The information in this document has been carefully reviewed and is believed to be
Nonetheless, this document is subject to change without notice, and Azurewave
Technologies. Inc., assumes no responsibility for any inaccuracies that may be contained in
this
document, and makes no commitment to update or to keep current the contained
or
information,
right to make changes,
attempt to supply the
described herein are free from
No part of this document may be reproduced, adapted or transmitted in any form or by
means, electronic or mechanical, for any purpose, except as expressly set forth in a
agreement signed by Azurewave. Azurewave or its affiliates may have patents or pending
patent
applications, trademarks, copyrights, mask work rights or other intellectual property
that
rights
is
rights
AZUREWAVE MAKES NO WARRANTIES OF ANY KIND WITH REGARD TO THE
CONTENT OF THIS DOCUMENT. IN NO EVENT SHALL AZUREWAVE BE LIABLE FOR
DIRECT,
DAMAGES ARISING
DOCUMENTATION, EVEN
PARTICULAR, AZUREWAVE
SOFTWARE, OR DATA TRANSMITTED
INCLUDING THE COSTS OF
OR RECOVERING SUCH
SPECIFICALLY DISCLAIMS THE IMPLIED
FITNESS FOR A PARTICULAR PURPOSE AS THEY
DOCUMENT AND TO THE IDEAS, MATERIAL
HEREIN.
provided except as expressly set forth in a written agreement signed by
to notify a person or organization of any updates. Azurewave reserves the
at
any time, in order to improve reliability, function or design and to
best
product possible. Azurewave does not represent that products
patent
apply to the ideas, material and information expressed herein. No license to such
INDIRECT,
SPECIAL, INCIDENTAL SPECULATORY OR CONSEQUENTIAL
FROM
THE USE OR INABILITY TO USE THIS PRODUCT OR
IF ADVISED
REPAIRING,
HARDWARE,
infringement or from any other third party
OF THE POSSIBLITY OF SUCH DAMAGES. IN
SHALL
NOT HAVE LIABILITY FOR ANY HARDWARE,
OR
SOFTWARE OR DATA. AZUREWAVE
reserved.
OTHERWISE USED WITH THE PRODUCT,
REPLACING, INTEGRATING, INSTALLING
WARRANTIES
AND
OF MERCHANTIBILITY AND
MIGHT
OTHERWISE APPLY TO THIS
INFORMATION EXPRESSED
accurate.
right.
any
written
Azurewave.
Document Conventions
Text
Notices
Azurewave Technologies. Inc., •
COMPANY CONFIDENTI AL January
Conventions
bold Bold type within paragraph text indicates commands, file
italic
Courier
Menu The Menu character tag is used for menu
[ ] Within commands, items enclosed in square brackets are
{ } Within commands, items enclosed in braces are options
| Within commands, the vertical bar separates
… An ellipsis indicates a repetition of the preceding
> The right angle bracket separates successive menu
NOTE: This message denotes neutral or positive information t hat calls
important points to the t ext . A not e provides inform ation t hat m ay ap ply
in special
directory names, paths, output, or returned
Example: The DK_Client package will not function unless
use the wdreg_install batch
Within commands, italics indicate a variable that the user
specify.
Example: mem_alloc size_in_bytes
Titles of manuals or other published documents are also set
italics.
The Courier font indicates output or
Example:
Error:Unable to al locate memor y for
Example: Choose Edit >
parameters or values that the user can choose to specify or
Azurewave Technologies. Inc., •
COMPANY CONFIDENTI AL January
2011
vii
Introduction
The Azurewave 802.11n + Bluetooth Adapter supports 802.11n and Bluetooth
operation. The card uses the Azurewave Client Utility (ACU) which is a user-mode
utility
designed to edit and add profiles for selected Azurewave network interface
adapters.
System
Requirements
Laptop/ PC
Microsoft Windows 2000, Windows Millennium Edition, Windows 98
Edition, Windows XP, or Windows NT 4.0 (with Service Pack
containing:
32-bit PCI Express
32 MB memory or
300 MHz processor or
Bus
greater
higher
Profile Management
Configure the wireless network adapter (wireless card) from the Profile Management
the Azurewave Client
of
Add a
Edit a
Import a
Export a
profile
profile
Profile
The wireless network adapter works in either infrastructure mode (which uses an
point) or ad hoc mode (a group of stations participating in the wireless
Create or Modify a Configuration
To add a new configuration profile, click New on the Profile Management tab. To modify a
configuration profile, select the configuration from the Profile list and click the
button.
