Bold type within paragraph text indicates commands, file names,
italic
Within commands, italics indicate a variable that the user must
The Menu character tag is used for menu items.
[ ] Within commands, items enclosed in square brackets ar
e optional
{ } Within commands, items enclosed in braces are options from
| Within commands, the vertical bar separates options.
… An ellipsis indicates a repe
tition of the preceding parameter.
>
Document Conventions
Text Conventions
directory names, paths, output, or returned values.
Example: The DK_Client package will not function unless you
use the wdreg_install batch file.
specify.
Example: mem_allocsize_in_bytes
Titles of manuals or other published documents are also set in
italics.
Courier
Menu
The Courier font indicates output or display.
Example:
Error:Unable to allocate memory for transfer!
Example: Choose Edit > Copy.
parameters or values that the user can choose to specify or omit.
which the user must choose.
The right angle bracket separates successive menu selections.
Example: Start > Programs > DK > wdreg_install.
System Requirements
Add a profile
Order profiles
Laptop/ PC containing:
32-bit PCI Express Bus
32 MB memory or greater
300 MHz processor or higher
Microsoft Windows 2000, Windows Millennium Edition, Windows 98 Second
Edition, Windows XP, or Windows NT 4.0 (with Service Pack 6)
Profile Management
Configure the wireless network adapter (wireless card) from the Profile Management tab
of the Atheros Client Utility.
Edit a profile Import a Profile Export a Profile
The wireless network adapter works in either infrastructure mode (which uses an access
point) or ad hoc mode (a group of stations participating in the wireless LAN).
Switch to a different profile Remove a profile Connect to a Different
Network
Create or Modify a Configuration Profile
To add a new configuration profile, click New on the Profile Management tab. To modify
a configuration profile, select the configuration from the Profile list and click the Modify
button.
The Profile Management dialog box displays the General tab. In profile management:
Edit the General tab. Edit the Security tab. Edit the Advanced tab.
To configure a profile for ad hoc or access point (infrastructure) mode, edit the Network
Type field on the Advanced tab.
Note that the ACU only allows the creation of 16 configuration profiles. After the
creation of 16 profiles, clicking the New button displays an error message. Remove an
old profile or modify an existing profile for a new use.
Remove a Configuration Profile
1.
Go to the Profile Management tab.
2.
Select the profile to remove from the list of configuration profiles.
3.
Click the Remove button.
Auto Profile Selection Management
Including a profile in the auto selection feature allows the wireless adapter to
automatically select that profile from the list of profiles and use it to connect to the
network.
Including a profile in auto profile selection:
1. On the Profile Management tab, click the Order Profiles button.
2. The Auto Profile Selection Management window appears, with a list of all created
profiles in the Available Profiles box.
3. Highlight the profiles to add to auto profile selection, then click Add. The profiles
appear in the Auto Selected Profiles box.
Ordering the auto selected profiles:
1. Highlight a profile in the Auto Selected Profiles box.
2. Click Move Up, Move Down, or Remove as appropriate. The first profile in the Auto
Selected Profiles box has highest priority, and the last profile has lowest priority.
3. Click OK.
4. Check the Auto Select Profiles box.
5. Save the modified configuration file.
When auto profile selection is enabled by checking Auto Select Profiles on the Profile
Management tab, the adapter scans for an available network. The profile with the
highest priority and the same SSID as one of the found networks is the one that is used
to connect to the network. If the connection fails, the adapter tries the next highest
priority profile that matches the SSID, and so on.
With auto profile selection enabled, the wireless adapter scans for available networks.
The highest priority profile with the same SSID as a found network is used to connect to
the network. On a failed connection, the adapter tries with the next highest priority
profile.
Switching to a Different Configuration Profile
1. To switch to a different profile, go to the Profile Management tab.
2. Click on the profile name in the Profile List.
3. Click the Activate button.
The Profile List provides icons that specify the operational state for that profile. The list
also provides icons that specify the signal strength for that profile.
Import and Export Profiles
Importing a Profile
1. From the Profile Management tab, click the Import button. The Import Profile
window appears.
2. Browse to the directory where the profile is located.
3. Highlight the profile name.
4. Click Open. The imported profile appears in the profiles list.
Exporting a Profile
1. From the Profile Management tab, highlight the profile to export.
2. Click the Export button. The Export Profile window appears.
3. Browse to the directory to export the profile to.
4. Click Save. The profile is exported to the specified location.
TCP/IP Configuration
Configuring the TCP/IP Address for the network device:
1. After configuring the wireless network adapter properties, open the Control Panel and
open Network and Dial-up Connections.
2. Find the Local Area Connection associated with the wireless network adapter. Right-
click that connection, and click Properties.
3. Select Internet Protocol (TCP/IP) and click Properties.
4. Click the radio button Use the following IP address, then enter an IP address and Subnet
mask. Assigning an IP address and Subnet mask allows stations to operate in access
point mode (infrastructure mode) or in ad hoc mode and to have Internet access. Default
gateway and DNS server information is also required. IP configuration information
(DHCP to assign the IP address, gateway and DNS server IP addresses) is usually
obtained from the corporate IT staff.
5. Click OK to finish.
General Tab
Profile Name
Identifies the configuration profile. This name must be
Client Name
Identifies the client machine.
Network Names (SSIDs)
The IEEE 802.11 wireless network name. This field has a
Tra
nsmit
Selects the transmit power level in mW. Actual transmit power may be
Power Save
Specify:
Network Type
Specifies the network as either
infrastructure
or
ad hoc
.
802.11b
Specifies the preamble setting in 802.11b.
The default setting is
Short &
Authentication
Select the mode the wireless adapter uses to authenticate to an AP:
In the Atheros Client Utility, access the General tab by clicking New or Modify on the
Profile Management tab. Edit the fields in the General tab to configure the configuration
profile. Make sure to also edit the Security and Advanced tabs.
Advanced Tab
In the Atheros Client Utility, access the Advanced tab by clicking New or Modify on the
Profile Management tab, then clicking the Advanced tab in Profile Management. Edit
the fields in the Advanced tab of Profile Management to configure the profile.
unique. Profile names are not case sensitive.
maximum limit of 32 characters.
Configure up to three SSIDs (SSID1, SSID2, and SSID3).
Power Level
Mode
Preamble
Mode
limited by hardware.
Maximum mode causes the access point to buffer incoming messages
for the wireless adapter. The adapter periodically polls the access
point to see if any messages are waiting.
Normal uses maximum when retrieving a large number of packets,
then switches back to power save mode after retrieving the packets.
Off turns power saving off, thus powering up the wireless adapter
continuously for a short message response time.
Long (access point mode), which allows both short and long headers in
the 802.11b frames. The adapter can only use short radio headers if the
access point supports and uses them. Set to Long Only to override
allowing short frames.
Auto causes the adapter to attempt authentication using shared, but
switches it to open authentication if shared fails.
Open enables an adapter to attempt authentication regardless of its
WEP settings. It will only associate with the access point if the WEP
keys on both the adapter and the access point match.
Shared only allows the adapter to associate with access points that
have the same WEP key.
For infrastructure (access point) networks, click the Preferred APs button to specify up to
four access points to which the adapter should attempt to associate.
Security Tab
WPA/WPA2
Enables the use of Wi
-
Fi Protected Access (WPA).
WPA/WPA2
Enables WPA/WPA2 Passphrase security
. Click on the
Configure
802.1x
Enables 802.1x security.
This option requires IT administration.
Pre-Shared Key
Enables the use of pre
-
shared keys that are defined on both the
None
No security (not recommended).
In the Atheros Client Utility, access the Security tab by clicking New or Modify on the
Profile Management tab. Click the Security tab in the Profile Management window.
Edit the fields in the Security tab of Profile Management to configure the profile. To
define the security mode, select the radio button of the desired security mode. Make sure
to also edit the General and Advanced tabs.
Choosing WPA/WPA2 opens the WPA/WPA2 EAP drop-down
menu. The options include:
If the access point that the wireless adapter is associating to has
WEP set to Optional and the client has WEP enabled, make sure that
Allow Association to Mixed Cells is checked on the Security Tab to
allow association. Note: If the Lock checkbox is checked, you cannot
change any values in this profile. See your system administrator.
access point and the station.
To define pre-shared encryption keys, choose the Pre-Shared Key
radio button and click the Configure button to fill in the Define PreShared Keys window.
