User's Manual

Atheros Communications, Inc. v
COMPANY CONFIDENTIAL June 2006
Contents
Introduction ...............................................................................................................7
System Requirements ........................................................................................7
Profile Management .................................................................................................7
Create or Modify a Configuration Profile.......................................................7
Remove a Configuration Profile.......................................................................8
Auto Profile Selection Management.......................................................................8
Switching to a Different Configuration Profile.....................................................9
Import and Export Profiles......................................................................................9
Importing a Profile....................................................................................................9
Exporting a Profile ....................................................................................................9
TCP/IP Configuration..............................................................................................9
Configuring the TCP/IP Address for the network device:.................................9
General Tab..............................................................................................................10
Advanced Tab..........................................................................................................10
Security Tab .............................................................................................................11
Using EAP-TLS Security .................................................................................12
Using EAP-TTLS Security...............................................................................12
Using PEAP (EAP-GTC) Security ..................................................................13
Using PEAP-MSCHAP V2 Security...............................................................14
Using LEAP Security .......................................................................................15
Configuring LEAP ..................................................................................................15
Pre-Shared Encryption Keys..................................................................................16
Defining pre-shared encryption keys:..................................................................16
Overwriting an Existing Static WEP Key ............................................................16
Disabling Static WEP..............................................................................................16
Using WPA Passphrase Security ..........................................................................17
Zero Configuration .................................................................................................17
Wireless Network Configuration..........................................................................17
Check the Status Information or Diagnostics......................................................18