Intel(R) PRO/Wireless 3945ABG Network Connection User Guide With your wireless network card, you can access wireless networks, share files or printers, or even share your Internet connection. All of these features can be explored with a wireless network in your home or office. This wireless local area network (WLAN) solution is designed for both home and business use. Additional users and features can be added as your networking needs grow and change.
● ● ● ● ● ● ● ● Glossary Wireless Network Overview Security Overview Specifications Customer Support Safety and Regulatory Information Warranty Adapter Registration Information in this document is subject to change without notice. © 2004–2005 Intel Corporation. All rights reserved. Intel Corporation, 5200 N.E.
are generally unlicensed devices that share spectrum with radars, satellites, and other licensed and unlicensed devices, it is sometimes necessary to dynamically detect, avoid, and limit usage to avoid interference with these devices. In many instances Intel is required to provide test data to prove regional and local compliance to regional and governmental regulations before certification or approval to use the product is granted.
Back to Contents Use Intel(R) PROSet/Wireless Software: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide ● ● ● ● ● ● ● ● ● ● Use Intel PROSet/Wireless as your Wireless Manager Start Intel PROSet/Wireless Start Intel PROSet/Wireless from the Taskbar ❍ Taskbar Icons ❍ Tool Tips and Desktop Alerts Intel PROSet/Wireless Main Window ❍ Wireless Networks List ❍ Connection Status Icons ❍ Network Properties ❍ Connection Details ❍ Profiles List Intel PROSet/Wireless Menus Tools Menu ❍ Application S
. Click Wireless Networks. 6. Verify that the Use Windows to configure my wireless network settings is not selected. If it is, clear it. 7. Click OK. This confirms that the Intel PROSet/Wireless utility is configured to manage your network profiles. NOTE: Check that the Application Settings option Notify when another application uses the wireless adapter is selected. This option prompts you when Microsoft Windows XP Wireless Zero Configuration starts to manage your network profiles.
Open Intel PROSet/Wireless Open Wireless Zero Configuration Wireless On Click to start Intel PROSet/Wireless when Intel PROSet/Wireless is your wireless manager. If you select Use Windows to manage Wi-Fi from the Taskbar menu, the menu option changes to Open Wireless Zero Configuration and Microsoft Windows XP Wireless Zero Configuration Service is used as your wireless manager. When you use Microsoft Windows, you cannot use your Intel profiles.
Searching for wireless networks: The wireless adapter searches for any available wireless networks. The icon is white with animation. No wireless networks found: There are no available wireless networks found. Intel PROSet/Wireless periodically scans for available networks. If you want to force a scan, double-click the icon to launch Intel PROSet/Wireless and click Refresh. The icon is red. Wireless network found: An available wireless network is found.
Tool Tip: Intel PROSet/Wireless Connected to a wireless network Wireless Network Name: Wireless Speed: 54.0 Mbps Signal Quality: Excellent IP Address: 192.168.1.103 Wireless networks found Action: Click the desktop alert to connect to the available network. Desktop alerts are also used to indicate if there is a connection problem. Click the alert to open the Intel Wireless Troubleshooter.
Use the Intel PROSet/Wireless to: ● ● ● ● ● ● View the current connection status (signal quality, speed and current network name). Scan for available wireless networks. Manage profiles. Auto-connect profiles to available networks in a specific order defined in the Profiles list. Connect to infrastructure and ad hoc networks. Configure adapter power settings.
Icon Description Wireless Off: The radio is not associated to a network. Click the Wireless On button to enable the radio. The authentication process to connect to the network has not been started. Searching for wireless networks: The wireless adapter is scanning for any available wireless networks. Animated Icons: No wireless networks found: The adapter does not find any wireless networks. Wireless network found: An available wireless network is found.
Wireless Networks The Wireless Networks list displays a list of wireless networks within range of the adapter. Name Description The signal strength of the wireless network access point or computer (Device to Device [ad hoc] mode). The signal strength icon bars indicate that the wireless network or computer is available for connection but is still not is associated with an access point or computer (Device to Device [ad hoc] mode).
Network Name Displays the wireless network name. Band Current band and frequency being used. Displays Out of Range if no band and frequency is displayed. The following bands are listed: ● ● ● Operation Mode 802.11a 802.11b 802.11g Displays the current operating mode: ● Network (Infrastructure) A wireless network centered around an access point.
Access Points in this Network (050) ● Signal Strength: The Signal strength icon bars indicate the strength of the transmit and receive signals in percent values between your wireless adapter and the nearest access point. Indicates how well the wireless adapter communicates with an access point or another wireless computer in Device to Device (ad hoc) mode. Signal Quality ranges from Excellent to Out of Range. ● ● ● Displays 802.11a, 802.11b, or 802.11g. This icon indicates the band being used.
Profile Name Name of the profile. Network Name Network Name (SSID) of the current connection. IP Address Internet Protocol (IP) address for the current connection. Signal Quality A radio frequency (RF) signal can be assessed by two components: ● ● signal strength (quantity) signal quality The quality of the signal is determined by a combination of factors. Primarily it is composed of signal strength and the ratio of the RF noise present.
802.1x Authentication Protocol Displays None, GTC, MS-CHAP-V2 or TLS. Refer to Security Settings for more information. CCX Version Version of the Cisco Compatible Extensions on this wireless connection. Current TX Power Cisco Compatible Extensions Power Levels. Supported Power 1.0, 5.0, 20.0, 31.6, 50.1 mW Levels Access Point MAC The Media Access Control (MAC) address for the associated access point. Address Mandatory Access Point Displays None, if not enabled.
Indicates infrastructure mode. Indicates Device to Device (ad hoc) mode. Indicates an Administrator profile. The wireless network uses Security encryption. Arrows Position profiles in a preferred order for auto-connection. ● ● Up-arrow: Move the position of a selected profile up in the Profiles list. Down-arrow: Move the position of a selected profile down in the Profiles list. Connect Connect the selected profile for the wireless network. Add Use the Profile Wizard to create a new profile.
Tools Application Settings: Use to set system wide connection preferences. Refer to Application Settings for information. Use Ctrl+P from your keyboard as an alternative to access this feature. Intel Wireless Troubleshooter: Use to resolve wireless network connection problems. Use Ctrl+W from your keyboard as an alternative to access this feature. Refer to Intel Wireless Troubleshooter for more information.
Help Intel PROSet/Wireless Help: Starts the online help. Use F1 from your keyboard as an alternative to access this feature. To navigate the help window: ● ● ● ● Press F6 to toggle between the left and right pane. Use the up and down arrow as an alternative on your keyboard to move up and down within the pane. To view information, click Contents in the left-side pane or use Alt+C on your keyboard as an alternative to access this feature. Double-click on a book icon to open a Contents' topic.
Adapter Lists the network adapter that are currently available. It may be either an Intel(R) PRO/Wireless 3945ABG Network Connection, an Intel(R) PRO/Wireless 2915ABG Network Connection or, an Intel(R) PRO/Wireless 2200BG Network Connection. Advanced Settings: The following settings control how Intel PROSet/Wireless behaves and displays information. Taskbar Show application icon on the taskbar: Select to display the Taskbar status icon. This icon resides on the Windows Taskbar (Notification Area).
Enable TLS rejected certificates notification: Select if you want a warning issued when a PEAP-TLS certificate is rejected by the authentication server. See Enterprise Security and Set up the Client for TLS authentication for more information. Auto Connect Use profiles only to connect to available networks: (Default) Connect the wireless adapter to an available network with a matching profile from the Profiles List. If no matching profile is found, you are notified (see Notifications).
Intel Wireless Troubleshooter is an application that can help you resolve wireless network connection issues. When a connection issue is detected, a desktop alert appears at the bottom right corner of your desktop. Once you click the desktop alert, a diagnostic message displays the recommended steps to resolve the connection problem. For example, if a connection problem occurred because of an invalid password, the Profile Wizard application is launched when you click a displayed hyperlink.
Wireless Event Viewer Launches Wireless Event Viewer. Disable Notification Select to disable the alert notifications. Enable Notification Select to enable the alert notifications. Available Help Date Time error message: ● ● ● Description of error. Link to resolve error (if available). See Resolve Errors for more information. Link to recommended steps to resolve error.
