HON HAI PRECISION IND 74487604 802.11 a/b/g/n MiniPCI module User Manual rev

HON HAI Precision Ind. Co., Ltd. 802.11 a/b/g/n MiniPCI module rev

User manual rev

Marvell. Moving Forward FasterDoc. No. MV-S800477-00, Rev. BAugust 14, 2007CONFIDENTIALDocument Classification: Proprietary Information CoverCB-85/MB-85/EC-85/MC-85WLAN Client CardsUser Guide
                                                  Document Conventions                         Note: Provides related information or information of special importance.                         Caution: Indicates potential damage to hardware or software, or loss of data.                         Warning: Indicates a risk of personal injury.Document StatusDoc Status: 2.00  Technical Publication: 0.x                         For more information, visit our website at: www.marvell.comDisclaimerNo part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the information, text, graphics, or other items contained within this document. Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use Marvell products in these types of equipment or applications. With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees: 1) Not to re-export or release any such information consisting of technology, software or source code controlled for national security reasons by the U.S. Export Control Regulations ("EAR"), to a national of EAR Country Groups D:1 or E:2; 2) Not to export the direct product of such technology or such software, to EAR Country Groups D:1 or E:2, if such technology or software and direct products thereof are controlled for national security reasons by the EAR; and, 3) In the case of technology controlled for national security reasons under the EAR where the direct product of the technology is a complete plant or component of a plant, not to export to EAR Country Groups D:1 or E:2 the direct product of the plant or major component thereof, if such direct product is controlled for national security reasons by the EAR, or is subject to controls under the U.S. Munitions List ("USML"). At all times hereunder, the recipient of any such information agrees that they shall be deemed to have manually signed this document in connection with their receipt of any such information. Copyright © 2007. Marvell International Ltd. All rights reserved. Marvell, the Marvell logo, Moving Forward Faster, Alaska, Fastwriter, Datacom Systems on Silicon, Libertas, Link Street, NetGX, PHYAdvantage, Prestera, Raising The Technology Bar, The Technology Within, Virtual Cable Tester, and Yukon are registered trademarks of Marvell. Ants, AnyVoltage, Discovery, DSP Switcher, Feroceon, GalNet, GalTis, Horizon, Marvell Makes It All Possible, RADLAN, UniMAC, and VCT are trademarks of Marvell. All other trademarks are the property of their respective owners.CB-85/MB-85/EC-85/MC-85 User Guide                         Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 2 Document Classification: Proprietary Information August 14, 2007, 2.00
Table of Contents                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 3 Table of ContentsTable of Contents .......................................................................................................................................3List of Figures............................................................................................................................................. 5List of Tables .............................................................................................................................................. 71 Introduction....................................................................................................................................91.1 Overview ...........................................................................................................................................................91.2 Wireless Networks ............................................................................................................................................91.2.1 Ad-Hoc Mode......................................................................................................................................91.2.2 Infrastructure Mode.............................................................................................................................92 Marvell Wireless Configuration Utility Overview...................................................................... 112.1 Overview .........................................................................................................................................................112.2 Marvell Wireless Configuration Utility..............................................................................................................112.2.1 Windows XP and Windows Server 2003 Users ................................................................................112.2.2 Tray Status Icons..............................................................................................................................122.3 Security ...........................................................................................................................................................133 Marvell Wireless Configuration Utility User Interface.............................................................. 153.1 Network Status Tab.........................................................................................................................................163.1.1 Select Profile.....................................................................................................................................163.1.2 Link Information ................................................................................................................................173.1.3 Signal Strength / Wireless Mode Indicator........................................................................................183.1.4 Internet Protocol (TCP/IP) ................................................................................................................183.1.5 Actual Throughput Performance.......................................................................................................193.1.6 Radio On/Off Check Box ..................................................................................................................193.2 Profile Manager Tab........................................................................................................................................213.2.1 Profile Setting—Network Info Tab ....................................................................................................223.2.2 Profile Setting—Security Tab............................................................................................................243.2.3 Legacy Authentication Modes...........................................................................................................253.2.3.1 Open System / Shared Key / Auto Switch..........................................................................263.2.3.2 WPA-PSK / WPA2-PSK .....................................................................................................283.2.4 802.1X Authentication Modes...........................................................................................................283.2.4.1 802.1X / WPA / WPA2 with EAP/TLS.................................................................................293.2.4.2 802.1X / WPA / WPA2 with PEAP......................................................................................363.2.4.3 802.1X / WPA / WPA2 with EAP/TTLS...............................................................................413.2.4.4 802.1X / WPA / WPA2 with LEAP ......................................................................................463.2.4.5 802.1X / WPA / WPA2 with EAP-FAST..............................................................................493.2.5 Profile Setting—Protocol Tab ...........................................................................................................52
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 4 Document Classification: Proprietary Information August 14, 2007, 2.00 3.3 Site Survey Tab...............................................................................................................................................533.3.1 Site Survey—Networks Filter............................................................................................................533.3.2 Site Survey—List of Detected Stations.............................................................................................543.3.3 Site Survey—Filter Button ................................................................................................................553.3.3.1 Network SSID.....................................................................................................................553.3.3.2 Network BSSID ..................................................................................................................553.3.3.3 Select Channel ...................................................................................................................553.3.4 Site Survey—Refresh Button............................................................................................................553.3.5 Site Survey—Associate Button .........................................................................................................553.4 Statistics Tab...................................................................................................................................................563.4.1 Signal Strength .................................................................................................................................563.4.2 Transmit Section...............................................................................................................................573.4.3 Receive Section................................................................................................................................583.4.4 Protocol Section................................................................................................................................583.5 Advanced Tab .................................................................................................................................................593.5.1 Advanced Tab—Marvell Wireless Card............................................................................................593.5.2 Advanced Tab—Miscellaneous ........................................................................................................603.6 AutoLink Tab ...................................................................................................................................................613.7 Admin Tab.......................................................................................................................................................633.7.1 Admin Tab—Import Profiles..............................................................................................................633.7.2 Admin Tab—Export Profiles .............................................................................................................633.7.3 Admin Tab—Autostart Marvell Wireless Configuration Utility...........................................................643.7.4 Admin Tab—Stop Windows Wireless Zero Configuration Service ...................................................643.8 About Tab........................................................................................................................................................64A Compliance Statements..............................................................................................................65A.1 Federal Communications Commission (FCC) Compliance.............................................................................65A.1.1 Transmitter Module Approval Conditions..........................................................................................65A.1.2 USA-Federal Communications Commission (FCC)..........................................................................65A.2 Industry Canada Notice...................................................................................................................................66A.3 Europe—EU Declaration of Conformity and Restrictions................................................................................67A.4 Taiwan DGT ....................................................................................................................................................68B Acronyms and Abbreviations.....................................................................................................69C Revision History ..........................................................................................................................71
