This version of Intel® PROSet/Wireless WiFi Software is compatible with the adapters listed next. However, note
that newer features provided in this software release are generally not supported for older, legacy adapters.
The following adapters are supported on this release for Windows* 8 with Windows* 7 drivers from Intel®:
With your WiFi network card, you can access WiFi networks, share files or printers, or even share your Internet
connection. All of these features can be explored using a WiFi network in your home or office. This WiFi network
solution is designed for both home and business use. Additional users and features can be added as your
networking needs grow and change.
This guide contains basic information about Intel adapters. It includes information about several adapter properties
that you can set to control and enhance the performance of your adapter with your particular wireless network
and environment. Intel® wireless adapters enable fast connectivity without wires for desktop and notebook PCs.
Adapter Settings
Regulatory Information
Specifications
Important Information
Support
Warranty
Glossary
Depending on the model of your Intel WiFi adapter, your adapter is compatible with 802.11a, 802.11b, 802.11g,
and 802.11n (draft 2.0) wireless standards. Operating at 5GHz or 2.4GHz frequency at data rates of up to 450
Mbps, you can now connect your computer to existing high-speed networks that use multiple access points within
large or small environments. Your WiFi adapter maintains automatic data rate control according to the access point
location and signal strength to achieve the fastest possible connection. All of your wireless network connections
are easily managed by the WiFi connection utility. Profiles that are set up through the WiFi connection utility
provide enhanced security measures with 802.1X network authentication.
Information in this document is subject to change without notice.
The copying or reproducing of any material in this document in any manner whatsoever without the written
permission of Intel Corporation is strictly forbidden. Intel® is a trademark or registered trademark of Intel
Corporation or its subsidiaries in the United States and other countries. Other trademarks and trade names may
be used in this document to refer to either the entities claiming the marks and names or their products. Intel
disclaims any proprietary interest in trademarks and trade names other than its own. Microsoft and Windows are
registered trademarks of Microsoft Corporation. Windows Vista is either a registered trademark or trademark of
Microsoft Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any
commitment to update the information contained herein.
"IMPORTANT NOTICE FOR ALL USERS OR DISTRIBUTORS:
Intel wireless LAN adapters are engineered, manufactured, tested, and quality checked to ensure that they meet
all necessary local and governmental regulatory agency requirements for the regions that they are designated
and/or marked to ship into. Because wireless LANs are generally unlicensed devices that share spectrum with
radars, satellites, and other licensed and unlicensed devices, it is sometimes necessary to dynamically detect,
avoid, and limit usage to avoid interference with these devices. In many instances Intel is required to provide test
data to prove regional and local compliance to regional and governmental regulations before certification or
approval to use the product is granted. Intel's wireless LAN's EEPROM, firmware, and software driver are designed
to carefully control parameters that affect radio operation and to ensure electromagnetic compliance (EMC). These
parameters include, without limitation, RF power, spectrum usage, channel scanning, and human exposure.
For these reasons Intel cannot permit any manipulation by third parties of the software provided in binary format
with the wireless LAN adapters (e.g., the EEPROM and firmware). Furthermore, if you use any patches, utilities, or
code with the Intel wireless LAN adapters that have been manipulated by an unauthorized party (i.e., patches,
utilities, or code (including open source code modifications) which have not been validated by Intel), (i) you will be
solely responsible for ensuring the regulatory compliance of the products, (ii) Intel will bear no liability, under any
theory of liability for any issues associated with the modified products, including without limitation, claims under
the warranty and/or issues arising from regulatory non - compliance, and (iii) Intel will not provide or be required to
assist in providing support to any third parties for such modified products.
Note: Many regulatory agencies consider Wireless LAN adapters to be "modules", and accordingly, condition
system-level regulatory approval upon receipt and review of test data documenting that the antennas and system
configuration do not cause the EMC and radio operation to be non-compliant."
May 3, 2013
Adapter Settings
Back to Contents
Adapter Settings
The Advanced tab displays the device properties for the WiFi adapter installed on your computer.
How to Access
At the Intel® PROSet/Wireless WiFi Connection Utility, Advanced Menu click Adapter Settings. Select the
Advanced tab.
WiFi Adapter Settings Description
NameDescription
802.11ac Mode
(5GHz)
802.11n
Channel Width
(2.4 GHz)
The 802.11ac standard builds on 802.11n standard. 802.11ac Mode delivers up to 867Mbps
(theoretical) by increasing channel bandwidth to 80MHz and adding higher density modulation
(256 QAM). Select Enabled or Disabled to set the 802.11ac mode of the WiFi adapter.
Enabled is the default setting. This setting applies to 802.11ac capable adapters only.
Set high throughput channel width to maximize performance. Set the channel width to Auto or
20MHz. Use 20MHz if 802.11n channels are restricted. This setting applies to 802.11n capable
adapters only.
NOTE: This setting does not apply to the Intel® Wireless WiFi Link 4965AGN (uses 20 MHz
channel width only).
802.11n
Channel Width
(5.2 GHz)
802.11n ModeThe 802.11n standard builds on previous 802.11 standards by adding multiple -input multiple -
Ad Hoc
Channel
802.11b/g
Ad Hoc QoS
Mode
Set high throughput channel width to maximize performance. Set the channel width to Auto or
20MHz. Use 20MHz if 802.11n channels are restricted. This setting applies to 802.11n capable
adapters only.
NOTE: This setting does not apply to the following adapters:
Intel® WiFi Link 1000
Intel® Wireless WiFi Link 4965AGN
output (MIMO). MIMO increases data throughput to improve transfer rate. Select Enabled or
Disabled to set the 802.11n mode of the WiFi adapter. Enabled is the default setting. This
setting applies to 802.11n capable adapters only.
NOTE: To achieve transfer rates greater than 54 Mbps on 802.11n connections, WPA2*-AES
security must be selected. No security ( None) can be selected to enable network setup and
troubleshooting.
An administrator can enable or disable support for high throughput mode to reduce powerconsumption or conflicts with other bands or compatibility issues.
Select Enabled or Disabled.
Quality of Service (QoS) control in ad hoc networks. QoS provides prioritization of traffic from
the access point over a wireless LAN based on traffic classification. WMM (Wi - Fi Multimedia) is
the QoS certification of the Wi -Fi Alliance (WFA). When WMM is enabled, the WiFi adapter uses
WMM to support priority tagging and queuing capabilities for Wi - Fi networks.
WMM Enabled (Default)
WMM Disabled
Bluetooth®Enable or disable Bluetooth® AMP. AMP stands for alternate MAC/PHY and uses the 802.11
Adapter Settings
AMP(Wi-Fi) as the highspeed transport. If disabled, Bluetooth HS is turned off.
HT Mode/VHT
Mode/Disabled
Fat Channel
Intolerant
This settings lets you select HT Mode (High Throughput mode), VHT Mode (Very High
Throughput Mode) or to disable both modes. HT Mode supports 802.11n compatibility, whereas
VHT Mode supports 802.11ac compatibility.
This setting communicates to access points that this WiFi adapter does not prefer 40MHz
channels in the 2.4GHz band. The default setting is for this to be turned off (disabled), so that
the adapter does not send this notification. If the access point continues to use 40MHz
channels, the WiFi adapter will also use 40MHz channels if the 802.11n Channel Width
(2.4GHz) setting is AUTO.
NOTE: This setting does not apply to the following adapters:
Intel® Wireless WiFi Link 4965AG_
Intel® PRO/Wireless 3945ABG Network Connection
Mixed mode
protection
Use to avoid data collisions in a mixed 802.11b and 802.11g environment. Request to
Send/Clear to Send (RTS/CTS) should be used in an environment where clients may not hear
each other. CTS-to-self can be used to gain more throughput in an environment where clients
are in close proximity and can hear each other.
Preferred Band In an environment with other radiating devices nearby (such as microwave ovens, cordless
telephones, access points, or client devices), in order to reduce interference you may want
prefer the 5GHz band over the 2.4GHz band, or vice-versa. Your choices are:
No Preference
Prefer 2.4GHz band
Prefer 5GHz band
Roaming
Aggressiveness
Transmit
Power
Here are the various Wi - Fi bands:
802.11 legacy - 2.4GHz
802.11a - 3.7GHz and 5GHz
802.11b - 2.4GHz
802.11g - 2.4GHz
802.11n - 2.4GHz and 5GHz
802.11ac - 5GHz
This setting lets you define how aggressively your wireless client roams to improve connection
to an access point. There are five available settings.
3. Medium: This is the default. A balanced setting between not roaming and
performance.
1. Lowest: Your wireless client will not roam. Only significant link quality degradation
causes it to roam to another access point.
5. Highest: Your wireless client continuously tracks the link quality. If any degradation
occurs, it tries to find and roam to a better access point.
Default Setting: Highest power setting.
Lowest: Minimum Coverage: Set the adapter to the lowest transmit power. Enables you to
expand the number of coverage areas or confine a coverage area. Reduces the coverage area
in high traffic areas to improve overall transmission quality and avoids congestion and
interference with other devices.
Highest: Maximum Coverage: Set the adapter to a maximum transmit power level. Select
for maximum performance and range in environments with limited additional WiFi radio
devices.
NOTE: The optimal setting is for a user to always set the transmit power at the lowest
possible level that is still compatible with the quality of their communication. This allows the
maximum number of wireless devices to operate in dense areas and reduce interference with
Adapter Settings
other devices that it shares the same radio spectrum with.