The Adapter Settings displays the device properties for the wireless adapter installed on your computer. It may be either an Intel(R) PRO/Wireless 3945ABG Network Connection, an Intel(R) PRO/Wireless 2915ABG Network Connection or, an Intel(R) PRO/Wireless 2200BG Network Connection. Adapter Settings description Name Description Ad Hoc Channel Unless the other computers in the ad hoc network use a different channel from the default channel, there is no need to change the channel.
Ad Hoc Power Management Set power saving features for Device to Device (ad hoc) networks. ● ● ● Disable: Select when connecting to ad hoc networks that contain stations that do not support ad hoc power management Maximum Power Savings: Select to optimize battery life. Noisy Environment: Select to optimize performance or connecting with multiple clients. NOTE: This setting is unavailable if the adapter is an Intel PRO/Wireless 2915ABG Network Connection or an Intel PRO/Wireless 2200BG Network Connection.
Roaming Aggressiveness This setting allows you to define how aggressively your wireless client roams to improve connection to an access point. ● ● Default: Balanced setting between not roaming and performance. Lowest: Your wireless client will not roam. Only significant link quality degradation causes it to roam to another access point. NOTE: This setting is unavailable if the adapter is an Intel(R) PRO/Wireless 2915ABG Network Connection or an Intel(R) PRO/Wireless 2200BG Network Connection.
OK Saves settings and returns to the previous page. Cancel Closes and cancels any changes. Help? Provides help information for this page. Advanced Statistics (Advanced menu) Provides current adapter connection information. The following describes information for the Advanced Statistics page. Name Description Statistics Advanced Statistics: This information pertains to how the adapter communicates with an access point.
● ● access point could have increased its data rate. Poor channel quality: The quality of the channel is low and caused the adapter to look for another access point. AP dropped mobile unit: The access point dropped a computer from the list of recognizable mobile devices. The computer must re-associate with an access point. Miscellaneous: Use this information to determine if an association with a different access point increases performance and helps maintain the highest possible data rate.
The Microsoft Windows XP Wireless Zero Configuration feature provides a built-in wireless configuration utility. This feature can be enabled and disabled within Intel PROSet/Wireless or click Use Windows to manage Wi-Fi on the Tools menu or the Taskbar menu. If Windows XP Wireless Zero Configuration is enabled, the features in Intel(R) PROSet/Wireless are disabled.
Import Profiles into the Profile List Import wireless profiles automatically into the Profiles List. This is accomplished by Intel (R) PROSet/Wireless monitoring the import folder on your hard disk for new profile files. Only profiles that have been enabled through Enable Auto-Import in the Advanced Settings are automatically imported. If a profile of the same name already exists in the Profiles List, you are notified to either reject the imported profile, or accept it.
Export profiles Step 1: Select one or more profiles to export from your profile list below: Select individual or multiple profiles from the list. The profile mode icon indicates either infrastructure or ad hoc mode is being used, and if security is being used. Step 2: Export the selected profile: Click Export to save your profiles to a selected directory. Step 3: Select the destination folder. Click Browse to search your hard disk for the destination directory. The C:\ drive is the default directory.
Exclude List Management ● ● ● ● ● Network Name: Name (SSID) of the wireless network. Radio: Displays the band if there is a DHCP error. MAC Address: The Ethernet MAC address of the device. Reason: Explains why this entry was excluded from automatic connection. Details: Provides specific information on how the access point was excluded and how to remove it from exclusion. This network has been excluded from automatic connection for the following reasons. -User has excluded this network manually.
NOTE: When your computer is switched on, the radio is constantly transmitting signals. In certain situations, as in an airplane, signals from the radio may cause interference. Use the following methods if you need to disable the radio and use your notebook without emitting radio signals. Use the optional computer radio on or off switch If your computer has an external switch installed, use it to switch the radio on or off. Refer to the computer manufacturer for more information about this switch.
To install the software: 1. 2. 3. 4. 5. 6. 7. Insert the Installation CD in your CD drive. Click Install Software on the Intel PROSet/Wireless Network screen. Read the license agreement. Select I accept the terms in the license agreement. Click Next. Click Custom. Select from the list of features to install: Intel PROSet/Wireless: The Intel PROSet Wireless application software. ● ● Install: Click Intel PROSet Wireless. Select Install this feature and all subfeatures. Proceed to step 8.
WMI Support: Wireless Management Instrumentation functionality allows administrators who do not have Intel PROSet/Wireless installed to manage remotely clients that do have Intel PROSet/Wireless installed. ● ● Install: Click WMI Support. Select Install this feature and all subfeatures. Proceed to step 8. Not install: Click This feature will not be available. A red x displays next to the option indicates that it is not be installed. Administrator Toolkit: Installs the Administrator Tool to the Tools menu.
5. You are asked what you would like to do with your current profiles and settings: You have chosen to completely remove the Intel PROSet/Wireless software. Select what to do with your current profiles and settings. ● ● ● Do not save my profiles and settings. Select to completely remove all of your current profiles and settings. If you reinstall the software, the profiles and settings are no longer available. Save my profiles and settings in the current format (Intel PROSet/Wireless 10.x).
Back to Contents Profile Management: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide ● ● ● ● ● ● ● ● ● What is a Profile Profiles List Profiles List icons Connect to a Profile Create a New Profile Edit an Existing Profile Remove a Profile Set a Profile Password Import and Export Profiles What is a Profile? A profile is a saved group of network settings. Profiles are displayed in the Profile List. Profiles are useful when moving from one wireless network to another.
Profile List Priority Arrows ● ● Use the up-arrow to move the position of a selected profile up in the profiles list. Use the down-arrow to move the position of a selected profile down in the profiles list. Profiles List Icons The network profile status icons indicate if the adapter is associated with a network, the type of operating mode being used, and if security encryption is enabled. These icons display next to the profile name in the profile list.
Connection Icons - The network profile status icons indicate the different connection states of the adapter with a wireless network, the type of operating mode being used, and if network security is being used. Blue circle: The wireless adapter is associated with an access point or computer (Ad hoc mode). If a profile has 802.1x security enabled, this indicates that the wireless adapter is associated and authenticated. Indicates Network (Infrastructure) mode. Indicates Device to Device (ad hoc) mode.
1. 2. 3. 4. Double-click the Taskbar icon to open the Intel PROSet/Wireless main window. Click Profiles to open the Profiles list. Select the profile from the Profile list. Click Connect. Remember that the connection is only made if the wireless network is in range. Manually connect to a profile from the Taskbar 1. 2. 3. 4. Right-click the Intel PROSet/Wireless connection Taskbar icon. Click Connect to Profile. Select a profile. Click to start the connection.
To create a new profile and connect to a wireless network: 1. From the Intel PROSet/Wireless main window, click Profiles. 2. On the Profiles page, click Add to open the Profile Wizard General Settings. 3. Use the General Settings to add the Profile Name, Wireless Network Name, select the Operating Mode, and access Advanced Settings. General Settings Description Name Description Profile Name Name of the wireless network profile.
Operating Mode Network (Infrastructure): Connect to an access point. An infrastructure network consists of one or more access points and one or more computers with wireless adapters. This connection is the type used in home networks, corporate networks, hotels, and other areas that provide access to the network and/or the internet. Device to Device (ad hoc): Connect directly to other computers in an ad hoc wireless network.
Advanced Settings Description Name Description Auto Connect Automatic: (Default) Select to have Intel PROSet/Wireless automatically connect to this profile when it is in range. On Demand: Select to prevent automatic connection of a profile when the network is in range. For example, if there is a cost for a wireless connection and you did not want to connect automatically when in range. To connect to the network: 1. Select the network from the Wireless Networks list 2. Click Connect.
Mandatory Access Point Mandatory Access Point: Forces the wireless adapter to connect to an access point that uses a specific MAC address. Type the MAC address of the access point (BSSID); 48-bit 12 hexadecimal digits. For example, 00:06:25:0E:9D:84. This feature is not available when ad hoc operating mode is used. Clear: Clear current address. Password Protection Start Application 1. Password protect this profile (max. 10 characters): Select to enable a password for the profile.
