User's Manual

Atheros Communications, Inc. v
COMPANY CONFIDENTIAL Feb. 2009
Contents
Introduction.......................................................................................................... 7
System Requirements .................................................................................... 7
Profile Management............................................................................................. 7
Create or Modify a Configuration Profile .................................................... 7
Remove a Configuration Profile ................................................................... 8
Auto Profile Selection Management ................................................................... 8
Switching to a Different Configuration Profile .................................................. 9
Import and Export Profiles .................................................................................. 9
Importing a Profile ............................................................................................... 9
Exporting a Profile ............................................................................................... 9
TCP/IP Configuration ......................................................................................... 9
Configuring the TCP/IP Address for the network device: ............................... 9
General Tab......................................................................................................... 10
Advanced Tab..................................................................................................... 10
Security Tab ........................................................................................................ 11
Using EAP-TLS Security.............................................................................. 12
Using EAP-TTLS Security ........................................................................... 12
Using PEAP (EAP-GTC) Security............................................................... 13
Using PEAP-MSCHAP V2 Security............................................................ 14
Using LEAP Security ................................................................................... 15
Configuring LEAP.............................................................................................. 15
Pre-Shared Encryption Keys.............................................................................. 16
Defining pre-shared encryption keys:............................................................... 16
Overwriting an Existing Static WEP Key.......................................................... 16
Disabling Static WEP.......................................................................................... 16
Using WPA Passphrase Security....................................................................... 17
Zero Configuration............................................................................................. 17
Wireless Network Configuration ...................................................................... 17
Check the Status Information or Diagnostics................................................... 18