NOTE: This setting takes effect when either Network (Infrastructure) or Device to Device (ad
hoc) mode is used.
Wake on Magic
Packet
This setting, enabled, wakes the computer from a sleep state when it receives a "magic
packet" from a sending computer. The magic packet contains the MAC address of the intended
destination computer.
Enabling turns on Wake on Magic Packet. Disabling turns off Wake on Magic Packet. Disabling
this only disables the magic packet feature, not Wake on Wireless LAN.
Wake on
Pattern Match
This feature wakes the computer from a sleep state when a particular wake pattern is received
at the adapter. This feature is supported by the Window* 7 and Windows 8. Such patterns
typically are:
Wake on new incoming TCP connection for IPv4 and IPv6 (TCP SYN IPv4 and TCP SYN
IPv6).
Wake on 802.1x re -authentication packets.
Disabling this only disables the pattern match feature, not Wake on Wireless LAN.
Wireless ModeSelect which mode to use for connection to a wireless network:
802.11a only: Connect the wireless WiFi adapter to 802.11a networks only. Not
applicable for all adapters.
802.11b only: Connect the wireless WiFi adapter to 802.11b networks only. Not
applicable for all adapters.
802.11g only: Connect the wireless WiFi adapter to 802.11g networks only.
802.11a and 802.11g: Connect the WiFi adapter to 802.11a and 802.11g networks
only. Not applicable for all adapters.
802.11b and 802.11g: Connect the WiFi adapter to 802.11b and 802.11g networks
only. Not applicable for all adapters.
802.11a, 802.11b, and 802.11g: (Default) - Connect to either 802.11a, 802.11b or
802.11g wireless networks. Not applicable for all adapters.
OKSaves settings and returns to the previous page.
CancelCloses and cancels any changes.
Back to Top
Back to Contents
Trademarks and Disclaimers
Glossary
Back to Contents
Glossary
TermDefinition
802.11The 802.11 standard refers to a family of specifications developed by the IEEE for wireless LAN
technology. The 802.11 specifies an over-the-air interface between a wireless client and a base
station or between two wireless clients and provides 1 or 2 Mbps transmission in the 2.4 GHz
band using either frequency hopping spread spectrum (FHSS) or direct sequence spread
spectrum (DSSS).
802.11aThe 802.11a standard specifies a maximum data transfer rate of 54 Mbps and an operating
frequency of 5 GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing
(OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such
as WEP encryption for security.
802.11b802.11b is an extension to 802.11 that applies to wireless networks and provides 11 Mbps
transmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b uses only
DSSS. Throughput data rate 5+ Mbps in the 2.4 GHz band.
802.11gThe 802.11g standard specifies a maximum data transfer rate of 54 Mbps, an operating
frequency of 2.4GHz, and WEP encryption for security. 802.11g networks are also referred to as
Wi-Fi* networks.
802.11nA task group of the IEEE 802.11 committee has defined a new draft specification that provides
for increased throughput speeds of up to 540 Mbps. The specification provides for Multiple Input- Multiple-Output (MIMO) technology, or using multiple receivers and multiple transmitters
in both the client and access point, to achieve improved performance.
802.1X802.1X is the IEEE Standard for Port-Based Network Access Control. This is used in conjunction
with EAP methods to provide access control to wired and wireless networks.
AAA ServerAuthentication, Authorization and Accounting Server. A system to control access to computer
resources and track user activity.
Access Point
(AP)
Ad Hoc
Network
AES-CCMPAdvanced Encryption Standard - Counter CBC-MAC Protocol is the new method for privacy
AuthenticationVerifies the identity of a user logging onto a network. Passwords, digital certificates, smart cards
Available
network
BERBit Error Rate. The ratio of errors to the total number of bits being sent in a data transmission
Bit RateThe total number of bits (ones and zeros) per second that a network connection can support.
Broadcast SSID Used to allow an access point to respond to clients on a wireless network by sending probes.
BSSIDA unique identifier for each wireless client on a wireless network. The Basic Service Set
A device that connects wireless devices to another network. For example, a wireless LAN,
Internet modem or others.
A communication configuration in which every computer has the same capabilities, and any
computer can initiate a communication session. Also known as a peer-to-peer network, a device
to device network or a computer-to-computer network.
protection of wireless transmissions specified in the IEEE 802.11i standard. AES-CCMP provides
a stronger encryption method than TKIP. The AES algorithm is capable of using cryptographic
keys of 128, 192, and 256 bits to encrypt and decrypt data in 128 -bit blocks. AES- CCMP uses
the AES block cipher, but restricts the key length to 128 bits. AES-CCMP incorporates two
sophisticated cryptographic techniques (counter mode and CBC-MAC) to provide improved
security between the mobile client and the access point.
and biometrics are used to prove the identity of the client to the network. Passwords and digital
certificates are also used to identify the network to the client.