6. Select the Network Authentication and Data Encryption options. Enter the encryption key settings and configure the 802.1x settings as required. Refer to Security Settings for more information.
7. Click OK when you have completed the profile settings. The Profile Wizard ends and you are returned to the Intel PROSet/Wireless main window. To change or verify the profile settings, click Back. 8. If you are not currently connected to a network, Intel PROSet/Wireless detects that a new profile has been added and automatically attempts to connect to this new profile. 9. If you want to manually connect to this profile, click Connect. The connection icon displays the current connection status.
4. Click Next and Back to navigate through the General and Security Settings: ❍ General Settings. Refer to General Settings for more information. ❍ Security Settings. Refer to Security Settings for more information. 5. Click OK to save the current settings and exit. Click Cancel to exit without saving changes. Remove a Profile To delete a profile: 1. Click Profiles on the Intel PROSet/Wireless main window. 2. Select the profile from the list. 3. Click Remove.
Import Profiles into the Profile List To import profiles manually: 1. 2. 3. 4. 5. Click Import on the Profiles page. Select the profile files to import. Click Import. You are notified that the profile has been successfully imported. Click OK. An administrator can set profiles to be imported automatically into the Profile list. Intel PROSet/Wireless monitors the import folder on your hard disk for new profile files.
Back to Contents Set Up Profile Security: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide Use Intel(R) PROSet/Wireless Software Personal Security Personal Security Settings Set up Data Encryption and Authentication ● ● Configure Profiles for Device to Device (Ad Hoc) Networks ❍ Set up a Client with Open Authentication and No Data Encryption (None) ❍ Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption Configure Profiles for Infrastructure Networks ❍ Set up a Client with No Data Encr
Use Intel(R) PROSet/Wireless Software The following sections describe how to use Intel(R) PROSet/Wireless to set up the required security settings for your wireless adapter. Refer to Personal Security. It also provides information about how to configure advanced security settings for your wireless adapter. This requires information from a systems administrator (corporate environment) or advanced security settings on your access point (for home users). Refer to Enterprise Security.
Data Encryption If you configure a profile for a Device to Device (ad hoc) network, select ● ● None: No authentication required. WEP-64 bit or WEP-128 bit: A network key or password is used for encryption. If you configure an profile for an Infrastructure network, select: ● ● ● ● Advanced None: No authentication required. WEP-64 bit or WEP-128 bit: A network key or password is used for encryption.
transmission. Enter the same password in all of the computers and access points in your home or small business network. Only devices that use the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. The password automatically initiates the Temporal Key Integrity Protocol (TKIP) for the data encryption process.
● ● ● Double-click a ad hoc network in the Wireless Networks list. Select a network in the Wireless Networks list. Click Connect. The Intel PROSet/Wireless software automatically detects the security settings for the wireless adapter. Create a device to device (ad hoc) network profile as described below. NOTE: Device to Device (ad hoc) networks are identified with a notebook image ( ) in the Wireless Networks and Profiles list. To create a profile for a wireless network connection with no encryption: 1.
1. Security Settings: Select either WEP 64-bit or WEP 128-bit to configure WEP data encryption with a 64- or 128-bit key. When WEP encryption is enabled on a device, the WEP key is used to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data. 2. Password: Enter the Wireless Security Password (Encryption Key). ❍ Pass phrase (64-bit): Enter five (5) alphanumeric characters, 0-9, a-z or A-Z.
(the location where a specific key is stored). The greater the key length, the more secure the key. To add a network key for an Infrastructure network connection: 1. On the Intel PROSet/Wireless main window, double-click an Infrastructure network in the Wireless Networks list or select the network and click Connect. NOTE: Infrastructure networks are identified with an access point image ( Wireless Networks and Profiles list. ) in the 2. Click Profiles to access the Profiles list. 3.
client station and the access point. An authentication server is not needed. WPA Personal Mode is targeted to home and small business environments. WPA2 is the second generation of WPA security that provides enterprise and consumer wireless users with a high level of assurance that only authorized users can access their wireless networks. WPA2 provides a stronger encryption mechanism through Advanced Encryption Standard (AES), which is a requirement for some corporate and government users.
1. On the Profile page, select a profile. 2. Click Properties to open the Wireless Profile Properties' General Settings. The Profile name and Wireless Network Name (SSID) display. Network (Infrastructure) should be selected as the Operating Mode. 3. Click Next. The Security Settings page opens. 4. Security Settings: Select WPA-Personal (AES-CCMP) to provide this level of security in the small network or home environment. It uses a password also called a pre-shared key (PSK).
● See Personal Security to set basic WEP or WPA security in a non-enterprise environment (home, small business). Enterprise Security Settings Enterprise Security Settings Description Name Setting Enterprise Security Select to open the Enterprise Security settings. The security settings that are available are dependent on the Operating Mode selected: Device to Device (ad hoc) or Network (Infrastructure).
Cisco Options Click to view the Cisco Compatible Extensions. NOTE: Cisco Compatible Extensions are automatically enabled for CKIP and LEAP profiles. Advanced button Select to access the Advanced Settings to configure the following options: ● ● ● ● ● Auto-Connect: Select to automatically or manually connect to a profile. Auto-Import this profile (for network administrators only). Mandatory Access Point: Select to associate the wireless adapter with a specific access point.
● Select a Device to Device (ad hoc) network in the Wireless Networks list. Click Connect. The Intel PROSet/Wireless software automatically detects the security settings for the wireless adapter. NOTE: Device to Device (ad hoc) networks are identified with a notebook image ( the Wireless Networks and Profiles list. ❍ ) in Authentication: ■ If no authentication is required, the network connects without a prompt to enter any log-on credentials.
3. 4. 5. 6. Wireless Network Name (SSID): Enter the network identifier. Profile Name: Enter a descriptive profile name. Operating Mode: Click Device to Device (ad hoc). Click Next 7. Click Enterprise Security to open the Security Settings. 8. Network Authentication: Open (Selected). When Open authentication is used, any wireless station can request authentication.
Set up a Client with Open Network Authentication and WEP Data Encryption On the Intel PROSet/Wireless main window, select one of the following methods to connect to a device to device network: 1. Double-click a Device to Device (ad hoc) network in the Wireless Networks list. 2. Select a Device to Device (ad hoc) network in the Wireless Networks list. Click Connect. The Intel PROSet/Wireless software automatically detects the security settings for the wireless adapter.
To change the security settings: 1. Click Profiles on the Intel PROSet/Wireless main window. The network that you just connected to is listed in the Profiles list. 2. Select the wireless network. 3. Click Properties to open the Wireless Profile Properties General Settings. The Wireless Network Name (SSID) and Profile Name are already defined. Device to Device (ad hoc) is selected as the operating mode. 4. Click Next to access the Security Settings. 5. Click Enterprise Security. 6.
the correct network name (SSID) can associate with an access point and gain access to the network. 9. Data Encryption: None is the default. 10. Click OK. The profile is added to the Profiles list and connects to the wireless network . Set up a Client with Shared Network Authentication When Shared Key authentication is used, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel.
data protection and access control to a wireless network. WPA enforces key-exchange and only works with dynamic encryption keys. If your wireless AP or router supports WPA-Personal and WPA2-Personal then you should enable it on the AP and provide a long, strong password. For personal or home networks without a RADIUS or AAA server, use Wi-Fi Protected Access Personal.
stronger data protection for multiple users and large managed networks. It prevents unauthorized network access by verifying network users through an authentication server. NOTE: WPA-Enterprise and WPA2-Enterprise are not interoperable. To add a profile that uses WPA - Enterprise or WPA2 - Enterprise authentication: 1. Obtain a user name and password on the RADIUS server from your administrator. 2. Certain Authentication Types require that obtain and install a client certificate.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Click Profiles on the Intel PROSet/Wireless main window. On the Profile page, click Add to open the Profile Wizard's General Settings. Profile Name: Enter a descriptive profile name. Wireless Network Name (SSID): Enter the network identifier. Operating Mode: Click Network (Infrastructure). Click Next. Click Enterprise Security. Network Authentication: Select Open (Recommended). Data Encryption: Select WEP. Click 802.1x Enabled. Authentication type: Select MD5.
