MSCF$ }1,0Summit WLAN AdapterSDCP TO (@н$v1Cu CF10CE~1.000FvCg SDC_SE~1.999B] SUMMIT~1.011B] 00readme.010-Cу 00000scu.009**C SDCAPP~1.008K/*B] sdc_help.007FCg SDC_SE~1.006\FB \ 0SCUtray.005 0C 0sdcsupp.0040CL 0sdcgina.003<0C, sdc_gina.0021Cs sdccf10g.0011Cu _setup.xml~vLvLMSCEv |\ hdx|Summit WLAN AdapterSDC%CE11%\Summit%CE3%%CE2%CertsHelpComm SDCCF10GLinkage SDCCF10G1 Parms Drivers PCMCIA Detect37TcpIpSummit Client Utility.lnk@sdccf10g.dll@sdc_gina.exe@ sdcgina.exe@ sdcsupp.exe@ SCUtray.dll@sdc_setup.dll @sdc_help.htm @sdcApplet.cpl @scu.exe @ readme.txt  @Summit Client Utility.lnk      ImagePathSDCCF10G.dll GroupNDISRouteSDCCF10G1 DisplayNameSummit WLAN Adapter WirelessImagePathSDCCF10G.dll GroupNDIS DisplayNameSummit WLAN Adapter  Wireless  CardType  BusType BusNumber IoBaseAddressInterruptNumber MiniportSDCCF10G PrefixNDS DllNdis.dllEntryDetectSDCCF10GDllSDCCF10G.dllDriverVersionDhcpMaxRetry`DhcpRetryDialogue`TcpInitialRTTConnectDampingIntervalDisconnectDampInterval)TcpMaxConnectResponseRetransmissionsInstallKey MZ@ !L!This program cannot be run in DOS mode. $W999W9Wf9kd9896W9C9E9A9Rich9PEH R!  8   !`!(P-@0D.text   `.rdatav @@.data|0@.pdata@@@.rsrc-P.@@.relocD@BD!O-D ЍP01004AoAO0 `p @4<[+ 8?@`p⊏?   `@P  0 mP AA 0  p[0_ˠ4 Ѝ0Xh0H!O- Ѝ 10ʍ$2AozOP0 `p @P<Z @_`0  pPA0 @P`Z $̠( Ѝ $ h0p@-M@P80 P@"800`0 ` ``P @9P P@@sqЍp@-R@ T H }@0@ ! T(0  !   n ( p -  e A- Mn@5 p0 pp^`VP PL0 | `v X?080 pp7U* Ѝ     !-  $!/0/0/0/ 0/0/0/0/0/ 0/$0/(0A-p`|PV0S /@ 0 @V 0S  /P@A/x0DL! X-  0B/h/ -00P/h00@-\@TP0S/@T:,@$P0S/@T:0@/L0D0T0P0A-pQ0pPP `0@C0S /@DT*l0 0 x@pP0S/@T:H@@P0S/@T:W0B/A/d0`0\0X0l0p0t0- /-Q> /0@-8@0P0S S6P0@/P0@/dh0-00 0b00C 0//@- @ /@//,0/00/40/80/<0Comm\SDCCF10G1_tempComm\SDCCF10G1_temp\Parms\Configs\Comm\SDCCF10G1\Parms\Configs\SBT0:GetServiceHandleSCU0:DeregisterServicecoredll.dllComm\SDCCF10G1x!!0TW$SCOREDLL.dllH R0"""("`>"K"X"g"SDC_SETUP.dllInstall_ExitInstall_InitUninstall_ExitUninstall_InitTW$StdUdL3@`@@D@@&@l @@@<A@@@\@t@@ @8X H` xF ^ x8xP h(@/Xpp      ( 8 H X h x           ( 8 H X h x f6ffb ^`[p@bd`.\NDZ,[4g(h*ThiTrxonpu4zd|,|B}0Zdg g VWCE_FINDDLG_SPWCE_REPLACEDLG_SPWCE_FINDDLG_PPCWCE_REPLACEDLG_PPCWCE_FINDREPLACEBAR WCE_FINDDLGWCE_REPLACEDLG4VS_VERSION_INFO?StringFileInfo040904b0CommentsVCompanyNameSummit Data CommunicationsJFileDescriptionSummit Setup DLL<FileVersion3, 04, 00, 004 InternalNamesdc_setupLLegalCopyrightCopyright 2006-12(LegalTrademarksDOriginalFilenamesdc_setup.dll PrivateBuildn'ProductNameSummit 802.11 Wireless Network Adapter@ProductVersion3, 04, 00, 00 SpecialBuildDVarFileInfo$Translation p Ȁ FNewMS Shell DlgP{&New P}1dP(OKP(CancelP+(F&HelpȀ FMS Shell Dlg@ȀqtFind MS Sans SerifP2Find What:PcP*g Match CaseP7g Match Whole Word Only PL( Up PY( DownPCc"Direction@ȀqtFind MS Sans SerifP2Find What:PcP*2Replace With:P5cPR\ Match Whole Word OnlyPF\ Match CaseȀ FindP 2Find What:P<FP& Match Whole Word OnlyP Match Case PXA( Up PXO( DownPS52+DirectionP9G Find NextPLGCancelP`GHelp@SIPPREFȀ ReplaceP 2Find What:P<FP2Replace With:P<FP5 Match Whole Word OnlyP( Match CasePG< Find NextPHG<ReplacePH[< Replace AllP[<CancelPn<Help@SIPPREF@P NextP$" ReplacePI( Replace AllPu OKȀ FFindP ?Find What:PFr P!w Match Whole Word OnlyP0w Match Case P!> Up P0> DownP{D(DirectionPBFind NextPBCancelP1BHelpȀ JReplaceP ?Find What:PFr P?Replace With:PFr P* Match Whole Word OnlyP9 Match CasePHFind NextPHReplaceP&H Replace AllP7HCancelP7&HelpFindFind NextHelpFindFind NextReplace Replace AllHelp   OpenSave AsAll Files (*.*)Untitledan unnamed file&HideNo error message is available.'An unsupported operation was attempted.$A required resource was unavailable.Out of memory.An unknown error has occurred.$An invalid argument was encountered.Invalid filename.Failed to open document.Failed to save document.Save changes to %1? Failed to create empty document.The file is too large to open.Could not start print job.Failed to launch help.Internal application error.Command failed.)Insufficient memory to perform operation.PSystem registry entries have been removed and the INI file (if any) was deleted.BNot all of the system registry entries (or INI file) were removed.FThis program requires the file %s, which was not found on this system.tThis program is linked to the missing export %s in the file %s. This machine may have an incompatible version of %s.#Unable to read write-only property.#Unable to write read-only property.Unexpected file format.V%1 Cannot find this file. Please verify that the correct path and file name are given.Destination disk drive is full.5Unable to read from %1, it is opened by someone else.AUnable to write to %1, it is read-only or opened by someone else..An unexpected error occurred while reading %1..An unexpected error occurred while writing %1.Please enter an integer.Please enter a number.*Please enter an integer between %1 and %2.(Please enter a number between %1 and %2.(Please enter no more than %1 characters.Please select a button.*Please enter an integer between 0 and 255. Please enter a positive integer. Please enter a date and/or time.Please enter a currency.Please enter a GUID.Please enter a time.Please enter a date.No error occurred.-An unknown error occurred while accessing %1.%1 was not found.%1 contains an invalid path.