Qualcomm Atheros, Inc.
•
v
COMPANY CONFIDENTIAL
October 2012
Contents
Introduction .......................................................................................................... 7
System Requirements .................................................................................... 7
Profile Management ............................................................................................. 7
Create or Modify a Configuration Profile .................................................... 7
Remove a Configuration Profile ................................................................... 8
Auto Profile Selection Management
.................................................................... 8
Switching to a Different Configuration Profile .................................................. 9
Import and Export Profiles
................................................................................... 9
Importing a Profile
................................................................................................ 9
Exporting a Profile
................................................................................................ 9
TCP/IP Configuration ......................................................................................... 9
Configuring the TCP/IP Address for the network device:
.................................. 9
General Tab ......................................................................................................... 10
Advanced Tab ..................................................................................................... 10
Security Tab ........................................................................................................ 11
Using EAP-TLS Security .............................................................................. 12
Using EAP-TTLS Security ........................................................................... 12
Using PEAP (EAP-GTC) Security ............................................................... 13
Using PEAP-MSCHAP V2 Security ............................................................ 14
Using LEAP Security ................................................................................... 15
Configuring LEAP
............................................................................................... 15
Pre-Shared Encryption Keys .............................................................................. 16
Defining pre-shared encryption keys:
............................................................... 16
Overwriting an Existing Static WEP Key
.......................................................... 16
Disabling Static WEP
......................................................................................... 16
Using WPA Passphrase Security ....................................................................... 17
Zero Configuration ............................................................................................. 17
Wireless Network Configuration
........................................................................ 17
Check the Status Information or Diagnostics ................................................... 18
Current Status .............................................................................................. 18
Adapter Information Button .............................................................................. 19
Diagnostics Tab .................................................................................................. 19
Transmitted Frames
........................................................................................... 20
Received Frames
............................................................................................... 20
Scan Available Networks
................................................................................... 20
Connecting to a different network
..................................................................... 20