Atheros AR5BMB6 User Manual

Atheros Client
Utility Help
Model AR5BMB6 (802.11a/b/g radio)
PRELIMINARY
Introduction
System Requirements
Profile Management
Create or Modify a Profile
Remove a Profile
Profile Auto Selection
Switch Profiles
Configure TCP/IP
Configuring Win XP
Security
EAP-TLS
EAP-TTLS
PEAP (EAP-GTC)
PEAP (EAP-MSCHAP V2)
LEAP
WPA Passphrase
Check Status or Diagnostics
Check Current Status
Check Driver Information
Check Statistics
Connect to Another Network
Settings
Signal Strength Display
Data Display
Display Refresh Interval
Tools
Tray Icon
Troubleshooting Utility
Enable/ Disable the Radio
Compliance
Introduction
The Atheros Client Utility (ACU) is a user-mode utility designed to edit and add configuration profiles, as well as display diagnostics pertaining to a selected Atheros network interface card (wireless adapter).
System Requirements
Laptop/ PC containing:
32-bit CardBus slot (or Desktop PC with PC Card-PCI adapter)
Mini PCI
32 MB memory or greater
300 MHz processor or higher
Atheros Communications, Inc. Page 2
COMPANY CONFIDENTIAL February 2005
Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6)
Profile Management
Configure the wireless network adapter (wireless card) from the Profile Management tab of the Atheros Client Utility.
Add a profile
Edit a profile
Import a Profile
Export a Profile
The wireless network adapter works in either infrastructure mode (which uses an access point) or
ad hoc mode
(a group of stations participating in the wireless LAN).
Order profiles
Switch to a different profile
Remove a profile
Connect to a Different
Network
Create or Modify a Configuration Profile
To add a new configuration profile, click New on the Profile Management tab. To modify a configuration profile, select the configuration from the Profile list and click the Modify button.
The Profile Management dialog box displays the General tab
Profile Management:
Edit the General tab.
Edit the Security tab.
Edit the Advanced tab.
.
To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network Type field on the Advanced tab.
Remove a Configuration Profile
1. Go to the Profile Management tab.
Select the profile to remove from the list of configuration profiles.
2.
Click the Remove button.
3.
Atheros Communications, Inc. Page 3
COMPANY CONFIDENTIAL February 2005
Auto Profile Selection Management
Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network.
Including a profile in auto profile selection:
1.
On the Profile Management tab, click the Order Profiles button.
The Auto Profile Selection Management window appears, with a list of all created profiles
2.
in the Available Profiles box.
Highlight the profiles to add to auto profile selection, then click Add. The profiles appear
3.
in the Auto Selected Profiles box.
Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box.
Click Move Up or Move Down as appropriate.
2.
The first profile in the Auto Selected Profiles box has highest priority, and the last profile has lowest priority.
3.
Click OK.
Check the Auto Select Profiles box.
4.
Save the modified configuration file.
5.
When auto profile selection is enabled by checking Auto Select Profiles on the Profile Management tab, the client adapter scans for an available network. The profile with the highest priority and the same SSID as one of the found networks is the one that is used to connect to the network. If the connection fails, the client adapter tries the next highest priority profile that matches the SSID, and so on.
With auto profile selection enabled, the wireless adapter scans for available networks. The highest priority profile with the same SSID as a found network is used to connect to the network. On a failed connection, the client adapter tries with the next highest priority profile.
Switching to a different configuration profile
1. To switch to a different profile, go to the Profile Management tab.
Click on the profile name in the Profile List.
2.
Click the Activate button.
3.
The Profile List provides icons that specify the operational state for that profile. The list also provides icons that specify the signal strength
See also Scan Available Networks.
Atheros Communications, Inc. Page 4
COMPANY CONFIDENTIAL February 2005
for that profile.
Import and Export Profiles
Importing a Profile
1. From the Profile Management tab, click the Import button. The Import Profile window
appears.
Browse to the directory where the profile is located.
2.
3. Highlight the profile name.
Click Open. The imported profile appears in the profiles list.
4.
Exporting a Profile
1. From the Profile Management tab, highlight the profile to export.
Click the Export button. The Export Profile window appears.
2.
Browse to the directory to export the profile to.
3.
Click Save. The profile is exported to the specified location.
4.