=%1 could not be opened because there are too many open files.Access to %1 was denied..An invalid file handle was associated with %1.<%1 could not be removed because it is the current directory.6%1 could not be created because the directory is full.Seek failed on %15A hardware I/O error was reported while accessing %1.0A sharing violation occurred while accessing %1.0A locking violation occurred while accessing %1.Disk full while accessing %1..An attempt was made to access %1 past its end.No error occurred.-An unknown error occurred while accessing %1./An attempt was made to write to the reading %1..An attempt was made to access %1 past its end.0An attempt was made to read from the writing %1.%1 has a bad format."%1 contained an unexpected object. %1 contains an incorrect schema.pixelsUncheckCheckMixedAll Files|*.*| All Folders \My Documents Finished searching the document!No matching item found!MenuCancell00T1\1`123333444445(585H5X5h5x555555`6d6h66,7074787$8(8,8084888<88909@9P9`9p99 P1T1X1\10 H0@,0000 0(00080@0H0P0X0`0h0p0x000bwb@22#\windows\sdc_help.htmThis directory is the default directory for digital certificates and protected access credentials (PACs) used in conjunction with Extensible Authentication Protocol (EAP) types. When you use PEAP or EAP-TLS, you may provision a certificate authority (CA) certificate for the EAP authentication server and distribute that certificate to every client device. On the device, you can store the certificate in the Microsoft certificate store or in the directory with the path specified as the value for Certs Path on the Summit Client Utility (SCU) Global window. When you dont specify a Certs Path value, SCU uses the path to this directory for the Certs Path value. When you enter a CA certificate name on an SCU Credentials page, you enter only the filename and extension, not the path. The Certs Path global setting provides the path. If you import CA certificates into the Microsoft certificate store and want to use them in SCU, select Use MS store on the Credentials page. When using the Microsoft certificate store, SCU ignores the Certs Path global setting and the value specified in the CA Cert filename field on the Credentials window. User (not CA) certificates for EAP-TLS and PEAP-TLS must be selected from the Microsoft certificate store. When you use EAP-FAST, you may create a PAC for each client device. When you create a PAC manually, you must store it in the directory identified by the Certs Path global setting. To use automatic provisioning, leave the PAC filename field in SCU blank. MZ@ !L!This program cannot be run in DOS mode. $W^N?????/?6 ?6[?0?0??>L?L ?4?4?Rich?PEu3R   P`0-$.text0 `.rdata@@.datam.@.pdata-0.@@.rsrc`@@  0@-@P 0p -pX-`P` 㺯P0@080 0x |PKp-KܬE8!p( -X-@@צɬK-Kì0+g |O- ЍP104x0S@@S |0S1 0 S819 㚓pJ ᑓ`? ㆯ↟0 倓?  x0S 0 m? ⻦u 0ZP 0  @R`ကA: ㇳˠ Ѝ\dpC-`x0p@S:3Q0 0TY♦P @Q0 0R^ R0 S^^ 0 D‐pa@W .P0 T&fP @^0 0RQ R0 SQQ 0 p@W W(000000SC-Px0@S5p`0 V'P @Q0 0R^ R0 S^^ 0 ǥ뀀@`T T(0@-@Pt0C- MP +0g@ @:x0S  kr0 @0 r0 @O0"x@"Q1O <0 "1d@`0@`啦d"0`@厦 1d<"100僦J70 )000 6#x0S1  儦Vx0p@S:0a0 TWpP @Q0 0R^ R0 S^^ 0 뀐p@W .`0 T&?P @^0 0RQ R0 SQQ 0 p@W  Ѝ(颋.x0@-@Pᯥ0@-@ᚑ0 0D H L 00噥p X-M@P  0 x00P0tP  0 k00 T0wBPD 0 m8TH 0K-<-8A-,M@ < 0 >aP 0Se ) <( 0 / < > O  /L0pSPက0 APhN助L0pPW@0 P,N@D@P@PxP),Ѝ %0@-QP@TP <962/,0@(p@-P@` < 0 T1P`0 @U@t ڄ/,$ p p4p@-`P@TPPPPp@^P < 0 KPp0@-@P00圤0@-@900  -W-4M`@p$hlV6`FPtT T T T0 0 0A00 0( 0, 0C0$0  0 m0 aV4Ѝ -_-0M`N8hlX$ @ P HB p+V V ( 0@N ,$0@@PA0 P@+X0Ѝ -S-0M@X@P` ( 0\pUBPE @0 0  0HNp@U0Ѝ-P P P "P PP  -:18Pf@-pP`@   T *0Q0@T*0S@0@-@P$20! P0 0@p@-@P`sT 00 /p@00 R:R<00BSФ<0 R R <0R <0RФ$0  R <0RФp@-P`f!@ ᇧfpp@-P`X@ yX9p@-@HP T  0@ 0@-M@0 P@oPP l @0 @fP @ @0 @[P0SPHЍ000SLp@-@P`H0 0P AP 0  6pLp@-@P`@0P 0 'P0 pL0@-eM@\001놔P <  ᧦beߍ0@- Ѝ@P@e`' < "̍|0 00 ̍9  0> 22l@'̠D Ѝ-80$00SP-Q J0 C0Q0 Ӂ0а qW-:1lA-Pp0@C`00 VP P0  `RP0P0@- P10S R 0@P000@-@uPP @0@-@Pት0p pX-M`Y@V0H0$H 6  T- ; 0Tʛ ;0T ;0T ; 0T ; 0T ;0T;0T ;0Tc ;0Tz ; 0T@2n< sPI *0 3"4 %5"85"<5+030303F03 03030303030 4 0,303?304d0403040 40$40 4"4q$r4"8s4"<t4 44 84/ <4=s4Sk 0j:0T ;0T ;0T ; 0T ; 0Th\P: 0T : 0T ;0T}y: 0Ts : 0Tn ; 0T ; 0Tf ; 0T ;] ; 0T\ ; 0TX ;S; 0TQ ; 0TM ; 0TI ; 0TE 9@; 0T? ; 0T; :60 0p0S H q'ArP" ; "4 0"80"< 0"4 0"80"< 0"4 0"80"< 0"4 0"80"< 040 K0 ^P0S1  %%&5$'5((5<0S0  .P$ KR K⎫{P  0 KB@@T 0T0KVKp-KP-@萤Ph8 0@-Q@1 w0 00@-0@C nP0p@-P0@C0`S 0S000 0SPP  0 p MP00 00pW- 0C0S 0S0000S SƒQ0@-@0 0S0000P P00 P0 000s0@-@P1 0 00@-0@C P0 pX- Ѝ@P D q`# < gKL< KL !0d+ " KK|0@C P0-Kp-Hp@-M`@ 0 P@PU  B @ b AA>K0 PzЍpp@-0@`p0P0C 0 B0c0AAK0 pA-@`PA VlA0@ 0F B0c 0pAAKW0  AW0@-@P <0#  P("(0p( -0X-@@P$P1 0 00P_ K0-Kp\ -pX-M@@P00 `00 P 00C 0 b0C0Z 00`S?V᝸P MKp-K0  000 Lp@-eM`P0010@T < i0 @ x 8 bP@  @eߍpLp pX-MP`M@ nMKbK)0@C XP0Kp-K\p pX-MP`#ޏ@ K>K0 lJ 0Q0@C ,P0Kp-K0v@- @㝥00h8i0@-@PŢ0PC-`P@ p0D 0 N0c0FA@KT0` ^Ccp -0X-PP@P1 0 00PT wK0-KLp@-M@0 < H0 l[ U    Ѝp踤 pX-4MP100 ϥHKdP@0CK' D0K];UT`H0D KD0K[PHK$ (( DKT\ HKf H2ɠ l@;PHK TH" ;0/ ? H0@C BP0Kp-MHKBЍؤ8@- @㪤00XO0@-@Pӡ0p@-`N8 90$:0(;0<SSP*Pnx! ;JdT@Ǡ 0  0 P  <  ppH 0X-M@0 P PP <K 㤨0@C P0ߡK0-Kp X-M;J@KK^ @@0S RJ0Rʲ0 00R00 P0K-KW0@-@P'0-kl0m n48<Sp( -0X-PP ݣ0@|0|00h@@AAK0-K-K0|-K0Ķ_Ehph -X-@@A⵶⳶|ڠK-KԠ-K0|ٚ-K0⛶p@-P@k{|  WA/p@ O-Pᨀ0 @p`P: , P|p @0 `VW@@00@-@Py0p _-(TMhKj 0 odK`\d0"@A0!