One of the networks listed under Available networks on the Wireless Networks tab of the
Wireless Network Connection Properties (Windows* XP environment). Any wireless network that
is broadcasting and is within receiving range of the WiFi adapter appears on the list.
from one location to another.
Note that this bit rate will vary, under software control, with different signal path conditions.
Identifier (BSSID) is the Ethernet MAC address of each adapter on the network.
Glossary
CA (Certificate
Authority)
CCX (Cisco
Compatible
A corporate certification authority implemented on a server. In addition, Internet Explorer's
certificate can import a certificate from a file. A trusted CA certificate is stored in the root store.
Cisco Compatible Extensions Program ensures that devices used on Cisco wireless LAN
infrastructure meet the security, management and roaming requirements.
eXtension)
CertificateUsed for client authentication. A certificate is registered on the authentication server (for
example, RADIUS server) and used by the authenticator.
CKIPCisco Key Integrity Protocol (CKIP) is a Cisco proprietary security protocol for encryption in
802.11 media. CKIP uses a key message integrity check and message sequence number to
improve 802.11 security in infrastructure mode. CKIP is Cisco's version of TKIP.
Client computer The computer that gets its Internet connection by sharing either the host computer's connection
or the access point's connection.
DSSSDirect Sequence Spread Spectrum. Technology used in radio transmission. Incompatible with
FHSS.
EAPShort for Extensible Authentication Protocol, EAP sits inside of Point -to-Point Protocol's (PPP)
authentication protocol and provides a generalized framework for several different authentication
methods. EAP is supposed to head off proprietary authentication systems and let everything
from passwords to challenge- response tokens and public-key infrastructure certificates all work
smoothly.
EAP-AKAEAP-AKA (Extensible Authentication Protocol Method for UMTS Authentication and Key
Agreement) is an EAP mechanism for authentication and session key distribution, using the
Universal Mobile Telecommunications System (UMTS) Subscriber Identity Module (USIM). The
USIM card is a special smart card used with cellular networks to validate a given user with the
network.
EAP-FASTEAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that
EAP-FAST does not use certificates to authenticate.
Provisioning in EAP-FAST is negotiated solely by the client as the first communication exchange
when EAP-FAST is requested from the server. If the client does not have a pre-shared secret
Protected Access Credential (PAC), it can request to initiate a provisioning EAP-FAST exchange
to dynamically obtain one from the server.
EAP-FAST documents two methods to deliver the PAC: manual delivery through an out-of - band
secure mechanism, and automatic provisioning.
Manual delivery mechanisms can be any delivery mechanism that the administrator of the
network feels is sufficiently secure for their network.
Automatic provisioning establishes an encrypted tunnel to protect the authentication of
the client and the delivery of the PAC to the client. This mechanism, while not as secure
as a manual method may be, is more secure than the authentication method used in
LEAP.
The EAP-FAST method can be divided into two parts: provisioning, and authentication. The
provisioning phase involves the initial delivery of the PAC to the client. This phase only needs to
be performed once per client and user.
EAP-GTCThe EAP-GTC (Generic Token Card) is similar to the EAP-OTP except with hardware token cards.
The request contains a displayable message, and the response contains the string read from the
hardware token card.
EAP-OTPEAP-OTP (One- Time Password) is similar to MD5, except it uses the OTP as the response. The
request contains a displayable message. The OTP method is defined in RFC 2289.
EAP-SIMExtensible Authentication Protocol -Subscriber Identity Module (EAP -SIM) authentication can be
used with:
Network Authentication types: Open, Shared, and WPA*-Enterprise, WPA2*-Enterprise.
Data Encryption types: None, WEP and CKIP.
Glossary
A SIM card is a special smart card that is used by Global System for Mobile Communications
(GSM) based digital cellular networks. The SIM card is used to validate your credentials with the
network
EAP-TLSA type of authentication method that uses EAP and a security protocol called the Transport
Layer Security (TLS). EAP -TLS uses certificates that use passwords. EAP-TLS authentication
supports dynamic WEP key management.
EAP-TTLSA type of authentication method that uses EAP and Tunneled Transport Layer Security (TTLS).
EAP-TTLS uses a combination of certificates and another security method such as passwords.
EncryptionScrambling data so that only the authorized recipient can read it. Usually a key is needed to
interpret the data.
FHSSFrequency-Hop Spread Spectrum. Technology used in radio transmission. Incompatible with
DSSS.
File and printer
sharing
Fragmentation
threshold
GHz
A capability that allows a number of people to view, modify, and print the same file(s) from
different computers.