TCP/IP Configuration
Configuring the TCP/IP Address for the network device:
1.
After configuring the wireless network adapter properties, open the Control Panel and open Network and Dial-up Connections.
Find the Local Area Connection associated with the wireless network adapter. Right-click
2.
that connection, and click Properties.
3.
Select Internet Protocol (TCP/IP) and click Properties.
Click the radio button Use the following IP address, then enter an IP address and Subnet
4.
mask. Assigning an IP address and Subnet mask allows stations to operate in access
point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default
gateway and DNS server information is also required.
IP configuration information (DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff.
5. Click OK to finish.
Atheros Communications, Inc. Page 5
COMPANY CONFIDENTIAL February 2005
General Tab
In the Atheros Client Utility, access the General tab by clicking New or Modify on the Profile Management tab.
Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the
Security
and Advanced tabs.
Profile Name
Client Name
Network Names (SSIDs)
See also:
Configure a Profile for Ad Hoc Mode
Configure a Profile for Access Point (Infrastructure) Mode
Identifies the configuration profile. This name must be unique. Profile names are not case sensitive.
Identifies the client machine.
The IEEE 802.11 wireless network name. This field has a maximum limit of 32 characters.
Configure up to three SSIDs (SSID1, SSID2, and SSID3).
Atheros Communications, Inc. Page 6
COMPANY CONFIDENTIAL February 2005
Advanced Tab
In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the Profile Management tab, then clicking the Advanced tab in Profile Management. of Profile Management to configure the profile.
Also edit the General and Security tabs.
Edit the Advanced tab
Transmit Power
Level
Power Save
Mode
Network Type
802.11b
Preamble
Wireless Mode
Wireless Mode
when Starting an
Ad Hoc
Network
Selects the transmit power level for 80211b/g or 802.11a in mW. Actual transmit power may be limited by regulatory domain or hardware limitations.
Specify:
Maximum mode causes the access point to buffer incoming
messages for the wireless adapter. The adapter up periodically polls the access point to see if any messages are waiting.
Normal uses maximum when retrieving a large number of packets,
then switches back to power save mode after retrieving the packets.
Off turns power saving off, thus powering up the wireless adapter
continuously for a short message response time.
Specifies the network as either infrastructure (access point mode) or ad hoc.
Specifies the preamble setting in 802.11b. The default setting is Short &
Long (AP mode), which allows both short and long headers in the 802.11b
frames. The adapter can only use short radio headers if the access point supports and uses them. Set to Long Only to override allowing short frames.
Specifies 5GHz 54 Mbps, 2.4 GHz 54 Mbps, 2.4 GHz 11 Mbps, or Super A/G operation in an access point network. the wireless mode of the access point it associates to.
Specifies 5GHz 54 Mbps, 5GHz 108 Mbps, or 2.4 GHz 54/11 Mbps to start an ad hoc available modes.
network if no matching network name is found after scanning all
The wireless adapter must match
This mode also allows selection of the channel the wireless adapter uses. The channels available depend on the regulatory domain. If the adapter finds no other ad hoc adapters, this selection specifies the which channel with the adapter starts the ad hoc network with.
The wireless adapter must match the wireless mode and channel of the clients it associates to.
802.11a
Authentication
Mode
For infrastructure (access point) networks, click the Preferred APs button to specify up to four access points to which the client adapter should attempt to associate.
Atheros Communications, Inc. Page 7
COMPANY CONFIDENTIAL February 2005
Select the mode the wireless adapter uses to authenticate to an AP:
Auto causes the adapter to attempt authentication using shared, but
switches it to open authentication if shared fails.
Open enables an adapter to attempt authentication regardless of its
WEP settings. It will only associate with the access point if the WEP keys on both the adapter and the access point match.
Shared only allows the adapter to associate with access points that
have the same WEP key.
Security Tab
In the Atheros Client Utility, access the Security tab by clicking New or Modify on the Profile Management tab. Click the Security tab in the Profile Management window.
Edit the fields in the Security tab of Profile Management to configure the profile. To define the security mode, select the radio button of the desired security mode. Make sure to also edit the
General
and Advanced tabs.
Enables the use of Wi-Fi Protected Access (WPA). Choosing WPA
WPA
opens the WPA EAP drop-down menu. The options include:
Enables WPA Passphrase security. Click on the Configure button and
WPA
Passphrase
fill in the WPA Passphrase.