3. Key Index: Select 1, 2, 3 or 4. (Default key is 1.) 4. Click Next. Step 2 of 2: MD5 User 1. Select one of the following credential methods: ❍ Use Windows logon user name and password: The 802.1x credentials match your Windows user name and password. Before connection, you are prompted for your Windows logon credentials. NOTE: This option is unavailable if Pre-Logon Connect is not selected during installation of the Intel PROSet/Wireless software. Refer to Install or Uninstall the Single Sign On Feature.
■ ■ ■ authenticator by the authentication protocol operating over the TLS tunnel. This identity is securely transmitted to the server only after an encrypted channel has been established. Domain: Name of the domain on the authentication server. The server name identifies a domain or one of its sub-domains (for example, zeelans.com, where the server is blueberry.zeelans.com). NOTE: Contact your administrator to obtain the domain name. Password: Specifies the user password.
1. Specify user name (identity): Click to specify the user name. ● User Name: Enter the user name assigned to the SIM card. 2. Click OK. Set up a Client with AES-CCMP Data Encryption and TLS Network Authentication These settings define the protocol and the credentials used to authenticate a user. Transport Layer Security (TLS) authentication is a two-way authentication method that exclusively uses digital certificates to verify the identity of a client and a server.
Step 1 of 2: TLS User 1. Obtain and install a client certificate, refer to Set up the Client for TLS authentication or consult your system administrator. 2. Select one of the following to obtain a certificate: ● Use my smart card: Select if the certificate resides on a smart card. ● Use the certificate issued to this computer: Click Select to choose a certificate that resides in the machine store. ● Use a user certificate on this computer. Click Select to choose a certificate that resides on this computer.
Step 2 of 2: TLS Server Select one of the following: 1. Validate Server Certificate: ● Certificate Issuer: The server certificate received during TLS message exchange must be issued by this certificate authority (CA). Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store are available for selection. If Any Trusted CA is selected, any CA in the list is acceptable.
● match exactly the server name found on the certificate. The server name should include the fully qualified domain name (for example, Servername.Domain name). Domain name must end in specified name: When selected, the server name identifies a domain and the certificate must have a server name belonging to this domain or to one of its sub-domains (for example, zeelans.com, where the server is blueberry.zeelans.com). NOTE: These parameters should be obtained from the administrator. 3.
● ● Prompt each time I connect: Select to prompt for user name and password before you connect to the wireless network. The user name and password must be first set in the authentication server by the administrator. Use the following: The user name and password are securely (encrypted) saved in the profile. ❍ User Name: This user name must match the user name that is set in the authentication server. ❍ Domain: Name of the domain on the authentication server.
authentication server. The client uses EAP-TLS to validate the server and create a TLSencrypted channel between client and server. The client can use another EAP mechanism (for example, Microsoft Challenge Authentication Protocol (MS-CHAP) Version 2), over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. The following example describes how to use WPA with AES-CCMP or TKIP encryption with PEAP authentication.
user name from the Intel PROSet/Wireless utility and ignores the Authentication Protocol MS-CHAP-V2 user name. This feature is the 802.1x identity supplied to the authenticator. Microsoft IAS RADIUS accepts only a valid user name (dotNet user) for EAP clients. Enter a valid user name whenever 802.1x MS RADIUS is used. For all other servers, this is optional, therefore, it is recommended that you no use a true identity, but instead the desired realm (for example, anonymous@myrealm).
To configure a one-time password: 1. Authentication Protocol: Select GTC (Generic Token Card). 2. User Credentials: Select Prompt each time I connect 3. On connection prompt for: Select one of the following: ■ Static password: On connection, enter the user credentials. ■ One-time password (OTP): Obtain the password from a hardware token device. ■ PIN (Soft Token): Obtain the password from a soft token program. 4. Click OK. 5. Select the profile on the Wireless Networks list. 6. Click Connect.
MS-CHAP-V2. This parameter specifies the authentication protocol operating over the PEAP tunnel. 1. User Credentials: Select one of the following options: ■ Use Windows Logon: Allows the 802.1x credentials to match your Windows user name and password. Before connection, you are prompted for your Windows logon credentials. ■ Prompt each time I connect: Prompts for user name and password every time you log onto the network.
1. Obtain and install a client certificate, refer to Set up the Client for TLS authentication or consult your system administrator. 2. Select one of the following to obtain a certificate: ■ Use my smart card: Select if the certificate resides on a smart card. ■ Use the certificate issued to this computer: Click Select to choose a certificate that resides in the machine store. ■ Use a user certificate on this computer. Click Select to choose a certificate that resides on this computer. 3. Click Next.
● server name must match exactly the server name found on the certificate. The server name should include the complete domain name (for example, Servername.Domain name). Domain name must end with the specified entry: When selected, the server name identifies a domain, and the certificate must have a server name that belongs to this domain or to one of its subdomains (for example, zeelans.com, where the server is blueberry.zeelans.com). NOTE: These parameters should be obtained from the administrator.
Update certificate automatically based on the certificates in the local store. This option is enabled only when the local store holds one or more certificates for which the "issued to" and "issued by" fields match the current certificate and for which the "expiration date" has not expired. If you choose this option, the application selects the first valid certificate.
15. Click Enable Radio Management Support. Use Radio Management to detect rogue access points. 16. Click OK to return to the Security Settings.
1. Select one of the following authentication methods: ■ Use the Windows logon user name and password: Allows the 802.1x credentials to match your Windows user name and password. The user's credentials are retrieved from the user's Windows log-on process. The credentials are only used if the user has no password defined in the Windows log-on credentials or if there is a problem capturing the Windows log-on credentials.
Enable Cisco Compatible Options: Select to enable Cisco Compatible Extensions for this wireless connection profile. ❍ ❍ Enable Radio Management Support: Select to have your wireless adapter provide radio management to the Cisco infrastructure. If the Cisco Radio Management utility is used on the infrastructure, it configures radio parameters, detects interference and rogue access points. Default setting is selected.
EAP-FAST User 1. Select the credentials retrieval method: ■ Use the Windows logon user name and password: The user credentials are retrieved from the Windows log on process. NOTE: This option is unavailable if Pre-Logon Connect is not selected during installation of the Intel PROSet/Wireless software. Refer to Install or Uninstall the Single Sign On Feature. ■ ■ Prompt for the user name and password: Prompts for user name and password before you connect to the wireless network.
NOTE: Contact your administrator to obtain the domain name. ■ Password: This password must match the password that is set in the authentication server. The entered password characters display as asterisks. ■ Confirm Password: Reenter the user password. 2. Allow automatic provisioning of Protected Access Credentials (PAC): EAP-FAST uses a PAC key to protect the user credentials that are exchanged. All EAP-FAST authenticators are identified by an Authority Identity (A-ID).
4. Enter the PAC password (optional). 5. Click OK to close this page. The selected PAC is added to PAC list. 6. Click OK to save the EAP-FAST settings and return to the Profiles list. The PAC is used for this wireless profile.
Back to Contents Security Overview: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide ● ● ● ● ● ● ● WEP Encryption ❍ Open and Shared Key authentication 802.1x Authentication ❍ How 802.1x Authentication Works ❍ 802.1x Features WPA/WPA2 ❍ Enterprise Mode ❍ Personal Mode ❍ WPA-Enterprise and WPA2-Enterprise ❍ WPA-Personal and WPA2-Personal ❍ AES-CCMP ❍ TKIP TLS TTLS PEAP Cisco Features ❍ Cisco LEAP ❍ Cisco Rogue Access Point Security Feature ❍ Fast Roaming (CCKM) ❍ CKIP ❍ 802.11b and 802.