List of Figures                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 5 List of Figures1 Introduction........................................................................................................................................ 92 Marvell Wireless Configuration Utility Overview ..........................................................................  11Figure 1: Marvell Wireless Configuration Utility Icon........................................................................................11Figure 2: Admin Tab—Stop Windows Wireless Zero Configuration Service ...................................................12Figure 3: Tray Status Icons Window ................................................................................................................123 Marvell Wireless Configuration Utility User Interface .................................................................. 15Figure 4: Network Status Tab ..........................................................................................................................16Figure 5: Select Profile Section........................................................................................................................16Figure 6: Link Information Section ...................................................................................................................17Figure 7: Signal Strength Bar...........................................................................................................................18Figure 8: Internet Protocol Section ..................................................................................................................18Figure 9: Actual Throughput Performance Section..........................................................................................19Figure 10: Radio On/Off Check Box ..................................................................................................................19Figure 11: Radio On/Off in the System Tray ......................................................................................................20Figure 12: Profile Manager Tab .........................................................................................................................21Figure 13: Network Info Tab (Infrastructure Network)........................................................................................22Figure 14: Network Info Tab (Ad-Hoc Network).................................................................................................23Figure 15: Security Tab—Authentication Modes ...............................................................................................25Figure 16: Security Tab—Open System with WEP............................................................................................26Figure 17: WEP Key Configuration Window ......................................................................................................26Figure 18: WEP Key Setting ..............................................................................................................................27Figure 19: Security Tab—WPA2-PSK with TKIP ...............................................................................................28Figure 20: Security Tab—WPA2 with EAP/TLS (Use Certificate)......................................................................29Figure 21: EAP/TLS (Use Certificate) Configuration Window—Client Authentication Tab ................................30Figure 22: Select Certificate Window (Client Certificates) .................................................................................31Figure 23: EAP/TLS Configuration Window—Server Authentication Tab ..........................................................32Figure 24: Select Certificate Window (Server Certificates) ................................................................................33Figure 25: Server Authentication—Trusted Domain or Server...........................................................................34Figure 26: Security Tab—WPA2 with PEAP ......................................................................................................36Figure 27: PEAP Configuration Window—Client Authentication Tab ................................................................37Figure 28: PEAP Configuration Window—Server Authentication Tab...............................................................38Figure 29: Select Certificate Window (Server Certificates) ................................................................................39Figure 30: Server Authentication—Trusted Domain or Server...........................................................................40Figure 31: Security Tab—WPA2 with EAP/TTLS...............................................................................................41Figure 32: EAP/TTLS Configuration Window—Client Authentication Tab .........................................................42Figure 33: EAP/TTLS Configuration Window—Server Authentication Tab........................................................43Figure 34: Select Certificate Window (Server Certificates) ................................................................................44Figure 35: Server Authentication—Trusted Domain or Server...........................................................................45
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 6 Document Classification: Proprietary Information August 14, 2007, 2.00 Figure 36: Security Tab—WPA2 with LEAP ......................................................................................................46Figure 37: LEAP Configuration Window ............................................................................................................47Figure 38: Security Tab—WPA2 with EAP-FAST ..............................................................................................49Figure 39: EAP-FAST Configuration Window ....................................................................................................50Figure 40: Protocol Tab .....................................................................................................................................52Figure 41: Site Survey Tab ................................................................................................................................53Figure 42: Site Survey—List of Detected Stations .............................................................................................54Figure 43: Site Survey—Advanced Filter Window .............................................................................................55Figure 44: Statistics Tab ....................................................................................................................................56Figure 45: Transmit Section...............................................................................................................................57Figure 46: Receive Section................................................................................................................................58Figure 47: Protocol Section................................................................................................................................58Figure 48: Advanced Tab...................................................................................................................................59Figure 49: Miscellaneous Section ......................................................................................................................60Figure 50: Access Point AutoLink Button...........................................................................................................61Figure 51: AutoLink Tab.....................................................................................................................................61Figure 52: AutoLink Tab (AutoLink Complete)...................................................................................................62Figure 53: Admin Tab ........................................................................................................................................63Figure 54: About Tab .........................................................................................................................................64A Compliance Statements ................................................................................................................... 65B Acronyms and Abbreviations..........................................................................................................69C Revision History ...............................................................................................................................71
List of Tables                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 7 List of Tables1 Introduction.........................................................................................................................................92 Marvell Wireless Configuration Utility Overview ........................................................................... 113 Marvell Wireless Configuration Utility User Interface ...................................................................15Table 1: Link Information Section Description ................................................................................................17Table 2: Internet Protocol Section Description ...............................................................................................19Table 3: Profile List Section Description .........................................................................................................21Table 4: Network Info Tab Description ...........................................................................................................23Table 5: WEP Key Configuration Window Description ...................................................................................27Table 6: EAP/TLS Configuration Window Description—Client Authentication Tab ........................................34Table 7: Select Certificate Window Description (Client Certificates) ..............................................................34Table 8: EAP/TLS Configuration Window Description—Server Authentication Tab .......................................35Table 9: Select Certificate Window Description (Server Certificates) .............................................................35Table 10: PEAP Configuration Window Description—Client Authentication Tab .............................................40Table 11: PEAP Configuration Window Description—Server Authentication Tab ............................................40Table 12: Select Certificate Window Description (Server Certificates).............................................................41Table 13: EAP/TTLS Configuration Window Description—Client Authentication Tab ......................................45Table 14: EAP/TTLS Configuration Window Description—Server Authentication Tab.....................................45Table 15: Select Certificate Window Description (Server Certificates).............................................................46Table 16: LEAP Configuration Window Description .........................................................................................48Table 17: EAP-FAST Configuration Window Description .................................................................................51Table 18: Protocol Tab Description ..................................................................................................................52Table 19: List of Detected Stations Description................................................................................................54Table 20: Transmit Section Description............................................................................................................57Table 21: Receive Section Description.............................................................................................................58Table 22: Protocol Section Description.............................................................................................................59Table 23: Advanced Tab Miscellaneous Section Description ...........................................................................60A Compliance Statements ................................................................................................................... 65Table 24: 802.11a Product Usage ....................................................................................................................68B Acronyms and Abbreviations..........................................................................................................69Table 25: Acronyms and Abbreviations ............................................................................................................69C Revision History ...............................................................................................................................71Table 26: Revision History................................................................................................................................71
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 8 Document Classification: Proprietary Information August 14, 2007, 2.00 THIS PAGE INTENTIONALLY LEFT BLANK
IntroductionOverview                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 9 1 Introduction1.1 OverviewThis document describes the functions of the Marvell Wireless Client Card Configuration Utility for the following Marvell® IEEE 802.11a/g/b and draft-802.11n WLAN client cards:Marvell CB-85 CardBus WLAN Client CardMarvell MB-85 Mini PCI WLAN Client CardMarvell EC-85 PCI Express WLAN Client CardMarvell MC-85 PCI Express WLAN Client Mini CardMarvell high throughput client cards are both IEEE 802.11a/g/b and draft-802.11n compliant.1.2 Wireless NetworksThe Marvell client cards operate similar to Ethernet cards, except that a radio replaces the wires between communication devices. All existing applications that operate over Ethernet operate over a Marvell wireless network without any modification or need for special wireless networking software. The Marvell client cards support the following network technologies:Ad-Hoc (peer-to-peer group) modeAccess Point (AP) Infrastructure mode1.2.1 Ad-Hoc ModeIn Ad-Hoc mode (also referred to as peer-to-peer mode), wireless clients send and receive information to other wireless clients without using an AP. In comparison to Infrastructure mode, this type of WLAN connection only contains wireless clients. Ad-Hoc mode is useful for establishing a network where wireless infrastructure does not exist or where services are not required. Two or more computers can establish an Ad-Hoc network when within range of one another. Ad-Hoc mode is used to connect network computers at home or in small offices. It can also be used to set up a temporary wireless network for meetings.1.2.2 Infrastructure ModeIn Infrastructure mode, wireless devices communicate with other wireless devices or devices on the LAN side wired network through APs. When communicating through wired networks, client cards send and receive information through APs.Access Points are typically strategically located within an area to provide optimal coverage for wireless clients. A large WLAN uses multiple APs to provide coverage over a wide area. APs connect to a LAN through a wired Ethernet connection. APs send and receive information from the LAN through this wired connection. Most corporate WLANs operate in Infrastructure mode because they require access to the wired LAN in order to use services such as file servers or printers.NoteFor information on installing the Marvell Wireless Configuration Utility, the Marvell client card, and the Marvell Windows driver, see the CB-85/MB-85/EC-85/MC-85 Installation Guide.For a list of acronyms used throughout this document see Appendix B, Acronyms and Abbreviations, on page 69.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 10 Document Classification: Proprietary Information August 14, 2007, 2.00 THIS PAGE INTENTIONALLY LEFT BLANK