EAP-TLS
EAP-TTLS
PEAP (EAP-GTC)
PEAP (EAP-MSCHAP V2)
LEAP
802.1x
Pre-Shared Key
(Static WEP)
Enables 802.1x security. This option requires IT administration.
Choosing 802.1x opens the 802.1x EAP type drop-down menu. The options include:
EAP-TLS
EAP-TTLS
PEAP (EAP-GTC)
PEAP (EAP-MSCHAP V2)
LEAP
If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow
Association to Mixed Cells is checked on the Security Tab
association.
Enables the use of pre-shared keys that are defined on both the access point and the station.
To define pre-shared encryption keys, choose the Pre-Shared Key radio button and click the Configure button to fill in the Define Pre-Shared
Keys window.
to allow
If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow
Association to Mixed Cells is checked on the Security Tab
association.
None
Atheros Communications, Inc. Page 8
COMPANY CONFIDENTIAL February 2005
No security (not recommended).
to allow
Using EAP-TLS Security
To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TLS from the drop-down menu.
Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates downloaded onto it. Check with the IT manager.
If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right, then
1.
click the Configure button.
Select the appropriate certificate authority from the list. The server/domain name and the
2.
login name are filled in automatically from the certificate information. Click OK.
3. Click OK.
Activate the profile.
4.
Using EAP-TTLS Security
To use EAP security In the Atheros Client Utility, access the Security tab in the Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
Choose EAP-TTLS from the drop-down menu.
2.
Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates downloaded onto it. Check with the IT manager.
1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right,
then click the Configure button.
Select the appropriate certificate from the drop-down list and click OK.
2.
Specify a user name for EAP authentication:
3.
o Check Use Windows User Name to use the Windows user name as the
EAP user name.
o OR: Enter a EAP user name in the User Name field to use a separate
user name and password and start the EAP authentication process.
Atheros Communications, Inc. Page 9
COMPANY CONFIDENTIAL February 2005
4. Click Advanced and:
o Leave the server name field blank for the client to accept a certificate
from any server with a certificate signed by the authority listed in the
Click OK.
5.
Enable the profile.
6.
Network Certificate Authority drop-down list. (recommended)
o Enter the domain name of the server from which the client will accept a
certificate.
o Change the login name if needed.
Using PEAP-GTC Security
To use PEAP-GTC security In the Atheros Client Utility, access the Security tab in the Profile Management window.
1.
On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button.
Choose PEAP (EAP-GTC) from the drop-down menu.
2.
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the
server properties must already be set. Check with the IT manager.
1.
Click the Configure button.
Select the appropriate network certificate authority from the drop-down list.
2.
Specify a user name for inner PEAP tunnel authentication:
3.
o Check Use Windows User Name to use the Windows user name as the
PEAP user name.
o OR: Enter a PEAP user name in the User Name field to use a separate
user name and start the PEAP authentication process.
Choose Token or Static Password, depending on the user database.
4.
Note that Token uses a hardware token device or the Secure Computing SofToken program (version 1.3 or later) to obtain and enter a one-time password during authentication.
Click Advanced and:
5.
o Leave the server name field blank for the client to accept a certificate
from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended)
o Enter the domain name of the server from which the client will accept a
certificate.
The login name used for PEAP tunnel authentication, fills in automatically as PEAP­xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed.
6.
Click OK.
Atheros Communications, Inc. Page 10
COMPANY CONFIDENTIAL February 2005
7. Enable the profile.
Using PEAP-MSCHAP V2 Security
To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab in the Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
Choose PEAP (EAP-MSCHAP V2) from the drop-down menu.
2.
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates, and
the server properties must already be set. Check with the IT manager.
Click the Configure button.
1.
Select the appropriate certificate from the drop-down list.
2.
Specify a user name for inner PEAP tunnel authentication:
3.
o Check Use Windows User Name to use the Windows user name as the
o OR: Enter a PEAP user name in the User Name field to use a separate
PEAP user name.
user name and start the PEAP authentication process.
4. Click Advanced and:
o Leave the server name field blank for the client to accept a certificate
from any server with a certificate signed by the authority listed in the Network Certificate Authority drop-down list. (recommended)
o Enter the domain name of the server from which the client will accept a
certificate.
o The login name used for PEAP tunnel authentication, fills in
automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed.