Use IEEE 802.11 Wired Equivalent Privacy (WEP) encryption to prevent unauthorized reception of wireless data. WEP encryption provides two levels of security: 64-bit key (sometimes referred to as 40-bit) or a 128bit key (also known as 104-bit). For stronger security, use a 128-bit key. If you use encryption, all wireless devices on your wireless network must use the same encryption keys. Wired Equivalent Privacy (WEP) encryption and shared authentication provides protection for your data on the network.
only if it passes a challenge-based authentication. 802.1x Authentication How 802.1x Authentication Works 802.1x Features Overview 802.1x authentication is independent of the 802.11 authentication process. The 802.1x standard provides a framework for various authentication and key-management protocols. There are different 802.1x authentication types, each provides a different approach to authentication but all employ the same 802.
This RADIUS server may authenticate either the user (via passwords or certificates) or the system (by MAC address). In theory, the wireless client is not allowed to join the networks until the transaction is complete. There are several authentication algorithms used for 802.1x. Some examples are: EAP-TLS, EAP-TTLS, and Protected EAP (PEAP). These are all methods for the wireless client to identify itself to the RADIUS server. With RADIUS authentication, user identities are checked against databases.
A simplified description of 802.1x authentication is: ● ● ● ● A client sends a "request to access" message to an access point. The access point requests the identity of the client. The client replies with its identity packet which is passed along to the authentication server. The authentication server sends an "accept" packet to the access point. The access point places the client port in the authorized state and data traffic is allowed to proceed. 802.1x Features ● ● ● ● 802.
The second generation of WPA that complies with the IEEE TGi specification is known as WPA2. Enterprise Mode: Enterprise Mode verifies network users through a RADIUS or other authentication server. WPA utilizes 128-bit encryption keys and dynamic session keys to ensure your wireless network's privacy and enterprise security. Enterprise Mode is targeted to corporate or government environments. Personal Mode: Personal Mode requires manual configuration of a preshared key (PSK) on the access point and clients.
your computer’s operating system and may require additional software or hardware as well as wireless LAN infrastructure support. Check with your computer manufacturer for details. TKIP (Temporal Key Integrity Protocol) is an enhancement to WEP (Wired Equivalent Privacy) security. TKIP provides per-packet key mixing, a message integrity check and a rekeying mechanism, which fixes the flaws of WEP.
● ● ● PAP: Password Authentication Protocol is a two way handshake protocol designed for use with PPP. Authentication Protocol Password Authentication Protocol is a plain text password used on older SLIP systems. It is not secure. CHAP: Challenge Handshake Authentication Protocol is a three way handshake protocol which is considered more secure than PAP (Password Authentication Protocol). MS-CHAP (MD4): Uses a Microsoft version of RSA Message Digest 4 challenge and reply protocol.
credentials and authentication protocols that could compromise security. This feature only works with Cisco's LEAP authentication. Standard 802.11 technology does not protect a network from the introduction of a rogue access point. Refer to LEAP Authentication for more information. Fast Roaming (CCKM) When a wireless LAN is configured for fast reconnection, a LEAPenabled client device can roam from one access point to another without involving the main server.
EAP-FAST like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that EAP-FAST does not use certificates to authenticate. Provisioning in EAP-FAST is negotiated solely by the client as the first communication exchange when EAP-FAST is requested from the server. If the client does not have a pre-shared secret Protected Access Credential (PAC), it is able to initiate a provisioning EAP-FAST exchange to dynamically obtain one from the server.
When this feature is enabled your wireless adapter provides radio management information to the Cisco infrastructure. If the Cisco Radio Management utility is used on the infrastructure, it configures radio parameters, detects interference and rogue access points.
Back to Contents Glossary of Terms: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide Glossary Numerical A B P R S T W C D E F G H I L M N O Term Definition 802.11 The 802.11 standard refers to a family of specifications developed by the IEEE for wireless LAN technology. The 802.11 specifies an over-the-air interface between a wireless client and a base station or between two wireless clients and provides 1 or 2 Mbps transmission in the 2.
802.11g The 802.11g standard specifies a maximum data transfer rate of 54 Mbps, an operating frequency of 2.4GHz, and WEP encryption for security. 802.11g networks are also referred to as Wi-Fi networks. 802.1x 802.1x is the IEEE Standard for Port-Based Network Access Control. This is used in conjunction with EAP methods to provide access control to wired and wireless networks. AAA Server Authentication, Authorization and Accounting Server.
Broadcast SSID Used to allow an access point to respond to clients on a wireless network by sending probes. BSSID A unique identifier for each wireless client on a wireless network. The Basic Service Set Identifier (BSSID) is the Ethernet MAC address of each adapter on the network. A corporate certification authority implemented on a CA (certificate server. In addition, Internet Explorer’s certificate can authority) import a certificate from a file. A trusted CA certificate is stored in the root store.
EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that EAP-FAST does not use certificates to authenticate. EAP-GTC The EAP-GTC (Generic Token Card) is similar to the EAP-OTP except with hardware token cards. The request contains a displayable message, and the response contains the string read from the hardware token card. EAP-OTP EAP-OTP (One-Time Password) is similar to MD5, except it uses the OTP as the response.
FHSS Frequency-Hop Spread Spectrum. Technology used in radio transmission. Incompatible with DSSS. File and printer sharing A capability that allows a number of people to view, modify, and print the same file(s) from different computers. The threshold at which the wireless adapter breaks Fragmentation the packet into multiple frames. This determines the threshold packet size and affects the throughput of the transmission. GHz Gigahertz. A unit of frequency equal to 1,000,000,000 cycles per second.
Mbps Megabits-per-second. Transmission speed of 1,000,000 bits per second. MHz Megahertz. A unit of frequency equal to 1,000,000 cycles per second. MIC (Michael) Message integrity check (commonly called Michael). MS-CHAP An EAP mechanism used by the client. Microsoft Challenge Authentication Protocol (MSCHAP) Version 2, is used over an encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. ns Nanosecond.
Power Save mode The state in which the radio is periodically powered down to conserve power. When the notebook is in Power Save mode, receive packets are stored in the access point until the wireless adapter wakes up. Preferred network One of the networks that has been configured. Such networks are listed under Preferred networks on the Wireless Networks tab of the Wireless Configuration Utility (Windows 2000 environment) or Wireless Network Connection Properties (Windows XP environment).
Silent Mode Silent Mode Access Points or Wireless Routers have been configured to not broadcast the SSID for the wireless network. This makes it necessary to know the SSID in order to configure the wireless profile to connect to the access point or wireless router. Single Sign On Single Sign On feature set allows the 802.1x credentials to match your Windows log on user name and password credentials for wireless network connections. SSID Service Set Identifier.
TTLS Tunneled Transport Layer Security. These settings define the protocol and the credentials used to authenticate a user. In TTLS, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between the client and server. The client can use another authentication protocol, typically password-based protocols, such as MD5 Challenge over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel.
Wireless Router A stand-alone wireless hub that allows any computer that has a wireless network adapter to communicate with another computer and to connect to the Internet. Also known as an access point. WLAN Wireless Local-Area Network. A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. WPA Wi-Fi Protected Access (WPA) is a security enhancement that strongly increases the level of data protection and access control to a wireless network.
relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. WPA is an interim standard that will be replaced with the IEEE’s 802.11i standard upon its completion. WPA-Personal Wi-Fi Protected Access-Personal provides a level of security in the small network or home environment. WPA-PSK Wi-Fi Protected Access-Pre-Shared Key (WPA-PSK) mode does not use an authentication server.
Back to Contents Administrator Tool: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide ● ● ● ● ● ● ● ● Set Administrator Password Administrator Packages Administrator Profiles ❍ Persistent ❍ Pre-Logon ❍ Voice over IP (VoIP) Administrator Tool Settings Administrator Settings Adapter Settings Software Administrator Tasks The Administrator Tool is used by the person who has administrator privileges on this computer.
1. Enter password: Create a password (maximum 100 characters). 2. Confirm Password: Reenter the password. 3. Click OK. The Open Administrator Package displays. To change the existing password: 1. 2. 3. 4. 5. 6. Click Administrator Tool from the Tools menu. Click Change Password on the password entry form. Old Password: Enter the existing password. New Password: Enter the new password. Confirm Password: Reenter the new password again. Click OK to save the new password and enter the Administrator Tool.
