Dell 5HCKT 802.11a/b/g Mini PCI type 3B Card User Manual Index
Dell Inc. 802.11a/b/g Mini PCI type 3B Card Index
Dell >
Contents
Users Manual
Index Intel PROSet/Wireless 2915ABG Network Connection User's Guide With your wireless network card, you can access wireless networks, share files or printers, or even share your Internet connection. All of these features can be explored using a wireless network in your home or office. This wireless LAN solution is designed for both home and business use. Additional users and features can be added as your networking needs grow and change. NOTE: This software is compatible with the Intel® PROSet/Wireless 2915ABG Network Connection and the Intel® PROSet/Wireless 2200BG Network Connection. Making a Basic Network Connection in Windows XP Making a Basic Network Connection in Windows 2000 Using the Intel PROSet for Wireless Utility Using Intel PROSet/WirelessProfiles Security Overview Configuring Advanced Network Security Settings in Windows XP Configuring Advanced Network Security Settings in Windows 2000 Specifications Regulatory Information Troubleshooting Glossary Information in this document is subject to change without notice. © 2000–2004 Dell Inc. All rights reserved. The copying or reproducing of any material in this document in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. The trademarks Dell, Latitude, Inspiron, the DELL logo, and TrueMobile are trademarks of Dell Inc. Microsoft and Windows are registered trademarks of Microsoft Corporation. Other trademarks and trade names may be used in this document to refer to either the file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/index.htm (1 of 2) [7/2/2004 12:27:06 PM] Index entities claiming the marks and names or their products. Dell disclaims any proprietary interest in trademarks and trade names other than its own. August 2004 file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/index.htm (2 of 2) [7/2/2004 12:27:06 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents Making a Basic Network Connection in Windows XP: Intel® PRO/Wireless 2915ABG Network Connection User's Guide Connecting to a Network in Windows XP Viewing the Status of Your Wireless Connection Connecting to a Network in Windows XP The information in this User's Guide assumes that your wireless card and the software are already installed in your system. If you did not receive your wireless card as part of a system, refer to the Setup Guide that came with your wireless card for hardware and software installation instructions. You can check your system to verify that the wireless card is installed. To see if you have a wireless card installed: 1. From your Windows desktop, right-click My Computer and select Properties. 2. From the Hardware tab, click Device Manager. 3. Double-click Network adapters. If the wireless card is installed you will see Intel® PRO/Wireless 2915ABG Network Connection. If the wireless card is not installed this name will not be displayed. If you are using Windows XP, it is recommended that you follow the steps below to configure your wireless network connection. You can also choose to use Intel® PROSet/Wireless to configure your wireless card. This is discussed in the Making a Basic Network Connection in Windows 2000 section. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (1 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide NOTE: If you are using Windows XP (Service Pack 2) Category View some of the dialogs shown in the following examples may appear different from those on your screen. To switch from Category View to Classic view, click Start àControl Panel and on the navigation bar click Switch to Classic View. Connecting to a Network Before attempting to connect to your network, make sure that your access point or wireless router is connected correctly. Please consult your access point or wireless router documentation to configure your access point or wireless router. You should now choose the type of security for your wireless network. Most home networks use either no security or Wired Equivalent Privacy (WEP) encryption. Additional security settings are also available that are typically used in corporate environments or for advanced users who require higher levels of security. 1. Right-click the Intel® PROSet/Wireless icon on the task tray and click Open Microsoft client. The Wireless Network Connection Properties dialog opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (2 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide NOTE: The names of wireless networks your computer can see are shown under Preferred networks. The name of your network is usually shown here. 2. On the Wireless Networks tab, under Preferred networks, click Add. The Wireless network properties dialog opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (3 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide NOTE: The names of wireless networks your computer can see are shown under Available Networks. For Windows XP SP2, it is necessary to Click on View Wireless Networks to see a list of available networks. The name of your network is usually shown here. If a blank network name (SSID) is received from a silent mode wireless router, there will be no entry for that network in the available networks list. To associate with a "silent mode" wireless router, a new profile must first be created before connection. After connection, the associated SSID can be viewed in the available networks list and in the preferred networks list. 3. Enter the name of your network in the Network name (SSID) field. 4. Click OK. The new network name appears in the Preferred networks list: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (4 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Adding an infrastructure network Network security must now be configured. For a home wireless network, you can choose not to have security, or you can configure your network for WEP security. If there is no network security, anyone can access your wireless network. WEP security provides some level of security for your wireless network. Additional advanced security settings are also available that are typically used in corporate environments or for advanced users who require higher security levels. You must ensure that the security settings on the access point exactly match those chosen for the wireless connection. Choose the appropriate link below for the security type you want to use. ● ● ● ● Configuring your Infrastructure Network with No Security Configuring your Infrastructure Network with WEP Security Configuring Advanced Network Security Settings in Windows XP Configuring Advanced Network Security Settings Using Intel® PROSet for Wireless Configuring your Infrastructure Network with No Security 1. Right-click the Intel® PROSet/Wireless Network icon on the task tray and click Open Microsoft client. The Wireless Network connection Properties dialog opens (see Connecting to a Network). 2. On the Wireless Network Connection Properties dialog (see Connecting to a file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (5 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Network), click to select your wireless network in the Preferred networks section. 3. Click Properties. The your wireless network Properties dialog opens: 4. From the Network Authentication drop-down menu, click to select Open. NOTE: Earlier versions of Windows XP software may not contain these drop-down menus. If you are using one of these earlier versions, click to deselect the Data encryption (WEP enabled) checkbox and skip to step 5. 5. From the Data encryption drop-down menu, click to select Disabled. 6. To save your settings on this dialog, click OK. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (6 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 7. To close the Wireless Network Connection Properties dialog, click OK. Your network configuration is now complete. Continue to Viewing the Status of your Wireless Connection. Configuring your Infrastructure Network with WEP Security 1. On the Wireless Network Connection Properties dialog (see Connecting to a Network), click to select your wireless network in the Preferred networks section. 2. Click Properties. The Wireless Network Properties dialog opens. 3. From the Network Authentication drop-down menu, select Open. NOTE: Earlier versions of Windows XP software may not contain these drop-down menus. If you are using one of these earlier versions, click to select the Data encryption (WEP enabled) checkbox and skip to step 5. 4. From the Data encryption drop-down menu, select WEP. 5. Click the checkbox to deselect The key is provided for me automatically. 6. Type the WEP network key in the Network key field. Your Network key must exactly match the access point’s network key. Your Network key will be either 5 or 13 ASCII (text) characters, or 10 or 26 hexadecimal (0-9, A-F) characters. The person who configured your access point is the only one who knows your network key. 7. Type this key again in the Confirm network key field. The settings are shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (7 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 8. To save your settings, click OK. 9. To close the Wireless Network Connection Properties dialog, click OK. Your network configuration is now complete. Continue to Viewing the Status of your Wireless Connection. Viewing the Status of your Wireless Connection The quality of your wireless connection is affected by: ● The strength of your wireless networking signal file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (8 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide ● ● The level of noise created by other devices in your home or office The location and environment in your home or office The quality of your wireless network is indicated by the Wireless Network Connection icon, located in the lower right corner of your Windows desktop. Point to this icon for a description of your signal quality. NOTE NOTE: It is also possible to view the current status of your wireless connection from the Intel® PROSet/Wireless main screen. To open PROSet/Wireless, double-click the PROSet icon located in the lower right corner of your Windows desktop. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPsetup.htm (9 of 9) [7/2/2004 12:29:13 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents Making a Basic Network Connection in Windows 2000: Intel® PRO/Wireless 2915ABG Network Connection User's Guide Connect to a Network in Windows 2000 Viewing the Status of your Wireless Connection Connecting to a Network using Windows 2000 This document assumes that your wireless card is already installed in your system and the software has been installed. If you did not receive your wireless card as part of a system, refer to the Setup Guide that came with your wireless card for hardware and software installation instructions. To see if you have a wireless card installed: 1. 2. 3. 4. From your Windows desktop, right-click My Computer and select Properties. From the Hardware tab, select the Device Manager button. Double-click Network adapters. If a supported wireless card is installed, you will see either Intel® PROSet/Wireless 2200BG Network Connection or Intel) PRO/Wireless 2915ABG Network Connection. If a supported wireless card is not installed this name will not be displayed. If you are using Windows 2000, you must use Intel® PROSet/Wireless to configure your wireless card. This procedure is discussed in this section. NOTE: USING WINDOWS XP: It is recommended that you use Windows XP to configure profiles for your network connections. However, you can also use Intel® PROSet/Wireless to create your profiles. If you need to configure profiles using Cisco specific settings such as LEAP you will also need to use Intel® PROSet/Wireless. Refer to Making a Basic Network Connection in Windows XP for information about configuring your wireless network profiles. Configuring a Network Profile in Infrastructure Mode using Windows 2000 file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (1 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide To connect to a wireless network, you must first configure a network profile for that network on your computer using Intel® PROSet/Wireless. Refer to Using Intel® PROSet/Wireless for instructions about how to launch Intel® PROSet/Wireless. You can connect to a network by first creating a new profile using the Profile Wizard, and then selecting that profile to connect to the network access point using the Connect button. Refer to Creating a profile for more information. Follow the applicable instruction set below, based on whether the network requires network security key information (check with your network administrator or access point installer to see if network key information is required). ● ● Configuring your Infrastructure Network with no security Configuring your Infrastructure Network with WEP Security Configuring your Infrastructure Network with No Security To configure a new profile with no security: 1. Double-click the Intel® PROSet/Wireless icon in the desktop task tray, or click Start àPrograms àIntel® PROSet/Wireless àIntel® PROSet/Wireless. (Be sure you are using Intel® PROSet/Wireless and not Microsoft Client to configure a new profile.) 2. From the Intel® PROSet/Wireless dialog, under Profiles, click Add. The General Settings dialog opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (2 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 3. Enter the Profile Name and Wireless Network Name (SSID) in the appropriate fields. 4. Select Network [Infrastructure]. If you want to assign a password for this profile, click Advanced. The Advanced Settings dialog opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (3 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 5. Select Password protect this profile (maximum 10 characters). 6. Enter the password, then re-enter it in the Confirm Password box. 7. To close the dialog, click OK. The previous Create Wireless Profile dialog reopens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (4 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 8. 9. 10. 11. Click Next. For Network Authentication, select Open (recommended). Select None as the Data Encryption. To save your settings and close the Security Settings page, click OK. The Intel® PROSet/Wireless dialog reopens. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (5 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 12. The new profile is positioned at the bottom of the Profiles list. Use the up and down arrows to position it at the top of the list. 13. To connect to the wireless network, select it and click Connect. 14. To verify the status of your wireless connection, refer to Viewing the Status of your Wireless Connection. Configuring your Infrastructure Network with WEP security The following describes how to edit an existing profile and apply Wired Equivalent Privacy (WEP) encryption. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (6 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide NOTE: Before starting, have the security network key available for the access point (for home use). If the access point is installed in a corporate environment, contact your system administrator for the network key. To configure a profile with WEP security: 1. Double-click the Intel® PROSet/Wireless icon in the desktop task tray, or click Start àPrograms àIntel® PROSet/Wireless àIntel® PROSet/Wireless. 2. From the Intel® PROSet/Wireless dialog, select the profile from the Profiles list and click Properties. The General Settings dialog opens: 3. Click Next. The Security Settings dialog opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (7 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 4. 5. 6. 7. For Network Authentication, select Open (recommended). Select WEP as the Data Encryption. For the Encryption Level, select 64-bit or 128-bit. Select a key index number 1, 2, 3, or 4. Key selection must correspond to the network key on the access point. 8. Enter the password characters in the Wireless Security Password (WEP Key) text box. Select either of the following: ● ● Use ASCII characters: Click Use ASCII characters to enable. Enter a text phrase, five (using 64-bit) or 13 (using 128-bit) alphanumeric characters (0-9, a-z or A-Z), in the pass phrase field. Use hex Key: Click Use hex Key to enable. Enter ten (using 64-bit) alphanumeric characters, 0-9, A-F, or twenty-six (using 128-bit) file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (8 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide alphanumeric characters (0-9, A-F) in the hex key field. NOTE: Both the network name and the network key information are casesensitive. 9. To save the settings and close the Security Settings page, click OK. 10. The profile is positioned at the bottom of the Profiles list. Use the up and down arrows to position it at the top of the list. 11. To connect to the wireless network, click Connect. 12. To verify the status of your wireless connection, refer to Viewing the Status of your Wireless Connection. Your basic configuration is now complete. If your network required advanced security options, click on the appropriate link below for advanced configuration instructions. Configuring Advanced Network Security Settings in Windows XP: Using Windows XP Support. Configuring Advanced Network Security Settings in Windows 2000: Using Intel® PROSet/Wireless. Viewing the Status of Your Wireless Connection The wireless network connection icon in the bottom right corner of the windows desktop indicates the current status of your wireless connection. There is also a signal quality icon on the Intel® PROSet/Wireless main windows that provides the current status of your wireless connection. The signal can vary from poor to excellent depending on the surroundings and quality of the signal from the access point or computer (ad hoc mode). The following table shows how the signal quality icon indicates the status of your wireless connection, and the suggested actions for low signals. Connection Connection Bars/Color Suggested Action Icon Status Excellent 5 green bars No action required Very Good 4 green bars No action required Good 3 green bars No action required file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (9 of 10) [7/2/2004 12:29:25 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Low 2 green bars Move closer to the access point Very Low 1 yellow bar Move closer to the access point No connection no colored Computer is still trying to establish initial bars connection or you have moved out of the range of your access point. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/W2Ksetup.htm (10 of 10) [7/2/2004 12:29:25 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Back to Contents Using Intel® PROSet/Wireless: Intel PROSet/Wireless 2915ABG Network Connection User's Guide Using Intel PROSet/Wireless as Your Wireless Manager Enabling/Disabling the Wireless Radio Intel PROSet/Wireless Main Window Intel PROSet/Wireless Menus Administrator Tool Single Sign On Feature Installing and Uninstalling the Software Installing and Uninstalling the Single Sign On Feature Window XP Zero Configuration Using Intel PROSet/Wireless as Your Wireless Manager The following information is for Windows XP users. If you are using Windows 2000 refer to Making a Basic Network Connection in Windows 2000. Intel PROSet/Wireless can be used to set up, edit, and manage network profiles to connect to a network. It also includes advanced settings such as power management and channel selection for setting up ad hoc networks. If you are using Windows XP, it is recommended that you use Windows XP to manage your network profiles. However, if your network requires LEAP authentication, you will need to use Intel® PROSet/Wireless to configure your LEAP profiles. Disabling Windows XP Wireless Manager from the Windows Operating System To disable Windows XP as your wireless manager from Windows: 1. Click Start àSettings àControl Panel. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (1 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide 2. Double-click Network Adapters. 3. Right-click Wireless Network Connection, and then click Properties. The Wireless Network Connection Properties page opens: 2. On the Wireless Networks tab, click to clear the Use Windows to configure my wireless network settings checkbox. 3. To save your settings, click OK. This procedure configures Intel® PROSet/Wireless to manage your network profiles. Disabling Windows XP from Intel® PROSet/Wireless If Windows XP is enabled, the Intel® PROSet/Wireless main window is disabled. However, you can still open the Intel® PROSet/Wireless window from the Start menu and disable Windows XP. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (2 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide To disable Windows XP from the Intel PROSet/Wireless window: 1. Click Start àPrograms àIntel PROSet/Wireless. The Intel PROSet/Wireless window opens. 2. Click Enable Intel PROSet/Wireless. This procedure configures Intel PROSet/Wireless to manage your network profiles. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (3 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide NOTE: To be notified when Windows XP or any other wireless manager starts to manage your network profiles, select Applications Settings under the Tools menu on the Intel PROSet/Wireless window box. Next, select Notify when another application is using the wireless device checkbox, as shown in the following illustration: Enabling/Disabling the Wireless Radio The wireless radio can be enabled/disabled from a hardware radio switch on your computer, in conjunction with either the Intel PROSet/Wireless or with Windows. NOTE: When your computer is switched on and the radio is enabled, the radio is capable of constantly transmitting signals. In certain situations, such as in a plane, signals from the radio may cause interference. The following methods describe how to disable the radio and use your laptop without emitting radio signals. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (4 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Using the Fn + F2 radio off/on switch To enable/disable the radio: 1. Press Fn + F2 to switch the radio on or off. This is known as the hardware switch. If you have Intel PROSet/Wireless installed, the current state of the radio is displayed in the Intel PROSet/Wireless main window and in the task tray. The hardware radio switch must be turned on before you can enable the radio using the Intel PROSet/Wireless or Windows Device Manager: Radio icon status: Using Fn + F2 displays a large wireless icon indicating that the radio is enabled or disabled, as shown in the following illustration: Radio Enabled using Fn + F2 Radio Disabled using Fn + F2 Using Intel PROSet/Wireless to enable/disable the radio The radio can be enabled/disabled from Intel PROSet/Wireless. The status icon on the Intel PROSet/Wireless main window displays the current state of the radio. When the radio is on, an attempt is made to associate the network access point using the last profile. If the adapter cannot connect to the access point, the Configuration Service attempts to find an available network. To enable/disable the radio using Intel PROSet/Wireless: ● To enable/disable the radio from the Intel PROSet/Wireless main window: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (5 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide ■ ■ ● Open the Intel PROSet/Wireless main window. To toggle the radio off and on, click Enable/Disable Radio. To enable/disable the radio off/on from the task tray: ■ ■ Right-click the task tray icon From the menu that opens, select Enable Radio or Disable Radio. When the radio is disabled, the task try shows the icon with a red X: The icon is located in the lower right corner of Windows desktop. Using Device Manager to enable/disable the radio The radio can be enabled/disabled using Device Manager on the Windows operating system. The wireless icon on the task tray will display the current state of the radio. To enable/disable the radio from the Windows Device Manager: 1. 2. 3. 4. 5. From the Windows desktop, right-click My Computer and then click Properties. Click the Hardware tab, and then click Device Manager. Double-click Network adapters. Right-click the installed wireless adapter in use. From the pop-up menu, choose Enable/Disable (depending on whether the radio is currently on or off). 6. When prompted, click Yes. NOTE:: Make sure the radio is enabled on both the software and the hardware. If it is not enabled on the hardware, you will receive this message when you try to connect: The Intel® PRO/Wireless 2915ABG (or the Intel PROSet/Wireless 2200BG) network connection is still disabled. Press Fn + F2 to enable it. A red X indicates the radio is disabled. Intel PROSet/Wireless Main Window file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (6 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide The main window contains basic information about your connection. If you are associated to a network, it will contain information such as SSID, profile name, and speed, and AP settings such as 802.11 band, channel, and security mode. The Signal Quality icon provides visual information about the quality of the wireless signal. It varies from poor to excellent, depending on the surroundings and quality of the signal from the access point. Refer to Viewing the Status of your Wireless Connection for more information. The current status of the radio is also displayed in the Intel PROSet/Wireless main screen. Refer to enabling the radio for more information about how to enable/disable the wireless radio. Intel PROSet/Wireless Main Window: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (7 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide ● To view detailed parameters of the access point and network adapter, as shown in the following illustration, click Details. The Connection Details window displays the current network connection information. Connection Details description Name Profile Name Network Name IP address Description Name of the profile. If this is a one-time connection thenis displayed. Network Name (SSID) of the current connection. Internet Protocol (IP) address for the current connection. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (8 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Signal Quality A radio frequency (RF) signal can be assessed by basically two components: ● ● strength (quantity) of the signal the quality of the signal The quality of the signal is determined by a combination of factors but primarily is composed of signal strength and the ratio of the RF noise present. RF noise occurs both naturally in nature and artificially by electrical equipment. If the amount of the RF noise is high, and/or the signal strength is low, it results in a lower signal to noise ratio which causes poorer signal quality. With a low signal to noise ratio it is more difficult for the radio receiver to discern the data information contained in the signal from the noise itself. Signal Strength While adequate signal strength is required for good data communications, even more important is the quality of the signal. A strong signal of poor quality results in poor data communications. If the signal quality is low, investigate sources of noise nearby, such as interference from other wireless LANs, other RF transmitters, electric motors or compressors. Also reflections of the signal by metallic or other objects in the area can result in poor signal quality. Adapter MAC Address The Media Access Control (MAC) address for the wireless adapter. Band Indicates the wireless band of the current connection. ● ● ● 802.11a 802.11b 802.11g Supported Data rates Rates at which the wireless adapter can send and receive data. Displays the speed in Mbps for the frequency being used. ● ● ● Radio Frequency Channel Number 802.11g - 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, and 54 802.11b - 1, 2, 5.5, and 11 802.11a - 6, 9, 11, 12, 18, 24, 36, 48, and 54 Displays the channel frequency of the current wireless connection. Displays the transmit and receive channel. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (9 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Network Authentication Data Encryption CCX Version CCX TPC Power CCX Power Levels Access Point MAC Address Mandatory Access Point Close Help? Displays Open, Shared, WPA-Enterprise, WPA-Personal, WPA2Enterprise and WPA2-Personal modes. Displays the 802.11 authentication used by the currently used profile. Refer to Security Settings for more information. Displays None, WEP, CKIP, TKIP or AES-CCMP. Refer to Security Settings for more information. Version of the Cisco Compatible Extensions on this wireless connection. Cisco Compatible Extensions Power Levels. 