Atheros AR5BMB71 Manual

802.11n 3x3 mpci module

Advertisement

Quick Links

Client Utility
AR5BMB71 802.11n 3x3
MPCI Module
PRELIMINARY
April 2006
COMPANY CONFIDENTIAL
April 2006

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AR5BMB71 and is the answer not in the manual?

Questions and answers

Summary of Contents for Atheros AR5BMB71

  • Page 1 Client Utility AR5BMB71 802.11n 3x3 MPCI Module PRELIMINARY April 2006 COMPANY CONFIDENTIAL April 2006...
  • Page 2 Atheros reserves the right to make changes, at any time, in order to improve reliability, function or design and to attempt to supply the best product possible. Atheros does not represent that products described herein are free from patent infringement or from any other third party right.
  • Page 3: Table Of Contents

    Defining pre-shared encryption keys:..............14 Overwriting an Existing Static WEP Key ............14 Disabling Static WEP ....................14 Using WPA Passphrase Security ................15 Zero Configuration ....................15 Wireless Network Configuration................15 Check the Status Information or Diagnostics............16 Atheros Communications, Inc. 3 of 3 COMPANY CONFIDENTIAL April 2006...
  • Page 4 Current Status....................16 Adapter Information Button ................. 16 Diagnostics Tab ....................... 17 Transmitted Frames....................17 Received Frames ..................... 17 Scan Available Networks..................18 Connecting to a different network ............... 18 Display Settings....................... 19 Tools......................... 19 Tray Icon ........................20 Color ......................... 21 Quality........................
  • Page 5: Introduction

    Note that the utility only allows the creation of 16 configuration profiles. After the creation of 16 profiles, clicking the button displays an error message. Remove an old profile or modify an existing profile for a new use. Atheros Communications, Inc. 5 of 5 COMPANY CONFIDENTIAL April 2006...
  • Page 6: Remove A Configuration Profile

    Remove a Configuration Profile 1. Go to the Profile Management tab. 2. Select the profile to remove from the list of configuration profiles. 3. Click the Remove button. Auto Profile Selection Management Including a profile in the auto selection feature allows the wireless adapter to automatically select that profile from the list of profiles and use it to connect to the network.
  • Page 7: Switching To A Different Configuration Profile

    DNS server information is also required. IP configuration information (DHCP to assign the IP address, gateway and DNS server IP addresses) is usually obtained from the corporate IT staff. 5. Click to finish. Atheros Communications, Inc. 7 of 7 COMPANY CONFIDENTIAL April 2006...
  • Page 8: General Tab

    General Tab In the Client Utility, access the General tab by clicking Modify on the Profile Management tab. Edit the fields in the General tab to configure the configuration profile. Make sure to also edit the Security and Advanced tabs. Profile Name Identifies the configuration profile.
  • Page 9: Security Tab

    If the access point that the wireless adapter is associating to has WEP set to Optional and the client has WEP enabled, make sure that Allow Association to Mixed Cells is checked on the Security Tab to allow association. Atheros Communications, Inc. 9 of 9 COMPANY CONFIDENTIAL April 2006...
  • Page 10: Using Eap-Tls Security

    None No security (not recommended). Using EAP-TLS Security To use EAP-TLS security In the Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2.
  • Page 11: Using Peap (Eap-Gtc) Security

    The login name used for PEAP tunnel authentication fills in automatically as PEAP-xxxxxxxxxxxx, where xxxxxxxxxxxx is the computer's MAC address. Change the login name if needed. 7. Click OK. 8. Enable the profile. Atheros Communications, Inc. 11 of 11 COMPANY CONFIDENTIAL April 2006...
  • Page 12: Using Peap-Mschap V2 Security

    Using PEAP-MSCHAP V2 Security To use PEAP-MSCHAP V2 security In the Client Utility, access the Security tab in the Profile Management window. 1. On the Security tab, choose the WPA radio button. OR: On the Security tab, choose the 802.1x radio button. 2.
  • Page 13: Using Leap Security

    7. Enter the LEAP authentication timeout time (between 30 and 500 seconds) to specify how long LEAP should wait before declaring authentication failed, and sending an error message. The default is 90 seconds. 8. Click OK. 9. Enable the profile. Atheros Communications, Inc. 13 of 13 COMPANY CONFIDENTIAL April 2006...
  • Page 14: Pre-Shared Encryption Keys

    Pre-Shared Encryption Keys Defining pre-shared encryption keys: 1. Click the Pre-Shared Key (Static WEP) radio button on the Security tab. 2. Click the Configure button. 3. Fill in the fields in the Define Pre-Shared Keys dialog box: Key Entry Determines the entry method for an encryption key: hexadecimal (0-9, A-F), or ASCII text (all keyboard characters except spaces).
  • Page 15: Using Wpa Passphrase Security

    Short/Long preamble (802.11b) When Zero Configuration is in use, a pop-up message is displayed on the utility when you attempt to create or edit a configuration profile from the Profile Management tab. Atheros Communications, Inc. 15 of 15 COMPANY CONFIDENTIAL...
  • Page 16: Check The Status Information Or Diagnostics

    To turn Zero Configuration off on Windows XP, take the following steps: 1. In Windows XP, open the Wireless Network Configuration Properties dialog box. 2. Clear the check box “Use Windows to configure my wireless network settings” to set Zero Configuration. When this check box is cleared, all profile settings are controlled by the configuration profile, which is set up from the Profile Management tab.
  • Page 17: Diagnostics Tab

    Association rejects: the number of AP authentication rejects received by the wireless network adapter • Standard MIC OK • Standard MIC errors • CKIP MIC OK • CKIP MIC errors Atheros Communications, Inc. 17 of 17 COMPANY CONFIDENTIAL April 2006...
  • Page 18: Scan Available Networks

    Scan Available Networks Click the Scan button on the Profile Management tab to scan for available infrastructure and ad hoc networks. On this list, click Refresh to refresh the list at any time. Connecting to a different network • Highlight a network name and click the Activate button to connect an available network.
  • Page 19: Display Settings

    Log in to LEAP manually, if LEAP is set to manually prompt for user name and password on each login. Reauthenticate Reauthenticate to a LEAP-configured access point. Exit Exit the Client Utility application. Atheros Communications, Inc. 19 of 19 COMPANY CONFIDENTIAL April 2006...
  • Page 20: Tray Icon

    Tray Icon The tray icon appears at the bottom of the screen, and shows the signal strength using colors and the received signal strength indication (RSSI). Hold the mouse cursor over the tray icon to display the current configuration profile name and association, as well as transmit and receive speed and the wireless adapter name and IP address.
  • Page 21: Color

    To configure a profile in ad hoc mode, change the Network Type in the Profile Management's Advanced tab. For ad hoc mode, modify the settings: • Network Name (on General Tab) Atheros Communications, Inc. 21 of 21 COMPANY CONFIDENTIAL April 2006...
  • Page 22: Infrastructure (Access Point) Mode

    • Transmit Power Level • 802.11b Preamble (if using 802.11b) • Wireless Mode When Starting an Ad Hoc Network Make sure to also edit the General and Security tabs. Infrastructure (Access Point) Mode In infrastructure (access point (AP)) mode, the wireless network adapter participates in a basic service set (BSS) as a station, and communicates with the other stations through an AP, as illustrated here.
  • Page 23: Uninstall An Old Driver

    EAP authentication provides dynamic unicast WEP keys for wireless adapters, but uses static broadcast keys. In broadcast WEP key rotation, the access point supplies a dynamic broadcast WEP key and changes it at intervals. Atheros Communications, Inc. 23 of 23 COMPANY CONFIDENTIAL...
  • Page 24: Advanced Status Information

    Advanced Status Information Click the Advanced button on the Current Status tab of the Client Utility to see advanced information about the program and its operations. The Current Status tab does not require any configuration. The following table describes the items found on the Advanced Status screen.
  • Page 25: Compliance

    We, Atheros Communications, Inc., 5480 Great American Parkway, Santa Clara, CA 95054, ph: 408-773-5200, declare under our sole responsibility that the product AR5BMB71 complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 26: Fcc Labeling Instructions For Oem Integrators

    FCC Labeling instructions for OEM Integrators: Integrators of this module must add the following label. Contains FCC ID: PPD-AR5BMB71 Above should be clearly visible on the outside of the products in which the module are installed. Industry Canada Notice: This device complies with Canadian RSS-210.

Table of Contents