NOTE: You can also select Save Package on the Administrator Tool File Menu to save the package. To edit a package: 1. Access the Administrator Tool. 2. On the Open Administrator Package page, click Open to edit an existing package. 3. Click Browse. Locate the package's executable file. 4. Click Open. Make your updates. 5. Click Close. 6. You are notified: The current package is changed. Would you like to save the changes? 7. Click Yes. Save the executable file to a directory on the local disk drive.
Persistent Connection Persistent profiles are applied at boot time or whenever no one is logged on the computer. After a user logs off, a Persistent profile maintains a wireless connection either until the computer is turned off or a different user logs on. Persistent Connect key points: ● The following types of profiles can be created as Persistent profiles: ❍ All profiles that do not require 802.
❍ Profiles that use the machine certificate to authenticate. NOTE: Intel PROSet/Wireless supports machine certificates. However, they are not displayed in the certificate listings. WPA-Enterprise profiles that do not use a user certificate. ❍ WPA-Personal profiles. Persistent profiles are applied at system power up and after a user logs off. ❍ ● To create a Persistent Profile: 1. 2. 3. 4. 5. 6. 7. Click Include Profiles. Click Persistent. Click Add to open the General Settings.
● ● ● Pre-Logon Connect is active only at the Windows log on. The following types of profiles can be created as Pre-Logon profiles: ❍ 802.1x MD5, LEAP, EAP-FAST profiles that use either the "Use the Windows logon user name and password" or "Use the following user name and password" credentials when configuring the profile's security settings. ❍ 802.1x PEAP or TTLS profiles with user or machine certificates (the user must have administrative rights to use machine certificates).
When a user logs off, any wireless connection is disconnected and a persistent profile (if one is available) is applied. Under certain circumstances it is desirable to maintain the current connection (for example, if user specific data needs to be uploaded to the server post-log off or when roaming profiles are used). Create a profile which is marked as both pre-logon and persistent to achieve this functionality. If such a profile is active when the user logs off, the connection is maintained.
11. Click Enterprise Security to open the Security Settings. See Enterprise Security for 802.1x security configuration information. 12. Click OK to save the profile and add it to the Administrator profiles list. NOTE: If a Persistent connection was already established, a PreLogin/Common profile is ignored if the profile is configured with both PreLogon/Common and Persistent connection options. Voice over IP (VoIP) Profiles Intel PROSet/Wireless software supports VoIP third-party soft-phone applications.
ITU G.729 CS-ACELP (Conjugate 8 Structure Algebraic-Code Excited Linear Prediction) An administrator can create profiles that use pre-existing VoIP profiles to configure various codec data rates and frame rates to improve voice quality in VoIP transmissions. To create a VoIP profile: NOTE: Ensure Voice over IP is not disabled in the Administrator Settings. It is enabled by default. 1. 2. 3. 4. Click Include Profiles. Select a profile from the list. Click Properties to open the Create VoIP Profiles page.
● ● G722_2_VARIABLE SPEEX_VARIABLE 5. Click OK to return to the Profiles list. 6. Click Close to save the profile settings to a package. Administrator Tool Settings An Administrator can determine where Administrator profiles are placed in a user's Profiles list. 1. Click the Administrator Tool Tools menu. 2. Click Settings to open the Administrator Tool Settings 3. Select Insert on Top to always place Administrator profiles at the top of a user's Profiles list.
Administrator Settings An administrator can select which level of control that users have over their wireless network connections. To configure Administrator Settings: 1. Click Include settings. 2. Enable or disable each setting listed in the table below. Name Description 802.11a Radio On/Off Select Add 802.11a Radio On/Off Selection to allow a user to turn on or off the 802.11a radio on their computer. This adds the 802.
Cache Credentials Select to save credentials after a user logs on. If the wireless connection temporarily disconnects, the saved credentials are used upon reconnection. The credentials are cleared when the user logs off. NOTE: if cleared, The Prompt each time I connect option is unavailable when creating profiles Cisco Compatible Extensions Select to enable Cisco Compatible Extensions on a user’s computer. Clear to disable.
Import and Export Select to import to or export profiles from a user’s computer. Enable permits auto import of user profiles when copied to an auto import folder. Message On Radio Toggle Enables a third-party application to notify a user that the Intel PROSet/Wireless radio is either on or off. Pre-Logon Cisco Mode Enable Cisco Mode during a pre-logon connection. Cisco access points have the capability to support multiple wireless network names (SSIDs) but only broadcast one.
Single Sign On Select which Administrator Profile types are enabled on a user computer? ● ● Persistent Connection: Profiles are active during start up and when no user is logged onto the computer. Pre-Logon Connection: Profiles are active immediately once a user logs onto the computer. Common profiles are enabled if PreLogon features are not installed on a user’s computer. Common profiles are active after a user has logged on and the session becomes active.
❍ decides not to enforce all the settings on a user's computer. The user can change the adapter setting values from the Intel PROSet/Wireless Advanced menu. Select the value: The administrator selects the value that is to be used on the user's computer. Name Description Ad Hoc Channel There is no need to change the channel unless the other computers in the ad hoc network use a different channel from the default channel. Value: Select the allowed operating channel from the list. ● ● 802.
Ad Hoc QoS Mode Quality of Service (QoS) control in ad hoc networks. QoS provides prioritization of traffic from the access point over a wireless LAN based on traffic classification. WMM (Wifi MultiMedia) is the QoS certification of the Wi-Fi Alliance (WFA). When WMM is enabled, the adapter uses WMM to support priority tagging and queuing capabilities for Wi-Fi networks. ● ● WMM Enabled.(Default) WMM Disabled Mixed Mode Protection Use to avoid data collisions in a mixed 802.11b and 802.11g environment.
Roaming Aggressiveness This setting allows you to define how aggressively your wireless client roams to improve connection to an access point. ● ● Default: Balanced setting between not roaming and performance. Lowest: Your wireless client will not roam. Only significant link quality degradation causes it to roam to another access point. NOTE: This setting is unavailable if the adapter is an Intel(R) PRO/Wireless 2915ABG Network Connection or an Intel(R) PRO/Wireless 2200BG Network Connection.
devices that this radio shares radio spectrum with. NOTE: This setting takes effect when either Infrastructure or Ad hoc mode is used. Wireless Mode Select which band to use for connection to a wireless network: ● ● ● ● ● ● 802.11a only: Connect the wireless adapter to 802.11a networks only. 802.11b only: Connect the wireless adapter to 802.11b networks only. 802.11g only: Connect the wireless adapter to 802.11g networks only. 802.11a and 802.11g only: Connect the wireless adapter to 802.11a and 802.
applications to install on a user's computer. ❍ Intel Wireless Troubleshooter: Helps you resolve wireless connection issues ❍ Administrator Tool: Installs the Administrator Tool to the Tools menu. ❍ Intel Smart Wireless Solutions: Provides an easy configuration wizard for connection to a wireless router. ❍ Single Sign On: Installs the Single Sign On features.This tool is used to configure common (shared) profiles.
repository for the logged-in user's account. You also need a trusted CA certificate in the root store. The following information provides two methods for obtaining a certificate: ● ● From a corporate certification authority (CA) implemented on a Windows 2000 server. Import a certificate from a file with Internet Explorer's certificate import wizard. If you do not know how to obtain a user certificate from the CA, consult your administrator for the procedure. To install the CA on the local machine: 1. 2.
9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. Click Computer account. Click Next. Click Finish. Click Close. Click OK. In the console, click Certificates (Local Computer). Click Trusted Root Certificate Authorities. Click Certificates. Verify that the CA you just installed is listed. Click File. Click Exit to close the console. Obtain a certificate from a Microsoft Windows 2000 CA: 1. Start Internet Explorer and browse to the Certificate Authority HTTP Service (use an URL such as http://yourdomainserver.
installed in the Personal folder. Import a Certificate from a File 1. Open Internet Properties (right-click on the Internet Explorer icon on the desktop. 2. Select Properties. 3. Content: Click Certificates. The list of installed certificates appears. 4. Click Import to open the Certificate Import Wizard. 5. Select the file. 6. Specify your access password for the file. Clear Enable strong private key protection. 7.