0.2, 0.4, 1.0, 6.3, 100.0 mW The Media Access Control (MAC) address for the associated access point. Displays "None" is not enabled. If enabled from the Mandatory AP setting, the access point MAC address is displayed. This option directs the wireless adapter to connect to an access point using a specific MAC address (48-bit 12 hexadecimal digits, e.g., 00:06:25:0E:9D:84). Closes the page. Displays the help information for this page. Main Window Connection Status Icons Icon Description Radio Disabled: The wireless adapter is not associated to a network. Click the Enable Radio button to enable the adapter. Searching for wireless networks: The wireless adapter is scanning for any available wireless networks. Animated Icons: No wireless networks found: There are no available wireless networks found. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (10 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Wireless network found: An available wireless network is found. You can choose to connect to available networks displayed in the Available Networks list. Connected to a wireless network: Connected to a wireless network. The network name, speed, and signal quality display the current connection status. Click Details to display details of the current network connection. Not connected to a wireless network: Not connected to a wireless network. Network Name Speed Network Name (SSID): The name of the network that the adapter is connected to. The Network Name SSID must be the same as the SSID of the access point, using infrastructure mode (also called BSSID, ESSID, or Net ID) or other computers in an ad hoc network (also called IBSSID). Displays the current data transfer rate in mega-bits-per-second (Mbps): ● ● ● Signal Quality 802.11g - 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 802.11b - 1, 2, 5.5, or 11 802.11a - 54, 48, 36, 24, 18, 12, 9, 6 The signal quality icon bars indicate the quality of the transmit and receive signals between your wireless adapter and the nearest access point or computer in device-to-device mode. The number of vertical green bars indicate the strength of the transmit and receive signals. The signal quality ranges from excellent to out of range. The following factors affect signal quality: ● ● ● Details Enable/Disable Radio Help? Signal quality decreases with distance and is affected by metal and concrete barriers. Metal objects can reflect signals and cause interference. Other electrical devices can cause interference. Provides adapter connection status information. Switch the radio off and on. Refer to Enabling/Disabling Wireless the Radio for more information. Displays the help information for this window. Drag Help? to the item of interest to display help information. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (11 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Close Close the Intel PROSet/Wireless main window. Close the Intel PROSet/Wireless main window. Profiles list (on the main window) Name Profile Name Network Name Connection Icons Network Name Arrows Description Profiles are network settings that allow your wireless adapter to connect to a network access point (Infrastructure mode) or computer (device-to-device ad hoc mode) which does not use an access point. Refer to Setting up Profiles for more information. Name of the wireless network (SSID) or computer. The network profile status icons indicate the different connection states of the adapter with a wireless network, the type of operating mode being used, and if network security is being used. Blue circle: The wireless adapter is associated with an access point or computer (Ad hoc mode). If a profile has 802.1x security enabled, this indicates that the wireless adapter is associated and authenticated. Infrastructure operating mode. Ad hoc operating mode. The network is using Security encryption. Wireless network band frequency being used. Name of the wireless network (SSID) or computer. Use the arrows to position profiles in a preferred order for autoconnection. ● ● Connect button Add button Remove button Properties button Up-arrow: Move the position of a selected profile up in the profile list. Down-arrow: Move the position of a selected profile down in the profile list. Connect the selected profile to the wireless network. Create a new profile using the Profile Wizard. Remove a selected profile from the Profile List. All profiles cannot be removed from the list, one profile must remain in the list. Edit the contents of an existing profile. You can also double-click a profile in the Profile List to edit the profile. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (12 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Available networks (on the main window) The Available Networks list displays a list of wireless networks within range of the adapter. Use the Connect button to launch the Profile Wizard to create a profile for the selected wireless network. Name Network Name Configure button Properties button Details button Refresh button Description The signal strength of the wireless network access point or computer (Ad hoc mode). The signal strength icon bars indicate that the wireless network or computer is available for connection but is still not is associated with an access point or computer (Ad hoc mode). The wireless network is using Infrastructure operating mode. The wireless network is using Ad hoc operating mode. The wireless network is using Security encryption. The band frequency being used by the wireless network. Name of the wireless network (SSID) or computer. Configures the selected available Network Name. The Networks Properties displays the current network connection status for the wireless adapter. Refer to Network Properties for information. Provides detailed information about the selected network and its access points. Refresh the list of available networks. If any new networks are available with range of the adapter, the list is updated to show the new network name. Intel PROSet/Wireless Menus You can use the following menu options to configure your network settings: ● ● ● ● File Tools Profiles Help file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (13 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide ● Task Tray Wireless Menu Descriptions Name File Description Exit: Close the Intel PROSet/Wireless main window. To launch Intel PROSet/Wireless: ● ● ● Tools Click Start > Programs > Intel PROSet/Wireless > Intel PROSet/Wireless. Right-click the task tray icon located in the lower right corner of your Windows Desktop, and click the menu option Open Intel PROSet/Wireless. Double-click the task tray icon to open Intel PROSet/Wireless. Application Settings: Provides system wide connection preferences. Refer to Application Settings for information. Use Ctrl+P from your keyboard as an alternative to using your mouse to access this feature. Adapter Settings: Displays Adapter Settings that correspond to the settings made in the Windows Advanced Settings. Refer to Adapter Settings for information. Use Ctrl+A from your keyboard as an alternative to using your mouse to access this feature. Use Microsoft client): Enables Windows XP as the wireless manager. Use F10 on your keyboard as an alternative to using your mouse to access this feature. Refer to Switching to Windows XP wireless manager for more information. Advanced Statistics: Provides detailed information about the network connection. Intel Wireless Troubleshooter: Self diagnostics utility. Use Ctrl+D from your keyboard as an alternative to using your mouse to access this feature. Administrator Tool: If installed, the Administrator tool is for file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (14 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Profiles Help administrators or the person who has administrator privileges on this computer. This option is used to configure shared profiles using Pre-logon and Persistent profiles. Refer to Administrator Tool for more information. Use Ctrl+T from your keyboard as an alternative to using your mouse to access this feature. Import/Export: Import and export profiles to and from the profile list. Refer to Import/Export Profiles for information. Use Ctrl+I from your keyboard as an alternative to using your mouse to access this feature. Manage Exclusions: Include or exclude specific access points. Refer to Manage Exclusions for information. Use Ctrl+M from your keyboard as an alternative to using your mouse to access this feature. Intel PROSet/Wireless Help: Launch the online help (F1). About: Displays version information for the currently installed application components. Tools Menu The following options are available from the Tools menu. Application Settings (Tools menu) Application Settings control how Intel PROSet/Wireless behaves and displays information. Name Adapter Description Displays the name of the installed adapter currently being managed by Intel PROSet/Wireless file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (15 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Task Tray Show application icon in the taskbar: Select this option to display the task tray status icon. This icon resides in the Windows Task bar (Notification area). Clear the box to not display the task tray status icon. Selecting Hide Icon from the task tray menu also clears this check box. The Task Tray Status Icon provides several functions: ● ● ● Notifications Visual feedback for the connection state and wireless activity of your wireless network. The icon changes color and animation for different wireless activity. See Task Tray Icons for more information. Menu – A menu is displayed when you click the icon. From this menu you perform tasks such as turning on/off the radio or launching the Intel PROSet/Wireless application. See: Task Tray Menu Options for more information. Tool tips and balloon prompts. See: Tool Tip and Balloon Prompts for more information. Show Alert Notifications: Select this option to display balloon windows next to the task tray icon. When your action is required, a message prompt displays. Only high importance events (alerts) trigger a balloon window. If the balloon window is checked, then the appropriate action is taken. Clear the box to not display balloon message prompts displayed. Refer to Tool Tip and Balloon Prompts for more information. Select one of the following options: ● ● Information Notifications: These balloons are of lower importance. They do not require your interaction but can greatly improve the wireless experience. Show Information Notifications: This checkbox is checked by default. All informational balloon windows are displayed next to the task tray status icon. These balloons improve your wireless experience by notifying you when available wireless networks are in range. They also inform you when a wireless connection has been made or has been lost. Refer to Tool Tip and Balloon Prompts for more information. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (16 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide ● ● Auto Connect Show a list of available networks in the area when not connected: When the Show Information Notifications checkbox is not checked, you can check this item. Since the informational balloon windows are disabled this option allows you to still be notified of available networks when the wireless adapter is not connected. Notify me when another application is using the wireless device: When checked, a window is displayed when other applications are trying to manage your wireless adapter. This is helpful if you are using software provided by a hotspot location (such as a coffee shop or airport terminal. To take advantage of the Intel PROSet/Wireless features you may want to disable the hotspot software when you leave. For more information about using the options above, refer to Configuration Service. Connect to available network using profiles only: (Default) Connect the wireless adapter to an available network using a matching profile from the Profiles List. If no matching profile is found you are notified by a notification (see Notifications). The wireless device remains disconnected until a matching profile is found or you configure a new matching profile. Connect to any available network if no matching profile found: If the wireless adapter is disconnected and wireless networks are found, the Intel PROSet/Wireless Configuration service attempts to match a profile from the Profiles List and if a match is found, connect. If no matches are found and one of the available networks is open (unsecured), this option allows the Intel Configuration Service to connect to that open network. Note: Open networks have no security. You would need to provide your own security for this wireless connection. One way to secure an open wireless connection is with Virtual Private Networking (VPN) software. Connect to any network based on profiles only (Cisco mode): This mode supports multiple and blank network names (SSIDs) for access points that support Cisco Compatible Extensions. Select this option to try every profile in preferred order. This requires that users know they are in the vicinity of an access point which has more than one SSID but only advertises one. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (17 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Manage Exclusions OK Cancel Help? Enable automatic exclude list feature: Select this checkbox to enable the automatic exclude list feature. This feature provides a way to exclude access points from automatic connection. Refer to Manage Exclusions for more information. Enable manual exclude list feature: Select this checkbox to enable the manual exclude list feature. This feature provides a way to exclude networks from automatic connection. Refer to Manage Exclusions for more information. Save settings and return to the previous window. Close the page and cancel changes. Displays the help information for this window. Adapter Settings (Tools menu) The Advanced tab on the Intel® PRO/Wireless 2915ABG Network Connection and Intel® PRO/Wireless 2200BG Network Connection window provides global settings for the wireless adapter. To access this window, click Tools > Adapter Settings. The Advanced tab is the default setting. Advanced Tab Description Name Ad Hoc Channel Description Value: 802.11b/g: Select this option when using 802.11b and 802.11g (2.4 GHz) ad hoc band frequency. ● Select the allowed operating channel from the list. 802.11a: Select this option when using 802.11a (5 GHz) ad hoc band frequency. ● Select the allowed operating channel from the list. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (18 of 39) [7/2/2004 12:29:31 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Intel Throughput Enhancement Changes the value of the Packet Burst control. Enable: Enables throughput enhancement. Mixed mode protection Power Management Disable: (default setting) Disables throughput enhancement. Use this option to avoid collision in the 11b/11g mixed environment. Use RTS/CTS where clients may not hear each other. Use CTS-to-self to gain more throughput where clients are physically close to and can hear each other. Allows you to select a balance between power consumption and adapter performance. The wireless adapter power settings slider sets a balance between the computer's power source and the battery. Use default value: Power settings are based on the computer's power source (Default). Manual: Allows you to adjust the slider for the desired setting. Use the lowest setting for maximum battery life.* Use the highest setting for maximum performance. Preamble Mode * Power consumption savings will vary based on infrastructure settings. The preamble property allows you to change the preamble length setting received by the access point during initial connection. Auto Tx Preamble: (Default) Allows automatic detection of the preamble setting received from the access point to enable the appropriate preamble option. Short preamble is used if this option is supported; if not, long preamble is used. Long Tx Preamble: Always use a long preamble length to connect to an access point. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (19 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Preferred Band If there is a wireless network that supports more than one band of operation, this setting will determine which band to connect with. For example, if 802.11a is selected for this Preferred Band setting, but an 802.11a network is unavailable, then the wireless adapter will still connect to an available 802.11b or 802.11g network. The selections are: ● ● ● Transmit Power 802.11g 802.11a 802.11b Decreasing the transmit power level reduces the radio coverage. Default setting: Highest power setting. ● ● Data Rate Lowest: Minimum coverage. Setting the transmission power level enables you to expand or confine a coverage area in respect to other wireless devices that could be operating nearby. Reducing a coverage area in high traffic areas improves transmission quality by reducing the number of missed beacons and noise in that coverage area. Highest Maximum coverage. Set the adapter to a maximum transmit power level. Select this setting when operating in highly reflective environments and areas where other devices could be operating nearby, and when attempting to communicate with mobile computers at the outer edge of a coverage area. Note: This setting will take effect when using either Infrastructure or ad hoc mode. Select the data transfer rate in megabits-per-second (Mbps). Best Rate: (Default) Use the fastest rate detected. Manually select: 1, 2, 5.5, 6. 9, 11, 12, 18, 24, 36, 48, or 54. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (20 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Wireless Mode 802.11a, 802.11b and 802.11g (Default): Connects to 802.11a, 802.11b, or 802.11g wireless networks. ● ● ● OK Cancel Help 802.11g only: Connects the wireless adapter to 802.11g networks only. 802.11a and 802.11g only: Connects the wireless adapter to 802.11a and 802.11g networks only. 802.11b and 802.11g only: Connects the wireless adapter to 802.11b and 802.11g networks only. Note: These wireless mode (Modulation type) options determine the discovered access points displayed in the Available networks list. Save settings and return to the previous window. Cancel changes and return to the previous window. Displays the help for this window. Windows Advanced Options (Adapter Settings) To access the Windows XP/2000 Advanced options: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Start Windows and log on with administrative privileges. From your desktop, right-click My Computer and click Properties. Click the Hardware tab. Click Device Manager. Double-click Network adapters. Right-click the name of the installed wireless adapter in use, and then click Properties. Select the Advanced tab. Select the Property you want (e.g., Mixed mode protection, Power Management, etc.). To deselect the checkbox, click Use default value. Select the new value (Disable or Enable) from the drop-down box. To save your settings and exit the window, click OK. To access the Windows 98SE/Me Advanced options: 1. 2. 3. 4. 5. Start Windows and log on with administrative privileges. From your desktop, right-click My Computer and then click Properties. Click the Device Manager tab. Double-click Network adapters. Right-click the name of the installed wireless adapter in use, and then click file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (21 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide 6. 7. 8. 9. 10. Properties. Select the Advanced tab. Select the Property you want (e.g., Mixed mode protection, Power Management, etc.). To deselect the checkbox, click Use default value. Select the new value (Disable or Enable) from the drop-down box. To save your settings and exit the window, click OK. To access the Windows NT4.0 Advanced options: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Start Windows and log on with administrative privileges. From your desktop, right-click My Computer and click Properties. Click the Hardware tab. Click the Device Manager button. Double-click Network adapters. Right-click the name of the installed wireless adapter in use, and then click Properties. Select the Advanced tab. Select the Property you want (e.g., Mixed mode protection, Power Management, etc.). To deselect the checkbox, click Use default value. Select the new value (Disable or Enable) from the drop-down box. To save your settings and exit the window, click OK. Advanced Statistics (Tools menu) Provides current adapter connection information. The following describes information for the Statistics Details window. Name Statistics Details Description Advanced Statistics - This information pertains to how the adapter is communicating with an access point. Association - If the adapter finds an access point to communicate with, the value is In range. Otherwise, the value is Out of range. ● ● AP MAC Address: The twelve digit MAC address (e.g., 00:40:96:31:1C:05) of the AP. Number of associations: The number of times file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (22 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide ● ● the access point has found the adapter. AP count: The number of available access points within range of the wireless adapter. Number of full scans: The number of times the adapter has scanned all channels for receiving information. Roaming - Roaming information indicates reasons for adapter roaming. Roaming occurs when an adapter communicates with one access point and then communicates with another for better signal strength. ● ● ● ● ● ● ● Roaming Count: The number of times that roaming occurred. AP did not transmit: The adapter did not receive radio transmission from the access point. You may need to reset the access point. Poor beacon quality: The signal quality is too low to sustain communication with the access point. You have moved the adapter outside the coverage area of the access point or the access point's device address information has been changed. AP load balancing: The access point ended its association with the adapter based on the access point's inability to maintain communication with all its associated adapters. Too many adapters are trying to communicate with one access point. AP RSSI too low: The Receive Signal Strength Indicator (RSSI) is too low to maintain an association with the adapter. You may have moved outside the coverage area of the access point or the access point could have increased its data rate. Poor channel quality: The quality of the channel is low and caused the adapter to look for another access point. AP dropped mobile unit: The access point dropped a computer from the list of recognizable mobile devices. The computer must re-associate with an access point. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (23 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Miscellaneous - Use this information to determine if an association with a different access point increases performance and helps maintain the highest possible data rate. ● ● ● ● Transmit/Receive (Tx/Rx) Statistics Received Beacons: Number of beacons received by the adapter. Percent missed Beacons: Percent value for missed beacons. Percent transmit errors: The percentage of data transmissions that had errors. RSSI: Signal strength of the access point with which the adapter is communicating. Displays percent values for non-directed, and directed packets. Total host packets: The sum total number of directed and non-directed packets counts. ● ● Transmit - (Mbps) Receive - (Mbps) Non-directed packets: The number of received packets broadcast to the wireless network. Directed packets: The number of received packets sent specifically to the wireless adapter. Reset Statistics Close Help? Total Bytes: The total number of bytes for packets received and sent by the wireless adapter. Resets the adapter statistical counters back to zero and begins making new data measurements. Close the window and return to the main window. Displays the help information for this window. Intel Wireless Troubleshooter (Tools menu) Name Description file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (24 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide File Help Exit: Exit Intel Wireless Troubleshooter application. Intel® Wireless Troubleshooter Help: Displays online help on the Intel Wireless Troubleshooter. About: Displays version information for the Intel Wireless Troubleshooter. Wireless Event Viewer Disable Notification Enable Notification Available Help Launch Wireless Event Viewer. Click to disable the alert notifications. Click to enable the alert notifications if an error is detected. Date Time error message: ● ● ● Description of error. Link to resolve error (if available). See Resolving Errors. Link to recommended steps to resolve error. Administrator Tool (Tools menu) Name Administrator Settings Administrator Profiles Description Settings button: Set the user's control over their wireless network connections. Options button: Enable or disable Persistent and Pre-Logon profiles on the computer. Persistent Connection: A Persistent profile is active during boot time and when no user is logged onto the computer. Pre-Logon/Common Connection: A Pre-Logon profile is active once a user logs onto the computer. When Single Sign On support is installed, this type of profile uses your Windows log on user name and password. Prelogon/Common are placed at the top of the Profiles list. Because these profiles are at the top of the list, when available they are connected first. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (25 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Disable Intel Profile Switching. Users will only be able to connect with the first Pre-Logon profile: Disable Profile Switching only applies to Pre-logon/Common profiles. Add: Launches the Profile Wizard to create a profile. Remove: Removes a selected profile from the profiles list. Properties: Allows users to edit the selected profile contents. Allows users to change the Administrator Tool password. Allows users to export settings and profiles as one package to other computers on the network. Closes the window. Displays the help for this window. Change Password Export Close Help? Profiles Menu The following options are available from the Profiles menu Import/Export (Profiles menu) This option allows you to import and export profiles. Import/Export Description Name Export profiles Description Select the profiles you want to export: Select individual or multiple profiles from the list. The profile mode icon indicates either infrastructure or ad hoc mode is being used and whether security is being used. Browse: Browse your hard disk for the destination directory. The directory path is shown in the destination directory window. Export: Start exporting profiles. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (26 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Import profiles Imports profiles in to the Profiles list. OK Cancel Help? Import: Browse your hard disk for files to import. Saves settings and returns to the previous window. Closes the window and cancels any changes. Displays help information for this window. For information about importing/exporting user-created profiles, refer to Importing/Exporting Profiles. For information about exporting Administrator profiles, refer to Administrator Export Preferences. Manage Exclusions (Profiles menu) The Exclude List management window is displayed when you select this menu option from the Profiles menu. This option allows you to exclude or include specific access points. This window allows you to see which networks (SSID) or individual access points (BSSID) have been excluded. Manage Exclusions Description Name Exclude List Management Description Network Name: Name (SSID) of the wireless network. Radio: Displays band frequency of the wireless adaptor: 2.457 GHz for 802.11b and 802.11g; 5.2 GHz for 802.11a. BSSID: MAC address for the selected access point. Reason: Describes why the profile was excluded. There are two kinds of exclude entries: User added or Faulty access point exclusions. These are dynamically entered in the list because of DHCP, 802.1x, or Rogue access point failure. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (27 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Details: Explanation of the exclusion and suggestions for fixing the exclusion. Note: Entries that are colored gray are excluded rogue access points. These entries cannot be removed from the list. Adds an access point to the list. Removes an access point from the list. Refreshes the list. Closes window and save settings. Displays the help information for this window. Add Remove Reset list Close Help? Task Tray Icon Menu Options The Intel PROSet/Wireless icon is displayed in the task tray located in the lower right corner of your Windows desktop. Right-click the status icon to display the menu options. Task Tray Icon Menu Description Menu Item Open Intel PROSet/Wireless Submenu Item none Comments Click this option to launch Intel PROSet/Wireless. If the Microsoft client is managing the wireless adapter, this menu option will read: Open Microsoft client. To switch back to Intel PROSet/Wireless, select Use Intel PROSet/Wireless from the menu. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (28 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Open Microsoft none client Launches Windows XP wireless manager. A list of available networks will be displayed. This option is displayed if Use Intel PROSet/Wireless is selected. Enable Radio none Turns the radio on. Disable Radio none Turns the radio off. Connect to Displays the List of Profile profiles is current profiles in displayed the Profile List. Select a profile to activate it. Use Microsoft None Toggles between client Intel PROSet/Wireless Use Intel and Windows XP PROSet/Wireless Wireless Zero Configuration Service. When you use Microsoft client, you will not be able to use the Intel PROSet/Wireless profiles. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (29 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Hide Icon None Removes Intel PROSet/Wireless icon from the task tray. The icon for the current session will no longer be displayed. Refer to Application Settings to display or hide the task tray icon. Task Tray Icons The task tray icon provides visual indication of the current wireless connection state. The connection status icon is located in the lower right corner of your Windows desktop. The task tray can be set to visible or not visible in the Application Settings Tools menu selection. Task Tray Icon Description Icon Description Disable Radio: The wireless adapter is off. The wireless device does not transmit or receive while it is off. Click Enable Radio to enable the adapter. The icon is white with a red X. Searching for wireless networks: The wireless adapter is searching for any available wireless networks. White icon with animation. No wireless networks found: There are no available wireless networks found. Intel PROSet/Wireless will periodically scan for available networks. If you want to force a scan, double-click the icon to launch Intel PROSet/Wireless and click the Refresh button. Red icon. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (30 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Wireless network found: An available wireless network is found. Double-click the icon to display the Available Networks window, select the network, and click the Configure button. Yellow icon. Authentication failed. Not able to authenticate with wireless network. Green icon with a yellow warning triangle. Connected to a wireless network: Connected to a wireless network. Tool tip display network name, speed, and signal quality. Green icon with waves that reflect signal quality. More waves mean better signal quality. NOTE: If you are using Windows XP as your wireless manager, the task tray icon is white, and it will not reflect connection status. You can still click it to display the task tray menu. Tool Tips and Balloon Message Prompts The Tool Tips and Balloon message prompts provide feedback and interaction for your wireless adapter. To display Tool tips move your mouse pointer over the icon. Balloon message prompts will be displayed when your wireless network changes state. For instance if you are out of range of any wireless networks, when you come in range a balloon prompt will be displayed. Balloon prompts can be enabled or disabled in the Application Settings. Tool Tips Tool tips display when the mouse pointer rolls over the icon. The tool tips display text for each of the connection states. For example when you are connected to a wireless network, the text shown below will be displayed in the tool tip: Tool Tip Description Tool Tip Description file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (31 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Wireless Network Name: Intel Speed: 54Mbps Signal Quality: Excellent Balloon Prompts When user action is required, a balloon message prompt is displayed. If you click the prompt, an appropriate action is taken. For example, when wireless networks are found, the following balloon prompt appears: Balloon Prompt description Balloon Prompt Description Wireless Network found. Click to connect to a wireless network. Launching Intel PROSet/Wireless from the Task Tray To launch Intel PROSet/Wireless, use one of the following options: ● ● Click the task tray icon located in the lower right corner of your Windows desktop. Right-click the task tray icon and then click Open Intel PROSet/Wireless. Administrator Tool The Administrator Tool is used for administrators or the person who has administrator privileges on this computer. This tool is used to configure shared (common) profiles. This tool also allows the administrator to restrict what level of control the users of this computer have over their wireless connections. Users cannot modify administrator settings or profiles unless they have the password for this tool. A password should be chosen that is secure. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (32 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide You can export these settings and profiles as one package to other computers on your network. Name Administrator Settings Administrator Profiles Description Settings button: Set the user's control over their wireless network connections. Options button: Enable or disable Persistent and Pre-Logon profiles on the computer. Persistent Connection: A Persistent profile is active during boot time and when no user is logged onto the computer. Pre-Logon/Common Connection: A Pre-Logon profile is active once a user logs onto the computer. When Single Sign On support is installed, this type of profile uses your Windows logon user name and password. Prelogon/Common are placed at the top of the Profiles list. Because these profiles are at the top of the list, when available they are connected first. Disable Intel Profile Switching. Users will only be able to connect with the first Pre-Logon/Common profile: Disable Profile Switching only applies to Pre-logon profiles. Add: Launches the Profile Wizard to create a profile. Remove: Removes a selected profile from the profiles list. Change Password Export Close Help? Properties: Allows users to edit the selected profile contents. Allows users to change the Administrator Tool password. Allows users to export settings and profiles as one package to other computers on the network. Closes the window. Displays the help for this window. Administrator Export Preferences file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (33 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Use the Administrator Settings and Profiles options to configure shared profiles for exporting. Exported profiles can be pushed to any Intel PROSet/Wireless user’s 'auto import' folder. IT Export Preferences window Name Export Administrator Preferences Description Step 1: Select one or both types you want to export: ● ● Administrator Settings: Export all settings. These include control of Cache Credentials and or XP Co-existence options. Administrator Profiles: Export all the Persistent and Pre-Logon/Common Profiles. Step 2: Select the destination file: ● Browse button: Select the profile destination path and directory. The export destination file has an .sso extension. The directory path appears in the destination directory window. Step 3: Export the selected preferences: ● Close Help? Export button: Start exporting your profiles to the assigned destination folder. Closes the window. Displays the help for this window. Administrator Profile Options These settings provide advanced profile connection options and allow the administrator to enable or disable Persistent and or Pre-Logon/Common profiles on the computer. Name Persistent Connection Description A Persistent profile is active during boot time and when no user is logged onto the computer. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (34 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Pre-Logon/Common Connection OK Cancel Help? A Pre-Logon/Common profile is active once a user logs onto the computer. These profiles appear at the top of a user's profiles list. They cannot be modified by the user without a password. Users can still prioritize the profiles they have created but they cannot re-prioritize Pre-logon/Common Profiles. Since these profiles appear at the top of the profile list, Intel PROSet/Wireless automatically attempts to connect to the Administrator profiles first before any user-created profiles. Saves settings and close the window. Cancels settings and close the window. Displays the help for this window. Administrator Settings Window These settings allow the administrator to control how users of this computer use their wireless connection. Name Description Cache Credentials Cache the user credentials during a user session: ● ● Click checkbox: Cache user credentials in memory so that you are only prompted the first time before connection instead of each time you connect or disconnect to the network during the Windows log on session. Clear checkbox: Prompt for credentials each time wireless connectivity (authentication, re-authentication) is established using 802.1x profiles with either the Use Windows Logon credentials or the Prompt for Credentials on Connection option. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (35 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide XP Co-existence Allow the user to enable XP Zero Configuration: ❍ Click checkbox: Displays a prompt, Windows XP is managing your profiles, indicating that Windows XP Zero Configuration is enabled and is managing your wireless adapter. You are prompted to answer the following question: Do you wish to disable Windows XP management and let Intel® PROSet manage your wireless network? ❍ ❍ ● OK Cancel Help? Select Yes, if you want Intel® PROSet/ Wireless to manage your wireless adapter. Select No, if you want Windows XP to manage your wireless adapter. Clear checkbox: If the box is cleared, when Intel® PROSet/Wireless launches, you are not be notified in the event that Windows XP Zero Configuration wireless manager is enabled. Saves settings and close the window. Cancels settings and close the window. Displays the help information for this window. Creating Administrator Profiles with the Administrator Tool Administrator Profiles are created using the Administrator Tool. User profiles are created from the Intel® PROSet/Wireless main window. Administrator Profiles are user-based or shared profiles owned and managed by the network administrator or the administrator of this computer. These profiles are common/shared by all users on this computer. However, end users cannot modify these profiles; they can only be modified using the Administrator Tool, which is password protected. There are two types of Administrator profiles: Persistent and Pre-logon/Common. Administrator Profiles are: ● Persistent Connection: This profile is applied at boot time or whenever no one is logged on to the computer. A Persistent profile maintains a wireless connection either file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (36 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide ● until the computer is turned off or a different user logs on. Pre-Logon Common Connection: This profile is applied when a user logs on. If Single Sign On support is installed, the connection is made as part of the Windows logon sequence (pre-logon). If Single Sign On support is not installed on the computer, the profile is applied when the user session becomes active. Pre-logon/common profiles always appear at the top of the user's Profiles list. Users can still prioritize their profiles (the ones they created), but they cannot change the priority of Prelogon/Common Profiles. Because pre-logon/common profiles appears at the top of the Profiles list, Intel® PROSet/Wireless automatically attempts to connect to the Administrator-created profiles before any user-created profiles. Pre-Logon Connection Status Window When the Single Sign On component is installed, the user has Pre-logon support. During the Windows log-on sequence, a Pre-logon Status window opens. This window displays the progress of the network connection. After the wireless adapter is associated with the network access point, the Status window closes. 1. After a system restart or power-up, the Windows Log On window opens, prompting you to enter your Windows Log On domain, user name, and password. 2. Click OK. The PreLogon profile Status window displays the progress of the network connection. After the wireless adapter is associated with the network access point, the status window closes and the Windows user log on window is displayed. Single Sign On and Windows XP Welcome Screen and Fast User Switching The Fast User Switching and the Windows XP Welcome Screen are disabled when Single Sign On support is installed. Single Sign On is targeted to the environment where users log on to their computer with a user name, password, and typically a domain. Fast User Switching does not support domain log on. NOTE: Windows Fast User Switching is enabled by default is you are using Windows XP Home Edition. It is targeted for the home user. Fast User Switching is also available on Windows XP Professional if you install it on a stand-along or workgroup-connected computer. If a computer running Windows XP Professional is added to a domain, then the Fast User Switching option is not available. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (37 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide Modifying and Uninstalling the Software The Single Sign On Pre-Logon Connection feature is not installed during the Typical installation process. To install this feature, use the Custom option during the installation process. Installing and Uninstalling the Single Sign On Feature The Single Sign On Pre-Logon Connect feature is not installed during the initial software installation process. This feature can be installed or uninstalled after Intel® PROSet/Wireless has been installed. To install the Single Sign On the Pre-Logon Connect feature after Intel® PROSet/Wireless has been installed: 1. Click Start àSettings àControl Panel àAdd or Remove Programs àIntel PROSet/Wireless. 2. Select Change/Remove. 3. On the Program Maintenance screen select Modify and then click Next. 4. Click Single Sign On. Select Install this feature and all subfeatures. Note: Windows XP Fast Switching and the Welcome screen are disabled when the Single Sign On feature options are installed. 5. Click Modify. After the software is installed on your computer, the component is listed as Installed. 6. Click OK. To remove the Single Sign On Pre-Logon Connect feature: 1. Click Start àSettings àControl Panel àAdd or Remove Programs àIntel PROSet/Wireless. 2. Select Change/Remove. 3. On the Program Maintenance screen select Modify and then click Next. 4. Click Pre-Logon connect subfeature of Single Sign On. Select Do not install this feature. A red X appears next to the option. 5. Click Modify. After the feature is uninstalled on your computer, the component is listed as Not Present. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (38 of 39) [7/2/2004 12:29:32 PM] Using the Intel(R) PROSet Wireless Utility: Intel(R) PRO/Wireless 2200BG Network Connection User's Guide 6. Click OK. Uninstalling Intel PROSet/Wireless The Intel PROSet/Wireless software can be uninstalled. To remove Intel PROSet/Wireless: 1. Click Start > Settings > Control Panel > Add or Remove Programs > Intel PROSet/Wireless. 2. Select Change/Remove. 3. Select Modify on the Program Maintenance screen 4. Click Next. 5. Click OK. After the software is uninstalled on your computer, the component is listed as Not Present. 6. Click OK. Windows XP Wireless Zero Configuration Feature The Windows XP Wireless Zero Configuration feature provides a built-in wireless configuration utility. This feature can be enabled and disabled in Windows XP or by clicking Use Microsoft Client on the Tools menu. If XP Zero Configuration is enabled the features in Intel® PROSet/Wireless are disabled. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilIntc.htm (39 of 39) [7/2/2004 12:29:32 PM] Profiles Back to Contents Using Intel® PROSet/Wireless Profiles What Is a Profile? Profile Types Administrator Profiles Profiles List Loading a Profile from the Task Tray Creating a New Profile Using the Profile Wizard Configuring Multiple Profiles Editing a Profile Adding WEP Encryption to a Profile Creating an Ad Hoc Connection with an Existing Profile Deleting a Profile Setting a Profile Password Importing and Exporting Profiles Automatic Profile Distribution Connecting to a Network without a Profile Connecting to a Network with a Blank SSID Profile Connection Preferences What Is a Profile? A profile is a saved group of network settings. Profiles are useful when moving from one wireless network to another. Different profiles can be configured for each wireless network. Profile settings must include the network name (SSID), operating mode, and security settings. From the Intel PROSet/Wireless main window, you can add, edit, and remove profiles. A profile is created when you connect to a wireless network. When you select a network from the Available networks list and click Configure, the Profile Wizard is launched. The Profile Wizard guides you through the settings required to connect to a wireless network. When the profile is complete, you can save it, and it is added to the Intel PROSet/Wireless main window Profiles list. Because these are saved settings, the next time you are in range of this wireless network, you are automatically connected. For more information, refer to Profile Wizard Overview. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (1 of 21) [7/2/2004 12:29:37 PM] Profiles Profile Types There are two types of profiles that can be used to connect to a wireless network. The profile types are: ● ● User Profiles: These profiles are created by the user. If there is more than one user on a computer network, the other users will need to create their own profiles. User-created wireless profiles are not accessible by other network users. Administrator Profiles: If one or more profiles need to be shared among users on a network, you need to install the Administrator Tool and create Administrator profiles. For more information, refer to Administrator Profiles. Administrator Profiles Administrator Profiles are created using the Administrator Tool. User profiles are created from the Intel PROSet/Wireless main window. Administrator Profiles are user-based or shared profiles owned and managed by the network administrator or the administrator of this computer. These profiles are common/shared by all users on this computer. However, end users cannot modify these profiles; they can only be modified using the Administrator Tool, which is password protected. There are two types of Administrator profiles: Persistent and Pre-logon/Common. Administrator Profiles are: ● ● Persistent Connection: This profile is applied at boot time or whenever no one is logged on the computer. A Persistent profile maintains a wireless connection either until the computer is turned off or a different user logs on. Pre-Logon Common Connection: This profile is applied when a user logs on. If Single Sign On support is installed, the connection is made as part of the Windows log-on sequence (prelogon). If Single Sign On support is not installed on the computer, the profile is applied when the user session becomes active. Pre-logon/common profiles always appear at the top of the user's Profiles list. Users can still prioritize their profiles (the ones they created), but they cannot change the priority of Pre-logon/Common Profiles. Because pre-logon/common profiles appears at the top of the Profiles list, Intel PROSet/Wireless automatically attempts to connect to the Administrator profiles before any user-created profiles. For more information about these profiles, see Creating Administrator Profiles with the Administrator Tool. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (2 of 21) [7/2/2004 12:29:37 PM] Profiles Profiles List The Profiles list displays a list of existing profiles. When you are in range of a wireless network, Intel PROSet/Wireless scans the Profiles list to see if there is a match. If a match is found, you are automatically connected to the network. For more information, see Configuration Service. The priority order of the Profiles list is the same as the priority used by Intel PROSet/Wireless to find a match. The Profiles List, found on the Intel PROSet/Wireless main window: ● Use the up and down arrows to arrange profiles in a specific order to automatically connect to a wireless network. Profiles can be arranged in a specific order of connection: 1 is the highest priority. The Configuration Service also uses the profiles priority list to connect to wireless networks. The Profiles list displays the available user-based and shared profiles. User-based profiles can be arranged in order of network connection priority. Administrator (shared) profiles will always take precedence over user-based profiles. You can connect to one network, using the first profile in the Profiles list, and then automatically connect to another network using the next profile. This allows you to stay connected while roaming freely from one wireless network to another. Although you can assign multiple profiles to a single network, you can only use one profile per connection. To add a new profile, use the Profile Wizard sequence of windows to configure the profile contents. The following sections discuss how to set up and configure a profile to connect to a network. NOTE: Administrator (shared) Pre-Logon or Persistent profiles are displayed at the top of the Profiles list. These profiles have priority over user-based profiles. Shared profiles in the Profiles list cannot be modified only viewed. ● Use the Connect button to connect a profile to the selected wireless network. You can also add, edit, and remove profiles from the main window. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (3 of 21) [7/2/2004 12:29:37 PM] Profiles Profile Icons The network profile status icons indicate whether the adapter is associated with a network, the type of operating mode being used, and whether security encryption is enabled. These icons are shown next to the profile name in the profile list. Refer to Profiles for details. Connecting to a Profile When you are in range of a wireless network that has a matching profile, you will be automatically connected to that network. If a network with a lower priority profile is also in range, you can force the connection to that lower profile. This can be accomplished using Intel PROSet/Wireless or from the task tray icon. Manually connecting to a profile from Intel PROSet/Wireless 1. To open Intel PROSet/Wireless, double-click the task tray icon. 2. From the Profiles list, select an existing profile. 3. Click Connect. Remember: The connection will only be made if the wireless network is in range. Manually connecting to a profile from the task tray icon 1. Right-click the Intel PROSet/Wireless icon on the task tray. 2. Select Connect to Profile, and then click the desired profile. Loading a Profile from the Task Tray To load a profile from the Task Tray: 1. Right-click the Intel PROSet/Wireless connection icon in the task tray. 2. Make sure that the Intel PROSet/Wireless connection manager is selected (not Microsoft client). 3. Click Connect to Profile and select the profile to be launched. Profile Wizard Overview file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (4 of 21) [7/2/2004 12:29:37 PM] Profiles Use the Profile Wizard to create a network profile for connection to a specific wireless network. When the Intel Configuration Service detects an available network and the adapter is not associated with another wireless network, the Connect to wireless network window is displayed. From Intel PROSet/Wireless, select a network from the Available Networks list and click Configure. The Profile Wizard guides you through the wireless network configuration process. ● Security Detection: After you select a wireless network from the Available Networks list, the General Settings page opens to display the network name and operating mode for the selected network. The identified Wireless Network Name (SSID) cannot be modified, but you can change the Profile name. Click Next to display the second Profile wizard Security progress page. This starts the access point query process to determine the highest level of security required for the selected network. After the required security is determined, the Security settings page displays the required information that must be entered to connect to that particular network. For example, if an Infrastructure WEP network is selected, WEP encryption and key index information is displayed, but only the WEP Network Key needs to be entered. If you do not know the required network settings, contact your administrator. Profiles To add profiles or to edit an existing profile: ● ● Add (Create a new profile): Click Add to open the Profile wizard and create a new profile. In this mode all of the General and Security page settings are blank and require that you enter adapter and wireless network information. Before creating a new profile, contact your administrator for the required network settings, or have the necessary network information ready to enter. Properties (Edit a profile): Click Properties to open the Profile Wizard and edit the profile contents. The General Settings and Security Settings pages display all of the profile settings and parameters that can be modified. For more information, refer to Creating a New Profile Using Profile Wizard or Configuring Multiple Profiles Using Profile Wizard. Creating a New Profile Using the Profile Wizard The Profile Wizard allows you to create a new profile, configure the profile contents, and connect to a wireless network. If you select a network from the Available Networks list and click Configure, the Profile Wizard guides you through the necessary steps to create a profile and connect to the network. During this process, the Profile Wizard attempts to detect the appropriate security settings for you. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (5 of 21) [7/2/2004 12:29:37 PM] Profiles To create a new profile and connect to a wireless network: 1. From the Intel PROSet/Wireless main window, click Add. The Profile Wizard launches, and the General Settings window opens. 2. In the Profile Name text box, enter a profile name. 3. in the Wireless Network Name (SSID) text box, enter the Wireless Network Name. 4. Select the Operating Mode you want to use, Infrastructure or Ad Hoc. 5. For the following options, click Advanced: ● ● ● Password protect the profile: Select the Password protect this profile checkbox. Enter the password in the text box, and then re-enter it in the Confirm Password text box. Auto-Import: Allows automatic import of this profile. For network administrators only. Mandatory Access Point: Makes the wireless adapter associate with a specific access point. 6. To save your settings and return to the General Settings page, click OK. 7. Click Next. The Security Settings window opens. 8. Select the Network Authentication and Data Encryption options. Enter the encryption key settings and configure the 802.1x settings as required. Refer to security settings for more information. 9. When you complete the profile settings, click OK to return to the Intel PROSet/Wireless window. (To change or verify the profile settings, select the profile and click Properties.) 10. From the Profiles list, select the new profile name. 11. To connect to the wireless network, click Connect. The network name, transmit and receive speed, and signal quality are displayed. 