Atheros Communications, Inc. • v
COMPANY CONFIDENTIAL September 2013
Contents
Introduction ............................................................................................................... 8
System Requirements ........................................................................................ 8
Profile Management ................................................................................................. 8
Create or Modify a Configuration Profile ....................................................... 8
Remove a Configuration Profile ....................................................................... 9
Auto Profile Selection Management ....................................................................... 9
Switching to a Different Configuration Profile ................................................... 10
Import and Export Profiles ..................................................................................... 10
Importing a Profile ................................................................................................... 10
Exporting a Profile ................................................................................................... 10
TCP/IP Configuration ............................................................................................ 10
Configuring the TCP/IP Address for the network device: .................................. 10
General Tab .............................................................................................................. 11
Advanced Tab .......................................................................................................... 11
Security Tab ............................................................................................................. 12
Using EAP-TLS Security ................................................................................. 13
Using EAP-TTLS Security ............................................................................... 13
Using PEAP (EAP-GTC) Security .................................................................. 14
Using PEAP-MSCHAP V2 Security ............................................................... 15
Using LEAP Security ....................................................................................... 16
Configuring LEAP .................................................................................................... 16
Pre-Shared Encryption Keys .................................................................................. 17
Defining pre-shared encryption keys: ................................................................... 17
Overwriting an Existing Static WEP Key.............................................................. 17
Disabling Static WEP .............................................................................................. 18
Using WPA Passphrase Security .......................................................................... 18
Zero Configuration ................................................................................................. 18
Wireless Network Configuration ............................................................................ 18
Check the Status Information or Diagnostics ...................................................... 19
Current Status ................................................................................................... 19
Adapter Information Button .................................................................................. 20
Diagnostics Tab ....................................................................................................... 20
Transmitted Frames ................................................................................................ 21
Received Frames .................................................................................................... 21
Scan Available Networks ....................................................................................... 21
Connecting to a different network ......................................................................... 21