
6-3
Cisco Aironet Wireless LAN Client Adapters Installation and Configuration Guide for Linux
OL-1376-02
Chapter 6 Diagnostics
Overview
Table 6-2 describes each client adapter setting for which status is displayed.
Table 6-2 Client Adapter Status
Client Adapter Setting Description
Device A description of your client adapter.
Note If your computer has more than one client adapter
installed, this field also indicates which adapter is being
used, such as eth1 or eth2.
Manufacturer The manufacturer of your client adapter.
Firmware Version The version of the firmware that is running on your client adapter.
Boot Block Version The version of the boot block firmware that is in your client
adapter. The boot block firmware contains identification
information for the client adapter, starts the radio, and passes
control to the main firmware, which (unlike the boot block) can
be modified and upgraded by the user.
Using Short Radio Headers Shows whether your client adapter is set up to use short radio
headers.
Val ue: Yes or No
Note See the Use Short Radio Headers parameter in Table 6-3
for information on using short radio headers.
Using Message Integrity Check Indicates whether your client adapter is using message integrity
check (MIC) to protect packets sent to and received from the
access point.
MIC prevents bit-flip attacks on encrypted packets. During a
bit-flip attack, an intruder intercepts an encrypted message, alters
it slightly, and retransmits it, and the receiver accepts the
retransmitted message as legitimate. Client adapters using Linux
driver 2.0 or greater and firmware version 4.25.2x or greater
support MIC; however, MIC can be used only if it is also enabled
on the access point.
Val ue: Yes or No
Note If the access point is using MIC, your client adapter's
driver and firmware must support MIC; otherwise, the
client cannot associate.
Server Based Authentication Shows whether LEAP is enabled for your client adapter.
Value: Enabled or Disabled
Note The status reports disabled when using LEAP and enabled
when not using LEAP.
Note See the the Server Based Authentication parameter in
“Server-Based Authentication” section on page 4-2 for
information on LEAP.
Commentaires sur ces manuels