12. To close the window, click Close. Configuring Multiple Profiles Using Profile Wizard Typically, one profile is assigned for a particular network connection. If there are multiple profiles assigned to one wireless network name (SSID), before connection to the network, Intel PROSet/Wireless configuration Service displays a window showing the multiple profile names for that particular network. One profile must be selected to connect to the network. To configure a profile to a network for which a wireless profile already exists. 1. Open the Intel PROSet/Wireless window. 2. From the Available Networks list, select the network to which you want to configure a profile: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (6 of 21) [7/2/2004 12:29:37 PM] Profiles 3. Click Configure. The connect or configure a New Profile window opens: 4. Click Configure. The Configure Wireless Settings window opens, indicating you need to designate settings for the new profile: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (7 of 21) [7/2/2004 12:29:37 PM] Profiles 5. Click Next. The General Settings window opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (8 of 21) [7/2/2004 12:29:37 PM] Profiles 6. In the Profile Name text box, enter a name for the profile and then click Next. The Security Settings window opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (9 of 21) [7/2/2004 12:29:37 PM] Profiles 7. Enter the Wireless Security Password (WEP Key) and click Next. 8. When the next window opens, showing you are done, click OK. You are returned to the Intel PROSet/Wireless main window. NOTE: If the Network requires a password, a password window will open, prompting you to enter the password. General Settings Window The General Settings window is the first page in the Profile Wizard. From this page you can specify the profile name, the wireless network name (SSID) and choose the operating mode. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (10 of 21) [7/2/2004 12:29:37 PM] Profiles While configuring the profile, you can use the left pane to navigate to the General and Security Settings pages. The Back and Next button located at the bottom of the Profile Wizard can also be used for the same functions. General Settings window description Name Profile Name Wireless Network Name (SSID) Description Name of the wireless network profile. Examples: My Office Network, Bob's Home Network, ABC Company Network, etc. Name of the wireless network access point used by the wireless adapter for connection. The SSID must match exactly the name of the wireless access point. It is case sensitive. When you are configuring a wireless network that was selected from the Available Networks list, the SSID is taken from the available network list. You cannot and should not change it. Operating Mode Advanced Blank SSID: If the wireless adapter receives a blank network name (SSID) from a stealth access point, is displayed in the available networks list. Provide the actual SSID for the access point. After connection both the blank SSID and the associated SSID can be viewed in the available networks list. Network (Infrastructure): Connect to an access point. An infrastructure network consists of one or more access points and one or more computers with wireless adapters. This connection is the type used in home networks, corporate networks, hotels and others to provide access to the network and/or the internet. Device to device (Ad hoc): Connect directly to other computers in an ad hoc wireless network. This type of connection is useful for connections between 2 or more computers only. It will not provide access to network resources or the Internet. Advanced Settings allows you to set a profile password, specify a certain access point address for adapter connection (Mandatory AP), or allow the profile to be AutoImported on another computer. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (11 of 21) [7/2/2004 12:29:37 PM] Profiles Administrator Profiles If you are creating or editing an Administrator profile from the Administrator Tool you have the following options: Persistent Connection: This is active when no user is logged on. It is used to maintain a wireless connection when no users are logged on. Pre-Logon/Common: This is active when a user is logged on. This profile is shared by all users. It is useful when you want all users of a computer to use a specific profile. This profile appears at the top of the profile list in PROSet/Wireless. Users cannot edit/modify Administrator profiles. They can only be edited from the Administrator Tool. NOTE: The Administrator Tool is only available if it has been installed. Next Cancel Help? Opens Security Settings page. Closes the Profile Wizard and cancels any changes. Displays the help for this window. Security Settings Window From the Security Settings page you can enter the required security settings for the selected wireless network. NOTE: The options displayed are dependent on the Operating Mode selected on the General Settings page. Security Settings Description Name Network Authentication Setting Open Shared WPA-Enterprise WPA2-Enterprise WPA-Personal WPA2-Personal file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (12 of 21) [7/2/2004 12:29:37 PM] Profiles Data Encryption None WEP CKIP TKIP AES-CCMP Enable 802.1x (Authentication Type) MD5 EAP-SIM TLS TTLS PEAP LEAP EAP-FAST Cisco Options Click to view the Cisco Compatible Extensions Options window. NOTE: Cisco Compatible Extensions are automatically enabled for CKIP, LEAP and EAPFAST profiles. Back Next View the prior page in the Profile Wizard. View the next page in the Profile Wizard. If more security information is required then the next Step of the Security page is displayed. Close the Profile Wizard and save the profile. Close the Profile Wizard and cancel any changes made. Displays the help information for the current page. OK Cancel Help? Advanced Settings Description From this window you can password protect a profile, enable the Auto-Import feature, and select a specific access point on a network to connect to. Use the Advanced button on the General Settings page to access this window. Advanced Settings Description Name Description file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (13 of 21) [7/2/2004 12:29:37 PM] Profiles Password Protection Auto-Import Mandatory Access Point Password: Password can be up to 10 characters. The entered password characters display as asterisks. Confirm New Password: Type the same password as entered in the Password field. Enable Auto-Import: Check to allow the profile to be imported and exported to other computers. This option allows a network administrator to distribute this profile automatically to computers connected to a network. Refer to Automatic File Distribution for more information. Mandatory Access Point: Forces the wireless adapter to connect to an access point using a specific MAC address. Type the MAC address of the access point (BSSID) 48-bit 12 hexadecimal digits, e.g., 00:06:25:0E:9D:84. This feature is not available when using ad hoc operating mode. OK Cancel Clear button: Clear current address. Close the window and save the settings. Close the window and cancel any changes. Help? Displays the help information for this window. Editing a Profile To edit an existing profile: 1. 2. 3. 4. ● ● From the Profiles list, select the profile you want to edit. Click Properties. The General Settings window opens. In the left pane of the General Settings window, click General Settings or Security Settings. Edit the settings are required: General Settings: Refer to General Settings for more information. Security Settings: Refer to Security Settings for more information. 5. When you finish editing the settings, click OK to return to the main window. 6. From the Profile list, select the edited profile name and click Connect. The connection status, network name, transmit and receive speed, and signal quality are displayed. Adding WEP Encryption to a Profile file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (14 of 21) [7/2/2004 12:29:37 PM] Profiles NOTE: Before starting, you must obtain a user name and password on the RADIUS server from your system administrator.rator. To add WEP with no authentication to a new profile: 1. From Intel PROSet/Wireless window, click click Properties from the Profile list. The General Settings window opens. 2. Click Next (or select Security Settings from the left pane). The Security Settings window opens. 3. For the Network Authentication, select Open (recommended). 4. For Data Encryption, select WEP. 5. For the Encryption Level, select either 64-bit or 128-bit. 6. Select the key index 1, 2, 3, or 4 (1 is the default setting). When using the WEP key index, each wireless station must use the same key index number to access the wireless network. 7. In the Wireless Security Password (WEP Key) text box, enter the Wireless Security Password (WEP Key): ● ● 64-bit: Enter a text phrase, up to 5 alphanumeric characters (0-9, a-z, or A-Z), in the pass phrase field or enter a hexadecimal value up to 10 alphanumeric characters (0-9, A-F) in the Network Key field. 128-bit: Enter a text phrase, up to 13 alphanumeric characters (0-9, a-z, or A-Z), or enter a hexadecimal value up to 26 alphanumeric characters (0-9, A-F) in the Network key field. 8. To save the profile settings, click OK. Creating an Ad Hoc Connection with an Existing Profile To create an ad hoc connection: 1. From the Intel PROSet/Wireless main window, select the profile you want from the profile list and click Properties. 2. When the General Settings window opens, click Device to device (Ad hoc) - connect directly to other computers. 3. Click Next. 4. For Data Encryption, select WEP. 5. For the Encryption Level, select 64- or 128-bit. The 128-bit level offers stronger encryption. 6. For the Key Index, select 1. When using WEP Key Index, each wireless station must use the same key index number to access the wireless network. 7. Enter the Wireless Security Password (WEP Key): ● 64-bit: Enter a text phrase, up to 5 alphanumeric characters (0-9, a-z, or A-Z), in the pass phrase field or enter a hexadecimal value up to 10 alphanumeric characters (0-9, A-F) in the file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (15 of 21) [7/2/2004 12:29:37 PM] Profiles ● Network Key field. 128-bit: Enter a text phrase, up to 13 alphanumeric characters (0-9, a-z, or A-Z), or enter a hexadecimal value up to 26 alphanumeric characters (0-9, A-F) in the Network key field. 7. To save the profile settings, click OK. Deleting a Profile To delete a profile: 1. Open the Intel ProSet/Wireless window. 2. From the Profiles List, click the profile to be deleted and click Remove. 3. When prompted to be sure you want to permanently delete the profile, click Yes. NOTE: You cannot delete all profiles from the Profiles List. There must always be one profile displayed in the list. If you are a restricted user the Delete button is disabled if you select a Common profile. Common profiles can only be edited and deleted if you have administrator privileges. Setting a Profile Password To password protect an existing profile: 1. From the Intel PROSet/Wireless main window, select a profile from the Profiles list and then click Properties. The General Settings page opens. 2. Click the Advanced button. 3. Click Password protect this profile. 4. In the Password text box, type a password. 5. In the Confirm Password text box, re-type the password. 6. To save the setting and return to the General Settings page, click OK. 7. On the General Settings page, click OK. 8. To close the main window, click Close. Connecting to a Network without a Profile To connect to an available network without a profile using Windows: 1. Right-click the wireless client icon on the task tray and click Open Microsoft client. 2. Under Available Networks, click View Wireless Networks. A list of available networks file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (16 of 21) [7/2/2004 12:29:37 PM] Profiles opens. 3. Select the network you want and click Connect. When you open the Microsoft client, the network you selected will appear in the Preferred Networks list. 4. To check the connection status, right-click the Wireless Network icon on the task tray. To connect to an available network without a profile using Intel PROSet/Wireless: 1. 2. 3. 4. Open the Intel PROSet/Wireless window. Under Available Networks, select the network you want to connect to. Click Configure. A connection window opens. Select Connect one time and click OK. The Wireless connection icon on the task tray indicates that you are now connected to the selected network. Connecting to a Network with a Blank SSID If the wireless adapter receives a blank network name (SSID) from a stealth access point, is displayed in the available networks list. To associate with a stealth access point, a new profile must first be created before connection. After connection both the blank SSID and the associated SSID can be viewed in the available networks list. To connect to an access point that transmits a blank network name (SSID) in the Available Networks list: 1. On the Intel PROSet/Wireless window, click the Refresh button. 2. Select the network name with a blank SSID and shown in the Available Networks list. 3. Click Configure. 4. The Profile Wizard window opens. Enter a profile name and Network Name (SSID) and security settings if required. 5. Click Next until settings are complete. 6. To save the profile settings and return to the Wireless Networks tab, click OK. 7. Select the new profile from the Profiles List and click Connect. Profile Connection Preferences To access the profile connection preference option: 1. From the Intel PROSet/Wireless main window, click Application Settings on the Tools menu. 2. Under Auto Connect, select one of the following options: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (17 of 21) [7/2/2004 12:29:37 PM] Profiles ● ● ● Connect to available network using profiles only: (Default setting) Use the profiles in the Profiles List to connect to any available network. Connect to any available network without using a profile from the Profile List. Connect to any network based on profiles only (Cisco mode): Tries every profile in preferred order. This assumes the user knows they are in the vicinity of an access point which has more than one SSID. It advertises only one wireless profile which allows you to get connected easily to a network. 4. To save the setting, click OK. 5. To close the main window, click Close. Importing and Exporting Profiles (Profiles menu) You can import and export user-based profiles to and from the Profiles list. Wireless profiles can be automatically imported into the Profiles list. This is accomplished by Intel PROSet/Wireless monitoring the import folder on your hard disk for new profiles. Only profiles that have been enabled (Enable Auto-Import) on the Profiles Import/Export window can be automatically imported. If a profile of the same name already exists in the Profiles list, a window prompts you to reject or accept the imported profile. If you accept it, the existing profile is replaced. All imported user-based profiles are placed at the bottom of the Profiles list, and it is immediately deleted from the import folder on your hard disk after import, whether the import was successful or not. For more information, refer to Automatic Profile Distribution. NOTE: A password protected profile can be imported and exported; however, before editing the profile, the password must be entered. Refer to Setting a Profile Password for more information. To export Administrator profiles, refer to Administrator Export Properties for more information. Import/Export Window Description Name Description file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (18 of 21) [7/2/2004 12:29:37 PM] Profiles Export profiles Select the profiles you want to export: Select individual or multiple profiles from the list. The profile mode icon indicates either infrastructure or ad hoc mode is being used and whether security is being used. Browse: Browse your hard disk for the destination directory. The directory path is shown in the destination directory window. Import profiles Export: Start exporting profiles. Imports profiles in to the Profiles list. OK Cancel Help? Import: Browse your hard disk for files to import. Saves settings and returns to the previous window. Closes the window and cancels any changes. Displays help information for this window. To import profiles: 1. 2. 3. 4. Open the Intel PROSet/Wireless window. On the menu bar, point to Profiles and then click Import/Export. When the Import/Export Profiles window opens, click Import. Select the profile you want to import and click Import. (The profiles extension is either .profiles or .p50. The profiles to import can be located in any directory you choose on your computer.) 5. When the Import Successful window appears, click OK. 6. To return to the main window, click Close. To export profiles: 1. Open the Intel PROSet/Wireless window. 2. On the menu bar, point to Profiles and then click Import/Export. 3. When the Import/Export Profiles window opens, select the profile you want to export from the Profiles list. 4. To select the destination folder, click Browse. 5. Select the destination folder and click Open. 6. Click Export. 7. When the Export Successful window appears, click OK. 8. To return to the main window, click Close. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (19 of 21) [7/2/2004 12:29:37 PM] Profiles Automatic Profile Distribution The Enable Auto-Import feature allows a network administrator to distribute profiles automatically to computers connected to a network. The Enable Auto-Import option is located on the Advanced Settings window. Use the Advanced button on the General settings page to access the Advanced Settings. Importing Profiles To distribute a profile automatically, the Enable Auto-Import must be selected, and then the profile can be copied to a specific directory on the host computer. From there it can be distributed to multiple computers. Once the profile is received by the remote computer it will automatically be available for use on the Profiles list. If a profile is password protected when sent, the user will be prompted for the password before the profile can be used. Automatically importing wireless network profiles is accomplished by monitoring the import folder on your hard disk for new profile files. Only profiles that have the Enable Auto-Import box checked on the Profile Wizard Advanced page window can be automatically imported. If a profile of the same name already exists in the Profiles List, a window is displayed from which you can either reject the import, or accept in which case the existing profile will be replaced. All imported profiles will be placed at the bottom of the Profiles List, and the profile file will be immediately deleted from the import folder on your hard disk after the import whether the import was successful or not. To import a profile into the Profiles List: Step 1: Enable the enable Auto-Import feature: a. From the Intel PROSet/Wireless window, select a profile to be edited from the Profiles List in the Networks page, and click Properties (or click Add to create a new profile using the Profile Wizard). The General Settings window opens. b. Click Advanced. The Advanced Settings window opens. c. Click the Enable Auto-Import check box. d. To save the setting and close the window, click OK (Edit a profile) or Finish (Add a profile). You are returned to the General Settings window. e. Click OK. You are returned to the Intel PROSet/Wireless main window. Step 2: Export the profile from the Profiles list to a folder on your hard disk. Refer to Importing and Exporting Profiles for details. Step 3: Copy the exported profile (.50/.profile extension) from its folder to the directory: Program Files\Intel\Wireless\AutoImport. The profile is now ready to distribute to other computers. Step 4: Using a network copy utility such as SMS, you can distribute the profiles to each of file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (20 of 21) [7/2/2004 12:29:37 PM] Profiles the remote computers on the network. The profiles much be copied into the following directory on the remote computer: Program files/Intel\Wireless\AutoImport. The profile is displayed in the Profiles list of the remote computer. NOTE: If a profile is sent with password protection, the user is prompted for the password before the profile can be used. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Profiles.htm (21 of 21) [7/2/2004 12:29:37 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents Security Overview WEP encryption 802.1x Authentication WPA/WPA2 Cisco Features This section describes the types of security used in connecting to wireless networks. WEP encryption Using IEEE 802.11 Wired Equivalent Privacy (WEP) encryption can prevent unauthorized reception of wireless data. WEP encryption provides two levels of security, using a 64-bit key (sometimes referred to as 40-bit) or a 128-bit key (also known as 104bit). For better security, use a 128-bit key. If you use encryption, all wireless devices on your wireless network must use the same encryption keys. WEP encryption and shared authentication provides protection for your data on the network. WEP uses an encryption key to encrypt data before transmitting it. Only computers using the same encryption key can access the network or decrypt the encrypted data transmitted by other computers. Authentication provides an additional validation process from the adapter to the access point. The WEP encryption algorithm is vulnerable to passive and active network attacks. TKIP and CKIP algorithms include enhancements to the WEP protocol that mitigate existing network attacks and address its shortcomings Open and Shared Key authentication The 802.11 authentication supports two types of network authentication methods: Open System and Shared Key. ● Using Open authentication, any wireless station can request authentication. The station that needs to authenticate with another wireless station sends an file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (1 of 7) [7/2/2004 12:29:43 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide ● authentication management frame that contains the identity of the sending station. The receiving station, or Access Point, grants any request for authentication. Open authentication allows any device network access. If no encryption is enabled on the network, any device that knows the SSID of the access point can gain access to the network. Using Shared Key authentication, each wireless station is assumed to have received a secret shared key over a secure channel that is independent from the 802.11 wireless network communications channel. Shared key authentication requires that the client configure a static WEP key. The client access is granted only if it passes a challenge-based authentication. 802.1x Authentication The 802.1x authentication is independent of the 802.11 authentication process. The 802.1x standard provides a framework for various authentication and key-management protocols. There are different 802.1x authentication types, each providing a different approach to authentication but all employing the same 802.1x protocol and framework for communication between a client and an access point. In most protocols, upon the completion of the 802.1x authentication process, the supplicant receives a key that it uses for data encryption. Refer to How 802.1x authentication works for more information. With 802.1x authentication, an authentication method is used between the client and a Remote Authentication Dial-In User Service (RADIUS) server connected to the access point. The authentication process uses credentials, such as a user's password that are not transmitted over the wireless network. Most 802.1x types support dynamic per-user, per-session keys to strengthen the static key security. 802.1x benefits from the use of an existing authentication protocol known as the Extensible Authentication Protocol (EAP). The 802.1x authentication for wireless LANs has three main components: The authenticator (the access point), the supplicant (the client software), and the authentication server (a Remote Authentication Dial-In User Service [RADIUS] server). The 802.1x authentication security initiates an authorization request from the wireless client to the access point, which authenticates the client to an Extensible Authentication Protocol (EAP) compliant RADIUS server. This RADIUS server may authenticate either the user (via passwords or certificates) or the system (by MAC address). In theory, the wireless client is not allowed to join the network until the transaction is complete. There are several authentication algorithms used for 802.1x. Some examples are; MD5Challenge, EAP-TLS, EAP-TTLS, Protected EAP (PEAP), and EAP Cisco Wireless Light file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (2 of 7) [7/2/2004 12:29:43 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Extensible Authentication Protocol (LEAP). These are all methods for the wireless client to identify itself to the RADIUS server. With RADIUS authentication, user identities are checked against databases. RADIUS constitutes a set of standards addressing Authentication, Authorization and Accounting (AAA). Radius includes a proxy process to validate clients in a multi-server environment. The IEEE 802.1x standard is for controlling and authenticating access to port-based 802.11 wireless and wired Ethernet networks. Port-based network access control is similar to a switched local area network (LAN) infrastructure that authenticates devices that are attached to a LAN port and prevent access to that port if the authentication process fails. What is a RADIUS? RADIUS is the Remote Access Dial-In User Service, an Authorization, Authentication, and Accounting (AAA) client-server protocol, which is used when a AAA dial-up client logs in or out of a Network Access Server. Typically, a RADIUS server is used by Internet Service Providers (ISP) to perform AAA tasks. AAA phases are described as follows: ● ● ● Authentication phase: Verifies a user name and password against a local database. After the credentials are verified, the authorization process begins. Authorization phase: Determines whether a request is allowed access to a resource. An IP address is assigned for the Dial-Up client. Accounting phase: Collects information on resource usage for the purpose of trend analysis, auditing, session time billing, or cost allocation. How 802.1x authentication works A simplified description of the 802.1x authentication is: 1. A client sends a "request to access" message to an access point. The access point requests the identity of the client. 2. The client replies with its identity packet which is passed along to the authentication server. 3. The authentication server sends an "accept" packet to the access point. 4. The access point places the client port in the authorized state and data traffic is allowed to proceed. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (3 of 7) [7/2/2004 12:29:43 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 802.1x features ● ● ● ● ● ● ● ● ● ● ● 802.1x supplicant protocol support Support for the Extensible Authentication Protocol (EAP) - RFC 2284 Supported Authentication Methods: MD5 - RFC 2284 EAP TLS Authentication Protocol - RFC 2716 and RFC 2246 EAP Tunneled TLS (TTLS) Cisco LEAP EAP-FAST EAP-SIM PEAP Supports Windows XP, 2000 WPA and WPS2 Wi-Fi Protected Access (WPA) is a security enhancement that strongly increases the level of data protection and access control to a wireless network. WPA enforces 802.1x authentication and key-exchange and only works with dynamic encryption keys. To strengthen data encryption, WPA utilizes its Temporal Key Integrity Protocol (TKIP). TKIP provides important data encryption enhancements that include a per-packet keymixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and also a re-keying mechanism. Using these improvement enhancements, TKIP protects against WEP's known weaknesses. The second generation of WPA that complies with the IEEE TGi specification is known as WPA2. WPA-Enterprise and WPA2- Enterprise: Provides this level of security on enterprise networks with a 802.1x RADIUS server. An Authentication Type is selected to match the authentication protocol of the 802.1x server. WPA-Personal and WPA2-Personal: Provides this level of security in the small network or home environment. It uses a password also called a pre-shared key (PSK). The longer this password the stronger the security of the wireless network. If your Wireless Access Point or Router supports WPA/WPA2 Personal, then you should enable it on the access point and provide a long, strong password. The same password entered into access point needs to be used on this computer and all other wireless devices that access the file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (4 of 7) [7/2/2004 12:29:43 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide wireless network. Cisco Features Cisco LEAP Cisco LEAP (Cisco Light EAP) is a server and client 802.1x authentication via a usersupplied logon password. When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access Control Server (ACS) server), Cisco LEAP provides access control through mutual authentication between client wireless adapters and the wireless network and provides dynamic, individual user encryption keys to help protect the privacy of transmitted data. Fast Roaming (CCKM) When a wireless LAN is configured for fast reconnection, a LEAP enabled client device can roam from one access point to another without involving the main server. Using Cisco Centralized Key Management (CCKM), an access point configured to provide Wireless Domain Services (WDS) takes the place of the RADIUS server and authenticates the client without perceptible delay in voice or other time-sensitive applications. CKIP Cisco Key Integrity Protocol (CKIP) is Cisco proprietary security protocol for encryption in 802.11 media. CKIP uses the following features to improve 802.11 security in infrastructure mode: ● ● ● Key Permutation (KP) Message Integrity Check (MIC) Message Sequence Number EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that EAP-FAST does not use certificates to authenticate. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (5 of 7) [7/2/2004 12:29:43 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Provisioning in EAP-FAST is negotiated solely by the client as the first communication exchange when EAP-FAST is requested from the server. If the client does not have a pre-shared secret Protected Access Credential (PAC), it can request to initiate a provisioning EAP-FAST exchange to dynamically obtain one from the server. EAP-FAST documents two methods to deliver the PAC: manual delivery through an outof-band secure mechanism, and automatic provisioning. ● ● Manual delivery mechanisms can be any delivery mechanism that the administrator of the network feels is sufficiently secure for their network. Automatic provisioning establishes an encrypted tunnel to protect the authentication of the client and the delivery of the PAC to the client. This mechanism, while not as secure as a manual method may be, is more secure than the authentication method used in LEAP. The EAP-FAST method can be divided into two parts: provisioning, and authentication. The provisioning phase involves the initial delivery of the PAC to the client. This phase only needs to be performed once per client and user. Mixed Cells Mode Some access points, for example Cisco 350 or Cisco 1200, support environments in which not all client stations support WEP encryption, this is called Mixed-Cell Mode. When these wireless networks operate in “optional encryption” mode, client stations that join in WEP mode send all messages encrypted, and stations that join in using standard mode send all messages unencrypted. These APs broadcast that the network is not using encryption, but allow clients to join using WEP mode. When “Mixed-Cell” is enabled in a profile, it allows you to connect to access points that are configured for “optional encryption.” Radio Management When this feature is enabled your wireless adapter provides radio management information to the Cisco infrastructure. If the Cisco Radio Management utility is used in the infrastructure, it configures radio parameters, detects interference and rogue access points. Back to Top file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (6 of 7) [7/2/2004 12:29:43 PM] Making a Basic Network Connection in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/Security_Overview.htm (7 of 7) [7/2/2004 12:29:43 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents Configuring Advanced Network Security Settings in Windows XP: Intel® PROSet/Wireless 2915ABG Network Connection User's Guide Configuring an Ad Hoc Network with No Security Configuring an Ad Hoc Network with WEP Security Configuring a WPA-PSK Client with AES or TKIP Encryption Configuring a WPA-PSK Client with AES or TKIP Encryption and TLS or TTLS Authentication Configuring a WPA Client with AES or TKIP Encryption and PEAP Authentication Configuring a Client for TLS/TTLS Authentication If you are using Windows 2000, click Configuring Advanced Network Security Settings in Windows 2000 for instructions on how to configure advanced security settings for your wireless adapter. This section contains instructions about how to configure advanced security settings for your wireless adapter. This requires information about advanced security settings on your access point (for home users) or from a system administrator (corporate environment). Refer to Making a Basic Network Connection in Windows XP for basic setup instructions. NOTE: If you cannot view your network in the list of Available Networks, it may be because your network does not broadcast or is in silent mode. Click Add and enter the name of the SSID of the network you are trying to associate with to add it to the list of Preferred Networks. For further configuration, select the added network and click Configure to edit security settings. Refer to the Troubleshooting section for further instructions on how to configure networks with silent SSID’s. If you are using Windows XP (Service Pack 2) Category View some of the windows shown in the following examples may appear different from those on your screen. To switch from Category View to Classic view, click Start àControl Panel and on the navigation bar click Switch to Classic View. Configuring an Ad hoc Network with No Security In peer-to-peer (ad hoc) mode, you can send and receive information to other computers without using an access point. Each computer in a peer-to-peer network is called a peer. Creating an ad hoc network requires more than one computer with a wireless adapter. All systems on the ad hoc network must be configured identically. You can use peer-to-peer mode to network computers in a home or small office, or to set up a temporary wireless network for a meeting. To configure an ad hoc network connection with no security: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (1 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 1. 2. 3. 4. Click Start àSettings àControl Panel and double-click Network Connections. Right-click Wireless Network Connection and click Properties. On the Wireless Network Connection Properties window, select the Wireless Networks tab. Verify that the Use Windows to configure my wireless network settings box is selected. If it is not, select it. The correct setting is shown in the following illustration: 5. Click Add. The Wireless Network Connection Properties window opens. NOTE: The names of wireless networks your computer can see are shown under Available Networks. The name of the network is usually shown here. 6. 7. 8. 9. In the Network name (SSID) text box, enter the name of the network you want to add. For Network Authentication, select Open (default setting). For Data encryption, select Disabled. Select the This is a computer-to-computer (ad hoc) network; wireless Access Points are not used checkbox. These settings are shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (2 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 10. Click OK. You are returned to the Wireless Network tab, and the new network name appears in the Preferred networks list. NOTE: Internet connection and firewall settings under Windows XP (Service Pack 2) may affect the ability to connect to an ad hoc network. Your network configuration is now complete. Continue to Viewing the Status of your Wireless Network Connection. Ad hoc connection options Name Network Authentication Description Open: No authentication used. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication. If no encryption is enabled on the network, any wireless device with the correct network name (SSID) can associate with the access point and gain access to the network. Shared: Shared authentication is accomplished with a pre-configured WEP key. Use this mode for 802.11 Authentication. This mode can work with any 802.1x authentication protocol and with the following data encryption options; None, WEP (64-bit, or 128-bit) or CKIP (64bit, or 128-bit). file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (3 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Data Encryption WPA-None: No authentication used on a Wi-Fi Protected Access (WPA) client. This works with TKIP and AES data encryption in an ad hoc connection. Disabled: No data encryption is used. WEP: WEP data encryption can be configured using 64-bit or 128-bit. WEP settings can be used with all Network Authentication protocols. Encryption Level Key Index Wireless Security Password (WEP Key) When WEP encryption is enabled on an access point, the WEP key provides a way to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point. 64-bit or 128-bit: 64-bit or 128-bit encryption. 1,2,3,4: Up to four passwords may be specified by changing the Key Index. Type the wireless network Password (WEP Key) in the text box. The Password is the same value used by the wireless access point or router. Contact your wireless network administrator for this password. Pass phrase (64-bit): Enter 5 ASCII characters (can use any characters, including spaces). Hex key (64-bit): Enter 10 alphanumeric hexadecimal characters, 09, A-F. Pass phrase (128-bit): Enter 13 ASCII characters (can use any characters, including spaces). Hex key (128-bit): Enter 26 alphanumeric hexadecimal characters, 09, A-F. Configuring an Ad hoc Network with WEP Security One configuration option for your ad hoc network is to set it up with no security (data encryption disabled), but this allows anyone to access your wireless network. Another option is to use WEP encryption. Using WEP encryption provides some level of security for your wireless network. To use configure your ad hoc network with WEP security: 1. Click Start àSettings àControl Panel and double-click Network Connections. 2. Right-click Wireless Network Connection and click Properties. The Wireless Network Connection Properties window opens. 3. On the Wireless Network Connection Properties window, click the Wireless Networks tab as shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (4 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 4. From the list of Preferred Networks, select the network and click Properties. The Network properties window opens. Note: Make sure that This is a computer-to-computer (ad hoc) network; wireless access points are not used is selected. 5. On the Association tab, from the Network Authentication drop-down menu, select Open. NOTE: Earlier versions of Windows XP software may not contain these drop-down menus. If you are using one of these earlier versions, click to select the Data encryption (WEP enabled) checkbox and continue with the next step. 6. From the Data Encryption drop-down menu, click WEP. These settings are shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (5 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide NOTE: If the wireless network does not require a network key (password), skip to step 10. 7. If you need to provide a network key, click to deselect The key is provided for me automatically. 8. In the Network key text box, type the WEP network key. Your Network key must exactly match the password (network key) used by other computers in the ad hoc network. Your Network key will be either 5 or 13 ASCII (text) characters, or 10 or 26 hexadecimal (0-9, A-F) characters. 9. In the Confirm network key text box, type this key again. 10. To save your settings, click OK. 11. To close the Wireless Network Connection Properties window, click OK. Your network configuration is now complete. For more information about the status of your connection, refer to Viewing the Status of your Wireless Network Connection. Ad hoc network connection using no network authentication (Open) with WEP data encryption Name Description Network Authentication Open: No authentication used. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication. If no encryption is enabled on the network, any wireless device with the correct network name (SSID) can associate with the access point and gain access to the network. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (6 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Data Encryption Encryption Level Key Index Wireless Security Password (WEP Key) WEP: WEP data encryption can be configured using 64-bit or 128-bit. WEP settings can be used with all Network Authentication protocols. When WEP encryption is enabled on an access point, the WEP key provides a way to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point. 64-bit or 128-bit: 64-bit or 128-bit encryption. 1,2,3,4: Up to four passwords may be specified by changing the Key Index. Type the wireless network Password (WEP Key) in the text box. The Password is the same value used by the wireless access point or router. Contact your wireless network administrator for this password. Pass phrase and hex key options are: Pass phrase (64-bit): Enter 5 ASCII characters (can use any characters, including spaces). Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F. Pass phrase (128-bit): Enter 13 ASCII characters (can include any characters, including spaces). Hex key (128-bit): Enter 26 alphanumeric hexadecimal characters, 09, A-F. Configuring a WPA-PSK Client with AES or TKIP Encryption This security level is available for Infrastructure networks. To configure a WPA-PSK client: Click Start àSettings àControl Panel and then double-click Network Connections. Right-click Wireless Network Connection and click Properties. On the Wireless Network Connection Properties window, select the Wireless Networks tab. Verify that the Use Windows to configure my wireless network settings box is selected. If it is not, select it. 5. From the Preferred Networks list, select the network you want and click Properties. 1. 2. 3. 4. NOTE: If the wireless network access point is in silent mode (blank network name SSID) the network name will not be displayed. You must first add the network name (SSID), then it will appear in the list of available networks. 6. For Network Authentication, select WPA-PSK (Wi-Fi Protected Access Pre-shared Key). file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (7 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide NOTE: Earlier versions of Windows XP did not support encryption modes such as WPA and WPAPSK. If you cannot view these options in the dropdown menu, please update Windows XP to the latest service pack. If WPA is required the Microsoft WPA supplicant must also be installed. 7. For Data Encryption, select AES or TKIP. These settings are shown in the following illustration: 8. If you need to provide a network key, click to deselect The key is provided for me automatically. 9. Enter the network key in the Network Key and the Confirm Network Key box. The network key must be a text phrase from 8 to 63 characters long or, a Hex key (0-9, A-F) 64 characters long. NOTE: Refer to your access point/router settings (for home users) or, contact your system administrator for the data encryption type and network key (enterprise users.) 10. To save your settings, click OK . 11. To close the Wireless Network Connection Properties window, click OK. For more information about connection status, refer to Viewing the Status of your Wireless Network Connection. For more information about PEAP authentication, refer to Security Overview. Configuring a WPA-PSK Client with AES or TKIP Encryption and TLS or TTLS file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (8 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Authentication Transport Layer Security TLS and Tunneled Transport Layer Security (TTLS) settings define the protocol and the credentials used to authenticate a user. TLS is a type of authentication method using Extensible Authentication Protocol (EAP) and a security protocol called Transport Layer Security. EAP-TLS uses certificates that require passwords. EAP-TLS authentication supports dynamic WEP key management. The TLS protocol is intended to secure and authenticate communications across a public network through data encryption. The TLS Handshake Protocol allows the server and client to provide mutual authentication and to negotiate an encryption algorithm and cryptographic keys before data is transmitted. In TTLS, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between the client and server. The client can use another authentication protocol, typically password-based protocols, such as MD5 Challenge over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. TTLS implementations today support all methods defined by EAP, as well as several older methods (CHAP, PAP, MS-CHAP and MS-CHAPv2). TTLS can easily be extended to work with new protocols by defining new attributes to support new protocols. To configure this infrastructure network: Click Start àSettings àControl Panel and double-click Network Connections. Right-click Wireless Network Connection Properties and click Properties. When the Wireless Network Properties window opens, click the Wireless Networks tab. Verify that the Use Windows to configure my wireless network settings box is selected. If it is not, select it. 5. From the Preferred Networks list, select the network you want and click Properties. The network properties window opens. 6. For Network Authentication, select WPA-PSK (Wi-Fi Protected Access). 1. 2. 3. 4. NOTE: Earlier versions of Windows XP did not support encryption modes such as WPA and WPAPSK. If you cannot view these options in the dropdown menu, please update Windows XP to the latest service pack. 7. For Data Encryption (depending on your network encryption), select AES or TKIP. If you are not sure which data encryption type to use, contact your network administrator. 8. Click the Authentication tab and then select Smart Card or other certificate for EAP Type, as shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (9 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 9. Click Properties and then select Use a certificate on this computer: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (10 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 10. Select the appropriate certificate(s) from the Trusted Root Certification Authorities. Contact your network administrator if you cannot find the appropriate certificate or do not know which one to use. 11. To close the Smart Card or other Certificate Properties window, click OK. 12. To close the Wireless network properties box, Click OK. To verify that your network connection has been made, refer to Viewing the Status of your Wireless Network Connection. For information about how to obtain a client certificate for TLS or TTLS authentication, contact your network administrator or, refer to Setting up a client for TLS/TTLS authentication. Configuring a WPA Client with AES or TKIP Encryption and PEAP Authentication Protected Extensible Authentication Protocol (PEAP) is an Internet Engineering Task Force (IETF) draft protocol sponsored by Microsoft, Cisco, and RSA Security. PEAP is designed to take advantage of server-side Extensible Authentication Protocol (EAP)-Transport Layer Security (TLS) and to support various authentication methods, including user passwords, one-time passwords, and Generic Token Cards. To configure this infrastructure network with PEAP authentication: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (11 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Click Start àSettings àControl Panel and then double-click Network Connections. Right-click Wireless Network Connection and click Properties. On the Wireless Network Connection Properties window, select the Wireless Networks tab. Verify that the Use Windows to configure my wireless network settings box is selected. If it is not, select it. 5. From the Preferred Networks list, select the network you want and click Properties. The network properties window opens. 6. For Network Authentication, select WPA. 7. For Data encryption, select AES or TKIP. These settings are shown in the following illustration. 1. 2. 3. 4. NOTE: Earlier versions of Microsoft Windows XP did not support encryption modes such as WPA and WPA-PSK. If you cannot view these options in the dropdown menu, please update Windows XP to the latest service pack. 8. Click the Authentication tab and for EAP type, select Protected EAP (PEAP). file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (12 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 9. 10. 11. 12. Click Properties. When the Protected EAP Properties window opens, select Validate server certificate. Select the appropriate Trusted Root Certification Authority from the list. For the authentication method, select Secured password (EAP-MSCHAP v2). These settings are shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (13 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide 13. Click Configure. The following properties window opens. 14. 15. 16. 17. 18. Make sure Automatically use my Windows logon name and password is checked. To return to the previous window, click OK. To save your settings on the Protected AP Properties window, click OK. To save your settings on the Authentication tab, click OK. To close the Wireless Network Connection Properties window, click OK. To verify that your network connection has been made, refer to Viewing the Status of your Wireless Network Connection. For more information about PEAP authentication, refer to Security Overview. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (14 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows XP: Intel PRO/Wireless 2915ABG Network Connection User's Guide Configuring a Client for TLS/TTLS Authentication The information in this section is intended for enterprise system administrators. For enterprise customers, contact your system administrator to obtain a client certificate for TLS/TTLS authentication. While obtaining a certificate for TLS/TTLS authentication, ensure strong private key protection is disabled. This is required for 802.1x authentication. EAP-TLS and EAP-TTLS authentication require client certificates in the local repository for the logged in users account and a trusted CA certificate in the root store. Certificates can be obtained from a corporate certificate authority located on a Windows 2000 Server or using Internet Explorer’s certificate import wizard. Obtaining a certificate from Windows 2000 Server 1. Launch Internet Explorer and browse to the Certificate Authority (CA) HTTP Service. 2. Logon to the CA Authority with the username and password of the user account created on the authentication server. This username and password are not necessarily the same as your Windows username and password. 3. On the Welcome page, select request a certificate task and submit the form. 4. On the Choose request page, select Advanced request and click Next. 5. On the Advanced Requests page, select Submit a certificate request to this CA using a form and click next. 6. On the Advanced Requests page, choose the user certificate template. Select Mark keys as exportable and click next. 7. On the Certificate Issued page, select Install this certificate. If this is the first certificate you have installed, you will prompted install a trusted CA certificate in the root store. Click Yes as you will need this certificate for TLS and TTLS authentication. 8. If you certificate was correctly installed, you will see the message: Your new certificate has been successfully installed. 9. To verify the installation, click à Tools à Internet Options à Content à Certificates. The new certificate should be installed in the personal folder. Obtaining a certificate from a file 1. 2. 3. 4. 5. 6. Right click on Internet Explorer icon on desktop, and select Properties. Select the Content tab, click the Certificates button. This displays a list of installed certificates. Select the import button under the list of certificates. This starts the Certification Import Wizard. Select the certificate file and click the password page. Enter the password for the file and ensure strong private key protection option is not selected. On the certification store page, select automatically select certificate store based on the type of certificate. 7. Proceed to complete the certificate import and click Finish. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/XPAdv.htm (15 of 15) [7/2/2004 12:29:50 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents Configuring Advanced Network Security Settings in Windows 2000: Intel® PROSet/Wireless 2915ABG Network Connection User's Guide Using Intel PROSet/Wireless Ad Hoc Network Overview Configuring an Ad Hoc Network with WEP Security or without Security Configuring a WEP Client with WEP and MD5 Authentication Configuring a WPA2-Enterprise Client with WEP, TKIP or AES-CCMP authentication Configuring a WPA Client with TKIP Encryption and TTLS or PEAP Authentication Configuring a CCX Client with CKIP Encryption and LEAP Authentication System Administrator Tasks (Obtain a Certificate) Using Intel® PROSet/Wireless The following sections describe how to set up peer-to-peer networking using Intel® PROSet/Wireless. It also provides information about how to configure advanced security settings for your wireless adapter. This requires information from a system administrator (corporate environment) or advanced security settings on your access point (for home users). If you are using Windows XP, refer to Making a Basic Network Connection in Windows XP to configure basic profiles. For advanced security settings, refer to Configuring Advanced Network Security Settings in Windows XP. If you are using Windows 2000, click Making a Basic Network Connection in Windows 2000 for basic setup instructions. NOTE: The software is compatible with the Intel® PRO/Wireless 2915ABG Network Connection and Intel® PRO/Wireless 2200BG Network Connection. Ad Hoc Network Overview In peer-to-peer (ad hoc) mode, you can send information to and receive it from other computers without using an access point. Each computer in a peer-to-peer network is called a peer. Creating an ad hoc network requires more than one computer with a wireless adapter. All systems on the file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (1 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide ad hoc network must be configured identically. To join an ad hoc network, you must know the ad hoc network key to connect to other computers in the ad hoc network. If you create the ad hoc network from your computer, other computers can connect using the network key (SSID) that you created. Once a network connection is established and after permission rights are given by other computers in the ad hoc network, you can freely share files. All wireless clients in the ad hoc network must use the same network name (SSID) and channel number. For a list of allowed 802.11b ad hoc channels, refer to the Adapter Settings for more information. Configuring an Ad Hoc Network with WEP Security or without Security Configuring an Ad Hoc Network with WEP Security or without Security The following examples illustrate how to create a new ad hoc profile using the Profile Wizard and connect to an ad hoc network with or without WEP security. For more information about authentication and encryption settings, refer to Security Overview. To configure a new ad hoc profile with no security: 1. Double-click the Intel PROSet Wireless icon in the desktop task tray or click Start àPrograms àIntel PROSet Wireless àIntel PROSet Wireless. 2. From the Intel PROSet/Wireless main window click Add. The General Settings window opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (2 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 3. Enter the Profile Name and Wireless Network Name (SSID). 4. Select Device to device [Ad hoc]. 5. If you want to assign a password for this profile, click Advanced. The Advanced Settings window opens. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (3 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 6. Select Password protect this profile (maximum 10 characters). 7. Enter the password, and then enter it again in the Confirm Password box. 8. To save your settings and close the window, click OK. You are returned to the General Settings window. 9. Click Next. The Security Settings window opens: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (4 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 10. In the Network Authentication text box, select Open (default setting). 