTC) Security .................................................................. 13
Using PEAP-MSCHAP V2 Security ............................................................... 14
Using LEAP Security ....................................................................................... 15
Configuring LEAP
.................................................................................................... 15
Pre-Shared Encryption Keys .................................................................................. 16
Defining pre-shared encryption keys:
................................................................... 16
Overwriting an Existing Static WEP Key
.............................................................. 16
Disabling Static WEP
.............................................................................................. 16
Using WPA Passphrase Security .......................................................................... 17
Zero Configuration ................................................................................................. 17
Wireless Network Configuration
............................................................................ 17
Check the Status Information or Diagnostics ...................................................... 18
Current Status ................................................................................................... 18
Adapter Information Button .................................................................................. 19
Diagnostics Tab ....................................................................................................... 19
Transmitted Frames
................................................................................................ 20
Received Frames
.................................................................................................... 20
Scan Available Networks
....................................................................................... 20
Connecting to a different network
......................................................................... 20