Click OK.
5.
Enable the profile.
6.
Atheros Communications, Inc. Page 11
COMPANY CONFIDENTIAL February 2005
Using LEAP Security
To use security In the Atheros Client Utility, access the Security tab in the Profile Management window.
LEAP security requires that all infrastructure devices (e.g. access points and servers) are configured for LEAP authentication. Check with the IT manager.
Configuring LEAP:
Configuring LEAP
Enabling LEAP
On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the drop-
down menu.
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the drop-
down menu.
1.
Click the Configure button.
Specify a user name and password:
2.
Select to Use Temporary User Name and Password by choosing the radio button:
o Check Use Windows User Name to use the Windows user name as the
LEAP user name.
o OR: Check Manually Prompt for LEAP User Name and Password to
manually login and start the LEAP authentication process.
Select to Use Saved User Name and Password by choosing the radio button:
o Specify the LEAP user name, password, and domain to save and use.
3. Enter the user name and password.
Confirm the password.
4.
Specify a domain name:
5.
o Check the Include Windows Logon Domain with User Name setting to pass the
Windows login domain and user name to the RADIUS server. (default)
o OR: Enter a specific domain name.
If desired, check No Network Connection Unless User Is Logged In to force the wireless
6.
adapter to disassociate after logging off.
Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify
7.
how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds.
Click OK.
8.
Enable the profile.
9.
Atheros Communications, Inc. Page 12
COMPANY CONFIDENTIAL February 2005
Pre-Shared Encryption Keys
Defining pre-shared encryption keys:
1.
Click the Define Pre-Shared Keys radio button on the Security tab.
Click on Configure.
2.
3. Fill in the fields in the Define Pre-Shared Keys dialog box:
Key Entry
Encryption
Keys
WEP Keys (1-
WEP Key
Determines the entry method for an encryption key: hexadecimal (0-9, A­F), or ASCII text (all keyboard characters except spaces).
Selects the default encryption keys used. Only allows the selection for a shared First, Second, Third, or Fourth key whose corresponding field has been completed.
Defines a set of shared encryption keys for network configuration security. At least one Shared Key field must be populated to enable security using
4)
a shared key. encryption key.
Defines the size for each encryption key. The options include:
Size
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters)
Click on the radio button to set the key as the default
128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII)
152-bit (enter 32 digits hexadecimal, 16 digits for ASCII)
4. Click OK for the changes to take effect.
Overwriting an Existing Static WEP Key
1. Click the Define Pre-Shared Keys radio button on the Security tab.
Click on Configure.
2.
In the window, all existing static WEP keys are displayed as asterisks for security
3.
reasons. Click in the field of the existing static WEP key to overwrite.
Delete the asterisks in that field.
4.
Enter a new key.
5.
Make sure to select the Transmit Key button to the left of this key is selected for the key
6.
to transmit packets.
Click OK.
7.
Disabling Static WEP
To disable static WEP for a particular profile, choose None on the Profile Management tab and click OK.
OR: Select any other security option on the Profile Management tab to automatically disable static WEP.
Atheros Communications, Inc. Page 13
COMPANY CONFIDENTIAL February 2005
Using WPA Passphrase Security
To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in the Profile Management window.
On the Security tab, choose the WPA Passphrase radio button.
1.
Click on the Configure button.
2.
Fill in the WPA Passphrase.
3.
Click OK.
Zero Configuration
This section describes the operation of the Atheros Client Utility (ACU) and Windows XP Wireless Configuration Service (WZCS).
Wireless Network Configuration
The Windows WZCS is an NT service that manages the wireless connection in a largely dynamic way. Only minimal connection information must be identified and configured.
To set Zero Configuration on Windows XP, take the following steps:
In Windows XP, open the Wireless Network Configuration Properties dialog box.
1.
Select the check box “Use Windows to configure my wireless network settings” to set
2.
Zero Configuration.
When this check box is selected, Windows XP takes control of these settings for all configuration profiles:
The Zero Configuration settings override all configuration profiles, even when you select other options. However, the ACU does still control the following settings when Zero Configuration is set:
SSID
Security keys
Ad hoc settings
Power settings
Active/Passive scanning (where applicable)
Transmit power
Wireless band
Short/Long preamble (802.11b)
When Zero Configuration is in use, a pop-up message is displayed on the ACU when you attempt to create or edit a configuration profile from the Station Configuration tab of the ACU.