If the access point that the wireless adapter is associating to has
WEP set to Optional and the client has WEP enabled, make sure that
Allow Association to Mixed Cells is checked on the Security Tab to
allow association.
Using EAP-TLS Security
To use EAP-TLS security In the Atheros Client Utility, access the Security tab in the
Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TLS from the drop-down menu.
Enabling EAP-TLS security:
To use EAP-TLS security, the machine must already have the EAP-TLS certificates
downloaded onto it. Check with the IT manager.
1. If EAP-TLS is supported, choose EAP-TLS from the drop-down menu on the right,
then click the Configure button.
2. Select the appropriate certificate authority from the list. The server/domain name
and the login name are filled in automatically from the certificate information. Click
OK.
3. Click OK.
4. Activate the profile.
Using EAP-TTLS Security
To use EAP security In the Atheros Client Utility, access the Security tab in the Profile
Management window.
1. On the Security tab, choose the WPA/WPA2 radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose EAP-TTLS from the drop-down menu.
Enabling EAP-TTLS security:
To use EAP-TTLS security, the machine must already have the EAP-TTLS certificates
downloaded onto it. Check with the IT manager.
1. If EAP-TTLS is supported, choose EAP-TTLS from the drop-down menu on the right,
then click the Configure button.
2. Select the appropriate certificate from the drop-down list and click OK.
3. Specify a user name for EAP authentication:
Check Use Windows User Name to use the Windows user name as the EAP user
name.
OR: Enter an EAP user name in the User Name field to use a separate user name
and password and start the EAP authentication process.
4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any
server with a certificate signed by the authority listed in the Network Certificate
Authority drop-down list. (recommended)
Enter the domain name of the server from which the client will accept a
certificate.
Change the login name if needed.
5. Click OK.
6. Enable the profile.
Using PEAP (EAP-GTC) Security
To use PEAP (EAP-GTC) security In the Atheros Client Utility, access the Security tab in
the Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-GTC) from the drop-down menu.
To use PEAP (EAP-GTC) security, the server must have WPA-PEAP certificates, and the
server properties must already be set. Check with the IT manager.
1. Click the Configure button.
2. To avoid the need to log on again after resuming operation (for example, after your
computer goes into standby or hibernate mode), check Always Resume the Secure
Session.
3. Select the appropriate network certificate authority from the drop-down list.
4. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP
user name.
OR: Enter a PEAP user name in the User Name field to use a separate user name
and start the PEAP authentication process.
5. Choose Token or Static Password, depending on the user database.
Note that Token uses a hardware token device or the Secure Computing SofToken
program (version 1.3 or later) to obtain and enter a one-time password during
authentication.
6. Click Settings... and:
Leave the server name field blank for the client to accept a certificate from any
server with a certificate signed by the authority listed in the Network Certificate
Authority drop-down list. (recommended)
Enter the domain name of the server from which the client will accept a
certificate.
The login name used for PEAP tunnel authentication fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC
address. Change the login name if needed.
7. Click OK.
8. Enable the profile.
Using PEAP-MSCHAP V2 Security
To use PEAP-MSCHAP V2 security In the Atheros Client Utility, access the Security tab
in the Profile Management window.
1. On the Security tab, choose the WPA radio button.
OR: On the Security tab, choose the 802.1x radio button.
2. Choose PEAP (EAP-MSCHAP V2) from the drop-down menu.
To use PEAP (EAP-MSCHAP V2) security, the server must have WPA-PEAP certificates,
and the server properties must already be set. Check with the IT manager.
1. Click the Configure button.
2. Select the appropriate certificate from the drop-down list.
3. Specify a user name for inner PEAP tunnel authentication:
Check Use Windows User Name to use the Windows user name as the PEAP
user name.
OR: Enter a PEAP user name in the User Name field to use a separate user name
and start the PEAP authentication process.
4. Click Advanced and:
Leave the server name field blank for the client to accept a certificate from any
server with a certificate signed by the authority listed in the Network Certificate
Authority drop-down list. (recommended)
Enter the domain name of the server from which the client will accept a
certificate.
The login name used for PEAP tunnel authentication fills in automatically as
PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC
address. Change the login name if needed.
5. Click OK.
6. Enable the profile.
Using LEAP Security
To use security In the Atheros Client Utility, access the Security tab in the Profile
Management window. LEAP security requires that all infrastructure devices (e.g. access
points and servers) are configured for LEAP authentication. Check with the IT manager.