11. In the Data Encryption text box: ● ● No security: Select None and proceed to step 15. WEP security: Select WEP and continue to step 12. 12. For the Encryption Level, select 64-bit or 128-bit. 13. For Key Index, select a key index number 1, 2, 3, or 4. Key selection must correspond to the network key on the access point. 14. In the Wireless Security Password (WEP Key) text box, enter the password characters . Select either of the following: ❍ Use ASCII characters: Click Use ASCII characters to enable. Enter a file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (5 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide ❍ text phrase, five (using 64-bit) or 13 (using 128-bit) ASCII characters (can use all characters, including space), in the pass phrase field. Use hex Key: Click Use hex Key to enable. Enter ten (using 64-bit) alphanumeric characters, 0-9, A-F, or 26 (using 128-bit) alphanumeric characters (0-9, A-F) in the hex key field. NOTE: Both the network name and the network key information are casesensitive. 15. To save the settings and close the Security Settings window, click OK. The profile is positioned at the bottom of the Profiles list. Use the up and down arrows to position it elsewhere on the list. 16. To connect to the wireless network, click Connect. To verify the status of your wireless connection, refer to Viewing the Status of your Wireless Connection. NOTE: Unless other computers in the ad hoc network use a different channel from the default channel, there is no need to change the default channel. If you want to change the default channel, select Adapter Settings under the Tools menu, choose the operating band, and then select a channel. Security Settings: Open authentication, no encryption There is no network authentication or data encryption used on this network. Name Network Authentication Data Encryption Enable 802.1x Description Open: No authentication used. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication. If no encryption is enabled on the network, any wireless device with the correct network name (SSID) can associate with the access point and gain access to the network. None: No data encryption used. Unchecked. Security Settings: Open Authentication, WEP Encryption This network uses no network authentication with WEP data encryption. Name Description file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (6 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Network Authentication Data Encryption Encryption Level Key Index Wireless Security Password (WEP Key) Open: No authentication used. Open authentication allows a wireless device access to the network without 802.11 authentication. The access point allows any request for authentication. If no encryption is enabled on the network, any wireless device with the correct network name (SSID) can associate with the access point and gain access to the network. WEP: WEP data encryption can be configured using 64-bit or 128bit. When WEP encryption is enabled on an access point, the WEP key provides a way to verify access to the network. If the wireless device does not have the correct WEP key, even though authentication is successful, the device is unable to transmit data through the access point or decrypt data received from the access point. 64-bit or 128-bit: 64-bit or 128-bit encryption. 1,2,3,4: Up to four passwords may be specified by changing the Key Index. Type the wireless network Password (WEP Key) in the text box. The Password is the same value used by the Wireless Access Point or Router. Contact your wireless network administrator for this password. Pass phrase and hex key options are: Pass phrase (64-bit): Enter 5 aASCII characters (can include any characters, including spaces). Hex key (64-bit): Enter 10 hexadecimal characters, 0-9, A-F. Pass phrase (128-bit): Enter 13 alphanumeric characters (can use any characters, including spaces). Hex key (128-bit): Enter 26 alphanumeric hexadecimal characters, 09, A-F. Configuring a WEP Client with WEP and MD5 Authentication Note: Before starting, you must obtain a user name and password on the RADIUS server from your system administrator. To add WEP and MD5 authentication to a new profile: 1. From Intel PROSet/Wireless main window, under the Profile list click Add. The General Settings window opens. 2. Enter the profile and network (SSID) name. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (7 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 3. For the operating mode, select Infrastructure. 4. If you want to assign a profile password, click Advanced and enter the password information; then click OK to return to the General Settings window. 5. On the General Settings window, click Next. The Security Settings window opens. 6. 7. 8. 9. 10. 11. 12. For Network Authentication, select Open (recommended). For Data Encryption, select WEP. Click the Enable 802.1x checkbox. For Authentication Type, select MD5 as the 802.1x. For the Encryption Level, select either 64-bit or 128-bit. Select the key index 1, 2, 3 or 4. Key 1 is the default setting. In the Wireless Security Password (WEP Key) text box, enter the required pass phrase or file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (8 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide hex key. 13. In the left side panel, click MD5 User to display the MD5 setting. The following window opens: 14. Select one of the following options: ● ● ● Use the Windows logon user name and password: Select this option to use your Windows log on user name for a Windows session. Note: this option is only available if you have the single sign On Pre-Login Connection component installed. Prompt for the user name and password: Select this option to prompt for user credentials when you log on to a Windows session. Use the following user name and password: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (9 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide ❍ ❍ ❍ ❍ User Name: This user name must match the user name that is set in the authentication server. Note: The user name and password do not have to be the same as the name of your current Windows user login. Domain: Optionally enter the domain name. Password: This password must match the password that is set in the authentication server. The entered password characters display as asterisks. Note: The user name and password do not have to be the same as the password of your current Windows user login. Confirm Password: Re-enter the user password. 15. To save the settings and close the Security Settings page, click OK. Configuring a WPA/WPA2-Enterprise Client with WEP, TKIP, or AES-CCMP Authentication Note: (1) Before starting, you must obtain a user name and password on the RADIUS server from your system administrator. (2) For personal/home networks use Wi-Fi Protected Access Personal (WPA/WPA2 Personal) mode. WPA/WPA2-Enterprise requires an authentication server. To add WPA/WPA-2 Enterprise authentication to a new profile: 1. Obtain and install a client certificate. For more information refer to Setting up the Client for TLS authentication or consult your system administrator. 2. From Intel PROSet/Wireless main window, click Add from the Profiles list. The General Settings window opens. 3. Enter the profile and network (SSID) name. 4. Select Infrastructure for the operating mode. 5. To assign a profile password, click Advanced and enter the password information; then click OK to return to the General Settings window. 6. On the General Settings window, click Next. The Security Settings window opens. 7. For Network Authentication, select WPA-Enterprise or WPA2-Enterprise. 8. For Data Encryption, select WEP, TKIP, or AES-CCMP. 9. Click the Enable 802.1x checkbox. 10. For the 802.1x Authentication Type, select TLS. The Security settings are shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (10 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 11. Under TLS user, select either: ● ● Use my smart card. Insert your Smart Card when you log on to your computer using this profile. Use a certificate on this computer: Your user name should be displayed in the User Name text box. Click the Select button to open a list of installed certificates. Select a certificate from the list. This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication. Click the Select button to open a list of installed certificates. Click OK to close the window. 12. In the left side panel to display the TLS setting, click TLS Server. Choose a certificate from the list or use the default certificate 'Any Trusted CA' and select the required Server/Certificate Name. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (11 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 13. Click OK to save the settings and close the Security Settings page. 14. Refer to Viewing the Status of your Wireless Connection to verify if your network connection has been made. NOTE: Refer to your access point/router settings (for home users) or, contact your system administrator for the data encryption type and network key (corporate users.) Configuring a WPA/WPA2-Enterprise Client with TKIP Encryption and TTLS or PEAP Authentication Using TTLS authentication: These settings define the protocol and the credentials used to authenticate a user. In TTLS, the client uses EAP-TLS to validate the server and create a TLSencrypted channel between the client and server. The client can use another authentication protocol, typically password-based protocols, such as MD5 Challenge, over this encrypted channel to enable server validation. The challenge and response packets are sent over a nonexposed TLS encrypted channel. Using PEAP authentication: PEAP settings are required for the authentication of the client to the authentication server. In PEAP, the client uses EAP-TLS to validate the server and create a TLS-encrypted channel between client and server. The client can use another EAP mechanism, such as Microsoft Challenge Authentication Protocol (MSCHAP) Version 2, over this encrypted channel to enable server validation. The challenge and response packets are sent over a nonexposed TLS encrypted channel. Note: Before starting, you must obtain a user name and password on the RADIUS server from your system administrator. To set up a new profile: 1. Obtain and install a client certificate, refer to Setting up the Client for TLS authentication or consult your system administrator. 2. From Intel PROSet/Wireless main window, click Add under the Profiles List. The General Settings window opens. 3. Enter the profile and network (SSID) name. 4. For the operating mode, select Infrastructure. 5. To assign a profile password, click Advanced and enter the password information; then click OK to return to the General Settings window. 6. On the General Settings window, click Next. 7. For Network Authentication, select WPA2-Enterprise. 8. For Data Encryption, select TKIP. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (12 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 9. Click the Enable 802.1x checkbox. 10. For the 802.1x Authentication Type, select PEAP. The Security settings are shown in the following illustration: 11. For authentication Protocol: ● Using MS-CHAP-V2 and GTC protocols: ❍ Use the Windows logon user name and password: If this feature is selected the user’s credentials are retrieved from the user’s Windows Logon process. Note: This option is only available if you have the Single Sign On Pre-Login Connection component installed. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (13 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide ❍ Prompt for the user name and password: Selecting this feature will show a window which will prompt for user name and password before you connect to the wireless network. The user name and password must be first set in the authentication server by the IT administrator. ● ❍ Use the following user name and password: The user name and password are securely (encrypted) saved in the profile. ● ● ● ● ❍ ❍ ● For GTC protocol: You may select whether you want to use a static password or a one-time password. User Name: This user name must match the user name that is set in the authentication server. Domain: Optionally enter the domain name. Password: This password must match the password that is set in the authentication server. The entered password characters display as asterisks. Confirm Password: Re-enter the user password. Use a client certificate: You may optionally select a client certificate from the Personal certificate store of the Windows logged-in user; this certificate is used for client authentication. Roaming Identity: When using 802.1x MS RADIUS as an authentication server, the authentication server authenticates the device by using the "Roaming Identity" username from PROSet and ignores the "Authentication Protocol MS-CHAP-V2" User Name. This feature is the 802.1x identity supplied to the authenticator. Microsoft IAS RADIUS accepts only a valid username (dotNet user) for EAP clients. Enter a valid username when using 802.1x MS RADIUS. For all other servers, this is an optional field, therefore, it is recommended that this field not contain a true identity, but instead the desired realm (e.g., anonymous@myrealm). Using TLS protocol: ❍ ❍ ❍ Use my smart card or certificate: Select smart card if the certificate resides on a smart card. Select certificate if the certificate resides on the computer. User Name: This user name must match the user name that is set in the authentication server by the IT administrator prior to client's authentication. The user name is case-sensitive. This name specifies the identity supplied to the authenticator by the authentication protocol operating over the TLS tunnel. This user’s identity is securely transmitted to the server only after an encrypted channel has been verified and established. Select button: Select a client certificate from the Personal certificate store of the Windows logged-in user; this certificate will be used for client authentication. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (14 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 12. For User Credentials, select Use Windows logon, Prompt each time I connect, or Use the following. If you select Use the following, you need to enter user name, domain, and password information. 13. To select a Client Certificate, click Use a Client Certificate on this wireless network, and then click Select. 14. When the Select Certificate window opens, select the certificate you want: PEAP or TTLS: Server/Certificate Authority Certificate Issuer The server certificate received during the PEAP or TTLS message exchange must have been issued by this certificate authority. Trusted intermediate certificate authorities and root authorities whose certificates exist in the system store will be available for selection in the drop-down list box. If Any Trusted CA is selected, any CA in the list will be acceptable. ● Server/Certificate Name Allow intermediate certificates: The server certificate received during negotiation may have been issued directly by the certificate authority indicated in the “Certificate issuer” field, or additionally by one of its intermediate certificate authorities. Check this box to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA. If unchecked, then the specified CA must have directly issued the server certificate. Check this option if you want to specify your server/certificate name. The server name, or a domain to which the server belongs, depending on which of the two options below has been selected. ● ● Server name must match exactly: When selected, the server name entered must match exactly the server name found on the certificate. The server name should include the complete domain name (e.g., Servername.Domain name) in this field. Domain name must end in specified name: When selected, the server name field identifies a domain, and the certificate must have a server name belonging to this domain or to one of its sub-domains (e.g., zeelans.com, where the server is blueberry.zeelans.com) Note: These parameters should be obtained from the system file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (15 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide administrator. 15. To save your settings, click OK. Configuring a CCX Client with CKIP Encryption and LEAP Authentication Configuring LEAP using Intel PROSet/Wireless Assistant An Intel PROSet Wireless CCX (v2.0) profile must be configured to connect to a specific ESS or Wireless LAN network. The profiles settings include LEAP and CKIP with automatic Rogue AP detection. To configure a profile for CCX security settings: 1. On the Intel PROSet/Wireless main window, click Add. The General Settings window opens. 2. Enter the profile and network (SSID) name. 3. For the operating mode, select Network [Infrastructure]. 4. Click Next. The Security Settings window opens. 5. For Network Authentication, select Open. 6. For Data Encryption, select CKIP. 7. Click Enable 802.1x. 8. For Authentication Type, select LEAP. 9. Click CCX Options. The Cisco Compatible Extensions Options window opens. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (16 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 10. Select the following options: ● ● ● Click the Cisco Compatible Extensions check box to enable CCX security. Click Enable Radio Management Support: Select this option for Cisco access point compatibility. Click Mixed Cells: Use this option to avoid collision in the 11b/11g mixed environment. 11. Click OK. Under LEAP User, your user name is displayed in the User Name text box. The domain name is also displayed in the Domain text box (default setting). 12. In the Password text box, enter your Windows login password. 13. In the Confirm Password text box, re-enter the password. This password is your user account created on the authentication server. The user name and password do not have to be the same as name and password of your current Windows user login. NOTE: You can also select Prompt for the user name and password, which will allow you to enter you user name when you connect to the network. 14. Click Allow for fast roaming (CCKM) to enable this feature. The Security settings are shown in the following illustration: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (17 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 15. To save the settings and close the Security Settings page, click OK. The Intel PROSet/Wireless main window opens to display the profile at the bottom of the Profiles list. Use the profile list arrows to position the profile in the list. If the profile is positioned at the top of the list, it will automatically be connected to the network the next time the wireless network is detected. 16. To connect to the appropriate CCX enabled wireless network access point using the CCX Profile, select the profile and click Connect. The connection icon indicates that you are connected to the network. The network name, speed, and signal quality display the current connection status. 17. To display information about the current network connection, click Details. For more information about connection status, refer to Viewing the Status of Your Wireless Connection. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (18 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide Security Settings for LEAP Name Description Use the Windows logon Selecting this feature, the user credentials are retrieved from the user name and password Windows Logon process. Note: This option is only available if you have the Single sign On Pre-Login Connection component installed. Prompt for the user name Selecting this feature, prompts for user name and password before and password you connect to the wireless network. The user name and password must be first set in the authentication server by the IT administrator. Use the following user The user name and password must be first set in the authentication name and password: server by the IT administrator. User Name: This user name must match the user name that is set in the authentication server. Domain: Optionally enter the name of the domain. Password: This password must match the password that is set in the authentication server. The entered password characters display as asterisks. Allow Fast Roaming (CCKM) Confirm Password: Re-enter the user password. Click Allow Fast Roaming (Cisco Centralized Key Management (CCKM)) to enable the client wireless adapter for fast secure roaming. When a wireless LAN is configured for fast reconnection, a LEAP enabled client device can roam from one access point to another without involving the main server. Using Cisco Centralized Key Management (CCKM), an access point configured to provide Wireless Domain Services (WDS) takes the place of the RADIUS server and authenticates the client without perceptible delay in voice or other time-sensitive applications. CCX Access Point and Client Configurations The access point provides settings to select different authentication types depending on the wireless network environment. The client sends an Authentication algorithm field during the 802.11 authentication handshake that takes place between the client and the AP during connection establishment. The Authentication algorithm values recognized by a CCX enabled AP is different for the different authentication types. For instance “Network-EAP” which denotes LEAP has a value of 0x80 while “Open” which is the 802.11 specified Open authentication and file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (19 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide “Required EAP” which requires an EAP handshake exchange have values of 0x0. Network-EAP only AP: For CCX enabled networks using LEAP authentication only the authentication type is set with “Network-EAP” checkbox selected, and “Open” and “Required EAP” boxes unchecked. The AP is then configured to allow LEAP clients ONLY to authenticate and connect. In this case, the AP expects the 802.11 authentication algorithm to be set to 0x80 (LEAP), and rejects clients that attempt authentication with an Authentication algorithm value 0x0. Client: In this case the client needs to send out an authentication algorithm value of 0x80 else the 802.11 authentication handshake would fail. During boot, when the Wireless LAN driver is already loaded, but the Intel PROSet Wireless supplicant is still unloaded, the client sends 802.11 authentication with an Authentication algorithm value of 0x0. Once the Intel PROSet Wireless supplicant loads, and engages the LEAP profile, it sends 802.11 authentication with an Authentication algorithm value of 0x80. However, the supplicant sends out 0x80 only if the Rogue AP box is checked. Network-EAP, Open and Required EAP AP: If Network-EAP, Open and Required EAP boxes are checked then it would accept both types of 802.11 authentication algorithm values 0x0 and 0x80. However, once the client is associated and authenticated the AP expects an EAP handshake to take place. For any reason if the EAP handshake does not take place quickly, the AP would not respond to the client for about 60 seconds. Client: Here the client could send out an authentication algorithm value of 0x80 or 0x0. Both values are acceptable and the 802.11 authentication handshake would succeed. During boot, when the Wireless LAN driver is already loaded and the client sends 802.11 authentication with an Authentication algorithm value of 0x0. This is sufficient to get authenticated but the corresponding EAP or LEAP credentials need to be communicated to the AP to establish a connection. Open and Required EAP only AP: In the case where the AP is configured with Network-EAP unchecked, but Open and Required EAP checked, the AP will reject any client attempting to 802.11 authenticate using an authentication algorithm value of 0x80. The AP would accept any client using an authentication algorithm value of 0x0, and expects EAP handshake to commence soon after. In this case, the client uses MD5, TLS, LEAP or any other appropriate EAP method suitable for the specific network configuration. Client: The client in this case is required to send out an authentication algorithm value of 0x0. As mentioned before the sequence involves a repeat of the initial 802.11 authentication handshake. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (20 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide First, the Wireless LAN driver initiates authentication with a value of 0x0 and later the supplicant would repeat the process. However, the authentication algorithm value used by the supplicant depends on the status of the Rogue AP checkbox. When the Rogue AP box is unchecked, the client sends an 802.11 authentication with Authentication algorithm value of 0x0 even after the supplicant loads and engages the LEAP profile. Some non-Intel clients, for example, when set to LEAP, cannot authenticate in this case. However, the Intel Wireless LAN client can authenticate, if the Rogue AP is unchecked. Rogue AP Checkbox configuration When the checkbox is checked it ensures that the client implements the Rogue AP feature as required by CCX. The client makes note of APs that it failed to authenticate with and sends this information to the AP that allows it to authenticate and connect. Also, the supplicant sets the Authentication algorithm type to 0x80 when the Rogue AP box is checked. There may be some network configurations implementing and Open and Required EAP only as described above. For this setup to work, the client must use an Authentication Algorithm value of 0x0, as opposed to the need to use 0x80 for Network-EAP only described above. Therefore, the Rogue AP checkbox also enables the client to support Network-EAP only and Open and Required EAP only. Note: Please refer to Cisco Client extensions version 2.0 document available at www.cisco.com for more details. System Administrator Tasks (Obtain a Certificate) Important: The following information is intended for system administrators. How to Obtain a Client Certificate If you do not have any certificates for EAP-TLS, or EAP-TTLS you must get a client certificate to allow authentication. For Enterprise customers, typically you need to consult your system network administrator for instructions about how to obtain a certificate on your network. Certificates can be managed from Internet Settings, accessed from either Internet Explorer or the Windows Control Panel. Use the “Content” page of “Internet Settings.” Windows XP and 2000 - When obtaining a client certificate, do not enable strong private key protection. If you enable strong private key protection for a certificate, you will need to enter an access password for the certificate each time this certificate is used. You must disable strong private key protection for the certificate if you are configuring the service for TLS/TTLS authentication. Otherwise the 802.1x service will fail authentication because there is no logged on file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (21 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide user to whom it can display the prompt window. Notes about Smart Cards After installing a Smart Card, the certificate is automatically installed on your computer and can be select from the personal certificate store and root certificate store. Setting up the Client for TLS and TTLS authentication The information in this section is intended for system administrators. For enterprise customers, contact your system administrator to obtain a client certificate for TLS/TTLS authentication. While obtaining a certificate for TLS/TTLS authentication, ensure strong private key protection is disabled. This is required for 802.1x authentication. EAP-TLS and EAP-TTLS authentication require client certificates in the local repository for the logged in users account and a trusted CA certificate in the root store. Certificates can be obtained from a corporate certificate authority located on a Windows 2000 Server, or, using Internet Explorer’s certificate import wizard. Step 1: Obtain a certificate from a Windows 2000 Server 1. Launch Internet Explorer and browse to the Certificate Authority (CA) HTTP Service. (Use a URL such as http://myCA.myDomain.com/certsrv). 2. Logon to the CA Authority with the username and password of the user account created on the authentication server. This username and password are not necessarily the same as your Windows username and password. 