The threshold at which the wireless adapter breaks the packet into multiple frames. This
determines the packet size and affects the throughput of the transmission.
A unit of frequency equal to 1,000,000,000 cycles per second.
(Gigahertz)
Host computerThe computer that is directly connected to the Internet via a modem or network adapter.
Infrastructure
network
A wireless network centered around an access point. In this environment, the access point not
only provides communication with the wired network, but also mediates wireless network traffic
in the immediate neighborhood.
IEEEInstitute of Electrical and Electronics Engineers (IEEE) is an organization involved in defining
computing and communications standards.
Internet
Protocol (IP)
The address of a computer that is attached to a network. Part of the address designates which
network the computer is on, and the other part represents the host identification.
address
LAN (Local Area
A high -speed, low-error data network covering a relatively small geographic area.
Network)
LEAP (Light
Extensible
Authentication
A version of Extensible Authentication Protocol (EAP). LEAP is a proprietary extensible
authentication protocol developed by Cisco that provides a challenge- response authentication
mechanism and dynamic key assignment.
Protocol)
MAC (Media
Access Control)
A hardwired address applied at the factory. It uniquely identifies network hardware, such as a
wireless adapter, on a LAN or WAN.
Address
Mbps
Transmission speed of 1,000,000 bits per second.
(Megabits-persecond)
MHz
A unit of frequency equal to 1,000,000 cycles per second.
(Megahertz)
MIC (Michael)Message Integrity Check (commonly called Michael).
MS-CHAPAn EAP mechanism used by the client. Microsoft Challenge Authentication Protocol (MS-CHAP)
Version 2, is used over an encrypted channel to enable server validation. The challenge and
response packets are sent over a non-exposed TLS encrypted channel.
ns(Nanosecond) 1 billionth (1/1,000,000,000) of a second.
OFDMOrthogonal Frequency Division Multiplexing.
Open
authentication
Allows any device network access. If encryption is not enabled on the network, any device that
knows the Service Set Identifier (SSID) of the access point can gain access to the network.
PEAPProtected Extensible Authentication Protocol (PEAP) is an Internet Engineering Task Force (IETF)
draft protocol sponsored by Microsoft, Cisco, and RSA Security. PEAP creates an encrypted
tunnel similar to the tunnel used in secure web pages (SSL). Inside the encrypted tunnel, a
Glossary
number of other EAP authentication methods can be used to perform client authentication. PEAP
requires a TLS certificate on the RADIUS server, but unlike EAP- TLS there is no requirement to
have a certificate on the client. PEAP has not been ratified by the IETF. The IETF is currently
comparing PEAP and TTLS (Tunneled TLS) to determine an authentication standard for 802.1X
authentication in 802.11 wireless systems. PEAP is an authentication type designed to take
advantage of server-side EAP-Transport Layer Security (EAP-TLS) and to support various
authentication methods, including user passwords and one-time passwords, and Generic Token
Cards.
Peer-to-Peer
mode
Power save
mode
A wireless network structure that allows wireless clients to communicate directly with each other
without using an access point.
The state in which the radio is periodically powered down to conserve power. When the portable
computer is in Power Save mode, received packets are stored in the access point until the
wireless adapter wakes up.
Preferred
network
One of the networks that has been configured. Such networks are listed under Preferred
networks on the Wireless Networks tab of the Wireless Network Connection Properties
(Windows* XP environment).
RADIUS
(Remote
RADIUS is an authentication and accounting system that verifies user's credentials and grants
access to requested resources.
Authentication
Dial-In User
Service)
RF (Radio
Frequency)
The international unit for measuring frequency is Hertz (Hz), which is equivalent to the older
unit of cycles per second. One MegaHertz (MHz) is one million Hertz. One GigaHertz (GHz) is
one billion Hertz. For reference: the standard US electrical power frequency is 60 Hz, the AM
broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88 108 MHz, and microwave ovens typically operate at 2.45 GHz.
RoamingMovement of a wireless node between two micro cells. Roaming usually occurs in infrastructure
networks built around multiple access points. Current wireless network roaming is only
supported in the same subnet of a network.
RTS thresholdThe number of frames in the data packet at or above which an RTS/CTS (request to send/clear
to send) handshake is turned on before the packet is sent. The default value is 2347.
Shared keyAn encryption key known only to the receiver and sender of data. This is also referred to as a
pre-shared key.
SIM
(Subscriber
A SIM card is used to validate credentials with the network. A SIM card is a special smart card
used by GSM-based digital cellular networks.
Identity
Module)
Silent modeSilent Mode Access Points or Wireless Routers have been configured to not broadcast the SSID
for the wireless network. This makes it necessary to know the SSID in order to configure the
wireless profile to connect to the access point or wireless router.