● choose a certificate that resides in the machine store. Use a user certificate on this computer. Click Select to choose a certificate that resides on this computer. 3. Click Next. Step 2 of 2: TLS Server Select one of the following: 1. Validate Server Certificate: ■ Certificate Issuer: The server certificate received during TLS message exchange must have been issued by this certificate authority (CA).
Back to Top Back to Contents Trademarks and Disclaimers
Back to Contents Troubleshooting: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide ● ● ● Intel(R) Wireless Troubleshooter Wireless Event Viewer Resolve Errors Intel Wireless Troubleshooter The Intel Wireless Troubleshooter is an application that can help you resolve wireless network connection issues. When a connection issue is detected, a desktop alert appears at the bottom right corner of your desktop screen.
Intel Wireless Troubleshooter Description The Intel Wireless Troubleshooter contains two panes. The left pane displays a list of available tools. The right pane displays the current connection issue. This pane is divided into two sections: the error message and the recommended action. The recommended action contains descriptions about available utilities and helps to resolve the associated connection issue. If you click on a help link, the help text is displayed in a window.
The Wireless Event Viewer program displays a list of error log records. You can save all available log records to a binary format file for sending to customer support. To launch Wireless Event Viewer, from the Tools menu, click Intel Wireless Troubleshooter. Click Wireless Event Viewer. Wireless Event Viewer Name Description File Settings: Wireless Event Viewer Settings: Select to change the storage location of the log file.
The wireless adapter failed to get a valid IP address Authentication failed because timer expired Smart Card was unexpectedly removed Disconnection from an Access Point GSM adapter was unexpectedly removed The AAA Server Rejected the EAP Method Authentication failed due to invalid user credentials: Reenter credentials This authentication error can be caused by invalid user credentials (could be user name, password or other form of user credentials). Use the following steps to resolve this error: 1. 2. 3.
1. 2. 3. 4. Select the appropriate profile from the Profiles list. Click Properties to open the General Settings. Click Next to open the Security Settings. Enterprise Security is selected. The appropriate 802.1x Authentication Type is selected. ● For TTLS and PEAP profiles: Verify that the correct Authentication Type is selected from the list, then click the Select button and select another certificate from the list of installed certificates and click OK.
3. 4. 5. 6. Click Next to open the Security Settings. Enterprise Security is selected. Select the appropriate 802.1x Authentication Type. For TTLS and PEAP profiles: Verify that the Roaming Identity server name is correct. Click OK to save the settings. Authentication failed due to an invalid user certificate: Reenter user credentials This authentication error can be caused by invalid server (domain) credentials. Use the following steps to resolve this error: 1. 2. 3. 4. 5. 6. 7. 8.
1. Select the profile 2. Click Connect and attempt to associate with the network and authenticate with the server. The wireless adapter failed to get a valid IP address This error can be due to an authentication failure with the network, incorrect encryption keys, or because of a DHCP server malfunction. Use the following steps to resolve this error: 1. 2. 3. 4. 5. Select the appropriate profile from the Profiles list. Click Properties to open the General Settings.
Disconnect Disconnect Disconnect Disconnect Disconnect Disconnect Disconnect Disconnect from from from from from from from from access access access access access access access access point point point point point point point point due due due due due due due due to to to to to to to to authentication failures. TKIP Michael Integrity check failure. Class 2 frame non-authentication failure. Class 3 frame non-association failure. reassociation failure. Information Element failure.
Back to Contents Connect to a Network: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide ● ● ● Connect to a wireless network First Time Connection Other Wireless Managers Connect to a wireless network You can connect to a wireless network with one of the following methods. ● ● ● ● Automatic Connection: If an existing profile matches an available network, you are automatically connected to that wireless network.
within range of your wireless adapter. When a network is found, a desktop alert notification displays: Wireless networks found. See Taskbar Icons for more information. 1. Double-click the desktop alert to open the Intel PROSet/Wireless main window. 2. Select a network from the wireless networks list. 3. Click Connect. If the network does not require security authentication, a desktop alert notifies you that you are connected to the network.
In addition to the Taskbar icon, Intel PROSet/Wireless also displays connection status and available networks. Refer to Intel PROSet/Wireless Main Window for more information. Other Wireless Managers If the Intel PROSet/Wireless detects another software application trying to communicate with the wireless device, you are notified of this behavior.
Click Use Windows to manage Wi-Fi to switch to Microsoft Windows XP Wireless Zero Configuration. Select this option to disable Intel PROSet/Wireless as your current wireless manager. You can then configure Microsoft Windows XP as your wireless manager. NOTE: Any wireless profiles created in Intel PROSet/Wireless are not visible in Microsoft Windows XP Wireless Zero Configuration. If you want to use your Intel wireless profiles you need to select Use Intel PROSet/Wireless from the Taskbar menu.
Third Party Wireless Software If you use software provided by a hotspot location (coffee shop, airport terminal), Intel PROSet/Wireless notifies you and then disables itself. It cannot manage the wireless device when another wireless manager communicates with the wireless device. To take advantage of the Intel PROSet/Wireless features, you want to disable or remove this software when you leave the hotspot.
Back to Top Back to Contents Trademarks and Disclaimers
Back to Contents Wireless Network Overview: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide About Wireless Network Technology ● ● ● Select a Wireless Network Configure a Wireless Network Identify a Wireless Network A wireless network connects computers without network cables. Instead computers use radio communications to send data between each other. You can communicate directly with other wireless computers, or connect to an existing network through a wireless access point.
Device-to-Device mode, also called Ad Hoc mode, works without access points and allows wireless computers to send information directly to other wireless computers. You can use Device-to-Device mode to network computers in a home or small office or to set up a temporary wireless network for a meeting. Configure a Wireless Network There are three basic components that must be configured for an 802.
● temporary connection, or create a new profile for that network. After you create profiles, your computer will automatically connect when you change locations. Security: The 802.11 wireless networks use encryption to help protect your data. Wired equivalent privacy (WEP) uses a 64- or 128-bit shared encryption key to scramble data. Before a computer transmits data, it uses a secret encryption key to scramble the data. The receiving computer uses this same key to unscramble the data.
sending probe packets with the broadcast SSID. If this feature is enabled on the access point, any wireless user can associate with the access point by using a blank (null) SSID.
Back to Contents Specifications: Intel PRO/Wireless 3945ABG Network Connection User Guide ● ● ● Intel PRO/Wireless 3945ABG Network Connection Intel PRO/Wireless 2915ABG Network Connection Intel PRO/Wireless 2200BG Network Connection Intel PRO/Wireless 3945ABG Network Connection Form Factor PCI Express (TM) Mini Card Dimensions Width 1.175 in x Length 2.039 in x Height 0.148 in (29.85 mm x 51.80 mm x 3.76 mm) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.
Frequency band 5.15 GHz to 5.85 GHz 2.400 - 2.4835 GHz (dependent on country) Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSK Wireless Medium 5 GHz UNII: Orthogonal Frequency Division Multiplexing (OFDM) 2.4 GHz ISM: Orthogonal Frequency Division Multiplexing (OFDM) Channels 4 to 12 nonoverlapping, dependent on country Channel 1-11 (US only) Channel 1-13 (Japan, Europe) Data Rates 54, 48, 36, 24, 18, 12, 9, 6 Mbps 11, 5.
Intel PRO/Wireless 2915ABG Network Connection Form Factor Mini PCI Type 3A Dimensions Width 2.85 in x Length 1.75 in x Height 0.20 in (59.75 mm x 50.95 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066 Dual Diversity Antenna On-board dual diversity switching Connector Interface 124-pin SO-DIMM edge connector Voltage 3.
Channels Data Rates 4 to 12 nonoverlapping, dependent on country Channel 1-11 (US only) Channel 1-13 (Japan, Europe) 54, 48, 36, 24, 18, 12, 9, 6 Mbps 11, 5.5, 2, 1 Mbps General Microsoft Windows XP, Microsoft Windows 2000 Operating Systems Wi-Fi(R) Alliance certification Wi-Fi(R) certification for 802.11b, 802.11g, 802.11a, WPA, WPA2, WMM, EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, MD5 Cisco Compatible Extensions certification Cisco Compatible Extensions, v3.