3. On the Welcome page, select request a certificate task and submit the form. 4. On the Choose request page, select Advanced request and click Next. 5. On the Advanced Requests page, select Submit a certificate request to this CA using a form and click Next. 6. On the Advanced Requests page, choose the user certificate template. Select Mark keys as exportable and click Next. 7. On the Certificate Issued page, select Install this certificate. If this is the first certificate you have installed, you will prompted install a trusted CA certificate in the root store. Click Yes as you will need this certificate for TLS and TTLS authentication. 8. If you certificate was correctly installed, you will see the message: Your new certificate has been successfully installed. 9. To verify the installation, click Internet explorer > Tools > Internet Options > Content > Certificates. The new certificate should be installed in the personal folder. Importing a certificate from a file 1. Open Internet Properties (right-click on the Internet Explorer icon on the desktop and select Properties. 2. Click the Certificates button on the Content page. This will open the list of installed file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (22 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 3. 4. 5. 6. 7. certificates. Click the Import button under the list of certificates. This will start the Certificate Import Wizard. (Note: Steps 1 through 3 may also be accomplished by double-clicking the icon for the certificate. Select the file and proceed to the Password page. On the Password page specify your access password for the file. Clear the Enable strong private key protection option. On the Certificate store page select Automatically select certificate store based on the type of certificate (the certificate must be in the User accounts Personal store to be accessible in the Configure window of the Client; this will happen if ‘automatic’ is selected). Proceed to 'Completing the Certificate Import' and click Finish. Step 2: Specifying the certificate used by Intel PROSet Wireless To create a profile using Shared Network authentication, WEP encryption, and TLS 802.1x authentication: 1. Obtain and install a client certificate, refer to Step 1 Obtain a Certificate or consult your system administrator. 2. Click the Add button. General Settings 3. Enter the profile and network (SSID) name. 4. Select Network [Infrastructure] for the operating mode. 5. Click Next. Security Settings 6. 7. 8. 9. Select Shared in the Network Authentication options. Select WEP as the Data encryption. Click the Enable 802.1x checkbox to enable the 802.1x security option. Select TLS as the 802.1x Authentication Type. Step 1 of 3: WEP Key 10. Select either 64-bit or 128-bit for the Encryption Level. 11. Select the encryption Key index 1, 2, 3 or 4. 12. Enter the Wireless Security Password (WEP Key): ● ● Use pass phrase: Click Use Pass Phrase to enable. Enter a text phrase using 8-63 alphanumeric characters (0-9, a-z or A-Z), in the pass phrase field. Use hex Key: Click Use hex Key to enable. Enter up to 64 alphanumeric characters, file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (23 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 0-9, A-F in the hex key field. 13. Click TLS User in the left side panel to display the TLS user settings. Step 2 of 3: TLS User 14. Select either: ● ● Use my smart card. Insert your Smart Card when you log on to your computer using this profile. Use a certificate on this computer: Your user name should be displayed in the User Name text box. Click the Select button to open a list of installed certificates. Select a certificate from the list. This option selects a client certificate from the Personal certificate store of the Windows logged-in user. This certificate will be used for client authentication. Click the Select button to open a list of installed certificates. Click OK to close the window. Note about Certificates: The specified identity should match the field "Issued to" in the certificate and should be registered on the authentication server (i.e., RADIUS server) that is used by the authenticator. Your certificate must be "valid" with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in using the same username you used when the certificate was installed. See Step 1 for more information. 15. Click TLS Server in the left side panel to display the TLS server settings. Step 3 of 3: TLS Server 16. Select from the Certificate Issuer list Any Trusted CA as the default. 17. Select the Allow intermediate certificates checkbox to allow a number of unspecified certificates to be in the server certificate chain between the server certificate and the specified CA. If unchecked, then the specified CA must have directly issued the server certificate 18. Enter the Server/Certificate name. If you know the server name enter this name. Select the appropriate option to match the server name exactly or specify the domain name. The options are Server Name must match exactly or Domain name must end in the specified name. 19. Click OK to save the settings and close the Security Settings page. 20. The profile displays in the profile list and is positioned at the bottom of the list. Use the profile list arrows to position the profile in the list. If the profile is positioned at the top of the list, it will automatically be connected to the network the next time the wireless network is detected. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (24 of 25) [7/2/2004 12:29:56 PM] Configuring Advanced Network Security Settings in Windows 2000: Intel PRO/Wireless 2915ABG Network Connection User's Guide 21. Select the profile and click Connect to connect to the wireless network. The connection icon indicates that you are connected to the network. The network name, speed, and signal quality display the current connection status. Click the Details button to display details of the current network connection. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/UtilAdv.htm (25 of 25) [7/2/2004 12:29:56 PM] Specifications Back to Contents Specifications: Intel PROSet/Wireless Network Connection Specifications: Intel PROSet/Wireless 2915ABG Network Connection Form Factor Mini PCI Type 3A Dimensions Width 2.85 in x Length 1.75 in x Height 0.20 in (59.75 mm x 50.95 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066 Dual Diversity Antenna On-board dual diversity switching Connector Interface 124-pin SO-DIMM edge connector Voltage 3.3 Volt Operating Temperature 0 to +70 degrees Celsius Humidity 50 to 85% non-condensing Frequency Modulation 5 GHz (802.11a) 2.4 GHz (802.11b/g) Frequency band 5.15 GHz to 5.85 GHz 2.400 - 2.472 GHz (dependent on country) Modulation BPSK, QPSK, 16 QAM, 64 QAM CCK, DQPSK, DBPSK Wireless Medium 5 GHz UNII: Orthogonal Frequency Division Multiplexing (OFDM) 2.4 GHz ISM: Orthogonal Frequency Division Multiplexing (OFDM) file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/specs.htm (1 of 3) [7/2/2004 12:29:58 PM] Specifications Channels Data Rates 4 to 12 nonoverlapping, dependent on country Channel 1-11 (US only) Channel 1-13 (Japan, Europe) 54, 48, 36, 24, 18, 12, 9, 11, 5.5, 2, 1 Mbps 6 Mbps General Operating Systems Windows XP, Windows 2000 Wi-Fi® Alliance certification Wi-Fi® certification for 802.11b, 802.11g, 802.11a WLAN Standard IEEE 802.11g, 802.11b, 802.11a Architecture Infrastructure or ad hoc (peer-to-peer) operating modes Security WPA, WPA-Enterprise, AES 128-bit, WEP 128-bit and 64-bit.Cisco Compatible Extensions v2.0, 802.1x: LEAP, PEAP, TKIP, EAP-TLS, EAP-TTLS, MD5 Product Safety UL, C-UL, CB (IEC 60590) Specifications: Intel PROSet/Wireless 2200BG Network Connection Form Factor Mini PCI Type 3A Dimensions Width 2.85 in x Length 1.75 in x Height 0.20 in (59.75 mm x 50.95 mm x 5 mm) Weight 0.7 oz. (12.90 g.) Antenna Interface Connector Hirose U.FL-R-SMT mates with cable connector U.FL-LP-066 Dual Diversity Antenna On-board dual diversity switching Connector Interface 124-pin SO-DIMM edge connector Voltage 3.3 Volt Operating Temperature 0 to +80 degrees Celsius file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/specs.htm (2 of 3) [7/2/2004 12:29:58 PM] Specifications Humidity 50 to 85% non-condensing 2.4 GHz Band (802.11b/g Most of the World (United States) Rest of World (Europe, Japan) Frequency ranges 2.412 - 2.462 GHz 2.412 - 2.472 GHz Channels 1 - 11 (active scan) 1 - 13 (active scan) Modulation CCK, DQPSK, DBPSK, BPSK, QPSK, 16 QAM, 64 QAM Wireless Medium 2.4 GHz ISM: Direct Sequence Spread Spectrum (DSSS) and Orthogonal Frequency Division Multiplexing (OFDM) Data Rates 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1 Mbps General Operating Systems Windows XP, 2000 Wi-Fi® Alliance certification Wi-Fi® certification for 802.11b, 802.11g, 802.11a WLAN Standard IEEE 802.11g, 802.11b, 802.11a Architecture Infrastructure or ad hoc (peer-to-peer) operating modes Security WPA, WPA-Enterprise, AES 128-bit, WEP 128-bit and 64-bit.Cisco Compatible Extensions v2.0, 802.1x Product Safety UL, C-UL, CB (IEC 60590) Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/specs.htm (3 of 3) [7/2/2004 12:29:58 PM] Regulatory Information Back to Contents Regulatory Information: Intel PRO/Wireless 2915ABG Network Connection User's Guide Information For the User Regulatory Information Information for the user Safety Notices The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment. The Intel PRO/Wireless 2915ABG Adapter meets the Human Exposure limits found in OET Bulletin 65, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCC’s recommended limits. The following safety precautions should be observed: ● ● ● ● Do not touch or move antenna while the unit is transmitting or receiving. Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body, especially the face or eyes, while transmitting. Do not operate the radio or attempt to transmit data unless the antenna is connected; if not, the radio may be damaged. Use in specific environments: ❍ The use of wireless devices in hazardous locations is limited by the constraints posed by the safety directors of such environments. ❍ The use of wireless devices on airplanes is governed by the Federal Aviation Administration (FAA). ❍ The use of wireless devices in hospitals is restricted to the limits set forth by each hospital. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (1 of 8) [7/2/2004 12:30:03 PM] Regulatory Information ● ● ● ● ● Explosive Device Proximity Warning (see below) Antenna Warning (see below) Use on Aircraft Caution (see below) Other Wireless Devices (see below) Power Supply (Access Point) (see below) Explosive Device Proximity Warning Warning: Do not operate a portable transmitter (such as a wireless network device) near unshielded blasting caps or in an explosive environment unless the device has been modified to be qualified for such use. Antenna Warnings Warning: To comply with the FCC and ANSI C95.1 RF exposure limits, it is recommended for the Intel PRO/Wireless 2915ABG Adapter installed in a desktop or portable computer, that the antenna for this device be installed so as to provide a separation distance of al least 20 cm (8 inches) from all persons and that the antenna must not be co-located or operating in conjunction with any other antenna or radio transmitter. It is recommended that the user limit exposure time if the antenna is positioned closer than 20 cm (8 inches). Warning: The Intel PRO/Wireless 2915ABG Adapter product is not designed for use with high-gain directional antennas. Use of such antennas with these products is illegal. Use On Aircraft Caution Caution: Regulations of the FCC and FAA prohibit airborne operation of radiofrequency wireless devices because their signals could interfere with critical aircraft instruments. Local Restrictions on 802.11b Radio Usage Caution: Because the frequency used by 802.11b wireless LAN devices may not yet be harmonized in all countries, 802.11b products are designed for use only in specific countries and are not allowed to be operated in countries other than those so designated. As a user of these products, you are responsible for ensuring that the products are used only in the countries for which they were intended and for verifying that they are file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (2 of 8) [7/2/2004 12:30:03 PM] Regulatory Information configured with the correct selection of frequency and channel for the country of use. Any deviation from the permissible settings for the country of use is an infringement of national law and may be punished as such. For country-specific information, please see the additional compliance information supplied with this product. Wireless interoperability The Intel PRO/Wireless 2915ABG Adapter is designed to be interoperable with any wireless LAN product that is based on direct sequence spread spectrum (DSSS) radio technology and to comply with the following standards: ● ● ● IEEE Std. 802.11b-1999. Standard on Wireless LAN. IEEE Std. 802.11g compliant. Standard on Wireless LAN. Wireless Fidelity (WiFi(R)) certification, as defined by the WECA (Wireless Ethernet Compatibility Alliance). The Intel(R) PRO/Wireless LAN 2200 3A Mini PCI adapter and your health The Intel PRO/Wireless 2915ABG Adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy emitted by this device, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones. The Intel PRO/Wireless 2915ABG Adapter wireless device operates within the guidelines found in radio frequency safety standards and recommendations. These standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature. In some situations or environments, the use of the Intel PRO/Wireless 2915ABG Adapter wireless device may be restricted by the proprietor of the building or responsible representatives of the applicable organization. Examples of such situations include the following: ● ● Using the Intel PRO/Wireless 2915ABG Adapter equipment on board airplanes, or Using the Intel PRO/Wireless 2915ABG Adapter equipment in any other environment where the risk of interference with other devices or services is perceived or identified as being harmful. If you are uncertain of the policy that applies to the use of wireless devices in a specific organization or environment (an airport, for example), you are encouraged to ask for authorization to use the Intel PRO/Wireless 2915ABG Adapter wireless device before file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (3 of 8) [7/2/2004 12:30:03 PM] Regulatory Information you turn it on. Regulatory information The Intel PRO/Wireless 2915ABG Adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. For country-specific approvals, see Radio approvals. Dell Inc. is not responsible for any radio or television interference caused by unauthorized modification of the devices included with the Intel PRO/Wireless 2915ABG Adapter kit, or the substitution or attachment of connecting cables and equipment other than that specified by Dell Inc. The correction of interference caused by such unauthorized modification, substitution or attachment is the responsibility of the user. Dell inc. and its authorized resellers or distributors are not liable for any damage or violation of government regulations that may arise from the user failing to comply with these guidelines. NOTE—Your Intel PRO/Wireless 2915ABG Adapter transmits less than 100 mW, but more than 10 mW. USA—Federal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions: ● ● This device may not cause harmful interference. This device must accept any interference that may cause undesired operation. NOTE—The radiated output power of the Intel PRO/Wireless 2915ABG Adapter wireless network device is far below the FCC radio frequency exposure limits. Nevertheless, the Intel PRO/Wireless 2915ABG Adapter device should be used in such a manner that the potential for human contact during normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequency exposure limits, you should keep a distance of at least 20 cm between you (or any other person in the vicinity) and the antenna that is built into the computer. To determine the location of the antenna within your computer, check the information posted on the general Dell support site at http://www.support.dell.com. Interference statement file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (4 of 8) [7/2/2004 12:30:03 PM] Regulatory Information This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If the equipment is not installed and used in accordance with the instructions, the equipment may cause harmful interference to radio communications. There is no guarantee, however, that such interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct the interference by taking one or more of the following measures: ● ● ● ● Reorient or relocate the receiving antenna. Increase the distance between the equipment and the receiver. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. NOTE—The Intel PRO/Wireless 2915ABG Adapter wireless network device must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. Any other installation or use will violate FCC Part 15 regulations. U.S. Frequency Bands 2.400 - 2.473 GHz Canada—Industry Canada (IC) This Class B digital apparatus complies with Canadian ICES-003, Issue 2, and RSS-210, Issue 4 (Dec. 2000). Cet appariel numérique de la classe B est conforme à la norme NMB-003, No. 2, et CNR210, No 4 (Dec 2000). "To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its trasmit antenna) that is installed outdoors is subject to licensing." « Pour empêcher que cet appareil cause du brouillage au service faisant l'objet d'une licence, il doit être utilisé a l'intérieur et devrait être placé loin des fenêtres afinde fournir un écran de blindage maximal. Si le matériel (ou son antenne d'émission) est installé à l'extérieur, il doit faire l'objet d'une licence. » file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (5 of 8) [7/2/2004 12:30:03 PM] Regulatory Information Europe—EU Declaration of Conformity Europe Frequency Bands 2.400 - 2.4835 GHz (Europe ETSI) The lower band of 5.15 -- 5.25 GHz should be operated only outdoors. This equipment complies with the essential requirements of the European Union directive 1999/5/EC. Cet équipement est conforme aux principales exigences essentielles définies dans la Directive européenne RTTE 1999/5/CE. Die Geräte erfüllen die grundlegenden Anforderungen der RTTE-Richtlinie 1999/5/EG. Questa apparecchiatura è conforme ai requisiti essenziali della Direttiva Europea R&TTE 1999/5/CE. Este equipo cumple los requisitos principales de la Directiva 1999/5/CE de la UE, "Equipos de Terminales de Radio y Telecomunicaciones". Este equipamento cumpre os requisitos essenciais da Directiva 1999/5/CE do Parlamento Europeu e do Conselho (Directiva RTT). O exoplismos autos plhroi tis basikes apaits ths koinotikhs odhgias EU R&TTE 1999/5/E. Deze apparatuur voldoet aan de noodzakelijke vereisten van EU-richtlijn betreffende radioapparatuur en telecommunicatie-eindapparatuur 1999/5/EG. Dette udstyr opfylder de Væsentlige krav i EU's direktiv 1999/5/EC om Radio- og teleterminaludstyr. Dette utstyret er i overensstemmelse med hovedkravene i R&TTE-direktivet (1999/5/EC) fra EU. Utrustningen uppfyller kraven för EU-direktivet 1999/5/EC om ansluten teleutrustning och ömsesidigt erkännande av utrustningens överensstämmelse (R&TTE). Tämä laite vastaa EU:n radio- ja telepäätelaitedirektiivin (EU R&TTE Directive 1999/5/EC) vaatimuksia. France Some areas of France have a restricted frequency band. The worst case maximum authorized power indoors is: ● 10 mW for the entire 2.4 GHz band (2400 MHz–2483.5 MHz) ● 100 mW for frequencies between 2446.5 MHz and 2483.5 MHz (NOTE—Channels file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (6 of 8) [7/2/2004 12:30:03 PM] Regulatory Information 10 through 13 inclusive operate in the band 2446.6 MHz to 2483.5 MHz) There are few possibilities for outdoor use: On private property or on the private property of public persons, use is subject to a preliminary authorization procedure by the Ministry of Defense, with maximum authorized power of 100 mW in the 2446.5–2483.5 MHz band. Use outdoors on public property is not permitted. In the departments listed below, for the entire 2.4 GHz band: ● ● Maximum authorized power indoors is 100 mW Maximum authorized power outdoors is 10 mW There is partial restriction of the 2.4 GHz band for outdoor/indoor in part of the 2.4 GHz band, according to the OEM Regulatory and Safety Notice Guidelines of CX2 2200BG (see page 12, concerning France). Departments in which the use of the 2400–2483.5 MHz band is permitted with an EIRP of less than 100 mW indoors and less than 10 mW outdoors: 01 Ain Orientales 36 Indre 66 Pyrénées 02 Aisne 37 Indre et Loire 67 Bas Rhin 03 Allier 41 Loir et Cher 68 Haut Rhin 05 Hautes Alpes 42 Loire 70 Haute Saône 08 Ardennes 45 Loiret 71 Saône et Loire 09 Ariège 50 Manche 75 Paris 11 Aude 55 Meuse 82 Tarn et Garonne 12 Aveyron 58 Nièvre 84 Vaucluse 16 Charente 59 Nord 88 Vosges 24 Dordogne 60 Oise 89 Yonne 25 Doubs 61 Orne 90 Territoire de Belfort 26 Drôme 63 Puy du Dôme 94 Val de Marne 32 Gers 64 Pyrénées Atlantique This requirement is likely to change over time, allowing the use your wireless LAN card in more areas within France. Please check with ART for the latest information (www.arttelecom.co.fr) file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (7 of 8) [7/2/2004 12:30:03 PM] Regulatory Information Belgique Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m un enregistrement auprès de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. Italia For use in private premises: no restriction outdoor or indoor, 2.400 - 2.4835 Ghz For use in public premises: no restriction outdoor or indoor, 2.400 - 2.4835 Ghz, but a general authorization has to be requested to the ministry of Post and telecommunications. Japan Frequency Bands 2.400 - 2.497 GHz (Japan) Radio approvals To determine whether you are allowed to use your wireless network device in a specific country, please check to see if the radio type number that is printed on the identification label of your device is listed on the radio approval list posted on the general Dell support site at http://support.dell.com. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/regs.htm (8 of 8) [7/2/2004 12:30:03 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide Back to Contents Intel Wireless Troubleshooter (Tools menu) Resolving Errors Intel Wireless Troubleshooter Intel Wireless Troubleshooter is an application that can assist you in resolving wireless network connection issues. When a connection issue is detected, a balloon tip appears at the bottom right of your desktop screen. When you click the balloon tip, a diagnostic page displays the recommended steps to resolve the connection issue. For example, if a connection issue occurred because of an invalid password, the Profile Wizard application is launched when you click the displayed hyperlink. You can also launch Wireless Event Viewer from this page and enable or disable alert notifications. Intel Wireless Troubleshooter Page Description The Intel Wireless Troubleshooter page contains two panes. The left pane displays a list of available tools that can be started using your left mouse button. The right pane displays the current connection issue in a section. Each section has two parts: the error message and the hint text. The error message and time stamp are preceded by an icon. The hint text contains a description of available utilities and help for resolving the associated connection issue. If you click a help text link, the help text is displayed in a pop-up window. If you click the associated issue resolver link, a program is launched to resolve the connection issue. You can launch Wireless Event Viewer or enable or disable the error notification. File Exit: Exit Intel Wireless Troubleshooter application. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (1 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide Help Intel Wireless Troubleshooter Help: Displays online help about the Intel Wireless Troubleshooter. About: Displays version information for the Intel Wireless Troubleshooter. Launch Wireless Event Viewer. Wireless Event Viewer Disable Click to disable the Notification alert notifications. Enable Click to enable the Notification alert notifications if an error is detected. Available Date Time error Help message: ● ● ● Description of error. Link to resolve error (if available). See Resolving Errors. Link to recommended steps to resolve error. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (2 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide Resolving Errors Use the following recommendations to resolve network connection issues detected by Intel Wireless Troubleshooter. Authentication failed due to invalid user credentials Authentication failed due to invalid username Authentication failed due to invalid user password Authentication failed due to an invalid server certificate Authentication failed due to invalid server credentials Authentication failed due to invalid server identity Authentication failed due to an invalid user certificate Incorrect PIN for retrieving certificate Authentication failed because the AAA server is unavailable Wireless adapter failed to get a valid IP address Authentication failed because timer expired Smart Card was unexpectedly removed Disconnection from an Access Point AAA Server Rejected the EAP Method Error Occurred Because the GSM Adapter Was Unexpectedly Removed Administrator Profile Failed to Authenticate IT Administrator Profile Failed to Obtain an IP Address from the DHCP Server Authentication failed due to invalid user credentials – Re-enter credentials This authentication error can be caused by invalid user credentials when using either a TTLS or PEAP profile. Use the following steps to help resolve this error: 1. From the profiles list, select a TTLS or PEAP profile. 2. Click Properties. 3. Click Next. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (3 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide 4. For the 802.1x Authentication Type, select TTLS or PEAP. 5. For User Credentials, select Use the following. 6. Verify the User Name, Domain, and password information. ● If Use Windows logon or Prompt each time I connect is selected, make sure that the correct user credentials information is used when you connect to the wireless network. Note: This option is only available if you have the Single Sign On Pre-Login Connection component installed. 7. To save the settings, click OK. Authentication failed due to invalid username – Re-enter username This authentication error can be caused by an invalid user name when using either a TTLS, PEAP or LEAP profile. Use the following steps to help resolve this error: 1. 2. 3. 4. Select the appropriate profile from the Profiles list. Click Properties. Click Next. Select the appropriate 802.1x Authentication Type. ● For TTLS and PEAP profiles: Select Use the following for User Credentials. ● Verify the User Name information. ● If Use Windows logon or Prompt each time I connect is selected, make sure that the correct user credentials information is used when you connect to the wireless network. Note: This option is only available if you have the Single Sign On Pre-Login Connection component installed. ● For LEAP profiles: Select Use the following user name and password and verify the user name information. If Use Windows logon user name and password or Prompt for user name and password is selected, make sure that the correct user credentials information is used when you connect to the wireless network. ● For EAP-SIM authentication type: Verify that the correct User Name is being used under Specify user name (identity). 5. To save the settings, click OK. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (4 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide Authentication failed due to invalid user password – Re-enter Password This authentication error can be caused by an invalid user password when using either a TTLS, PEAP or LEAP profile. Use the following steps to help resolve this error: 1. 2. 3. 4. Select the appropriate profile from the profiles list. Click Properties. Click Next. Select the appropriate 802.1x Authentication Type. ● For TTLS and PEAP profiles: Select the Use the following option for User Credentials. ● Re-enter the correct password. ● If Use Windows logon or Prompt each time I connect is selected, make sure that the correct user credentials information is used when you connect to the wireless network. Note: This option is only available if you have the Single Sign On Pre-Login Connection component installed. ● For LEAP profiles: Select Use the following user name and password and re-enter the correct password. If Use Windows logon user name and password or Prompt for user name and password is selected, make sure that the correct password information is used when you connect to the wireless network. 