iv • Atheros Communications, Inc.
Dec 2007 COMPANY CONFIDENTIAL
Contents
Introduction............................................................................................................... 5
System Requirements ........................................................................................ 5
Profile Management .................................................................................................5
Create or Modify a Configuration Profile ...................................................... 5
Remove a Configuration Profile ...................................................................... 5
Auto Profile Selection Management....................................................................... 5
Switching to a Different Configuration Profile..................................................... 5
Import and Export Profiles...................................................................................... 5
Importing a Profile....................................................................................................5
Exporting a Profile.................................................................................................... 5
TCP/IP Configuration ............................................................................................. 5
Configuring the TCP/IP Address for the network device:................................. 5
General Tab................................................................................................................5
Advanced Tab ........................................................................................................... 5
Security Tab ............................................................................................................... 5
Using EAP-TLS Security ................................................................................... 5
Using EAP-TTLS Security.................................................................................5
Using PEAP (EAP-GTC) Security.................................................................... 5
Using PEAP-MSCHAP V2 Security ................................................................5
Using LEAP Security .........................................................................................5
Configuring LEAP ....................................................................................................5
Pre-Shared Encryption Keys ...................................................................................5
Defining pre-shared encryption keys:.................................................................... 5
Overwriting an Existing Static WEP Key ..............................................................5
Disabling Static WEP................................................................................................ 5
Using WPA Passphrase Security ............................................................................ 5
Zero Configuration................................................................................................... 5
Wireless Network Configuration ........................................................................... 5
Check the Status Information or Diagnostics ....................................................... 5