Marvell Wireless Configuration Utility OverviewOverview                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 11 2Marvell Wireless Configuration Utility Overview2.1 OverviewThe Marvell Wireless Client Card Configuration Utility is a Windows® based application that allows configuration and management of the Marvell high throughput client cards. The Marvell Wireless Configuration Utility sets up profiles and performs other wireless network management tasks. For information on installing the Marvell Wireless Configuration Utility see the Installation Guide.2.2 Marvell Wireless Configuration UtilityOnce installed, the Marvell Wireless Configuration Utility is accessed from the Start menu or from the Desktop.Start menu:Start > Marvell Wireless Configuration UtilityStart > Programs > Marvell > Marvell Wireless Configuration UtilityDesktop:Double-click the Marvell Wireless Configuration Utility icon.2.2.1 Windows XP and Windows Server 2003 UsersFor Windows XP and Windows Server 2003, either the Windows Wireless Zero Configuration Service or the Marvell Wireless Configuration Utility can be used to configure the Marvell client card. For further information on the Windows Wireless Configuration Service, refer to the Windows documentation.Disabling Windows Wireless Zero Configuration ServiceTo disable the Windows Wireless Zero Configuration Service:1. Start the Marvell Wireless Configuration Utility.2. Click the Admin tab.Figure 1: Marvell Wireless Configuration Utility Icon                         NoteWhen using the Marvell Wireless Configuration Utility, Marvell recommends turning off the Windows Wireless Zero Configuration Service, which is enabled by default. Both utilities should not be used at the same time.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 12 Document Classification: Proprietary Information August 14, 2007, 2.00 3. Select the Stop Windows Wireless Zero Configuration Service check box.2.2.2 Tray Status IconsDifferent icons in the system tray indicate the status of the wireless connection.Figure 3: Tray Status Icons WindowFigure 2: Admin Tab—Stop Windows Wireless Zero Configuration Service                         Card UnpluggedConnectedNot Connected(red with “X” mark)(red)(green)
Marvell Wireless Configuration Utility OverviewSecurity                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 13 2.3 SecurityImplementing a security infrastructure to monitor physical access to WLAN networks is more difficult than monitoring access on wired networks. Unlike wired networks where a physical connection is required, anyone within the range of a wireless AP can send and receive frames, as well as listen for frames being sent. IEEE 802.11 and IEEE 802.1X define a set of standards and protocols for use in minimizing the security risks on wireless networks. These include the authentication modes used to authenticate the wireless client station and the wireless AP to be connected, complemented by different encryption methods used for data to be transmitted over the wireless network. Four of these security standards are as follows:802.1X—802.1X authentication provides authenticated access to 802.11 wireless networks and to wired Ethernet networks. 802.1X minimizes wireless network security risks by providing user and computer identification, centralized authentication, and encryption services based on the Wired Equivalent Privacy (WEP) algorithm. 802.1X supports the Extensible Authentication Protocol (EAP). EAP allows the use of different authentication methods, such as smart cards and certificates.Wired Equivalent Privacy (WEP)—WEP is a basic security implementation according to the IEEE 802.11 standard. Due to various security issues WEP encryption is vulnerable and was therefore superseded by WPA and WPA2 encryption.Wi-Fi Protected Access (WPA)—WPA is a security implementation based on a subset of the 802.11i standard. WPA provides enhanced security for wireless networks when used with the Temporal Key Integrity Protocol (TKIP) and the Message Integrity Check (MIC) algorithms.Wi-Fi Protected Access 2 (WPA2)—WPA2 is the next generation Wi-Fi security, based on the final 802.11i standard. WPA2 offers the strongest available security in the form of Advanced Encryption Standard (AES) level encryption, plus faster roaming between APs.Security ConfigurationsThe Marvell Wireless Configuration Utility supports the following security features:Authentication Modes•Open System•Shared Key•Auto Switch•WPA-PSK•WPA2-PSK•WPA•WPA2•802.1X Authentication Protocol (including support for Cisco® Compatible Extensions (CCX))-  EAP/Transport Layer Security (EAP/TLS) (equivalent to Microsoft “Smart Card or other Certificate”)-  Protected EAP (PEAP)-  EAP/Tunneled TLS Authentication Protocol (EAP/TTLS)- Light EAP (LEAP)- EAP-Flexible Authentication via Secure Tunneling (EAP-FAST)Encryption Methods•Security Off•WEP (including support for Cisco Message Integrity Check (CMIC) and Cisco Key Integrity Protocol (CKIP))
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 14 Document Classification: Proprietary Information August 14, 2007, 2.00 •TKIP (WPA, WPA-PSK)•AES (WPA2, WPA2-PSK)WEP Key Size•40-bit key (64-bit WEP)•104-bit key (128-bit WEP)
Marvell Wireless Configuration Utility User Interface                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 15 3 Marvell Wireless Configuration Utility User InterfaceThe Marvell Wireless Client Card Configuration Utility allows configuration of Marvell high throughput client cards through the following tabs:Network Status—displays the status of the network to which the user is connected. The Marvell Wireless Configuration Utility initializes on this page. Profile Manager—displays the current profiles and allows the user to set attributes for network type, security options and protocols, as well as create/modify/delete profiles.Site Survey—displays site survey information.Statistics—displays the statistics of the current session.Advanced—used to set protocol parameters.AutoLink—to set AutoLink connectionAdmin—used to import and export profiles. Additionally, the user can define how to use the Marvell Wireless Configuration Utility and the Windows Wireless Zero Configuration Service.About—provides information such as the driver version number, firmware version number, Marvell Wireless Configuration Utility version number, and Medium Access Controller (MAC) address of the client card.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 16 Document Classification: Proprietary Information August 14, 2007, 2.00 3.1 Network Status TabThe Network Status tab displays the status of the network. When the Marvell Wireless Configuration Utility initializes, it displays the Network Status tab.3.1.1 Select ProfileThe Select Profile section displays the name of the profile in use. Additional information about the profile is provided in the Profile Manager. Select one of the profiles previously defined by clicking the down arrow and highlighting a profile from the pull-down list.Profiles are created, modified, and deleted through the Profile Manager.Figure 4: Network Status Tab                         Figure 5: Select Profile Section
Marvell Wireless Configuration Utility User InterfaceNetwork Status Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 17 3.1.2 Link InformationThe Link Information section contains the current information about the wireless connection.                         Figure 6: Link Information Section                         Table 1: Link Information Section DescriptionField DescriptionStatus Status of the wireless network connection:•Card UnpluggedClient card is not plugged in, or client card is plugged in but not recognized.•ConnectedClient card is plugged in and connected to a wireless network.•No ConnectionClient card is plugged in, but no wireless connection.•No RadioClient card is plugged in, but the radio is turned off. To turn the radio on, clear the Radio Off check box.•Scanning forScanning for available APs and wireless stations in the area.•Waiting for peerWaiting for a peer station to connect to the wireless network (Ad-Hoc network only).Network SSID Network SSID label (i.e., Network Name). The Network Name is a text string of up to 32 characters.Network Type Type of environment connected to:•Infrastructure ModeIn this mode, wireless clients send and receive information through APs. The APs are strategically located within an area to provide optimal coverage for wireless clients. A large WLAN uses multiple APs to provide coverage over a wide area. APs can connect to a LAN through a wired Ethernet connection. APs send and receive information from the LAN through the wired connection.•Ad-Hoc ModeIn this mode, wireless clients send and receive information to other wireless clients without using an AP. This type of WLAN only contains wireless clients. Use Ad-Hoc mode to connect network computers at home or in small office, or to set up a temporary wireless network for a meeting. Network BSSID Network Basic Service Set (BSS) Identifier. The BSSID is a 48-bit identity used to identify a particular BSS within an area. In Infrastructure BSS networks, the BSSID is the MAC address of the AP. In Ad-Hoc networks, the BSSID is generated randomly.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 18 Document Classification: Proprietary Information August 14, 2007, 2.00 3.1.3 Signal Strength / Wireless Mode IndicatorThe color-coded Signal Strength bar displays the signal strength of the last packet received by the client card.  Signal strength is reported as a percentage. A signal in the red indicates a bad connection. A signal in the green indicates a good connection. The Wireless Mode indicator shows the data rates the client card operates. There are three modes:802.11a802.11b802.11g (backward compatible to 802.11b)3.1.4 Internet Protocol (TCP/IP)This section specifies the IP configuration of the client station when it is connected.Security Reports the type and level of security set. The security level is set through the Profile Setting of the Profile Manager tab. Configure security settings also through the Site Survey tab when connecting to a network.Tx/Rx Rates Current Tx Rate and Rx Rate of the channel being monitored.Table 1: Link Information Section Description (Continued)Field DescriptionFigure 7: Signal Strength Bar                         a means connected to an 802.11a capable APg means connected to an 802.11g capable APb means connected to an 802.11b capable APFigure 8: Internet Protocol Section
Marvell Wireless Configuration Utility User InterfaceNetwork Status Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 19                          3.1.5 Actual Throughput PerformanceThis section of the Network Status tab displays the Current Tx Rate and the Current Rx Rate of the channel being monitored.3.1.6 Radio On/Off Check BoxSelecting the Radio Off check box turns off the radio. Clearing the check box turns on the radio.Table 2: Internet Protocol Section DescriptionField DescriptionDHCP Option Dynamic Host Configuration Protocol. Either enabled or disabled.IP Address An identifier for a computer or device on a TCP/IP network. The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be 0 to 255.Subnet Mask A mask used to determine what subnet an IP address belongs to. An IP address has two components, the network part and the host part. The subnet mask specifies the network part of the IP address.Default Gateway The default node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the Web pages. In homes, the gateway is the Internet Service Provider (ISP) that connects the user to the Internet. Figure 9: Actual Throughput Performance Section                         NoteThese are actual throughput diagrams (without the WLAN overhead delivered by the client card).Figure 10: Radio On/Off Check Box
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 20 Document Classification: Proprietary Information August 14, 2007, 2.00 Another way to turn the radio on or off is to right-click the Configuration Utility icon in System Tray and select Turn Radio Off to turn the radio off. When the radio is off, select Turn Radio On to turn the radio back on.The system hot key Alt+F2 can also be used to turn the radio on/off. When the radio is off, there is no radio activity, and the following tabs are disabled:Profile ManagerSite SurveyStatistics AdvancedAutoLinkFigure 11: Radio On/Off in the System Tray
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 21 3.2 Profile Manager TabThe Profile Manager tab displays the profiles available and allows you to create, modify, and delete profiles.Profile Manager—Profile ListThe section on the left side of this tab lists all of the profiles available. Highlighting a profile selects it. If the check box next to the profile is selected, that profile is used in auto-configuration mode when the link is lost. If it is not selected, that profile is excluded in auto-configuration. The buttons associated with this window are as follows.Figure 12: Profile Manager Tab                         Table 3: Profile List Section DescriptionButton DescriptionApply Profile Applies the profile selected. Apply the profile by double-clicking the desired profile.Move Up/Down Moves the profile up and down in the list. All profiles with the Network Type set to Infrastructure are displayed before the profiles with the Network Type set to Ad-Hoc. In auto-configuration mode, the selected profiles at the top of the list have higher priority than selected profiles at the bottom of the list.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 22 Document Classification: Proprietary Information August 14, 2007, 2.00 Profile Manager—Profile SettingThe Profile Settings are used to set, modify, and display information about the profile selected in the Profile List section. The information is divided into three tabs:Network InfoSecurityProtocol3.2.1 Profile Setting—Network Info TabThe Profile Manager initially displays the Network Info tab.Delete Deletes a profile.Create Creates a profile.Save Saves changes made to a selected profile.Table 3: Profile List Section Description (Continued)Button DescriptionFigure 13: Network Info Tab (Infrastructure Network)
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 23                          The Network Info tab fields are as follows.Figure 14: Network Info Tab (Ad-Hoc Network)                         Table 4: Network Info Tab DescriptionField DescriptionProfile Name Name of profile selectedNetwork SSID Network SSID labelNetwork Type •InfrastructureConnects to an existing Infrastructure network•Ad-HocEither connects to an existing Ad-Hoc network or initiates a new Ad-Hoc networkWireless Mode •AutoConnects to an 802.11a network, to an 802.11g network, or to an 802.11b network•802.11aConnects to an 802.11a network only•802.11gConnects either to an 802.11g network or to an 802.11b network•802.11bConnects to an 802.11b network only•802.11n (2.4 GHz)Connects to an 802.11n network with 2.4 GHz•802.11n (5 GHz)Connects to an 802.11n network with 5 GHzPreferred Channel Channel being used for an Ad-Hoc network initiated by the client cardThe channel can be selected only at creation of a new profile (Ad-Hoc network only).
