Table Of Contents - Acer Atheros AR5B95 Manual

802.11n adapter
Table of Contents

Advertisement

Introduction ............................................................................................................... 7
Profile Management ................................................................................................. 7
Auto Profile Selection Management ....................................................................... 8
Switching to a Different Configuration Profile ..................................................... 9
Import and Export Profiles ...................................................................................... 9
Importing a Profile .................................................................................................... 9
Exporting a Profile .................................................................................................... 9
TCP/IP Configuration .............................................................................................. 9
Configuring the TCP/IP Address for the network device: ................................. 9
General Tab .............................................................................................................. 10
Advanced Tab .......................................................................................................... 10
Security Tab ............................................................................................................. 11
Configuring LEAP .................................................................................................. 15
Pre-Shared Encryption Keys .................................................................................. 16
Defining pre-shared encryption keys: .................................................................. 16
Overwriting an Existing Static WEP Key ............................................................ 16
Disabling Static WEP .............................................................................................. 16
Using WPA Passphrase Security .......................................................................... 17
Zero Configuration ................................................................................................. 17
Wireless Network Configuration .......................................................................... 17
Check the Status Information or Diagnostics ...................................................... 18
Acer Communications, Inc.
COMPANY CONFIDENTIAL
System Requirements ........................................................................................ 7
Create or Modify a Configuration Profile ....................................................... 7
Remove a Configuration Profile ....................................................................... 8
Using EAP-TLS Security ................................................................................. 12
Using EAP-TTLS Security ............................................................................... 12
Using PEAP (EAP-GTC) Security .................................................................. 13
Using PEAP-MSCHAP V2 Security ............................................................... 14
Using LEAP Security ....................................................................................... 15
Contents
Dec 2008
v

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents