EasyManua.ls Logo

Atheros AR5B22 - Table of Contents

Atheros AR5B22
53 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Qualcomm Atheros, Inc. v
COMPANY CONFIDENTIAL January 2012
Contents
Introduction .......................................................................................................... 7
System Requirements .................................................................................... 7
Profile Management ............................................................................................. 7
Create or Modify a Configuration Profile .................................................... 7
Remove a Configuration Profile ................................................................... 8
Auto Profile Selection Management .................................................................... 8
Switching to a Different Configuration Profile .................................................. 9
Import and Export Profiles ................................................................................... 9
Importing a Profile ................................................................................................ 9
Exporting a Profile ................................................................................................ 9
TCP/IP Configuration ......................................................................................... 9
Configuring the TCP/IP Address for the network device: .................................. 9
General Tab ......................................................................................................... 10
Advanced Tab ..................................................................................................... 10
Security Tab ........................................................................................................ 11
Using EAP-TLS Security .............................................................................. 12
Using EAP-TTLS Security ........................................................................... 12
Using PEAP (EAP-GTC) Security ............................................................... 13
Using PEAP-MSCHAP V2 Security ............................................................ 14
Using LEAP Security ................................................................................... 15
Configuring LEAP ............................................................................................... 15
Pre-Shared Encryption Keys .............................................................................. 16
Defining pre-shared encryption keys: ............................................................... 16
Overwriting an Existing Static WEP Key .......................................................... 16
Disabling Static WEP ......................................................................................... 16
Using WPA Passphrase Security ....................................................................... 17
Zero Configuration ............................................................................................. 17
Wireless Network Configuration ........................................................................ 17
Check the Status Information or Diagnostics ................................................... 18
Current Status .............................................................................................. 18
Adapter Information Button .............................................................................. 19
Diagnostics Tab .................................................................................................. 19
Transmitted Frames ........................................................................................... 20
Received Frames ............................................................................................... 20
Scan Available Networks ................................................................................... 20
Connecting to a different network ..................................................................... 20

Table of Contents

Related product manuals