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 24 Document Classification: Proprietary Information August 14, 2007, 2.00                          3.2.2 Profile Setting—Security TabClicking the Security tab displays the following security options:Authentication ModeEncryption Method (Security off, WEP, TKIP, and AES)Key settings (for legacy authentication modes) or 802.1X Authentication Protocol selection (for 802.1X authentication modes)Region Code Sets the region codeAvailable options are Default, USA (FCC), Canada (IC), Europe (ETSI), Spain, France, Japan (MKK), Taiwan (DGT), and Australia/Korea802.11n Network Enables/disables draft-802.11n functionalityIf enabled, the Modulation and Coding Scheme (MCS) index and 802.11n options can be configured.Channel Width Sets the channel bandwidthAvailable options are Auto, 20 MHz, and 40 MHz. The default is Auto.Guard Interval Sets the Guard IntervalAvailable options are Auto, Standard, and Short. The default is Auto.Extension Channel Sets the extension channel mode when bandwidth is 40 MHzAvailable options are Auto, None, Lower, and Upper. The default is Auto.Antenna Selection Sets the antenna selectionsAvailable options are Auto, Antenna A, Antenna B, 2 by 2, and 2 by 3. The default is Auto.NoteThe fields Wireless Mode and Preferred Channel are used only when a new Ad-Hoc network is initiated by the client card. These two attributes are ignored when the client card is connected to an existing Ad-Hoc network with the same desired SSID.Table 4: Network Info Tab Description (Continued)Field Description
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 25                                                    3.2.3 Legacy Authentication ModesThe Marvell Wireless Configuration Utility currently supports the following legacy authentication modes:Open System—Open Authentication (no key or a pre-shared WEP key is required)Shared Key—Shared Authentication (a pre-shared WEP key is required)Auto Switch—Auto Select Authentication modes (no key or a pre-shared WEP key is required)WPA-PSK—WPA Pre-Shared KeyWPA2-PSK—WPA2 Pre-Shared KeyIf Open System or Auto Switch is selected as Authentication Mode, Security off and WEP are available as Encryption Method. If Shared Key is selected as Authentication Mode, WEP is pre-selected as Encryption Method. For details on how to configure the WEP key(s), see Section 3.2.3.1.If WPA-PSK or WPA2-PSK is selected as Authentication Mode, AES and TKIP are available as Encryption Method. For details on how to define the pre-shared key, see Section 3.2.3.2.Figure 15: Security Tab—Authentication Modes                         NoteThe authentication modes available depend on the network type selected on the Network Info tab. For Ad-Hoc networks, only Open System and Shared Key are available.NoteThe authentication modes available depend on the network type selected on the Network Info tab. For Ad-Hoc networks, only authentication modes without encryption or with WEP key are available.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 26 Document Classification: Proprietary Information August 14, 2007, 2.00 3.2.3.1 Open System / Shared Key / Auto Switch                         The WEP key configuration for the authentication modes Open System, Shared Key, and Auto Switch is identical:1. Click Configure WEP Keys.The Configure WEP Key window is displayed. For a detailed description of this window, see Table 5 on page 27.Figure 16: Security Tab—Open System with WEP                         Figure 17: WEP Key Configuration Window
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 27 2. Select the required Key Format and Key Size.3. Enter the Transmit Key(s).4. Click OK to return to the Security tab of the Profile Settings.5. Select the WEP key to be used for the transmission.6. Click Save to set the configuration.                         NoteUp to four WEP keys are supported. The WEP key used for the transmission must be identical on the sending and receiving station.Figure 18: WEP Key Setting                         Table 5: WEP Key Configuration Window DescriptionField DescriptionKey Format Either ASCII characters or hexadecimal digitsKey Size • 40-bit, 5 character ASCII key size (40-bit, 10 hexadecimal digits)• 104-bit, 13 character ASCII key size (104-bit, 26 hexadecimal digits)Transmit Key/Key Value Key to be used as transmit key. The key value is in ASCII or hexadecimal, depending on the format selected. The key value size shown depends on the key size selected.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 28 Document Classification: Proprietary Information August 14, 2007, 2.00 3.2.3.2 WPA-PSK / WPA2-PSK                         The definition of the pre-shared key is identical for both WPA-PSK/WPA2-PSK with TKIP/AES:1. Enter the pre-shared key into the Passphrase and Confirm boxes.The passphrase must contain between 8 and 63 ASCII characters.2. Click Save to set the configuration.3.2.4 802.1X Authentication ModesThe Marvell Wireless Configuration Utility currently supports the following 802.1X authentication modes:802.1X—Open System with 802.1X Authentication (EAP/TLS, PEAP, EAP/TTLS, LEAP or EAP-FAST)WPA—WPA with 802.1X Authentication (EAP/TLS, PEAP, EAP/TTLS, LEAP or EAP-FAST)WPA2—WPA2 with 802.1X Authentication (EAP/TLS, PEAP, EAP/TTLS, LEAP or EAP-FAST)For all 802.1X authentication modes, CCX support can be enabled.If 802.1X (Open System) is selected as Authentication Mode, WEP is pre-selected as Encryption Method. If WPA or WPA2 is selected, TKIP and AES are available as Encryption Method. For details on how to define the different 802.1X authentication protocols (EAP/TLS, PEAP, EAP/TTLS, LEAP, and EAP-FAST), see the following subsections.Figure 19: Security Tab—WPA2-PSK with TKIP
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 29 3.2.4.1 802.1X / WPA / WPA2 with EAP/TLS                         The definition of the EAP/TLS authentication protocol for the authentication modes 802.1X, WPA, and WPA2 is identical:1. Select EAP/TLS (Use Certificate) as 802.1X Authentication Protocol.2. Click Configure.The EAP/TLS (Use Certificate) window is displayed. For a detailed description of this window, see Table 6 on page 34.Figure 20: Security Tab—WPA2 with EAP/TLS (Use Certificate)
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 30 Document Classification: Proprietary Information August 14, 2007, 2.00                          3. On the Client Authentication tab, enter your Login Name.4. Click Browse.The Select Certificate window is displayed. For a detailed description of this window, see Table 7 on page 34.Figure 21: EAP/TLS (Use Certificate) Configuration Window—Client Authentication Tab
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 31                          5. In the Certificates in Store list, click the personal certificate to be used for the client authentication.6. Click Select to confirm your selection and to return to the EAP/TLS (Use Certificate) window.7. If you want to specify particular server certificates to be accepted (instead of accepting any certificate sent by the server), click the Server Authentication tab. For a detailed description of this window, see Table 8 on page 35. Otherwise, continue with step 14.Figure 22: Select Certificate Window (Client Certificates)                         NoteIf the required certificate is not yet installed on your system or if you do not know which certificate to use, contact your network administrator.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 32 Document Classification: Proprietary Information August 14, 2007, 2.00                          8. Select the required Server Validation Method.9. For Accept only trusted certificates or Accept certificates from trusted server/domain, click Add to select the appropriate certificate. The Select Certificate window is displayed. For a detailed description of this window, see Table 9 on page 35.Figure 23: EAP/TLS Configuration Window—Server Authentication Tab
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 33                          10. On the Select Certificate window, select the Certificate Store.11. From the Certificates in Store list, click the certificate to be used for the server authentication.12. Click Select to confirm your selection and to return to the EAP/TLS (Use Certificate) window.13. If you have selected Accept certificates from trusted server/domain, enter the appropriate server name or domain name into the Trusted Domain or Server box.Figure 24: Select Certificate Window (Server Certificates)                         NoteIf the required certificate is not yet installed on your system or if you do not know which certificate to use, contact your network administrator.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 34 Document Classification: Proprietary Information August 14, 2007, 2.00                          14. Click OK to return to the Security tab of the Profile Settings.15. If CCX compatibility is required, select the Enable Cisco Compatible Extensions (CCX) check box.16. Click Save to set the configuration.                                                  Figure 25: Server Authentication—Trusted Domain or Server                         Table 6: EAP/TLS Configuration Window Description—Client Authentication TabField/Button DescriptionLogin Name Login name to the authentication serverCertificate Certificate to be used for client authenticationView Shows the selected certificateBrowse Selects the certificate from the certificates storeTable 7: Select Certificate Window Description (Client Certificates)Area DescriptionSelect Certificate Store Certificate stores with certificates to be used for client authentication:•My Personal CertificatesContains personal certificates•Certification Authority CertificatesContains certificates issued by a Certification Authority (CA) (for server authentication only)•Root CertificatesContains certificates issued by a CA who uses an own Trusted Root CA certificate (for server authentication only)•Software Publisher CertificatesContains certificates issued by a software publisher (for server authentication only)Certificates in Store Lists the personal certificates installed on the client system