Dimensions Width 2.34 in x Length 1.75 in x Height 0.20 in (59.45 mm x 44.45 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066 Dual Diversity Antenna On-board dual diversity switching Connector Interface 124-pin mini PCI edge connector Voltage 3.3 V Operating Temperature 0 to +70 degrees Celsius Humidity 50 to 85% non-condensing Frequency Modulation OFDM with BPSK, QPSK, 16QAM, 64QAM, DBPSK, DQPSK, CCK Frequency band 2.
Wi-Fi(R) Alliance certification Wi-Fi(R) certification for 802.11b, 802.11g, 802.11a, WPA, WPA2, WMM, EAP-SIM, LEAP, PEAP, TKIP, EAP-FAST, EAP-TLS, EAP-TTLS, MD5 Cisco Compatible Cisco Compatible Extensions, v2.0 Extensions certification WLAN Standard IEEE 802.11g and 802.11b Architecture Infrastructure or ad hoc (peer-to-peer) operating modes Security WPA, LEAP, PEAP, TKIP, EAP-TLS, EAP-TTLS, AES (128-bit), WEP 128-bit and 64-bit.
Back to Contents Customer Support: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide Customer Support Intel support is available online or by telephone. Available services include the most up-to-date product information, installation instructions about specific products, and troubleshooting tips.
http://support.intel.com/support/go/wireless/wlan/pro3945abg.htm Network Product Support: http://www.intel.com/network Corporate Web Site: http://www.intel.
Back to Contents Regulatory Information: Intel(R)PRO/Wireless 3945ABG Network Connection User Guide Supported on the Intel(R) PRO/Wireless 3945ABG Network Connection, Intel(R) PRO/Wireless 2915ABG Network Connection and Intel(R) PRO/Wireless 2200BG Network Connection Hardware Intel(R) PRO/Wireless 3945ABG Network Connection ● ● Information for the User Regulatory Information Intel(R) PRO/Wireless 2915ABG Network Connection ● ● Information for the User Regulatory Information Intel(R) PRO/Wireless 2200B
infringement of national law and may be punished as such. For country-specific information, see the additional compliance information supplied with the product. Wireless interoperability The Intel(R) PRO/Wireless 3945ABG Network Connection adapter is designed to be interoperable with other wireless LAN products that are based on direct sequence spread spectrum (DSSS) radio technology and to comply with the following standards: ● ● ● ● IEEE Std. 802.11b compliant Standard on Wireless LAN. IEEE Std. 802.
NOTE:The Intel(R) PRO/Wireless 3945ABG Network Connection adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations. Canada—Industry Canada (IC) This device complies with RSS210 of Industry Canada.
Belgium Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enregistrement auprès de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. In geval van privé-gebruik, buiten een gebouw, op een openbare plaats, is geen registratie nodig, wanneer de afstand minder dan 300m is.
Intel(R) PRO/Wireless 2915ABG Network Connection The information in this document applies to the following products: Tri-mode wireless LAN adapters (802.11a/802.11b/802.11g ) Intel(R) PRO/Wireless 2915ABG Network Connection (model WM3B2915ABG) Intel(R) PRO/Wireless 2915ABG Network Connection (model WM3A2915ABG) NOTE: Due to the evolving state of regulations and standards in the wireless LAN field (IEEE 802.11 and similar standards), the information provided herein is subject to change.
authorization to use the Intel(R) PRO/Wireless 2915ABG Network Connection adapter wireless device before you turn it on. Regulatory information Information for the OEMs and Integrators: The following statement must be included with all versions of this document supplied to an OEM or integrator, but should not be distributed to the end user. ● ● ● ● This device is intended for OEM integrators only. This device cannot be co-located with any other transmitter.
Declaration of Conformity This equipment complies with the essential requirements of the European Union directive 1999/5/EC. Czech Intel(R) Corporation tímto prohlašuje, že tento Intel(R) PRO/Wireless 2915ABG Network Connection je ve shod• se základními požadavky a dalšími p•íslušnými ustanoveními sm•rnice 1999/5/ES.
Dutch Hierbij verklaart Intel(R) Corporation dat het toestel Intel(R) PRO/Wireless 2915ABG Network Connection in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG Bij deze verklaart Intel(R) Corporation dat deze Intel(R) PRO/Wireless 2915ABG Network Connection voldoet aan de essentiële eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC.
A license is required for the outdoor use of band 5.470 – 5.725 GHz. Belarus 2.4 GHz OFDM (802.11g) is not allowed at this time. Indonesia 5 GHz interface is not allowed at this time. Korea Kuwait 5 GHz interface is not allowed at this time. Oman If the modules are less than 100 milliwatts they are unlicensed but if they are more than 100 milliwatts, the user is responsible for getting a license to operate from Telecommunications Regulatory Authority (TRA) in Sultanate of Oman.
Antenna Warnings Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended for the Intel(R) PRO/Wireless 2200BG Network Connection installed in a desktop or portable computer, that the antenna for this device be installed so as to provide a separation distance of al least 20 cm (8 inches) from all persons and that the antenna must not be co-located or operating in conjunction with any other antenna or radio transmitter.
Europe—EU Declaration of Conformity Europe Frequency Bands 2.400 - 2.
Declaration of Conformity This equipment complies with the essential requirements of the European Union directive 1999/5/EC. English Hereby, Intel(R) Corporation, declares that this Intel(R) PRO/Wireless 2200BG Network Connection is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC.
Pour la Guyane et la Réunion 2.400 - 2.4835 GHz (Canaux 1à 13) autorisé en usage intérieur 2.420 - 2.4835 GHz (canaux 5 à 13) autorisé en usage extérieur Pour tout le territoire Fan cais: Seulement 5.15 -5.35 GHz autorisé pour le 802.1 Belgique Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enregistrement auprès de l'IBPT est requise.
Back to Contents Warranty: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide Product Warranty Information One-Year Limited Hardware Warranty Limited Warranty Intel warrants to the purchaser of the Intel(R) PRO/Wireless 3945ABG Network Connection PCI Card (the “Product”), that the Product, if properly used and installed, will be free from defects in material and workmanship and will substantially conform to Intel’s publicly available specifications for the Product for a period of one (1) year begi
If the Product which is the subject of this Limited Warranty fails during the warranty period for reasons covered by this Limited Warranty, Intel, at its option, will: ● ● ● REPAIR the Product by means of hardware and/or software; OR REPLACE the Product with another product, OR, if Intel is unable to repair or replace the Product, REFUND the then-current Intel price for the Product at the time a claim for warranty service is made to Intel under this Limited Warranty.
Intel-supplied modifications or corrections to any software provided with or included in the Product. How to Obtain Warranty Service To obtain warranty service for the Product, you may contact your original place of purchase in accordance with its instructions or you may contact Intel. To request warranty service from Intel, you must contact the Intel Customer Support ("ICS") center in your region (http://support.intel.com/support/notebook/centrino/sb/CS009883.
WARRANTY LIMITATIONS AND EXCLUSIONS THIS WARRANTY REPLACES ALL OTHER WARRANTIES FOR THE PRODUCT AND INTEL DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, COURSE OF DEALING AND USAGE OF TRADE. Some states (or jurisdictions) do not allow the exclusion of implied warranties so this limitation may not apply to you.
IN THE FOLLOWING FORUMS AND GOVERNED BY THE FOLLOWING LAWS: FOR THE UNITED STATES OF AMERICA, CANADA, NORTH AMERICA AND SOUTH AMERICA, THE FORUM SHALL BE SANTA CLARA, CALIFORNIA, USA AND THE APPLICABLE LAW SHALL BE THAT OF THE STATE OF DELAWARE. FOR THE ASIA PACIFIC REGION (EXCEPT FOR MAINLAND CHINA), THE FORUM SHALL BE SINGAPORE AND THE APPLICABLE LAW SHALL BE THAT OF SINGAPORE.