The Profile Management dialog box displays the General tab. In profile
Edit the General
Edit
the Security
Edit the Advanced
To configure a profile for ad hoc or access point (infrastructure) mode, edit the
Type field on the advanced
Note that the ACU only allows the creation of 16 configuration profiles. After
creation of 16 profiles, clicking the New button displays an error message. Remove
old profile or modify an existing profile for a new
Remove a Configuration
Profile
use.
the
an
1. Go to the Profile Management
2. Select the profile to remove from the list of configuration
3. Click the Remove
button.
tab.
profiles.
Auto Profile Selection Management
Including a profile in the auto selection feature allows the wireless adapter
automatically select that profile from the list of profiles and use it to connect to
network.
Including a profil e i n auto prof il e sel
1. On the Profile Management tab, click the Order Profiles
2. The Auto Profile Selection Management window appears, with a list of all
profiles in the Available Profiles
3. Highlight the profiles to add to auto profile selection, then click Add. The
appear in the Auto Selected Profiles
ect
ion:
box.
box.
button.
Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles
2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the
Selected Profiles box has highest priority, and the last profile has lowest
OK.
3. Click
4. Check the Auto Select Profiles
5. Save the modified configuration
box.
box.
file.
When auto profile selection is enabled by checking Auto Select Profiles on the
Management tab, the adapter scans for an available network. The profile with
highest priority and the same SSID as one of the found networks is the one that is
connect to the network. If the connection fails, the adapter tries the next
to
priority profile that matches the SSID, and so
on.
With auto profile selection enabled, the wireless adapter scans for available networks. The
highest priority profile with the same SSID as a found network is used to connect to the
Azurewave Technologies. Inc., • ix
COMPANY CONFIDENTI AL January
network. On a failed connection, the adapter tries with the next highest priority profile.
to
the
created
profiles
priority.
Profile
the
highest
2011
Auto
used
Switching to a Different Configuration Profile
1. To switch to a different profile, go to the Profile Management
List.
2. Click on the profile name in the Profile
3. Click the Activate
button.
The Profile List provides icons that specify the operational state for that profile. The
also provides icons that specify the signal strength for that
profile.
tab.
Import and Export Profiles
Importing a Profile
1. From the Profile Management tab, click the Import button. The Import
window
2. Browse to the directory where the profile is
3. Highlight the profile
4. Click Open. The imported profile appears in the profiles
Exporting a Profile
1. From the Profile Management tab, highlight the profile to
2. Click the Export button. The Export Profile window
3. Browse to the directory to export the profile
4. Click Save. The profile is exported to the specified
appears.
name.
located.
to.
location.
list.
appears.
export.
list
Profile
TCP/IP Configuration
Configuring the TCP/ IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel
open Network and Dial-up
2. Find the Local Area Connection associated with the wireless network adapter.
click that connection, and click
3. Select Internet Protocol (TCP/IP) and click
4. Click the radio button Use the following IP address, then enter an IP address and
mask. Assigning an IP address and Subnet mask allows stations to operate in access point
mode (infrastructure mode) or in ad hoc mode and to have Internet access.
gateway and DNS server information is also required. IP configuration
(DHCP to assign the IP address, gateway and DNS server IP addresses) is
from the corporate IT
In the Azurewave Client Utility, access the General tab by clicking New or Modify on
Profile Management tab. Edit the fields in the General tab to configure the
profile. Make sure to also edit the Security and Advanced
tabs.
Profile Name
Client Name
Network Names (SSIDs)
Identifies the configuration profile. This name must
unique. Profile names are not case
Identifies the client
machine.
sensitive.
The IEEE 802.11 wireless network name. This field has
maximum limit of 32
characters.
Configure up to three SSIDs (SSID1, SSID2, and
configuration
be
SSID3).
Advanced Tab
In the Azurewave Client Utility, access the Advanced tab by clicking New or Modify on
the
Profile Management tab, then clicking the Advanced tab in Profile Management. Edit
the fields in the Advanced tab of Profile Management to configure the
Transmit
Power
Network Type
Authenticat
L
Power Save
Mode
802.11b
P
reamble
Mode
For infrastructure (access point) networks, click the Preferred APs button to specify up
four access points to which the adapter should attempt to
Selects the transmit power level in mW. Actual transmit power may be
evel
limited by
Specify:
Specifies the network as either infrastructure or ad
Specifies the preamble setting in 802.11b. The default setting is Short
Long (access point mode), which allows both short and
the 802.11b frames. The adapter can only use short
access point supports and uses them. Set to Long
allowing short
ion
Select the mode the wireless adapter uses to authenticate to an AP:
hardware.
Maximum mode causes the access point to buffer
for the wireless adapter. The adapter periodically
point to see if any messages are
Normal uses maximum when retrieving a large number
then switches back to power save mode after
Off turns power saving off, thus powering up
continuously for a short message
Auto causes the adapter to attempt authentication using
switches it to open authentication if shared
Open enables an adapter to attempt authentication regardless
WEP settings. It will only associate with the access point if
keys on both the adapter and the access point
Shared only allows the adapter to associate with access
have the same
frames.