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 35                                                   Table 8: EAP/TLS Configuration Window Description—Server Authentication TabArea/Button DescriptionServer Validation Method Certificates to be accepted for server authentication:•Accept any server certificate•Accept only trusted certificates•Accept certificates from trusted server/domainTrusted Certificates Lists the trusted certificates installed on the client systemRequired, when Accept only trusted certificates or Accept certificates from trusted server/domain is selected. The appropriate root certificate of the server/domain must also be installed on the client system.View Shows the selected certificateRemove Deletes the selected certificate from the Trusted Certificates listAdd Selects the certificate from the certificates storeTrusted Domain or Server Domain or server the certificate to be trusted is received fromRequired, when Accept certificates from trusted server/domain is selectedTable 9: Select Certificate Window Description (Server Certificates)Area DescriptionSelect Certificate Store Certificate stores with certificates to be used for server authentication:•My Personal CertificatesContains personal certificates (for client authentication only)•Certification Authority CertificatesContains certificates issued by a CA•Root CertificatesContains certificates issued by a CA who uses an own Trusted Root CA certificate•Software Publisher CertificatesContains certificates issued by a software publisherCertificates in Store Lists the certificates installed in the selected certificate store on the client system
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 36 Document Classification: Proprietary Information August 14, 2007, 2.00 3.2.4.2 802.1X / WPA / WPA2 with PEAP                         The definition of the PEAP authentication protocol for the authentication modes 802.1X, WPA, and WPA2 is identical:1. Select Protected EAP (PEAP) as 802.1X Authentication Protocol.2. Click Configure.The Protected EAP (PEAP) window is displayed. For a detailed description of this window, see Table 10 on page 40.Figure 26: Security Tab—WPA2 with PEAP
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 37                          3. On the Client Authentication tab, enter your Login Name, Password, and Domain.The domain information is optional.4. From the Inner EAP Protocols list, select the EAP protocol to be used.If required, change the order of preference.5. If you have selected EAP-GTC, select the credentials to be used for login.6. If you want to specify particular server certificates to be accepted (instead of accepting any certificate sent by the server), click the Server Authentication tab. For a detailed description of this window, see Table 11 on page 40. Otherwise, continue with step 13.Figure 27: PEAP Configuration Window—Client Authentication Tab
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 38 Document Classification: Proprietary Information August 14, 2007, 2.00                          7. Select the required Server Validation Method.8. For Accept only trusted certificates or Accept certificates from trusted server/domain, click Add to select the appropriate certificate.The Select Certificate window is displayed. For a detailed description of this window, see Table 12 on page 41.Figure 28: PEAP Configuration Window—Server Authentication Tab
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 39                          9. On the Select Certificate window, select the Certificate Store.10. From the Certificates in Store list, click the certificate to be used for the server authentication.11. Click Select to confirm your selection and to return to the Protected EAP (PEAP) window.12. If you have selected Accept certificates from trusted server/domain, enter the server name or the domain name into the Trusted Domain or Server box.Figure 29: Select Certificate Window (Server Certificates)                         NoteIf the required certificate is not yet installed on your system or if you do not know which certificate to use, contact your network administrator.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 40 Document Classification: Proprietary Information August 14, 2007, 2.00                          13. Click OK to return to the Security tab of the Profile Settings.14. If CCX compatibility is required, select the Enable Cisco Compatible Extensions (CCX) check box.15. Click Save to set the configuration.                                                  Figure 30: Server Authentication—Trusted Domain or Server                         Table 10: PEAP Configuration Window Description—Client Authentication TabArea/Field DescriptionLogin Name Login name to the authentication serverPassword Password for login to the authentication serverDomain Domain name for login to the authentication server (optional)Inner EAP Protocols EAP protocol to be used for inner (client) authentication:•EAP/MS-CHAP V2Uses Microsoft Challenge Handshake Authentication Protocol (CHAP) v2 for authentication•EAP-GTCUses Generic Token Card (GTC) for authenticationCredentials to use for inner EAP-GTCCredentials to be used for inner (client) authentication:•My PasswordUses a user-specific password•Token informationUses a token that generates a one-time passwordRequired, when EAP-GTC is selected as Inner EAP ProtocolTable 11: PEAP Configuration Window Description—Server Authentication TabArea/Button DescriptionServer Validation Method Certificates to be accepted for server authentication:•Accept any server certificate•Accept only trusted certificates•Accept certificates from trusted server/domainTrusted Certificates Lists the trusted certificates installed on the client systemRequired, when Accept only trusted certificates or Accept certificates from trusted server/domain is selected. The appropriate root certificate of the server/domain must also be installed on the client system.View Shows the selected certificateRemove Deletes the selected certificate from the Trusted Certificates list
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 41                          3.2.4.3 802.1X / WPA / WPA2 with EAP/TTLS                         Add Selects the certificate from the certificates storeTrusted Domain or Server Domain or server the certificate to be trusted is received fromRequired, when Accept certificates from trusted server/domain is selectedTable 12: Select Certificate Window Description (Server Certificates)Area DescriptionSelect Certificate Store Certificate stores with certificates to be used for server authentication:•My Personal CertificatesContains personal certificates (for client authentication only)•Certification Authority CertificatesContains certificates issued by a CA•Root CertificatesContains certificates issued by a CA who uses an own Trusted Root CA certificate•Software Publisher CertificatesContains certificates issued by a software publisherCertificates in Store Lists the certificates installed in the selected certificate store on the client systemTable 11: PEAP Configuration Window Description—Server Authentication Tab Area/Button DescriptionFigure 31: Security Tab—WPA2 with EAP/TTLS
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 42 Document Classification: Proprietary Information August 14, 2007, 2.00 The definition of the EAP/TTLS authentication protocol for the authentication modes 802.1X, WPA, and WPA2 is identical:1. Select EAP/Tunneled TLS (TTLS) as 802.1X Authentication Protocol.2. Click Configure.The EAP/Tunneled TLS (TTLS) window is displayed. For a detailed description of this window, see Table 13 on page 45.3. On the Client Authentication tab, enter your Anonymous Name, Login Name, Password, and Domain.The domain information is optional.4. If you want to specify particular server certificates to be accepted (instead of accepting any certificate sent by the server), click the Server Authentication tab. For a detailed description of this window, see Table 14 on page 45.Otherwise, continue with step 11.Figure 32: EAP/TTLS Configuration Window—Client Authentication Tab
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 43                          5. Select the required Server Validation Method.6. For Accept only trusted certificates or Accept certificates from trusted server/domain, click Add to select the appropriate certificate.The Select Certificate window is displayed. For a detailed description of this window, see Table 15 on page 46.Figure 33: EAP/TTLS Configuration Window—Server Authentication Tab
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 44 Document Classification: Proprietary Information August 14, 2007, 2.00                          7. On the Select Certificate window, select the Certificate Store.8. From the Certificates in Store list, click the certificate to be used for the server authentication.9. Click Select to confirm your selection and to return to the EAP/Tunneled TLS (TTLS) window.10. If you have selected Accept certificates from trusted server/domain, enter the server name or the domain name into the Trusted Domain or Server box.Figure 34: Select Certificate Window (Server Certificates)                         NoteIf the required certificate is not yet installed on your system or if you do not know which certificate to use, contact your network administrator.