Single Sign OnSingle Sign On feature set allows the 802.1X credentials to match your Windows log on user
name and password credentials for wireless network connections.
SSID (Service
Set Identifier)
SSID or network name is a value that controls access to a wireless network. The SSID for your
wireless network card must match the SSID for any access point that you want to connect with.
If the value does not match, you are not granted access to the network. Each SSID may be up
to 32 alphanumeric characters long and is case- sensitive.
stealthA stealth access point is one that has the capability and is configured to not broadcast its SSID.
This is the WiFi network name that appears when a DMU (Device Management Utility, such as
Intel® PROSet/Wireless WiFi Connection Utility) scans for available wireless networks. Although
this can enhance wireless network security, it is commonly considered a weak security feature.
To connect to a stealth access point, a user must specifically know the SSID and configure their
DMU accordingly. The feature is not a part of the 802.11 specification, and is known by differing
names by various vendors: closed mode, private network, SSID broadcasting.
TKIP (Temporal
Key Integrity
Temporal Key Integrity protocol improves data encryption. Wi - Fi Protected Access* uses its
TKIP. TKIP provides important data encryption enhancements including a re - keying method.
Glossary
Protocol)TKIP is part of the IEEE 802.11i encryption standard for wireless networks. TKIP is the next
generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless
networks. TKIP provides per packet key mixing, a message integrity check and a re - keying
TLS (Transport
Layer Security)
mechanism, thus fixing the flaws of WEP.
A type of authentication method using the Extensible Authentication Protocol (EAP) and a
security protocol called the Transport Layer Security (TLS). EAP- TLS uses certificates which use
passwords. EAP -TLS authentication supports dynamic WEP key management. The TLS protocol is
intended to secure and authenticate communications across a public network through data
encryption. The TLS Handshake Protocol allows the server and client to provide mutual
authentication and to negotiate an encryption algorithm and cryptographic keys before data is
transmitted.
TTLS (Tunneled
Transport Layer
Security)
These settings define the protocol and the credentials used to authenticate a user. In TTLS, the
client uses EAP-TLS to validate the server and create a TLS-encrypted channel between the
client and server. The client can use another authentication protocol. Typically password -based
protocols challenge over this encrypted channel to enable server validation. The challenge and
response packets are sent over a non-exposed TLS encrypted channel. TTLS implementations
today support all methods defined by EAP, as well as several older methods (CHAP, PAP, MSCHAP and MS -CHAP -V2). TTLS can easily be extended to work with new protocols by defining
new attributes to support new protocols.
WEP (Wired
Equivalent
Privacy)
Wired Equivalent Privacy, 64 - and 128-bit (64 -bit is sometimes referred to as 40 -bit). This is a
low -level encryption technique designed to give the user about the same amount of privacy that
he would expect from a LAN. WEP is a security protocol for wireless local area networks
(WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security
as that of a wired LAN. WEP aims to provide security by data over radio waves so that it is
protected as it is transmitted from one end point to another.
WEP KeyEither a pass phrase or hexadecimal key.
The pass phrase must be 5 ASCII characters for 64-bit WEP or 13 ASCII characters for 128 -bit
WEP. For pass phrases, 0-9, a -z, A-Z, and ~!@#$%^&*()_+|`- ={}|[]\:";'<> ?,./ are all valid
characters.
The hex key must be 10 hexadecimal characters (0-9, A-F) for 64 -bit WEP or 26 hexadecimal
characters (0- 9, A-F) for 128-bit WEP.
Wi-Fi*
(Wireless
Is meant to be used generically when referring of any type to 802.11 network, whether
802.11b, 802.11a, or dual -band.
Fidelity)
WiMAXWiMAX, the Worldwide Interoperability for Microwave Access, is a telecommunications
technology aimed at providing wireless data over long distances in a variety of ways, from point to -point links to full mobile cellular type access. It is based on the IEEE 802.16 standard. The
name WiMAX was created by the WiMAX Forum, which was formed in June 2001 to promote
conformance and interoperability of the standard. The forum describes WiMAX as "a standardsbased technology enabling the delivery of last mile wireless broadband access as an alternative
to cable and DSL."
Wireless router A stand -alone wireless hub that allows any computer that has a wireless network adapter to
communicate with another computer within the same network and to connect to the Internet.
WLAN (Wireless
Local-Area
A type of local -area network that uses high-frequency radio waves rather than wires to
communicate between nodes.
Network)
WPA* (Wi- Fi
Protected
Access)
This is a security enhancement that strongly increases the level of data protection and access
control to a wireless network. WPA is an interim standard that will be replaced with the IEEE's
802.11i standard upon its completion. WPA consists of RC4 and TKIP and provides support for
BSS (Infrastructure) mode only. WPA and WPA2 are compatible.