Atheros Communications, Inc. Page 14
COMPANY CONFIDENTIAL February 2005
To turn Zero Configuration off on Windows XP, take the following steps:
1. In Windows XP, open the Wireless Network Configuration Properties dialog box.
2. Clear the check box “Use Windows to configure my wireless network settings” to set Zero Configuration.
When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the Station Configuration tab of the ACU.
Check the Status Information or Diagnostics
The Atheros client utility includes a number of tools to display current diagnostics and status information.
Check current status
Check driver information
Check receive and transmit diagnostics
Current Status
The Current Status tab contains general information about the program and its operations. The Current Status tab does not require any configuration.
The following table describes the items found on the Current Status screen.
Profile Name
Link Status
Wireless Mode
IP Address
Network Type
The name of the current selected configuration profile. Set up the configuration name on the General tab
Shows whether the station is associated to the wireless network.
Displays the wireless mode. Configure the wireless mode on the
Advanced tab.
Displays the computer's IP address.
The type of network the station is connected to. The options include:
Infrastructure
Ad Hoc
(access point)
.
Configure the network type on the Advanced tab.
Current Channel
Atheros Communications, Inc. Page 15
COMPANY CONFIDENTIAL February 2005
Shows the currently connected channel.
Server Based
Authentication
Data Encryption
Signal Strength
Click the Advanced button to see the advanced status diagnostics.
Shows whether server based authentication is used.
Displays the encryption type the driver is using. Configure the encryption type on the Security tab
Shows the strength of the signal.
.
Adapter Information Button
The Adapter Information button contains general information about the network interface card (the wireless network adapter) and the network driver interface specification (NDIS) driver. Access the adapter information from the Diagnostics tab
Card Name
MAC Address
Driver
Driver Version
The name of the wireless network adapter.
The MAC address of the wireless network adapter.
The driver name and path of the wireless network adapter driver.
The version of the wireless network adapter driver.
.
Driver Date
Client Name
The creation date of the wireless network adapter driver.
The name of the client computer.
Atheros Communications, Inc. Page 16
COMPANY CONFIDENTIAL February 2005
Diagnostics Tab
The Diagnostics tab of the Atheros Client Utility provides buttons used to retrieve receive and transmit statistics. The Diagnostics tab does not require any configuration.
The Diagnostics tab lists the following receive and transmit diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast frames transmitted and received
Broadcast frames transmitted and received
Unicast frames transmitted and received
Total bytes transmitted and received
Click the Adapter Information button for more general information about the the wireless network adapter and the network driver interface specification (NDIS) driver.
Click the Advanced Statistics button on the Diagnostics tab to also show receive and transmit statistical information for the following receive and transmit diagnostics for frames received by or transmitted to the wireless network adapter:
Transmitted Frames
Frames transmitted OK
Frames retried
Frames dropped
NoACK frames
ACK frames
RTS Frames
Clear-to-send (CTS)
Frames
No CTS frames
Retried RTS frames
Retried data frames
Received Frames
Frames received OK
Beacons
Frames with errors
CRC errors
Encryption errors
Duplicate frames
AP mismatches
Data rate mismatches
Authentication time-out
Authentication rejects: the number of AP
authentication failures received by the wireless network adapter
Association time-out
Association rejects: the number of access
point authentication rejects received by the wireless network adapter
Standard MIC OK
Standard MIC errors
CKIP MIC OK
CKIP MIC errors
Atheros Communications, Inc. Page 17
COMPANY CONFIDENTIAL February 2005
Scan Available Networks
Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time.
Connecting to a different network
Highlight a network name and click the Activate button to connect an available network. If no configuration profile exists for that network, the Profile Management window opens to the General tab. Fill in the profile name and click OK to create the configuration profile
for that network.
Atheros Communications, Inc. Page 18
COMPANY CONFIDENTIAL February 2005
Display Settings
To change the display settings, choose Options > Display Settings from the menu.
The display settings dialog box contains tools to set the:
Signal Strength Display
Units
Refresh Interval
Data Display
Sets the units used when displaying signal strength: percentage (%) or dBm.
Use the up/down arrows to set the display refresh interval in seconds.
