EasyManua.ls Logo

Atheros AR5B95 - Table of Contents

Atheros AR5B95
33 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Atheros Communications, Inc. v
COMPANY CONFIDENTIAL Dec 2008
Contents
Introduction ............................................................................................................... 7
System Requirements ........................................................................................ 7
Profile Management ................................................................................................. 7
Create or Modify a Configuration Profile ....................................................... 7
Remove a Configuration Profile ....................................................................... 8
Auto Profile Selection Management ....................................................................... 8
Switching to a Different Configuration Profile ..................................................... 9
Import and Export Profiles ...................................................................................... 9
Importing a Profile .................................................................................................... 9
Exporting a Profile .................................................................................................... 9
TCP/IP Configuration .............................................................................................. 9
Configuring the TCP/IP Address for the network device: ................................. 9
General Tab .............................................................................................................. 10
Advanced Tab .......................................................................................................... 10
Security Tab ............................................................................................................. 11
Using EAP-TLS Security ................................................................................. 12
Using EAP-TTLS Security ............................................................................... 12
Using PEAP (EAP-GTC) Security .................................................................. 13
Using PEAP-MSCHAP V2 Security ............................................................... 14
Using LEAP Security ....................................................................................... 15
Configuring LEAP .................................................................................................. 15
Pre-Shared Encryption Keys .................................................................................. 16
Defining pre-shared encryption keys: .................................................................. 16
Overwriting an Existing Static WEP Key ............................................................ 16
Disabling Static WEP .............................................................................................. 16
Using WPA Passphrase Security .......................................................................... 17
Zero Configuration ................................................................................................. 17
Wireless Network Configuration .......................................................................... 17
Check the Status Information or Diagnostics ...................................................... 18

Related product manuals