5. To save the settings, click OK. Authentication failed due to an invalid server certificate – Select another Certificate This authentication error can be caused by an invalid server certificate when using either a TLS, TTLS, or PEAP profile. Use the following steps to help resolve this error: 1. Select the appropriate profile from the profiles list. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (5 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide 2. Click Properties. 3. Click Next. 4. Select the appropriate 802.1x Authentication Type. ● ● For TTLS and PEAP profiles: Verify that the correct Authentication Type is selected from the drop-down list. Click Use a Client Certificate on this wireless network and click Select. Choose a valid certificate from the list of installed certificates, and then click OK. For TLS profiles: Click Use a Client Certificate on this wireless network and click Select. Choose a valid certificate from the list of installed certificates, and then click OK. Note About Certificates: The specified identity should match the "Issued to" field in the certificate and should be registered on the authentication server (i.e., RADIUS server) that is used by the authenticator. Your certificate must be "valid" with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in using the same user name you used when the certificate was installed. 5. Click Close. 6. to save the settings, click OK. Authentication failed due to invalid server credentials – Re-enter server credentials This authentication error can be caused by invalid server (Domain) credentials when using either a TTLS, PEAP, or LEAP profile. Use the following steps to help resolve this error: 1. 2. 3. 4. Select the appropriate profile from the profiles list. Click Properties. Click Next. Select the appropriate 802.1x Authentication Type. ● For TTLS and PEAP profiles: Select Use the following for User Credentials. ● Verify the Domain information. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (6 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide If Use Windows logon or Prompt each time I connect is selected, make sure that the correct Domain credentials information is used when you connect to the wireless network. Note: This option is only available if you have the Single Sign On Pre-Login Connection component installed. ● For LEAP profiles: Select Use the following user name and password and verify the Domain is correct. If Prompt for user name and password is selected, make sure that the correct Domain and password information is entered when you connect to the wireless network. (Must match what appears on the Security settings window.) 5. To save the settings, click OK. ● Authentication failed due to invalid server identity – Re-enter server name This authentication error can be caused by invalid server identity information when using either a TTLS or PEAP profile. Use the following steps to help resolve this error: 1. 2. 3. 4. 5. Select the appropriate profile from the profiles list. Click Properties. Click Next. Select the appropriate 802.1x Authentication Type. For TTLS and PEAP profiles: Verify that the Roaming Identity server name is correct. 6. To save the settings, click OK. Authentication failed due to an invalid user certificate – Re-enter user credentials This authentication error can be caused by an invalid user certificate when using either a TLS, TTLS, or PEAP profile. Use the following steps to help resolve this error: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (7 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide 1. 2. 3. 4. Select the appropriate profile from the profiles list. Click Properties. Click Next. Select the appropriate 802.1x Authentication Type. ● ● For TTLS and PEAP profiles: Verify that the correct Authentication Type is selected from the drop-down list, click Select, choose a valid certificate from the list of installed certificates, and then click OK. For TLS profiles: Click Select, choose a valid certificate from the list of installed certificates, and then click OK. Note about Certificates: The specified identity should match the field "Issued to" in the certificate and should be registered on the authentication server (i.e., RADIUS server) that is used by the authenticator. Your certificate must be "valid" with respect to the authentication server. This requirement depends on the authentication server and generally means that the authentication server must know the issuer of your certificate as a Certificate Authority. You should be logged in using the same username you used when the certificate was installed. 5. Click Close. 6. To save the settings, click OK. Incorrect PIN for retrieving certificate – Re-enter PIN Recommended action: The certificate retrieval failed because of an incorrect PIN. Re-enter the correct PIN. Authentication failed because the AAA server is unavailable The wireless adapter is associated to the access point, but the 802.1x authentication cannot be completed because of no response from the authentication server. Recommended action: file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (8 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide On the Intel PROSet/Wireless main window, select the profile and click Connect. This procedure allows you to try to associate with the network and authenticate with the server. Wireless adapter failed to get a valid IP address This error can be due to an authentication failure with the network, incorrect encryption keys, or because of a DHCP server malfunction. Re-enter encryption keys. If it is an encryption key mismatch, use the following steps to resolve this error: 1. 2. 3. 4. Click Properties. Click Next. Enter the encryption key. To save the security settings for the profile, click OK. If it is a DHCP server issue: ● If using a wireless router, check the DHCP settings in that device. Authentication failed because timer expired Authentication failed because timer expires while trying to authenticate a possible rogue access point (AP). The rogue AP timed out, possibly because of a problem with the RADIUS server. Recommended action: ● ● To prevent the wireless adapter from connecting with a possible rogue AP, consider adding this rogue AP to the excluded access point list. Then the adapter will no longer try to connect with this AP. To try connecting again (if you don't think this is a rogue AP), on the Intel PROSet/Wireless main window, select the profile and click Connect and try to associate with the network and authenticate with the server. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (9 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide Smart Card was unexpectedly removed This error occurred because the Smart Card was unexpectedly removed. Recommended action: 1. Insert the Smart Card. 2. Select the 802.1x EAP-SIM authentication profile. 3. Click Connect and try to associate with the network. Disconnection from an Access Point The following error messages are displayed when the wireless adapter is disconnected from the network access point. Disconnect from access point due to failed association. Disconnect from access point due to authentication failures. Disconnect from access point due to TKIP Michael Integrity Check failure. Disconnect from access point due to Class 2 frame non-authentication failure. Disconnect from access point due to Class 3 frame non-association failure. Disconnect from access point due to re-association failure. Disconnect from access point due to Information Element failure. Disconnect from access point due to EAPOL-Key protocol 4-way handshake failure. Disconnect from access point due to 802.1x authentication failure. Recommended action: To re-connect, remove the access point from the exclude list or manually connect (i.e., on the Intel PROSet/Wireless main window, select the profile and click Connect). file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (10 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide AAA Server Rejected the EAP Method This error occurs when the AAA Server does not accept the configured authentication type. Use the following steps to help resolve this error: 1. Open Intel PROSet/Wireless by double-clicking the task tray icon located at the bottom right of the screen. 2. Select the associated or last used profile from the Profiles list. 3. Click Properties. The Wireless Profile Properties – General Settings page opens. 4. Click Next. The Wireless Profile Properties – Security Settings page is opens. 5. Verify that Enable 802.1x is checked. 6. Verify that the correct authentication type is selected. 7. Click Next to see Step 2 of the Wireless Profile Properties – Security Settings page. 8. Enter the required information. 9. Click OK. The profile is now re-applied. Intel PROSet/Wireless attempts to connect to the wireless network. Error Occurred Because the GSM Adapter Was Unexpectedly Removed This error occurs when the GSM adapter is not fully inserted or is unexpectedly removed from the mobile station. Use the following steps to help resolve this error: 1. 2. 3. 4. Re-insert the GSM adapter. Double-click the Intel PROSet/Wireless icon at the bottom right of the screen. Select the associated or last-used profile from the profiles list. Click on Connect. The profile is now re-applied. Intel PROSet/Wireless attempts to connect to the wireless network. An Administrator Profile Failed to Authenticate This error occurs when the credentials in the profile are not accepted by the authenticator file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (11 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide such as access point or AAA server. Note: The Administrator Tool may or may not be installed on your system. For more information about the Administrator Tool, refer to Administrator Tool. Use the following steps to help resolve this error: 1. 2. 3. 4. Double-click the Intel PROSet/Wireless icon at the bottom right of the screen. From the Tools menu, select Administrator. Select the appropriate Administrator Profile from the profiles list. Click Properties. The Wireless Profile Properties – General Settings page appears. 5. Click Next. The Wireless Profile Properties – Security Settings page opens. 6. Edit the credentials such as WEP keys and certificates. 7. Click OK. The profile is now re-applied. Intel PROSet/Wireless attempts to connect to the wireless network. IT Administrator Profile Failed to Obtain an IP Address from the DHCP Server This error can occur due to an authentication failure with the network, incorrect encryption keys, or because of a DHCP server malfunction. Use the following steps to help resolve this error: 1. 2. 3. 4. 5. 6. 7. Double-click the Intel PROSet/Wireless icon at the bottom right of the screen. From the Tools menu, click IT Administration. Select the appropriate Administrator Profile from the profiles list. Click Properties. The Wireless Profile Properties – General Settings page opens Click Next. The Wireless Profile Properties – Security Settings page is opens. Edit the credentials such as WEP keys and certificates. Click OK. The profile is now re-applied. Intel PROSet/Wireless attempts to connect to the wireless network. Wireless Event Viewer The Wireless Event Viewer program displays a list of error log records. You can save all file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (12 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide available log records to a binary format file for sending to customer support. To launch Wireless Event Viewer, from the Tools menu, click Intel Wireless Troubleshooter, and then click Wireless Event Viewer. Wireless Event Viewer Name File Description Preferences: Change the storage location of the log file by selecting Preferences from the File menu. Click to display the Preference page. ● The available logs shall be saved to the following folder: The current folder is displayed in the text box. The default location is the desktop. Browse: Specify a new folder location. OK: Close the page and apply the new changes. Cancel: Close the page without applying any changes. Level Exit: Exit Intel Wireless Troubleshooter. The severity level of the connection event is indicated by an icon. The severity levels are: ● ● ● Description Date and Time Save As Clear Help? Information Error Warning Brief description of the connection event. Date and time of the detected connection event. This field can be sorted in ascending or descending order. Click the column header to sort the displayed events. Save the available log. You can use the suggested name or change it. Removes the information in the Wireless Event Viewer. Displays the help information for this page. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (13 of 14) [7/2/2004 12:30:06 PM] Troubleshooting: Intel PRO/Wireless 2915ABG Network Connection User's Guide file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/trouble.htm (14 of 14) [7/2/2004 12:30:06 PM] Glossary Back to Contents Glossary: Intel PRO/Wireless 2915ABG Network Connection User's Guide Term Definition 802.11 The 802.11 standard refers to a family of specifications developed by the IEEE for wireless LAN technology. The 802.11 specifies an over-the-air interface between a wireless client and a base station or between two wireless clients and provides 1 or 2 Mbps transmission in the 2.4 GHz band using either frequency hopping spread spectrum (FHSS) or direct sequence spread spectrum (DSSS). 802.11a The 802.11a standard specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. The 802.11a standard uses the Orthogonal Frequency Division Multiplexing (OFDM) transmission method. Additionally, the 802.11a standard supports 802.11 features such as WEP encryption for security. 802.11b 802.11b is an extension to 802.11 that applies to wireless LANS and provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band. 802.11b uses only DSSS. Throughput data rate 5+ Mbps in the 2.4 GHz band. 802.11g The 802.11g standard specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and WEP encryption for security. 802.11g networks are also referred to as Wi-Fi networks. 802.1x 802.1x is the IEEE Standard for Port-Based Network Access Control. This is used in conjunction with EAP methods to provide access control to wired and wireless networks. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (1 of 10) [7/2/2004 12:30:09 PM] Glossary Access Point Access point (AP). A stand-alone wireless hub that allows any computer that has a wireless network adapter to communicate with another computer and to connect to the Internet. Ad Hoc network A communication configuration in which every computer has the same capabilities, and any computer can initiate a communication session. Also known as a peer-to-peer network or a computer-tocomputer network. AES Advanced Encryption Standard. An additional replacement for WEP encryption. Available network One of the networks listed under Available networks on the Wireless Networks tab of the Wireless Configuration Utility (Windows 2000 environment) or Wireless Network Connection Properties (Windows XP environment). Any wireless network that is broadcasting and is within receiving range of the wireless adapter appears on the list. BER Bit error rate. The ratio of errors to the total number of bits being sent in a data transmission from one location to another. Bit Rate The total number of bits (ones and zeros) per second that a network connection can support. Note that this bit rate will vary, under software control, with different signal path conditions. Broadcast SSID Used to allow an access point to respond to clients on a wireless network by sending probes. BSSID A unique identifier for each wireless client on a wireless network. The Basic Service Set Identifier (BSSID) is the Ethernet MAC address of each adapter on the network. CA (certificate authority) A corporate certification authority implemented on a server. In addition, Internet Explorer’s certificate can import a certificate from a file. A trusted CA certificate is stored in the root store. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (2 of 10) [7/2/2004 12:30:09 PM] Glossary CCX Cisco Compatible eXtension. Cisco Compatible Extensions Program ensure that devices used on Cisco wireless LAN infrastructure meet the security, management and roaming requirements. Certificate Used for client authentication. A certificate is registered on the authentication server (i.e., RADIUS server) and used by the authenticator. CKIP Cisco Key Integrity Protocol (CKIP) is a Cisco proprietary security protocol for encryption in 802.11 media. CKIP uses a key message integrity check and message sequence number to improve 802.11 security in infrastructure mode. CKIP is Cisco's version of TKIP. Client computer The computer that gets its Internet connection by sharing either the host computer's connection or the Access Point's connection. DSSS Direct Sequence Spread Spectrum. Technology used in radio transmission. Incompatible with FHSS. EAP Short for Extensible Authentication Protocol, EAP sits inside of Point-to-Point Protocol’s (PPP) authentication protocol and provides a generalized framework for several different authentication methods. EAP is supposed to head off proprietary authentication systems and let everything from passwords to challenge-response tokens and publickey infrastructure certificates all work smoothly. EAP-FAST EAP-FAST, like EAP-TTLS and PEAP, uses tunneling to protect traffic. The main difference is that EAP-FAST does not use certificates to authenticate. EAP-TLS A type of authentication method using EAP and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates that use passwords. EAP-TLS authentication supports dynamic WEP key management. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (3 of 10) [7/2/2004 12:30:09 PM] Glossary EAP-TTLS A type of authentication method using EAP and Tunneled Transport Layer Security (TTLS). EAPTTLS uses a combination of certificates and another security method such as passwords. Encryption Scrambling data so that only the authorized recipient can read it. Usually a key is needed to interpret the data. FHSS Frequency-Hop Spread Spectrum. Technology used in radio transmission. Incompatible with DSSS. File and printer sharing A capability that allows a number of people to view, modify, and print the same file(s) from different computers. Fragmentation threshold The threshold at which the wireless adapter breaks the packet into multiple frames. This determines the packet size and affects the throughput of the transmission. GHz Gigahertz. A unit of frequency equal to 1,000,000,000 cycles per second. Host computer The computer that is directly connected to the Internet via a modem or network adapter. Infrastructure Network A wireless network centered around an access point. In this environment, the access point not only provides communication with the wired network, but also mediates wireless network traffic in the immediate neighborhood. IEEE Institute of Electrical and Electronics Engineers (IEEE) is an organization involved in defining computing and communications standards. Internet Protocol (IP) address The address of a computer that is attached to a network. Part of the address designates which network the computer is on, and the other part represents the host identification. LAN Local area network. A high-speed, low-error data network covering a relatively small geographic area. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (4 of 10) [7/2/2004 12:30:09 PM] Glossary LEAP Light Extensible Authentication Protocol. A version of Extensible Authentication Protocol (EAP). LEAP is an authentication implementation of 802.1x by Cisco, which provides a challenge-response authentication mechanism and dynamic WEP key assignment. MAC A hardwired address applied at the factory. It uniquely identifies network hardware, such as a wireless adapter, on a LAN or WAN. Mbps Megabits-per-second. Transmission speed of 1,000,000 bits per second. MHz Megahertz. A unit of frequency equal to 1,000,000 cycles per second. MIC Message integrity check (commonly called Michael). MS-CHAP An EAP mechanism used by the client. Microsoft Challenge Authentication Protocol (MSCHAP) Version 2, is used over an encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. ns Nanosecond. 1 billionth (1/1,000,000,000) of a second. OFDM Orthogonal Frequency Division Multiplexing. PEAP Protected Extensible Authentication Protocol (PEAP) is an Internet Engineering Task Force (IETF) draft protocol sponsored by Microsoft, Cisco, and RSA Security. PEAP creates an encrypted tunnel similar to the tunnel used in secure web pages (SSL). Inside the encrypted tunnel, a number of other EAP authentication methods can be used to perform client authentication. PEAP requires a TLS certificate on the RADIUS server, but unlike EAP-TLS there is no requirement to have a certificate on the client. PEAP has not been ratified by the IETF. The IETF is currently comparing PEAP and TTLS (Tunneled TLS) to determine an authentication standard for 802.1X authentication in 802.11 wireless systems. PEAP is an authentication type designed to take advantage of file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (5 of 10) [7/2/2004 12:30:09 PM] Glossary server-side EAP-Transport Layer Security (EAP-TLS) and to support various authentication methods, including user's passwords and one-time passwords, and Generic Token Cards. Peer-to-Peer Mode A wireless network structure that allows wireless clients to communicate with each other without using an access point. Power Save mode The state in which the radio is periodically powered down to conserve power. When the notebook is in Power Save mode, receive packets are stored in the AP until the wireless adapter wakes up. Preferred network One of the networks that has been configured. Such networks are listed under Preferred networks on the Wireless Networks tab of the Wireless Configuration Utility (Windows 2000 environment) or Wireless Network Connection Properties (Windows XP environment). RADIUS Remote Authentication Dial-In User Service (RADIUS) is an authentication and accounting system that verifies users credentials and grants access to requested resources. RF Radio Frequency. The international unit for measuring frequency is Hertz (Hz), which is equivalent to the older unit of cycles per second. One Mega-Hertz (MHz) is one million Hertz. One GigaHertz (GHz) is one billion Hertz. For reference: the standard US electrical power frequency is 60 Hz, the AM broadcast radio frequency band is 0.55 -1.6 MHz, the FM broadcast radio frequency band is 88-108 MHz, and microwave ovens typically operate at 2.45 GHz. Roaming Movement of a wireless node between two micro cells. Roaming usually occurs in infrastructure networks built around multiple access points. RTS threshold The number of frames in the data packet at or above which an RTS/CTS (request to send/clear to send) handshake is turned on before the packet is sent. The default value is 2347. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (6 of 10) [7/2/2004 12:30:09 PM] Glossary Shared Key An encryption key known only to the receiver and sender of data. SIM Subscriber Identity Module card is used to validate credentials with the network. A SIM card is a special smart card that is used by GSM-based digital cellular networks. Silent Mode Silent Mode Access Points or Wireless Routers have been configured to not broadcast the SSID for the wireless network. This makes it necessary to know the SSID in order to configure the wireless profile to connect to the access point or wireless router. Single Sign On Single Sign On feature set allows the 802.1x credentials to match your Windows log on user name and password credentials for wireless network connections. SSID Service Set Identifier. A value that controls access to a wireless network. The SSID for your wireless network card must match the SSID for any access point that you want to connect with. If the value does not match, you are not granted access to the network. You can have up to three SSIDs. Each SSID can be up to 32 characters long and is casesensitive. TKIP Temporal Key Integrity protocol improves data encryption. Wi-Fi Protected Access utilizes its TKIP. TKIP provides important data encryption enhancements including a re-keying method. TKIP is part of the IEEE 802.11i encryption standard for wireless LANs. TKIP is the next generation of WEP, the Wired Equivalency Protocol, which is used to secure 802.11 wireless LANs. TKIP provides perpacket key mixing, a message integrity check and a re-keying mechanism, thus fixing the flaws of WEP. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (7 of 10) [7/2/2004 12:30:09 PM] Glossary TLS Transport Layer Security. A type of authentication method using the Extensible Authentication Protocol (EAP) and a security protocol called the Transport Layer Security (TLS). EAP-TLS uses certificates which use passwords. EAP-TLS authentication supports dynamic WEP key management. The TLS protocol is intended to secure and authenticate communications across a public network through data encryption. The TLS Handshake Protocol allows the server and client to provide mutual authentication and to negotiate an encryption algorithm and cryptographic keys before data is transmitted. TTLS Tunneled Transport Layer Security. These settings define the protocol and the credentials used to authenticate a user. In TTLS, the client uses EAPTLS to validate the server and create a TLSencrypted channel between the client and server. The client can use another authentication protocol, typically password-based protocols, such as MD5 Challenge over this encrypted channel to enable server validation. The challenge and response packets are sent over a non-exposed TLS encrypted channel. TTLS implementations today support all methods defined by EAP, as well as several older methods (CHAP, PAP, MS-CHAP and MS-CHAPv2). TTLS can easily be extended to work with new protocols by defining new attributes to support new protocols. WEP Wired Equivalent Privacy. Wired Equivalent Privacy, 64- and 128-bit (64-bit is sometimes referred to as 40bit). This is a low-level encryption technique designed to give the user about the same amount of privacy that he would expect from a LAN. WEP is a security protocol for wireless local area networks (WLANs) defined in the 802.11b standard. WEP is designed to provide the same level of security as that of a wired LAN. WEP aims to provide security by data over radio waves so that it is protected as it is transmitted from one end point to another. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (8 of 10) [7/2/2004 12:30:09 PM] Glossary Wi-Fi Wireless Fidelity. Is meant to be used generically when referring of any type to 802.11 network, whether 802.11b, 802.11a, or dual-band. Wireless Router A stand-alone wireless hub that allows any computer that has a wireless network adapter to communicate with another computer and to connect to the Internet. Also known as an access point (AP). WLAN Wireless Local-Area Network. A type of local-area network that uses high-frequency radio waves rather than wires to communicate between nodes. WPA-Enterprise and WPAPersonal Wi-Fi Protected Access. A new standards-based, interoperable security technology for wireless LAN (subset of IEEE 802.11i draft standard) that encrypts data sent over radio waves. WPA is a Wi-Fi standard that was designed to improve upon the security features of WEP which includes two improvements over WEP: 1. Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys have not been tampered with. 2. User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. WPA is an interim standard that will be replaced with the IEEE’s 802.11i standard upon its completion. file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (9 of 10) [7/2/2004 12:30:09 PM] Glossary WPA-PSK Wi-Fi Protected Access - Pre-Shared Key (WPAPSK) mode does not use an authentication server. It can be used with the data encryption types: WEP or TKIP. WPA-PSK requires configuration of a preshared key (PSK). You must enter a pass phrase or 64 hex characters for a Pre-Shared Key of length 256bits. The data encryption key is derived from the PSK. Back to Top Back to Contents file:///C|/Documents%20and%20Settings/pguillor/Desktop/w2k5/glossary.htm (10 of 10) [7/2/2004 12:30:09 PM]
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Modify Date : 2004:07:23 10:25:04-07:00 Create Date : 2004:07:02 12:27:02Z Page Count : 163 Mod Date : 2004:07:23 10:25:04-07:00 Creation Date : 2004:07:02 12:27:02Z Producer : Acrobat Web Capture 5.0 Metadata Date : 2004:07:23 10:25:04-07:00 Title : Index Page Mode : UseOutlinesEXIF Metadata provided by EXIF.tools