WPA2* (Wi-Fi
Protected
Access 2)
This is the second generation of WPA that complies with the IEEE TGi specification. WPA2
consists of AES encryption, pre -authentication and PMKID caching. It provides support for BSS
(Infrastructure) mode and IBSS (ad hoc) mode. WPA and WPA2 are compatible.
WPA-Enterprise Wi- Fi Protected Access -Enterprise applies to corporate users. A new standards-based,
interoperable security technology for wireless LAN (subset of IEEE 802.11i draft standard) that
encrypts data sent over radio waves. WPA is a Wi - Fi standard that was designed to improve
Glossary
upon the security features of WEP as follows:
Improved data encryption through the temporal key integrity protocol (TKIP). TKIP uses a
hashing algorithm to scramble the encryption keys and adds an integrity -checking feature
to ensure that the keys have not been tampered with.
User authentication, which is generally missing in WEP, through the extensible
authentication protocol (EAP). WEP regulates access to a wireless network based on a
computer's hardware - specific MAC address, which is relatively simple to be sniffed out and
stolen. EAP is built on a more secure public-key encryption system to ensure that only
authorized network users can access the network.
WPA is an interim standard that will be replaced with the IEEE's 802.11i standard upon its
completion.
WPA-PersonalWi-Fi Protected Access-Personal provides a level of security in the small network or home
environment.
WPA-PSK (WiFi ProtectedAccess Pre Shared Key)
WPA-PSK mode does not use an authentication server. It can be used with the data encryption
types WEP or TKIP. WPA - PSK requires configuration of a pre-shared key (PSK). You must enter
a pass phrase or 64 hex characters for a pre -shared key of length 256- bits. The data encryption
key is derived from the PSK.
Back to Top
Back to Contents
Trademarks and Disclaimers
Regulatory Information
Back to Contents
Regulatory Information
This section provides regulatory information for the following wireless adapters:
NOTE: Due to the evolving state of regulations and standards in the wireless LAN field (IEEE 802.11
and similar standards), the information provided herein is subject to change. Intel Corporation
assumes no responsibility for errors or omissions in this document.
Intel WiFi/WiMAX Wireless Adapters
Information in this section supports the following wireless adapters:
NOTE: In this section, all references to the "wireless adapter" refer to all adapters listed above.
The following information is provided:
Information for the User
Regulatory Information
Information for OEMs and Host Integrators
INFORMATION FOR THE USER
for complete wireless adapter specifications.
Safety Notices
USA FCC Radio Frequency Exposure
The FCC with its action in ET Docket 96 -8 has adopted a safety standard for human exposure to radio frequency
(RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposure
limits found in OET Bulletin 65, supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio
Regulatory Information
according to the instructions found in this manual will result in exposure substantially below the FCC’s
recommended limits.
The following safety precautions should be observed:
Do not touch or move antenna while the unit is transmitting or receiving.
Do not hold any component containing the radio such that the antenna is very close or touching any
exposed parts of the body, especially the face or eyes, while transmitting.
Do not operate the radio or attempt to transmit data unless the antenna is connected; this behavior may
cause damage to the radio.
Use in specific environments:
The use of wireless adapters in hazardous locations is limited by the constraints posed by the safety
directors of such environments.
The use of electronic devices equipped with wireless adapters on airplanes is governed by rules for
each commercial airline operator.
The use of wireless adapters in hospitals is restricted to the limits set forth by each hospital.
Explosive Device Proximity Warning
Warning: Do not operate a portable transmitter (including this wireless adapter) near unshielded blasting
caps or in an explosive environment unless the transmitter has been modified to be qualified for such use.
Antenna Warnings
Warning: The wireless adapter is not designed for use with high-gain directional antennas.
Use On Aircraft Caution
Caution: Regulations of commercial airline operators may prohibit airborne operation of certain electronic
devices equipped with radio-frequency wireless devices (wireless adapters) because their signals could interfere
with critical aircraft instruments.
Other Wireless Devices
Safety Notices for Other Devices in the Wireless Network: See the documentation supplied with wireless
adapters or other devices in the wireless network.
Local Restrictions on 802.11a, 802.11b, 802.11g, 802.11n, and 802.16e Radio Usage
Caution: Due to the fact that the frequencies used by 802.11a, 802.11b, 802.11g, 802.11n, and 802.16e
wireless LAN devices may not yet be harmonized in all countries, 802.11a, 802.11b, 802.11g, 802.11n, and
802.16e products are designed for use only in specific countries, and are not allowed to be operated in countries
other than those of designated use. As a user of these products, you are responsible for ensuring that the
products are used only in the countries for which they were intended and for verifying that they are configured
with the correct selection of frequency and channel for the country of use. The device transmit power control
(TPC) interface is part of the Intel® PROSet/Wireless WiFi Connection Utility Software. Operational restrictions for
Equivalent Isotropic Radiated Power (EIRP) are provided by the system manufacturer. Any deviation from the
permissible power and frequency settings for the country of use is an infringement of national law and may be
punished as such.