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 45                          11. Click OK to return to the Security tab of the Profile Settings.12. If CCX compatibility is required, select the Enable Cisco Compatible Extensions (CCX) check box.13. Click Save to set the configuration.                                                  Figure 35: Server Authentication—Trusted Domain or Server                         Table 13: EAP/TTLS Configuration Window Description—Client Authentication TabField DescriptionInner Authentication Protocol Protocol to be used for inner (client) authenticationAnonymous Name Anonymous login name to the authentication serverLogin Name Login name to the authentication serverPassword Password for login to the authentication serverDomain Domain name for login to the authentication server (optional)Table 14: EAP/TTLS Configuration Window Description—Server Authentication TabArea/Button DescriptionServer Validation Method Certificates to be accepted for server authentication:•Accept any server certificate•Accept only trusted certificates•Accept certificates from trusted server/domainTrusted Certificates Lists the trusted certificates installed on the client systemRequired, when Accept only trusted certificates or Accept certificates from trusted server/domain is selected. The appropriate root certificate of the server/domain must also be installed on the client system.View Shows the selected certificateRemove Deletes the selected certificate from the Trusted Certificates listAdd Selects the certificate from the certificates storeTrusted Domain or Server Domain or server the certificate to be trusted is received fromRequired, when Accept certificates from trusted server/domain is selected
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 46 Document Classification: Proprietary Information August 14, 2007, 2.00                          3.2.4.4 802.1X / WPA / WPA2 with LEAP                         The definition of the LEAP authentication protocol for the authentication modes 802.1X, WPA, and WPA2 is identical:1. Select Light EAP (LEAP) as 802.1X Authentication Protocol.2. Click Configure.The LEAP Configuration window is displayed. For a detailed description of this window, see Table 16 on page 48.Table 15: Select Certificate Window Description (Server Certificates)Area DescriptionSelect Certificate Store Certificate stores with certificates to be used for server authentication:•My Personal CertificatesContains personal certificates (for client authentication only)•Certification Authority CertificatesContains certificates issued by a CA•Root CertificatesContains certificates issued by a CA who uses an own Trusted Root CA certificate•Software Publisher CertificatesContains certificates issued by a software publisherCertificates in Store Lists the certificates installed in the selected certificate store on the client systemFigure 36: Security Tab—WPA2 with LEAP
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 47                          3. Under Logon Settings, select the user credentials (and, if required, Login Name, Password, and Domain) to be used for the client authentication.Use Windows user name and password is only available if Enable single sign-on is selected.4. If required, specify further settings under Options.5. Click OK to return to the Security tab of the Profile Settings.6. If CCX compatibility is required, select the Enable Cisco Compatible Extensions (CCX) check box.7. Click Save to set the configuration.Figure 37: LEAP Configuration Window                         NoteTo enable single sign-on, administrator rights are required.Using single sign-on authentication for the first time requires a restart of your system after having saved the LEAP configuration.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 48 Document Classification: Proprietary Information August 14, 2007, 2.00                          Table 16: LEAP Configuration Window DescriptionArea/Field DescriptionLogon Settings Credentials to be used for login to the authentication server:•Use stored user credentials below•Login Name—Login name to the authentication server•Password—Password for login to the authentication server•Domain—Domain name for login to the authentication server (optional)•Prompt for User CredentialsCredentials are to be entered during authentication (are not stored in the profile).•Use Windows user name and password (available only when Enable single sign-on is selected)Windows user name and password are used for login to the authentication server. Additionally, Include Windows domain in Windows logon information can be selected.Options •Enable single sign-onWindows user credentials are used for login to the authentication server (see Logon Settings)•Allow fast roaming (CCKM)Enables Cisco Centralized Key Management (CCKM) which allows for fast roaming without involving the authentication server•Authentication timeout value (seconds)Time to be waited before assuming the authentication failed. Default value is 90.•Restrict time finding domain controller to (seconds)Maximum time allowed to find the domain controller, included in the overall authentication time. Default value is 60.
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 49 3.2.4.5 802.1X / WPA / WPA2 with EAP-FAST                         The definition of the EAP-FAST authentication protocol for the authentication modes 802.1X, WPA, and WPA2 is identical:1. Select EAP-FAST as 802.1X Authentication Protocol.2. Click Configure.The EAP-FAST Configuration window is displayed. For a detailed description of this window, see Table 17 on page 51.Figure 38: Security Tab—WPA2 with EAP-FAST
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 50 Document Classification: Proprietary Information August 14, 2007, 2.00                          3. Under Logon Settings, select the user credentials (and, if required, Login Name, Password, and Domain) to be used for the client authentication.Use Windows user name and password is only available if Enable single-signon is selected.4. If automatic Protected Access Credentials (PAC) provisioning is required, select the Allow Automatic PAC Provisioning check box, and enter the appropriate Authority ID.5. If required, specific further settings under Options.6. Click OK to return to the Security tab of the Profile Settings.Figure 39: EAP-FAST Configuration Window                         NoteTo enable single sign-on, administrator rights are required.Using single sign-on authentication for the first time requires a restart of your system after having saved the EAP-FAST configuration.
Marvell Wireless Configuration Utility User InterfaceProfile Manager Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 51 7. If CCX compatibility is required, select the Enable Cisco Compatible Extensions (CCX) check box.8. Click Save to set the configuration.                         Table 17: EAP-FAST Configuration Window DescriptionArea/Button DescriptionLogon Settings Credentials to be used for login to the authentication server:•Use stored user credentials below•Login Name—Login name to the authentication server•Password—Password for login to the authentication server•Domain—Domain name for login to the authentication server (optional)•Prompt for User CredentialsCredentials are to be entered during authentication (are not stored in the profile).•Use Windows user name and password (available only when Enable single sign-on is selected)Windows user name and password are used for login to the authentication server. Additionally, Include Windows domain in Windows logon information can be selected.Protected Access Credentials (PAC)Allows automatic PAC provisioningImport Selects authority ID of the authentication serverOptions •Enable single sign-onWindows user credentials are used for login to the authentication server (see Logon Settings)•Allow fast roaming (CCKM)Enables Cisco Centralized Key Management (CCKM) which allows for fast roaming without involving the authentication server•Authentication timeout value (seconds)Time to be waited before assuming the authentication failed. Default value is 90.•Restrict time finding domain controller to (seconds)Maximum time allowed to find the domain controller, included in the overall authentication time. Default value is 60.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 52 Document Classification: Proprietary Information August 14, 2007, 2.00 3.2.5 Profile Setting—Protocol TabThe Protocol tab allows you to set or change the protocol information.Do not change settingsIf this check box is selected, the protocol setting is not changed when the profile is applied.Use below settingsIf the Do not change setting check box is not selected, the protocol settings include the following parameters.                         Figure 40: Protocol Tab                         Table 18: Protocol Tab DescriptionField DescriptionPower Save Mode Sets the power mode. Available options are Continuous Access or Max Power Save. The default setting is Continuous Access.Preamble (802.11b)  Sets the Radio Preamble to Auto, Short or Long.Transmit Rate The range of the data rate depends on the type of AP that the client card is connected to. The default setting is Auto Select.MCS index will be allowed to select when the 802.11n Network check box in the Network Info tab is selected.Fragment Threshold Sets the fragmentation threshold (the size that packets are fragmented into for transmission). The default setting is 2346.RTS/CTS Threshold Sets the packet size at which the AP issues a Request-To-Send (RTS) or Clear-To-Send (CTS) frame before sending the packet. The default setting is 2347.Reset Resets the protocol settings to their default values
Marvell Wireless Configuration Utility User InterfaceSite Survey Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 53 3.3 Site Survey TabThe Site Survey tab displays a list of all peer-to-peer (Ad-Hoc) and AP stations within range of the client card.3.3.1 Site Survey—Networks FilterThis section lets you customize which sites are displayed in the Site Survey list:Display Peer-To-Peer stations—selecting this check box displays all peer-to-peer (Ad-Hoc) stations within range.Display 802.11a Access Points—selecting this check box displays all 802.11a APs within range.Display 802.11g Access Points—selecting this check box displays all 802.11g APs within range.Display 802.11b Access Points—selecting this check box displays all 802.11b APs within range.Figure 41: Site Survey Tab
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 54 Document Classification: Proprietary Information August 14, 2007, 2.00 3.3.2 Site Survey—List of Detected StationsThis section reports information on the peer-to-peer (Ad-Hoc) stations or AP stations detected.                         Figure 42: Site Survey—List of Detected Stations                         Circle means connected802.11g AP Icon802.11b AP IconAd-Hoc Network802.11a AP IconTable 19: List of Detected Stations DescriptionField DescriptionNetwork SSID Network SSID label (i.e., the Network Name). The Network Name is a text string.MAC Address MAC address, a hardware address that uniquely identifies each node of a networkSecurity Security enabled or disabledCH Channel used by the detected deviceSignal Signal strength of the detected device as a percentageIcons The following icons may be displayed left of the Network SSID:• An antenna icon with a subscript a indicates an 802.11a AP.• An antenna icon with a subscript b indicates an 802.11b AP.• An antenna icon with a subscript g indicates an 802.11g AP.• A circle around the antenna icon means the client card is connected to this network.• A slash icon indicates an Ad-Hoc network.WMM Wireless Multimedia Enhancements (WMM) supported by the detected deviceEWC  Draft-802.11n functionality supported by the detected deviceNetwork Type Type of environment connected to: Ad-Hoc or Infrastructure