Configuring LEAP
On the Security tab, choose the WPA radio button. Choose WPA-LEAP from the
drop-down menu.
OR: On the Security tab, choose the 802.1x radio button. Choose LEAP from the
drop-down menu.
1. Click the Configure button.
2. Specify a user name and password. Select to Use Temporary User Name and
Password by choosing the radio button:
Check Use Windows User Name to use the Windows user name as the LEAP
user name.
OR: Check Manually Prompt for LEAP User Name and Password to
manually login and start the LEAP authentication process.
Select to Use Saved User Name and Password by choosing the radio button:
Specify the LEAP user name, password, and domain to save and use.
3. Enter the user name and password.
4. Confirm the password.
5. Specify a domain name:
Check the Include Windows Logon Domain with User Name setting to pass
the Windows login domain and user name to the RADIUS server. (default)
OR: Enter a specific domain name.
6. If desired, check No Network Connection Unless User Is Logged In to force the
wireless adapter to disassociate after logging off.
7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to
specify how long LEAP should wait before declaring authentication failed, and
sending an error message. The default is 90 seconds.
8. Click OK.
9. Enable the profile.
Key Entry
De
termines the entry method for an encryption key: hexadecimal (0
-
9,
Encryption
Selects the default encryption keys used. Only allows the selection for
WEP Keys
Defines a set of shared encryption keys for network configuration
WEP Key
Defines the size for each encryption key. The options include:
Pre-Shared Encryption Keys
Defining pre-shared encryption keys:
1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab.
2. Click the Configure button.
3. Fill in the fields in the Define Pre-Shared Keys dialog box:
A-F), or ASCII text (all keyboard characters except spaces).
Keys
4. Click OK for the changes to take effect.
Overwriting an Existing Static WEP Key
1. Click the Pre-Shared Key radio button on the Security tab.
2. Click on Configure.
3. In the window, all existing static WEP keys are displayed as asterisks for security
reasons. Click in the field of the existing static WEP key to overwrite.
4. Delete the asterisks in that field.
5. Enter a new key.
6. Make sure to select the Transmit Key button to the left of this key is selected for the
key to transmit packets.
7. Click OK.
a shared First, Second, Third, or Fourth key whose corresponding
field has been completed.
(1-4)
security. At least one Shared Key field must be populated to enable
security using a shared key.
Click on the radio button to set the key as the default encryption key.
Size
64-bit (enter 10 digits for hexadecimal, 5 ASCII characters) 128-bit (enter 26 digits for hexadecimal, 13 digits for ASCII) 152-bit (enter 32 digits hexadecimal, 16 digits for ASCII)
Disabling Static WEP
To disable static WEP for a particular profile, Select any other security option on the
Profile Management tab to automatically disable static WEP
OR: choose None on the Security tab to disable security, and click OK (not
recommended).
Using WPA Passphrase Security
To use WPA Passphrase security In the Atheros Client Utility, access the Security tab in
the Profile Management window.
1. On the Security tab, choose the WPA Passphrase radio button.
2. Click on the Configure button.
3. Fill in the WPA Passphrase.
4. Click OK.
Zero Configuration
This section describes the operation of the Atheros Client Utility (ACU) and Windows
XP Wireless Configuration Service (WZCS).
Wireless Network Configuration
The Windows WZCS is a service that manages the wireless connection in a largely
dynamic way. Only minimal connection information must be identified and configured.
To set Zero Configuration on Windows XP, take the following steps:
1. In Windows XP, open the Wireless Network Configuration Properties dialog box.
2. Select the check box “Use Windows to configure my wireless network settings” to set
Zero Configuration.
When this check box is selected, Windows XP takes control of these settings for all
configuration profiles:
SSID Security keys Ad hoc settings
Note that Windows XP takes control of these settings for all configuration profiles, thus users can
not ( create new profiles with different settings while using Windows Zero Configuration.
The Zero Configuration settings override all configuration profiles, even when you select
other options. However, the ACU does still control the following settings when Zero
Configuration is set:
Power settings Active/Passive scanning (where applicable) Transmit power Wireless band Short/Long preamble (802.11b)
When Zero Configuration is in use, a pop-up message is displayed on the ACU when
you attempt to create or edit a configuration profile from the Profile Management tab of
the ACU.
To turn Zero ConfigurationoffonWindowsXP,take thefollowingsteps:
In Windows XP, opentheWirelessNetworkConfigurationPropertiesdialogbox.
Clear the check box
Zero Configuration.Whenthischeckboxiscleared,allprofilesettingsarecontrolled
by the configurationprofile,whichissetupfromtheACUProfileManagementtab.
Check the StatusInformationorDiagnostics
os client utilityincludesanumberoftoolstodisplaycurrentdiagnosticsand
Check current status
Check driver information
Check receive and transmitdiagnostics
The Current Status tab containsgeneralinformationabou
operations. The CurrentStatustabdoesnotrequireanyconfiguration.Thefollowing
table describes the itemsfoundontheCurrentStatusscreen.
r name and path of the wireless network adapter driver.
Driver Version
Version of the wireless network adapter driver.
Driver Date
Creation date of the wireless network adapter driver.
Client Name
Name of the client computer.
The Adapter Information button contains general information about the network
interface card (the wireless network adapter) and the network driver interface
specification (NDIS) driver. Access the adapter information from the Diagnostics tab.
Diagnostics Tab
The ACU Diagnostics tab provides allows retrieval of receive and transmit statistics. The
Diagnostics tab does not require any configuration. It lists these receive and transmit
diagnostics for frames received by or transmitted by the wireless network adapter:
Multicast packets transmitted and received
Broadcast packets transmitted and received
Unicast packets transmitted and received
Total bytes transmitted and received
The Adapter Information button has general information about the wireless network
adapter and NDIS driver. The Advanced Statistics button to shows statistics for
diagnostics for frames received by or transmitted to the wireless network adapter:
Transmitted Frames
Frames transmitted
send (CTS)
Scan Available Networks
Scan Available NetworksScan Available Networks
Scan Available Networks
button onthe
and ad hoc networks. Onthislist,click
Connecting to a different network
Highlight a networkname
network. If no configurationprofileexistsforthatnetwork,theProfileManagement
window opens to theGeneraltab
configuration profile
Received Frames
Authentication rejects: the number of AP authentication
No CTS frames Retried RTS framesRetried data frames
Frames received OK Beacons Frames with errors CRC errors Encryption errors Duplicate frames AP mismatches Data rate mismatches Authentication time-out
Association time-out Association rejects: t
received by the wireless network adapter
Standard MIC OK Standard MIC errors CKIP MIC OK CKIP MIC errors
Click the Scan
Profile Management tab
Refresh
and click the Activate button to
.
for that network.
(AP) Network
OK to create the
Connected
Infrastructure
(AP) Network
Ad Hoc
Network
Connected Ad
Hoc Network
Encryption
Active
Display Settings
Signal Strength Display
Sets the units used when displaying signal
Refresh Interval
Use the up/down arrows to set the display refresh
Data Display
Sets the display to cumulative or relative:
Enable/Disable
Radio
Enable or disable the RF Signal on all Atheros
Enable/Disable
Tray
Enable or disable the
tray icon
.
Troubleshooting
Run the optional
Troubleshooting Utility
.
Manual LEAP Login
Log in to LEAP
manually, if LEAP is set to
Reauthenticate
Reauthenticate to a LEAP
-
configured access
Exit
Exit the Atheros Client Utility application.
To change the display settings, choose Options > Display Settings from the menu. The
display settings dialog box contains tools to set the:
ACU Tools
Use the Action menu to access the Atheros Client Utility tools:
Units
Icon
strength: percentage (%) or dBm.
interval in seconds.
Relative displays the change in statistical data
since the last update.
Cumulative displays statistical data collected
since opening the profile.
station reference designs.
manually prompt for user name and password on
each login.
point.
The tray icon appearsatthe bottomofthescreen,andshowsthesignalstrengt
and the receivedsignalstrengthindication(
Hold the mouse cursoroverthetrayicontodisplaythecurrentconfigurationprofile
name and association,aswellastransmitandreceivespeedandthewirelessadapter
name and IP address.Right
Help
Open Atheros Client
Utility
Troubleshooting
Preferences
Enable/Disabl
e Radio
Manual LEAP Login
Reauthenticate
Select Profile
Show Connection
Status
Exit
Open the online help.