WEP key.
waiting.
response time.
fails.
associate.
profile.
in
polls the access
retrieving the packets.
the wireless adapter
hoc.
long headers in
radio headers if the
Only
to override
match.
Azurewave Technologies. Inc., •
COMPANY CONFIDENTI AL January
coming
of packets,
s
points tha
messages
hared,
the WEP
2011
a
&
but
of its
t
the
to
xi
Security Tab
In the Azurewave Client Utility, access the Security tab by clicking New or Modify on
Profile Management tab. Click the Security tab in the Profile Management
Edit the fields in the Security tab of Profile Management to configure the profile.
the security mode, select the radio button of the desired security mode. Make
define
also edit the General and Advanced
to
WPA/WP
tabs.
A2
Enables the use of Wi-Fi Protected Access
Choosing WPA/WPA2 opens the WPA/WPA2 EAP
menu. The options
EAP-FAST
EAP-TLS
EAP-TTLS
(EAP-GTC)
PEAP
PEAP (EAP-MSCHAP
LEAP
include:
V2)
(WPA).
drop-down
window.
To
sure
the
WPA/WP
P
assphrase
P
re-Shared
(Static
A2
802.1x
Key
WEP
Enables WPA/WPA2 Passphrase security. Click on the
button and fill in the WPA/WPA2
Enables 802.1x security. This option requires IT
Choosing 802.1x opens the 802.1x EAP type drop-down menu.
options
If the access point that the wireless adapter is associating to
WEP set to Optional and the client has WEP enabled, make sure
Allow Association to Mixed Cells is checked on the Security Tab
allow association. Note: If the Lock checkbox is checked, you
change any values in this profile. See your system
Enables the use of pre-shared keys that are defined on both
)
access point and the
To define pre-shared encryption keys, choose the Pre-Shared
radio button and click the Configure button to fill in the Define
Shared Keys
If the access point that the wireless adapter is associating to
WEP set to Optional and the client has WEP enabled, make sure
To use EAP-TLS security In the Azurewave Client Utility, access the Security tab in
Profile Management
1. On the Security tab, choose the WPA radio
OR: On the Security tab, choose the 802.1x radio
2. Choose EAP-TLS from the drop-down
Allow Association to Mixed Cells is checked on the Security Tab
allow
None
No security (not
Security
association.
window.
recommended).
menu.
button.
button.
to
the
Enabling E AP-TLS
security:
To use EAP-TLS security, the machine must already have the EAP-TLS
downloaded onto it. Check with the IT
1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the
then click the Configure
2. Select the appropriate certificate authority from the list. The server/domain name and
the login name are filled in automatically from the certificate information. Click OK.
OK.
3. Click
4. Activate the
profile.
button.
manager.
Using EAP-TTLS
To use EAP security In the Azurewave Client Utility, access the Security tab in the
Management
1. On the Security tab, choose the WPA/WPA2 radio
OR: On the Security tab, choose the 802.1x radio
Enabling E AP-TTLS
2. Choose EAP-TTLS from the drop-down
To use EAP-TTLS security, the machine must already have the EAP-TTLS
downloaded onto it. Check with the IT
Security
window.
security:
button.
button.
menu.
manager.
1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the
then click the Configure
2. Select the appropriate certificate from the drop-down list and click
3. Specify a user name for EAP
Check Use Windows User Name to use the Windows user name as the EAP
name.
OR: Enter an EAP user name in the User Name field to use a separate user
and password and start the EAP authentication
4. Click Advanced
Leave the server name field blank for the client to accept a certificate from
server
Authority drop-down list. (rec
and:
with a certificate signed by the authority listed in the Network
Azurewave Technologies. Inc., • xiii
COMPANY CONFIDENTI AL January
button.
authentication:
ommended)
process.
certificates
certificates
OK.
Certificate
2011
right,
Profile
right,
user
name
any
Enter the domain name of the server from which the client will accept
certificate.
Change the login name if
5. Click
6. Enable the
OK.
profile.
Using PEAP (EAP-GTC)
To use PEAP (EAP-GTC) security In the Azurewave Client Utility, access the Security tab
in
the Profile Management
1. On the Security tab, choose the WPA radio
OR: On the Security tab, choose the 802.1x radio
2. Choose PEAP (EAP-GTC) from the drop-down
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and
server properties must already be set. Check with the IT
1. Click the Configure
2. To avoid the need to log on again after resuming operation (for example, after
computer goes into standby or hibernate mode), check Always Resume the
Session.