Marvell Wireless Configuration Utility User InterfaceSite Survey Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 55 3.3.3 Site Survey—Filter ButtonClicking the Filter button displays the Advanced Filter window.3.3.3.1 Network SSIDAny SSID—no specific SSID is used when scanning for available networks in the area.Find network with this SSID—the utility searches for the specified SSID.3.3.3.2 Network BSSIDAny BSSID—no specific BSSID is used when scanning for available networks in the area.Find network with this BSSID—the utility searches for the specified BSSID.3.3.3.3 Select ChannelScan all channels—all channels are scanned when searching for available networks in the area.Scan channel Only—only the specified channel is scanned when searching for available networks in the area.Scan Channel to Channel—a range of channels are scanned when searching for available networks in the area.3.3.4 Site Survey—Refresh ButtonTo request a survey of the wireless networks in the area, click Refresh.3.3.5 Site Survey—Associate ButtonTo establish a connection, select an available network, and then click Associate. Alternatively, the connection can be established by double-clicking the selected network.Figure 43: Site Survey—Advanced Filter Window
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 56 Document Classification: Proprietary Information August 14, 2007, 2.00 3.4 Statistics TabClicking the Statistics tab displays the statistics of the current connect session.3.4.1 Signal StrengthThe color-coded Signal Strength bar displays the signal strength of the last packet received by the client card. Signal strength is reported as a percentage. A signal in the red indicates a bad connection. A signal in the green indicates a good connection.Figure 44: Statistics Tab
Marvell Wireless Configuration Utility User InterfaceStatistics Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 57 3.4.2 Transmit SectionThe Transmit section displays the information on the packets sent.                         Figure 45: Transmit Section                         Table 20: Transmit Section DescriptionField DescriptionTotal Packet Reports the total number of packets transmittedUnicast Packet Reports the number of packets transmitted by the client card that were destined for a single network nodeMulticast Packet Reports the number of packets transmitted by the client card that were destined for more than one network nodeSingle Retries Reports the number of packets that require one retry before the client card received an acknowledgement.NOTE: After the client card sends a packet, it waits for an acknowledge from the receiving radio to confirm that the packet was successfully received. If the acknowledge is not received within a specified period of time, the client card retransmits the packet. Multiple Retries Reports the number of packets that require more than one retry before the client card received an acknowledgementFailed Count Reports the number of packets that were not successfully transmitted because the client card did not receive an acknowledge within the specified period of timeRTS Success Reports the number of RTS attempts that were successfulRTS Failure Reports the number of RTS attempts that were not successfulACK Error Reports the number of unicast transmit attempts for which no acknowledgement was received
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 58 Document Classification: Proprietary Information August 14, 2007, 2.00 3.4.3 Receive SectionThe Receive section displays the information on the packets received.                         3.4.4 Protocol SectionThe Protocol section displays the information on the protocol status.Figure 46: Receive Section                         Table 21: Receive Section DescriptionField DescriptionTotal Packet Reports the total number of packets receivedUnicast Packet Reports the number of packets received by the client card that were destined for a single network nodeMulticast Packet Reports the number of packets received by the client card that were destined for more than one network nodeDuplicate Frame Reports the number of duplicate frames receivedReceived Beacons Reports the number of beacons received after association is establishedBeacon Loss Reports the number of missing beacons after association is establishedFigure 47: Protocol Section
Marvell Wireless Configuration Utility User InterfaceAdvanced Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 59                          3.5 Advanced TabThe Advanced tab displays the advanced parameters available for the installed Marvell client cards.3.5.1 Advanced Tab—Marvell Wireless CardThis section of the Advanced tab reports the type of Marvell client card installed.Table 22: Protocol Section DescriptionField DescriptionPreamble Displays radio preamble type:•Auto• Short•LongTx Power Displays transmit power mode (in dBm)Figure 48: Advanced Tab
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 60 Document Classification: Proprietary Information August 14, 2007, 2.00 3.5.2 Advanced Tab—Miscellaneous                                                                                                                                                                                                                                                                  Figure 49: Miscellaneous Section                         Table 23: Advanced Tab Miscellaneous Section DescriptionField DescriptionAuto connect if link loss or no connection (use checked profiles in <Profile Manager>)Clear this check box to disable the auto-configuration feature. Whenever there is a link loss, auto-configuration tries to establish a connection to the checked profiles in the Profile Manager window.Enable WMM  Select this check box to enable/disable the Wireless Multimedia Enhancements (WMM) feature.BoostMode Select this check box for performance enhancement.Enable WPS Select this check box to enable Wireless Provisioning Services (WPS).Worldwide Regulatory Domain Select this check box to set the regulatory domainDFS Mode Select this check box to enable Dynamic Frequency Selection (DFS)
Marvell Wireless Configuration Utility User InterfaceAutoLink Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 61 3.6 AutoLink TabTo enable AutoLink mode, proceed as follows:1. Toggle the AutoLink button on the Access Point to enable AutoLink mode.2. On the AutoLink tab, click AutoLink.Within 60 seconds, the AutoLink will be completed.Figure 50: Access Point AutoLink Button                         Figure 51: AutoLink Tab
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 62 Document Classification: Proprietary Information August 14, 2007, 2.00 AutoLink is complete.Figure 52: AutoLink Tab (AutoLink Complete)
Marvell Wireless Configuration Utility User InterfaceAdmin Tab                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 63 3.7 Admin TabThe Admin tab allows you to import and export profiles.3.7.1 Admin Tab—Import ProfilesTo import a profile, proceed as follows:1. Click Import Profiles.2. Select the path and filename of the profile.3. Click Open.3.7.2 Admin Tab—Export ProfilesTo export a profile, proceed as follows:1. Click Export Profiles.2. Select or enter the path and filename of the profile.3. Click Save.Figure 53: Admin Tab
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 64 Document Classification: Proprietary Information August 14, 2007, 2.00 3.7.3 Admin Tab—Autostart Marvell Wireless Configuration UtilitySelect the Autostart Marvell Wireless Client Card Configuration Utility at System Startup check box to automatically start the Marvell Wireless Configuration Utility at system startup (recommended).3.7.4 Admin Tab—Stop Windows Wireless Zero Configuration ServiceWhen using the Marvell Wireless Configuration Utility, Marvell recommends turning off the Windows Wireless Zero Configuration Service, which is enabled by default. Both utilities should not be used at the same time. To turn off the Windows Wireless Zero Configuration Service, select the Stop Windows Wireless Zero Configuration Service check box.3.8 About TabThe About tab displays information about the Marvell Wireless Client Card Configuration Utility.Figure 54: About Tab
Compliance StatementsFederal Communications Commission (FCC) Compliance                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 65 A Compliance StatementsA.1 Federal Communications Commission (FCC) ComplianceA.1.1 Transmitter Module Approval ConditionsAntennas must be installed to provide 20 cm separation distance from the transmitting antenna to the body of the user during normal operating condition. This device must not be co-located or operating in conjunction with any other antenna or transmitter. Only those antennas filed under FCC ID:MCL74487604 can be used with this device.When the module is installed in the final system where the antenna location is less than 20 cm separation distance to the body of user, additional equipment authorization must be applied. FCC ID label on the final system must be labeled with “Contains FCC ID:MCL74487604” or “Contains transmitter module FCC ID:MCL74487604”.In the user guide, final system integrator must be ensure that there is no instruction provided in the user guide to install or remove the transmitter module.The transmitter module must be installed and used in strict accordance with the manufacturer's instructions as described in the user documentation that comes with the product. This device complies with the following radio frequency and safety standards.A.1.2 USA-Federal Communications Commission (FCC) This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy. If not installed and used in accordance with the instructions, it may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:Reorient or relocate the receiving antenna.Increase the distance between the equipment and the receiver.Connect the equipment to outlet on a circuit different from that to which the receiver is connected.Consult the dealer or an experienced radio/TV technician for help.ModificationsAny changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.  CautionExposure to Radio Frequency RadiationTo comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. This device must not be co-located or operating in conjunction with any other antenna or transmitter.   This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.       Operations in the 5.15-5.25 GHz band are restricted to indoor usage only.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 66 Document Classification: Proprietary Information August 14, 2007, 2.00 A.2 Industry Canada NoticeThis device complies with Canadian RSS-210.“This Class B digital apparatus complies with Canadian ICES-003”Cet appareil numérique de la classe B est conforme à la norme NMB-003 du CanadaOperation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of this device.”L'utilisation de ce dispositif est autorisée seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l'utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.The term “IC” before the equipment certification number only signifies that the Industry Canada technical specifications were met.To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (EIRP) is not more than that required for successful communication.To prevent radio interference to the licensed service, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing.
Compliance StatementsEurope—EU Declaration of Conformity and Restrictions                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 67 A.3 Europe—EU Declaration of Conformity and RestrictionsHereby, Marvell Semiconductor, Inc., declares that this telecommunication equipment complies with all the provisions of the EC directives listed below and meets the relevant parts of the related technical specifications:Compliance with R&TTE (Radio & Telecommunications Terminal Equipment) Directive 99/5/EC, Article 10.5EN 300 328 v1.6.1 (2004-11) – Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission Systems; Data transmission equipment operating in the 2,4GHz ISM band and using spread spectrum modulation techniques; Harmonized EN covering essential requirements under article 3.2 of the R&TTE directive.EN 301 893 v1.2.3 (2003-08) – Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Harmonized EN covering essential requirements of article 3.2 of the R&TTE directive.Compliance with Electromagnetic Compatibility (EMC) Directive 89/336/EECEN 301 489-17 v1.2.1 (2002-08) – Electromagnetic compatibility and Radio Spectrum Matters (ERM); Electromagnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for wideband data and high performance RLAN (HIPERLAN) equipment.Compliance with Low Voltage Directive 73/23/EEC EN 60950:2001 – Safety of Information Technology Equipment, including electrical business equipment.EN 50371:2002 – Generic standard to demonstrate the compliance of low power electronic and electric apparatus with the basic restrictions related to human exposure to electromagnetic fields.EN 50385:2002 – Product standard to demonstrate the compliances of radio base stations and fixed terminal stations for wireless telecommunication systems with the basic restrictions or the reference levels related to human exposure to radio frequency electromagnetic fields.                         This equipment is marked with the   0984   symbol and can be used throughout the European community. Marking by the symbol   indicates that usage restrictions apply.2.4 GHz for Metropolitan FranceIn all Metropolitan départements, wireless LAN frequencies can be used under the following conditions, either for public or private use:Indoor use: maximum power (EIRP) of 100 mW for the entire 2400 - 2483.5 MHz frequency bandOutdoor use: maximum power (EIRP) of 100 mW for the 2400 - 2454 MHz band and with maximum power (EIRP) of 10 mW for the 2454 - 2483 MHz band802.11a RestrictionsThis product is for indoor use only when using channels 36, 40, 44, 48, 52, 56, 60, or 64 (5150 - 5350 MHz), 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, or 140 (5450 - 5700 MHz). DFS and TPC must remain enabled to ensure product compliance with EC regulations.To ensure compliance with local regulations, be sure to select the country in which the access point in installed.
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 68 Document Classification: Proprietary Information August 14, 2007, 2.00 This product can be used as shown in Table 24.                         A.4 Taiwan DGT2.4 GHz Band Products                         5 GHz Band Products                         Table 24: 802.11a Product Usage5 GHz wireless LANIEEE 802.11a                         A, AND, B, CH, D, CY, CZ, DK, ES, EST, F, FIN, FL, FR, GB, GR, H, I, IRL, IS, L, LT, M, MC, BN, NL, P, PL, RSM, S, SK, SLO, VCautionExposure to Radio Frequency RadiationTo comply with RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. This device must not be co-located or operating in conjunction with any other antenna or transmitter.Indoor Use Only
Acronyms and Abbreviations                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 69 BAcronyms and Abbreviations                         Table 25: Acronyms and AbbreviationsAcronym DefinitionAES Advanced Encryption StandardAP Access PointBRAN Broadband Radio Access NetworksBSS Basic Service SetBSSID Basic Service Set IDCA Certification AuthorityCCKM Cisco Centralized Key ManagementCCX Cisco Compatible ExtensionsCE Conformité Européenne (European Conformity)CTS Clear To SendCHAP Challenge Handshake Authentication ProtocolDFS Dynamic Frequency SelectionDGT Directorate General of Telecommunications (Taiwan)DHCP Dynamic Host Configuration ProtocolEAP Extensible Authentication ProtocolEC European CommunityEIRP Equivalent Isotropically Radiated PowerEMC Electromagnetic CompatibilityEN European StandardERM Electromagnetic compatibility and Radio spectrum MattersEWC Enhanced Wireless ConsortiumFAST Flexible Authentication via Secure TunnelingFCC Federal Communications CommissionGTC Generic Token CardIC Industry CanadaICES Interference-Causing Equipment StandardIEEE Institute of Electrical and Electronics EngineersIP Internet ProtocolISM Industrial, Scientific, and Medical applications (of radio)ISP Internet Service ProviderLAN Local Area Network
CB-85/MB-85/EC-85/MC-85 User Guide                                                  Doc. No. MV-S800477-00 Rev. B  CONFIDENTIAL  Copyright © 2007 MarvellPage 70 Document Classification: Proprietary Information August 14, 2007, 2.00 LEAP Light EAPMAC Medium Access ControllerMbps Megabits per secondMCS Modulation and Coding SchemeMIC Message Integrity CheckNMB Norme sur le Matériel Brouilleur (ICES)PAC Protected Access CredentialsPEAP Protected EAPPSK Pre-Shared KeysR&TTE Radio and Telecommunications Terminal EquipmentRLAN Radio Local Area NetworkRSS Radio Standards SpecificationRTS Request to SendSSID Service Set IdentifierTCP/IP Transmission Control Protocol/Internet ProtocolTKIP Temporal Key Integrity ProtocolTLS Transport Layer SecurityTTLS Tunneled TLSWEP Wired Equivalent PrivacyWi-Fi Wireless Fidelity (IEEE 802.11)WLAN Wireless Local Area NetworkWMM Wireless Multimedia EnhancementsWPA Wi-Fi Protected AccessWPA2 Wi-Fi Protected Access 2WPA2-PSK Wi-Fi Protected Access 2-Pre-Shared KeysWPA-PSK Wi-Fi Protected Access-Pre-Shared KeysWPS Wireless Provisioning ServicesTable 25: Acronyms and Abbreviations (Continued)Acronym Definition
Revision History                         Copyright © 2007 Marvell CONFIDENTIAL Doc. No. MV-S800477-00 Rev. BAugust 14, 2007, 2.00 Document Classification: Proprietary Information Page 71 CRevision History                         Table 26: Revision HistoryDocument TypeRevisionRelease Rev. B’IEEE 802.11a/g/b and draft-802.11n/EWC compliant’ changed to ’IEEE 802.11a/g/b and draft-802.11n compliant’ throughout the documentSection 2, Marvell Wireless Configuration Utility Overview, on page 11• Subsection Section 2.2, Marvell Wireless Configuration Utility, on page 11 reworked• Subsection Section 2.3, Security, on page 13 updatedSection 3, Marvell Wireless Configuration Utility User Interface, on page 15 reworked• Description, figures, and tables in all subsections updatedAppendix A, Compliance Statements, on page 65 addedAppendix B, Acronyms and Abbreviations, on page 69 updated
Marvell. Moving Forward FasterMarvell Semiconductor, Inc.5488 Marvell LaneSanta Clara, CA 95054, USATel: 1.408.222.2500Fax: 1.408.752.9028www.marvell.comBack Cover

Navigation menu