Launch the Atheros Client Utility (ACU).
UsetheACUto
view status and statisticsinformation
Run the
Troubleshooting Utility
.
Set the ACU startup and menu options. Checktostartthe
program automatically when Windows starts,andcheck
menu items that should appear on the popupmenu.
Enable or disable the RF signal.
Log in to LEAP
manually, if LEAP is set to manuallyprompt
Reauthenticate to the access point.
Click a configuration profile name to switchto.Ifno
configuration profile exists for a connection,
This window displays connection information:
configurationprofile
Auto Profile
auto profile selection
Displays whether the adapter isconnectedtoa
wireless network.
Lists the quality of the link connection.
Displays the SSID of the associatednetwork.
Shows the name of the AP the wirelessadapteris
connected to.
Shows the IP address of the accesspointthe
wireless adapter is connected to.
Lists the speed of the link connection.
Adapter IP
Address
Displays the IP address of the wirelessadapter.
Exit the Atheros Clie
nt Utility application.
Tray Icon
colors
h using
RSSI).
-click on the tray icon to:
configure a profile or
for user name and password on each login.
Active Profile
Selection
Connection
Status
Link Quality
SSID
Access Point
Name
Access Point
IP Address
Link Speed
Displays the active
Shows whether
.
add a profile.
name.
is enabled.
Color
Quality
RSSI*
Green
Excellent
20 dB +
Green
Good
10-20 dB +
Yellow
Poor
5-10 dB
Red
Poor
< 5 dB
Gray
No Connection
No Connection
The colors are defined as follows:
*Received signal strength indication RSSI. Displayed in dB or percentage.
disable the tray icon in the Action menu.
Ad Hoc Mode
In ad hoc mode, a wireless network adapter works within an independent basic service
set (IBSS), as illustrated here. All stations communicate directly with other stations
without using an access point (AP).
To connect to an ad hoc network, configure the profile for ad hoc mode.
operation may be limited by Hardware to meet regulatory requirements.
Ad Hoc Mode Profile Configuration
Enable or
Ad Hoc
To configure a profile in ad hoc mode, change the Network Type in the Profile
Management's Advanced tab. For ad hoc mode, modify the settings:
Network Name (on General Tab)
Transmit Power Level
802.11b Preamble (if using 802.11b)
Wireless Mode When Starting an Ad Hoc Network
Make sure to also edit the General and Security tabs.
Infrastructure (Access Point) Mode
In infrastructure (access point (AP)) mode, the wireless network adapter participates in a
basic service set (BSS) as a station, and communicates with the other stations through an
AP, as illustrated here.
To connect to an access point network, configure the profile for access point mode
To configure a profile in infrastructure (access point) mode, change the Network Type in
the Advanced tab. For access point mode, modify the settings:
Power Save Mode
802.11b Preamble (if using 802.11b)
Wireless Mode
802.11 Authentication Mode
Make sure to also edit the General and Security tabs.
.
Uninstall an Old Driver
Uninstall an old driver before upgrading to a new NDIS driver release.
To remove the newly installed driver from the system if the system does not have
previously installed versions of the NDIS driver, proceed to Step 4.
1. To remove the NDIS driver from the OS, go to Device Manager, right-click Atheros
AR500x Wireless Network Adapter, and choose Uninstall.
2. Click OK to uninstall the device.
3. When the device is uninstalled from Device Manager, search for and delete the
driver files that reside in the system.
a. Go to the Start menu and choose Search > For Files or Folders.
b. Enter
c. Click Search Now. A few files matching these criteria are possible, if previous
d. Choose the files that have been found and delete them from the system.
4. To complete the uninstallation, remove the file
\WINNT\system32\drivers
oem*.inf
Atheros
drivers have not been removed properly.
in the Containing text: field.
in the Search for files or folders named: field, and enter
.
Additional Security Features
ar5211.sys
from the folder
These security features prevent attacks on a wireless network's WEP keys. The wireless
adapter automatically supports each of these features, but these features must be enabled
on the access point.
Message Integrity Check (MIC)
MIC prevents bit-flip attacks on encrypted packets. In a bit-flip attack, someone
intercepts an encrypted message retransmits it after some alterations. Thus the receiver
accepts the message as legitimate. The MIC adds some bytes to each packet to protect it
against tampering.