Sets the display to cumulative or relative:
Relative displays the change in statistical
data since the last update.
Cumulative displays statistical data collected
since opening the profile.
ACU Tools
Use the Action menu to access the Atheros Client Utility tools:
Enable/Disable Radio
Enable/Disable Tray Icon
Troubleshooting
Manual LEAP Login
Enable or disable the RF Signal on all Atheros
station reference designs.
Enable or disable the tray icon.
Run the optional Troubleshooting Utility.
Log in to LEAP manually, if LEAP is set to manually
prompt for user name and password on each login.
Reauthenticate
Reauthenticate to a LEAP-configured access point.
Exit the Atheros Client Utility application.
Exit
Atheros Communications, Inc. Page 19
COMPANY CONFIDENTIAL February 2005
Tray Icon
The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI
Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name.
Right-click on the tray icon to:
).
Help
Open Atheros Client Utility
Troubleshooting
Preferences
Enable/Disable Radio
Manual LEAP Login
Reauthenticate
Select Profile
Show Connection Status
Open the online help.
Launch the Atheros Client Utility (ACU). Use the ACU to
configure the profile information.
Run the Troubleshooting Utility.
Set the startup options and menu options for the ACU. Check whether the program should start automatically when Windows starts, and check the menu items that should appear on the popup menu.
Enable or disable the RF Signal.
Log in to LEAP manually, if LEAP is set to manually prompt
for user name and password on each login.
Reauthenticate to the access point.
Click a configuration profile name to switch to it. If no configuration profile exists for a connection, add first.
Display the Connection Status window. This window displays information about the connection:
Active Profile
or view status and statistics
a profile
Displays the name of the active
configuration profile.
Auto Profile Selection
Connection Status
Link Quality
Atheros Communications, Inc. Page 20
COMPANY CONFIDENTIAL February 2005
Shows whether auto profile selection is enabled.
Displays whether the adapter is connected to a wireless network.
Lists the quality of the link connection.
Exit
The colors are defined as follows:
Color Quality RSSI*
Green Excellent 20 dB +
Green Good 10-20 dB +
Yellow Poor 5-10 dB
SSID
Access Point Name
Access Point IP Address
Link Speed
Client Adapter IP Address
Exit the Atheros Client Utility application.
Displays the SSID of the associated network.
Shows the name of the access point the wireless adapter is connected to.
Shows the IP address of the access point the wireless adapter is connected to.
Lists the speed of the link connection.
Displays the IP address of the wireless adapter.
Red Poor < 5 dB
Gray No Connection No Connection
*Received signal strength indication RSSI. Displayed in dB or percentage.
Enable or disable the tray icon in the Action menu.
Atheros Communications, Inc. Page 21
COMPANY CONFIDENTIAL February 2005
Troubleshooting Utility
The Troubleshooting Utility is an optional utility that identifies and resolves wireless adapter configuration and association problems when the adapter is in access point (infrastructure) mode.
This utility is available only in Mini PCI solutions.
To run the Troubleshooting Utility:
Click Run Test to run the troubleshooting utility tests:
From the Diagnostics tab, click the Troubleshooting button to run the Troubleshooting Utility.
OR: Select Action > Troubleshooting from the action menu.
Driver Installation
Card Insertion
Card Enable
Radio
Association
Authentication
Network
The utility posts the test results as:
Test passed: Successful test completion
Test failed: The test failed because the wireless adapter is not configured improperly to
associate to an access point
Test bypassed: The test was not required for the active profile
To view a report of the tests, click View Report.
To save the report, click Save Report and browse to the directory to save the report to.
Name the file and click Save.
Click Start Test to re-run the troubleshooting utility.
Atheros Communications, Inc. Page 22
COMPANY CONFIDENTIAL February 2005
Ad Hoc Mode
In ad hoc mode, a wireless network adapter works within an independent basic service set (IBSS), as illustrated here. All stations communicate directly with other stations without using an access point (AP).
To connect to an ad hoc network, configure the profile for ad hoc mode
.
Ad Hoc Mode Profile Configuration
To configure a profile in ad hoc mode, change the Network Type in the Profile Management's
Advanced tab
Network Name (on General Tab
Transmit Power Level
802.11b Preamble
Wireless Mode When Starting an Ad Hoc Network
Make sure to also edit the General
. For ad hoc mode, modify the settings:
)
(if using 802.11b)
and Security tabs.