Wireless Interoperability
The wireless adapter is designed to be interoperable with other wireless LAN products that are based on direct
sequence spread spectrum (DSSS) radio technology and to comply with the following standards:
IEEE Std. 802.11b compliant Standard on Wireless LAN
IEEE Std. 802.11g compliant Standard on Wireless LAN
IEEE Std. 802.11a compliant Standard on Wireless LAN
Regulatory Information
IEEE Std. 802.11n draft 2.0 compliant on Wireless LAN
IEEE 802.16e -2005 Wave 2 compliant
Wireless Fidelity certification, as defined by the Wi -Fi Alliance
WiMAX certification as defined by the WiMAX Forum
The Wireless Adapter and Your Health
The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy
emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless
devices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safety
standards and recommendations. These standards and recommendations reflect the consensus of the scientific
community and result from deliberations of panels and committees of scientists who continually review and
interpret the extensive research literature. In some situations or environments, the use of the wireless adapter
may be restricted by the proprietor of the building or responsible representatives of the applicable organization.
Examples of such situations may include:
Using the wireless adapter on board airplanes, or
Using the wireless adapter in any other environment where the risk of interference with other devices or
services is perceived or identified as being harmful.
If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization or
environment (an airport, for example), you are encouraged to ask for authorization to use the adapter before you
turn it on.
REGULATORY INFORMATION
USA - Federal Communications Commission (FCC)
This wireless adapter is restricted to indoor use due to its operation in the 5.15 to 5.25 and 5.470 to 5.75GHz
frequency ranges. FCC requires this wireless adapter to be used indoors for the frequency ranges 5.15 to 5.25GHz
and 5.470 to 5.75GHz to reduce the potential for harmful interference to co -channel mobile satellite systems. No
configuration controls are provided for Intel® wireless adapters allowing any change in the frequency of operations
outside the FCC grant of authorization for U.S. operation according to Part 15.407 of the FCC rules.
Intel® wireless adapters are intended for OEM integrators only.
Intel® wireless adapters cannot be co -located with any other transmitter unless approved by the FCC.
This wireless adapter complies with Part 15 of the FCC Rules. Operation of the device is subject to the following
two conditions:
This device may not cause harmful interference.
This device must accept any interference that may cause undesired operation.
Class B Device Interference Statement
This wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference
in a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If the
wireless adapter is not installed and used in accordance with the instructions, the wireless adapter may cause
harmful interference to radio communications. There is no guarantee, however, that such interference will not
occur in a particular installation. If this wireless adapter does cause harmful interference to radio or television
reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct
the interference by taking one or more of the following measures:
Reorient or relocate the receiving antenna of the equipment experiencing the interference.
Increase the distance between the wireless adapter and the equipment experiencing the interference.
Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the
equipment experiencing the interference is connected.
Consult the dealer or an experienced radio/TV technician for help.
Regulatory Information
NOTE: The adapter must be installed and used in strict accordance with the manufacturer's
instructions as described in the user documentation that comes with the product. Any other installation
or use will violate FCC Part 15 regulations.
Safety Approval Considerations
This device has been safety approved as a component and is for use only in complete equipment where the
acceptability of the combination is determined by the appropriate safety agencies. When installed, consideration
must be given to the following:
It must be installed into a compliant host device meeting the requirement of UL/EN/IEC 60950 -1 2nd edition
including the general provisions of enclosure design 1.6.2 and specifically paragraph 1.2.6.2 (Fire Enclosure).
The device shall be supplied by a SELV source when installed in the end-use equipment.
A heating test shall be considered in the end-use product for meeting the requirement of UL/EN/IEC 60950 1 2nd edition.
Low Halogen
Applies only to brominated and chlorinated flame retardants (BFRs/CFRs) and PVC in the final product. Intel
components as well as purchased components on the finished assembly meet JS- 709 requirements, and the PCB /
substrate meet IEC 61249-2-21 requirements. The replacement of halogenated flame retardants and/or PVC may
not be better for the environment.
Japan
Indoor use only in the 5Ghz band.
Korea
Mexico
La operación de este equipo está sujeta a las siguientes dos condiciones: (1) es posible que este equipo o
dispositivo no cause interferencia perjudicial y (2) este equipo o dispositivo debe aceptar cualquier interferencia,
incluyendo la que pueda causar su operación no deseada.
Taiwan
Loading...
+ 33 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.