Temporal
Broadcast
Key Integrity Protocol (TKIP)
This feature prevents attacks on WEP in which someone catches encrypted packets and
uses their initialization vector (IV) to decipher the WEP key. TKIP removes the
predictability to protect both unicast and broadcast WEP keys.
Key Rotation
EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses
static broadcast keys. In broadcast WEP key rotation, the access point supplies a
dynamic broadcast WEP key and changes it at intervals.
Advanced Status Information
Network Name (SSID)
Displays the wireless network name.
Server Based
Shows whether server based authentication is used.
Data Encryption
Displays the encryption type the driver is using.
Configure the
Authentication Type
Displays the
authentication mode
.
Message Integrity
Shows whether
MIC is enabled. MIC prevents bit
-
flip attacks on
Associated AP Name
Displays the name of the access point the wireless adapter is
Associated AP IP
Shows the IP address of the access point the wireless adapter is
Associated AP MAC
Displays the MAC address of the access point the wireless
Power Save Mode
Shows the
power save mode
. Power management is disabled in
Current Power Level
Displays the
rate in mW.
Current Signal Strength
Shows the current signal strength in dBm.
Current Noise Level
Displays the current noise level in dBm.
Up Time
Shows how long the client adapter has been receiving power (in
802.11b Preamble
Displays the
802.
11b preamble
format.
Current Receive Rate
Shows the current receive rate in Mbps.
Current Tr
ansmit Rate
Displays the current transmit rate in Mbps.
Channel
Shows the currently connected channel.
Frequency
Displays frequency the station is using.
Channel Set
Shows the current channel set.
Click the Advanced button on the Current Status tab of the Atheros Client Utility to see
advanced information about the program and its operations. The Current Status tab does
not require any configuration. The following table describes the items found on the
Advanced Status screen.
Configure the network name on the General tab.
Authentication
encryption type on the Security tab.
Configure the authentication mode on the General tab.
Check
Address
Address
encrypted packets.
associated to.
associated to.
adapter is associated to.
ad hoc mode.
Configure the power save mode on the Advanced tab.
transmit power level
hours:minutes:seconds). If the adapter runs for more than 24
hours, the display shows in days:hours:minutes:seconds.
Configure the preamble format on the Advanced tab.
Note: The country code selection is for non-US model only and is not available to all US model.
Per FCC regulation, all WiFi product marketed in US must fixed to US operation channels only.
Federal Communication Commission Interference Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause undesired operation.
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment generates, uses and can
radiate radio frequency energy and, if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment
off and on, the user is encouraged to try to correct the interference by one of the following
measures:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and receiver.
- Connect the equipment into an outlet on a circuit different from that
to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This device is intended only for OEM integrators under the following conditions:
1) The antenna must be installed such that 20 cm is maintained between the antenna
and users, and
2) The transmitter module may not be co-located with any other transmitter or antenna.
As long as 2 conditions above are met, further transmitter test will not be required.
However, the OEM integrator is still responsible for testing their end-product for any
additional compliance requirements required with this module installed
IMPORTANT NOTE:
certain laptop configurations or co-location with another transmitter), then the FCC
authorization is no longer considered valid and the FCC ID can not be used on the final
product. In these circumstances, the OEM integrator will be responsible for re-evaluating
the end product (including the transmitter) and obtaining a separate FCC authorization.
End Product
This transmitter module is authorized only for use in device where the antenna may be
installed such that 20 cm may be maintained between the antenna and users. The final
end product must be labeled in a visible area with the following: “Contains FCC ID:
PPQ-MP1”. The grantee's FCC ID can be used only when all FCC compliance
requirements are met.
Manual Information To the End User
The OEM integrator has to be aware not to provide information to the end user
regarding how to install or remove this RF module in the user’s manual of the end
product which integrates this module.
Labeling
In the event that these conditions can not be met (for example
The end user manual shall include all required regulatory information/warning as show
in this manual.
Industry Canada statement:
This device complies with ISED’s licence-exempt RSSs. Operation is subject to the following two
conditions: (1) This device may not cause harmful interference, and (2) this device must accept
any interference received, including interference that may cause undesired operation.