Atheros Communications, Inc. Page 23
COMPANY CONFIDENTIAL February 2005
Infrastructure (Access Point) Mode
In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here.
To connect to an access point network, configure the profile for access point mode.
Infrastructure (Access Point) Mode Profile Configuration
To configure a profile in infrastructure (access point) mode, change the Network Type in the
Advanced tab
Transmit Power Level
Power Save Mode
802.11b Preamble (if using 802.11b)
Wireless Mode
802.11a Authentication Mode (if using 802.11a)
Make sure to also edit the General and Security tabs.
. For access point mode, modify the settings:
Atheros Communications, Inc. Page 24
COMPANY CONFIDENTIAL February 2005
Uninstall an Old Driver
Uninstall an old driver before upgrading to a new NDIS driver release.
To remove the newly installed driver from the system if the system does not have previously installed versions of the NDIS driver, proceed to Step 4
1.
To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros
Wireless Network Adapter, and choose Uninstall.
Click OK to uninstall the device.
2.
When the device is uninstalled from Device Manager, search for and delete the driver
3.
files that reside in the system.
Go to the Start menu and choose Search > For Files or Folders.
a.
Enter oem*.inf in the Search for files or folders named: field, and enter
b.
Atheros in the Containing text: field. Click Search Now.
c.
A few files matching these criteria are possible, if previous drivers have
d.
not been removed properly. Choose the files that have been found and delete them from the system.
e.
.
To complete the uninstallation, remove the file ar5211.sys from the folder
4.
\WINNT\system32\drivers.
Additional Security Features
These security features prevent attacks on a wireless network's WEP keys. The wireless adapter automatically supports each of these features, but these features must be enabled on the access point.
Message Integrity Check (MIC)
MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone intercepts an encrypted message retransmits it after some alterations. Thus the receiver accepts the message as legitimate. The MIC adds some bytes to each packet to protect it against tampering.
Temporal Key Integrity Protocol (TKIP)
This feature prevents attacks on WEP in which someone catches encrypted packets and uses their initialization vector (IV) to decipher the WEP key. TKIP removes the predictability to protect both unicast and broadcast WEP keys.
Broadcast Key Rotation
EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals.
Atheros Communications, Inc. Page 25
COMPANY CONFIDENTIAL February 2005
Advanced Status Information
Click the Advanced button on the Current Status tab of the Atheros Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration.
The following table describes the items found on the Advanced Status screen.
Network Name (SSID)
Server Based
Authentication
Data Encryption
Authentication Type
Message Integrity
Check
Associated AP Name
Associated AP IP
Address
Associated AP MAC
Address
Power Save Mode
Displays the wireless network name.
Configure the network name on the General tab.
Shows whether server based authentication is used.
Displays the encryption type the driver is using. Configure the encryption type on the Security tab
Displays the authentication mode.
Configure the authentication mode on the General tab.
Shows whether MIC is enabled. MIC prevents bit-flip attacks on encrypted packets.
Displays the name of the access point the wireless adapter is associated to.
Shows the IP address of the access point the wireless adapter is associated to.
Displays the MAC address of the access point the wireless adapter is associated to.
Shows the power save mode. Power management is disabled in ad hoc mode.
.
Configure the power save mode on the Advanced tab.
Current Power Level
Available Power
Levels
Current Signal
Strength
Current Noise Level
Up Time
802.11b Preamble
Current Receive Rate
Atheros Communications, Inc. Page 26
COMPANY CONFIDENTIAL February 2005
Displays the transmit power level rate in mW.
Configure the transmit power level on the Advanced tab.
Shows the 802.11a and/or 802.11b/g available power levels.
Shows the current signal strength in dBm.
Displays the current noise level in dBm.
Shows how long the client adapter has been receiving power (in hours:minutes:seconds). If the adapter runs for more than 24 hours, the display shows in days:hours:minutes:seconds.
Displays the 802.11b preamble format.
Configure the preamble format on the Advanced tab.
Shows the current receive rate in Mbps.
Current Transmit
Channel
Frequency
Channel Set
Displays the current transmit rate in Mbps.
Rate
Shows the currently connected channel. Displays frequency the station is using.
Shows the current channel set.
