Atheros Communications, Inc. • v
COMPANY CONFIDENTIAL Dec 2007
Contents
Introduction .....................................................................................................................7
System Requirements .............................................................................................7
Profile Management.......................................................................................................7
Create or Modify a Configuration Profile ..........................................................7
Remove a Configuration Profile ..........................................................................8
Auto Profile Selection Management...........................................................................8
Switching to a Different Configuration Profile ........................................................9
Import and Export Profiles...........................................................................................9
Importing a Profile .........................................................................................................9
Exporting a Profile .........................................................................................................9
TCP/IP Configuration...................................................................................................9
Configuring the TCP/IP Address for the network device: ...................................9
General Tab....................................................................................................................10
Advanced Tab ...............................................................................................................10
Security Tab ...................................................................................................................11
Using EAP-TLS Security ......................................................................................12
Using EAP-TTLS Security ...................................................................................12
Using PEAP (EAP-GTC) Security ......................................................................13
Using PEAP-MSCHAP V2 Security ..................................................................14
Using LEAP Security ............................................................................................15
Configuring LEAP........................................................................................................15
Pre-Shared Encryption Keys ......................................................................................16
Defining pre-shared encryption keys: .....................................................................16
Overwriting an Existing Static WEP Key ................................................................16
Disabling Static WEP ...................................................................................................16
Using WPA Passphrase Security...............................................................................17
Zero Configuration ......................................................................................................17
Wireless Network Configuration ..............................................................................17
Check the Status Information or Diagnostics .........................................................18