3. Select the appropriate network certificate authority from the drop-down
4. Specify a user name for inner PEAP tunnel
Check Use Windows User Name to use the Windows user name as the
name.
user
OR: Enter a PEAP user name in the User Name field to use a separate user
start the PEAP authentication
and
5. Choose Token or Static Password, depending on the user
Note that Token uses a hardware token device or the Secure Computing
program (version 1.3 or later) to obtain and enter a one-time password
authentication.
6. Click Settings...
Leave the server name field blank for the client to accept a certificate from
server
Authority drop-down list. (rec
Enter the domain name of the server from which the client will accept
certificate.
The login name used for PEAP tunnel authentication fills in automatically
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's
address. Change the login name if
7. Click
8. Enable the
OK.
and:
with a certificate signed by the authority listed in the Network
To use PEAP-MSCHAP V2 security In the Azurewave Client Utility, access the Security
tab in
the Profile Management
1. On the Security tab, choose the WPA radio
OR: On the Security tab, choose the 802.1x radio
2. Choose PEAP (EAP-MSCHAP V2) from the drop-down
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP
and the server properties must already be set. Check with the IT
1. Click the Configure
2. Select the appropriate certificate from the drop-down
3. Specify a user name for inner PEAP tunnel
Check Use Windows User Name to use the Windows user name as the
name.
user
OR: Enter a PEAP user name in the User Name field to use a separate user
start the PEAP authentication
and
4. Click Advanced
Leave the server name field blank for the client to accept a certificate from
with a certificate signed by the authority listed in the Network
server
Authority drop-down list. (rec
Enter the domain name of the server from which the client will accept
certificate.
The login name used for PEAP tunnel authentication fills in automatically
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's
address. Change the login name if
OK.
5. Click
6. Enable the
Azurewave Technologies. Inc., •
COMPANY CONFIDENTI AL January
profile.
button.
and:
window.
button.
authentication:
process.
ommended)
needed.
button.
menu.
certificates,
list.
manager.
MAC
PEAP
Certificate
a
2011
name
any
as
xv
Using LEAP
To use security In the Azurewave Client Utility, access the Security tab in the
Management window. LEAP security requires that all infrastructure devices (e.g.
and servers) are configured for LEAP authentication. Check with the IT
Configuring LEA
On the Security tab, choose the WPA radio button. Choose WPA-LEAP from
down
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from
down
1. Click the Configure
2. Specify a user name and password. Select to Use Temporary User Name
3. Enter the user name and
4. Confirm the
5. Specify a domain
6. If desired, check No Network Connection Unless User Is Logged In to force
7. Enter the LEAP authentication timeout time (between 30 and 500 seconds)
8. Click
9. Enable the
Security
P
menu.
menu.
Password by choosing the radio
Check Use Windows User Name to use the Windows user name as the
user
OR: Check Manually Prompt for LEAP User Name and Password
manually login and start the LEAP authentication
Select to Use Saved User Name and Password by choosing the radio
Specify the LEAP user name, password, and domain to save and
Check the Include Windows Logon Domain with User Name setting to
Windows login domain and user name to the RADIUS server.
OR: Enter a specific domain
wireless adapter to disassociate after logging
how long LEAP should wait before declaring authentication failed,
error message. The default is 90
1. Click the Pre-Shared Key (Static WEP) radio button on the Security
2. Click the Configure
3. Fill in the fields in the Define Pre-Shared Keys dialog
Key Entry
En
crypt
Keys
WEP
Keys
(1-4)
WEP
Size
4. Click OK for the changes to take
Overwriting an Existing Static
1. Click the Pre-Shared Key radio button on the Security
2. Click on
3. In the window, all existing static WEP keys are displayed as asterisks for
reasons. Click in the field of the existing static WEP key to
4. Delete the asterisks in that
5. Enter a new
6. Make sure to select the Transmit Key button to the left of this key is selected for
key to transmit
7. Click
Azurewave Technologies. Inc., • xvii
COMPANY CONFIDENTI AL January
Configure.
OK.
key.
keys:
tab.
button.
box:
Determines the entry method for an encryption key: hexadecimal
A-F), or ASCII text (all keyboard characters except
ion
Selects the default encryption keys used. Only allows the selection for a
shared First, Second, Third, or Fourth key whose corresponding field
has been
Defines a set of shared encryption keys for network
security. At least one Shared Key field must be populated to
completed.
security using a shared
key.
spaces).
configuration
Click on the radio button to set the key as the default encryption
Key
Defines the size for each encryption key. The options
64-bit (enter 10 digits for hexadecimal, 5 ASCII
128-bit (enter 26 digits for hexadecimal, 13 digits for
152-bit (enter 32 digits hexadecimal, 16 digits for
effect.
WEP Key
tab.
include:
characters)
ASCII)
ASCII)
security
field.
overwrite.
packets.
2011
enable
the
(0-9,
key.
Loading...
+ 36 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.