Compliance
FCC Radio-Frequency Exposure Notice:
FCC ID#: PPD-AR5BMB6
This device generates and radiates radio-frequency energy. In order to comply with FCC radio­frequency radiation exposure guidelines for an uncontrolled environment, this equipment has to
be installed and operated while maintaining a minimum body to antenna distance of 20cm.
The antenna(s) used for this transmitter must not be co-located or
operated in conjunction with any other antenna or transmitter.
This product does not contain any user serviceable components. Any unauthorized product changes or modifications will invalidate warranty and all applicable regulatory certifications and approvals. This product must be installed by a professional technician/installer
FCC Part 15 Notice (Applicable to Use Within the USA):
802.11a radio only: This product is for indoor use only when using channels 36, 40, 44, or 48 (5150–5250 MHz). This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
WARNING: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from the one which the receiver
is connected to.
- Consult the dealer or an experienced radio/TV technician for help.
- The user may find the following booklet prepared by the Federal Communications
Commission helpful: The Interference Handbook This booklet is available from the U.S. Government Printing Office, Washington, D.C. 20402. Stock No. 004-000-00345-4.
Atheros Communications, Inc. Page 27
COMPANY CONFIDENTIAL February 2005
FCC OEM Labeling instructions:
OEM should add following label:
Contains FCC ID: PPD-AR5BMB6
Above should be clearly visible on products where AR5BMB6 modules are installed.
Industry Canada Notice (Applicable to Use Within Canada):
This device complies with Canadian RSS-210. To prevent radio interference to the licensed service, this device is intended to be operated
indoors and away from windows to provide maximum shielding. Equipment (or its transmitting
antenna) that is installed outdoors is subject to licensing. The installer of this radio equipment must ensure that the antenna is located or pointed such that it does not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6, obtainable from Health Canada’s web site www.hc-sc.gc.ca/rpb
Avis de Conformité à la Réglementation d’Industrie Canada:
Pour empêcher toute interférence aux services faisant l'objet d'une licence, cet appareil doit être utilisé à l'intérieur seulement et devrait être placé loin des fenêtres afin de fournir un écran de blindage maximal. L’installateur du présent matériel radio doit s’assurer que l’antenne est située ou pointée de manière à ce que cette dernière n’émette pas de champs radioélectriques supérieurs aux limites specifées par Santé Canada pour le grand public; consulter le Code de sécurité 6, disponible sur le site Web de Santé Canada, à l’adresse suivante: www.hc-sc.gc.ca/rpb
European Community—CE Notice (802.11a Radio):
Marking by the symbol:
CE Mark with notified body number
CE mark with NB# indicates compliance with the essential requirements of Directive 73/23/EC and the essential requirements of articles 3.1(b), 3.2 and 3.3 of Directive 1999/5/EC. Such marking is indicative that this equipment meets or exceeds the following technical standards:
EN 301 893 - Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Harmonized EN covering essential requirements of article 3.2 of the R&TTE Directive.
EN 301 489-17—Electromagnetic compatibility and Radio Spectrum Matters (ERM); Electromagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2.4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment.
EN 60950—Safety of information technology equipment, including electrical business equipment.
Marking by the symbol:
Exclamation Mark !
Indicates that usage restrictions apply.
.
.
Atheros Communications, Inc. Page 28
COMPANY CONFIDENTIAL February 2005
- This product is for indoor use only when using channels 36, 40, 44, 48, 52, 56, 60, or 64 (5150–5350 MHz).
- Turbo mode is not allowed in EC countries.
European Community—CE Notice (802.11b Radio)
Marking by the symbol:
CE Mark with exclamation mark
indicates compliance with the essential requirements of Directive 73/23/EC and the essential requirements of articles 3.1(b), 3.2 and 3.3 of Directive 1999/5/EC. Such marking is indicative that this equipment meets or exceeds the following technical standards:
- EN 300 328-2—Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; data transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation techniques
- EN 301 489-17—Electromagnetic compatibility and Radio Spectrum Matters (ERM); Electromagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2.4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment.
- EN 60950—Safety of information technology equipment, including electrical business equipment.
Marking by the symbol: Exclamation Mark indicates that usage restrictions apply.
Atheros Communications, Inc. Page 29
COMPANY CONFIDENTIAL February 2005
Loading...