Le présent appareil est conforme aux CNR d’ ISED applicables aux appareils radio exempts de
licence. L’exploitation est autorisée aux deux conditions suivantes : (1) le dispositif ne doit pas
produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y
compris un brouillage susceptible de provoquer un fonctionnement indésirable.
Radiation Exposure Statement:
This equipment complies with ISED radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
Déclaration d'exposition aux radiations:
Cet équipement est conforme aux limites d'exposition aux rayonnements ISED établies pour un
environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20
cm de distance entre la source de rayonnement et votre corps.
This device is intended only for OEM integrators under the following conditions:
1) The antenna must be installed such that 20 cm is maintained between the antenna and users,
and
2) The transmitter module may not be co-located with any other transmitter or antenna.
As long as 2 conditions above are met, further transmitter test will not be required. However, the
OEM integrator is still responsible for testing their end-product for any additional compliance
requirements required with this module installed.
Cet appareil est conçu uniquement pour les intégrateurs OEM dans les conditions
suivantes: (Pour utilisation de dispositif module)
1) L'antenne doit être installée de telle sorte qu'une distance de 20 cm est respectée entre
l'antenne et les utilisateurs, et
2) Le module émetteur peut ne pas être coïmplanté avec un autre émetteur ou antenne.
Tant que les 2 conditions ci-dessus sont remplies, des essais supplémentaires sur l'émetteur ne
seront pas nécessaires. Toutefois, l'intégrateur OEM est toujours responsable des essais sur son
produit final pour toutes exigences de conformité supplémentaires requis pour ce module
installé.
IMPORTANT NOTE:
In the event that these conditions can not be met (for example certain laptop configurations or
co-location with another transmitter), then the Canada authorization is no longer considered
valid and the IC ID can not be used on the final product. In these circumstances, the OEM
integrator will be responsible for re-evaluating the end product (including the transmitter) and
obtaining a separate Canada authorization.
NOTE IMPORTANTE:
Dans le cas où ces conditions ne peuvent être satisfaites (par exemple pour certaines
configurations d'ordinateur portable ou de certaines co-localisation avec un autre émetteur),
l'autorisation du Canada n'est plus considéré comme valide et l'ID IC ne peut pas être utilisé sur
le produit final. Dans ces circonstances, l'intégrateur OEM sera chargé de réévaluer le produit
final (y compris l'émetteur) et l'obtention d'une autorisation distincte au Canada.
End Product Labeling
This transmitter module is authorized only for use in device where the antenna may be installed
such that 20 cm may be maintained between the antenna and users. The final end product must
be labeled in a visible area with the following: “Contains IC: 4491A-MP1”.
Plaque signalétique du produit final
Ce module émetteur est autorisé uniquement pour une utilisation dans un dispositif où
l'antenne peut être installée de telle sorte qu'une distance de 20cm peut être maintenue entre
l'antenne et les utilisateurs. Le produit final doit être étiqueté dans un endroit visible avec
l'inscription suivante: "Contient des IC: 4491A-MP1".
Manual Information To the End User
The OEM integrator has to be aware not to provide information to the end user regarding how
to install or remove this RF module in the user’s manual of the end product which integrates this
module.
The end user manual shall include all required regulatory information/warning as show in this
manual.
Manuel d'information à l'utilisateur final
L'intégrateur OEM doit être conscient de ne pas fournir des informations à l'utilisateur final
quant à la façon d'installer ou de supprimer ce module RF dans le manuel de l'utilisateur du
produit final qui intègre ce module.
Le manuel de l'utilisateur final doit inclure toutes les informations réglementaires requises et
avertissements comme indiqué dans ce manuel.
DETACHABLE ANTENNA USAGE
This radio transmitter (IC: 4491A-MP1 / Model: MP1) has been approved by ISED to operate
with the antenna type listed below with maximum permissible gain indicated. Antenna types
not included in this list, having a gain greater than the maximum gain indicated for that type,
are strictly prohibited for use with this device.
Le présent émetteur radio (IC: 4491A-MP1/ Model: MP1) a été approuvé par ISED pour
fonctionner avec les types d'antenne énumérés ci-dessous et ayant un gain admissible maximal.
Les types d'antenne non inclus dans cette liste, et dont le gain est supérieur au gain maximal
indiqué, sont strictement interdits pour l'exploitation de l'émetteur.