_ 7`040 6Z1!100|夛1p`XMA  h0 0 l0 )0@xS 㱝 㭝 0]; g@ X; h000 0S  kr0 @ r0 @/0"@"Q1O <0 \"1d@`0x@`u0"0x`@nJ70 000 60S 1@ x @@@@ow0p@S:/a0 TVx[P @^0 0RQ R0 SQQ 0 xp@W .`0 T&x+P @^0 0RQ R0 SQQ 0 x֗p@W Ѝ(颋.dG-Lß Ѝ@<304,30P S 0S 0S 0 b : 0 ixӗ`0sڼ0Vo S 0Stl]\2 0 S819 FS 8p `p<p: 0S S < jP31  B ? 00   !Rd! T1L  , ? 00   !R! ÆP< 4݃# *S S <  0  pd0\  @! PU !ˠ Ѝ@(\dp4@- @s00H@G-MQ@200rv [k0 Lk;p 0S  00 S ;l07$b0[l00la 0S  0k0 F P 0F ;I00S- t10S0 S 0 F@0S(S 0 F10S U$< 0 &3Y lǚ0P S  0X00S D0S,0SЍ0Tx@0@-@;l㕚 0 h P T00S @0 00(PP 0@'@-@;kn 0  0P   @@-@`00S L00S 800S< 3ۢP P 0@-@P᎛0O-MP4=00 =0S 8 90$:0(;0<SS`*`[ \0$]0(^0< CR000 \ <|,tl d@p@p { G o#@S 0@ =  H ]#<ܙ@? 0 ) 0 $ 0 I 0 F 0 L 0 M L0 0 N 0 [ 0  0  0 k 0 l ? :   G-T #ၙ@ 0@   H "<m@Й 0  0 Ip\@ ә  k@ l  0 LL M 0 F l0 @ N 0 : [0 4 0 / ;F`0 `: ? 4 ? ` 0 @ 0 ` 0 p48,($@p@p  G["ܘ@? 0@ )  HvI"Ș@+ 0  0  0 q  qXIpᮘ@K*F`ᤘ@": 0  0 [ [/Lᆘ@#}@,!ܘ 0 M g@N ]@٘ 0 ` <0 Z Kk0 T 0 lO ? `[ 0 `U 0 ` 0 p)  G!@| 0@ f  HH \n Ip0 @ ᗘvF`@ፘl k@ l    0 L 0 N 0 M 0 0 ` ? ` 0 @ 0 ` 0 p} [0 0   G: !᎗@ 0@ Hთ@4 <y@ܗ 0@  Ip0 yh@  ߗF`Y@՗ k@ l    0 LN <0 H N 0 B; M 0 ; 0 `H ? ` 0 @ 0 ` 0 p [0  0 0 릗Ѝ`H Hp 0X-MPG3P  P@@9T 00 qK0-p$ 0X-MPG P  '@@T 00 HK0-p` X-M00S$;Fㄖ@KK҉ @@0S RJ0Rʲ0 00R00 P0K-KWp X-M00S/<J@KKᘉ[ \0@@$]0(^0<SS0S RJ0Rʲ0 00R00 P0K-KWH p X-M@KKV @@0S RJ0Rʲ0 00R00 P0Kw-KW`p, X-M<ӕ@KiK! @@0S RJ0Rʲ0 00R00 PP0KB-KRWpp X-M;N㞕@K4K @@0S RJ0Rʲ0 00R00 P0K -KWp@-M@000;!_l@P0PS <0  l0 00PS00gЍp0@-M@0 @PPP h @0 @P < @0 @P0SPЍ0A-|Ÿ ЍPl20ʍ2X0  0  g< &̍^ ZI h|PO4 50$60(70<SC }PP2pS@گoIS IPF|P@8S2@AoTx I2@SگoI4 IPF|P5p2@AoTwx l&\ T.@-,0+ @^  "̠ Ѝ8H(DXlH0@-@4 50$60(70<S Pb\X47cR0@D$4O-dȟ ЍppP80$6@0  0 9@ 0-'g,  op0p@q0@r0q04 D88@ +D  Dk l0$m0(n0g h0$i0(j0 [ \0 D$]0(^0< tl@ X+D  <DTc d0_ D$e0(f0<` a b ,@ +D  D,-, .+0 /  DaLD@ 0+D  D '*P)@(&0%  D P@=r@ +D  fc]DHG IF0p J  D4,P@ +D  DA;DBEPD@CA0@  D P@,@ +D   lD`  D80@ +D  D_p_0  D@ +D  dD^< H3D 0 DS~$ 5@ +D  )p& D 98 =<0:>@;P$?`48(45687,< ,p  8"L, "4 $.,< D@ +D  xDkA@ ED0BF@CP$G`4@(<=>8?,< ,p  8"L, "4 $.,< D,  @ +D  lD (54")(26*B7R$%+b4$0(1&28'r3,< $  8"D, "< ,.$4 DAv@ +D  jtgaD=<"A@2>BB?R$Cb4<(89:8;,< $p  8"D, "< ,.$4 D8@ +D  ,|)#@Dx,   D<4P ,+D   D9"82:-,48 1r0P.;54B6$2 4H3 ((b,)/r d70 4L.PX*2+$$<"$!4$4L0$<., D@ +D  @D<0 q0 P `0P  4^0 4 JP    < 40  4I0 4 5P0 00' PV  DBwP +D  kxhbDTPH_@ 4V$SM$i̠( ЍTD\<\p 0HԶpDl@-@, @tO-MpL209` `$`0 @4TP@(`5v0Se\⢋#9.-0,+ 000` 4 50$60(70<S  | E[ \0$]0(^0<S 0S-.,0+ ( \ \i0kS! 0CS 㗋 㒋!㊋ ㅋ》f ڊxՊsЊ,00Sj00Ѝp08`pH(-0S1 HP00@-@(000;0@-@00 PC 0P00@谨p X-M@K၊K}KP00@@0 00S RJ0Rʲ0 00R00 P0K-KW0@-@P0 [-$MP 20(0 #K#KL K1L#.KAOkKp2 | d `" \B Hb SPZ `J;@!` K 0 PgP9|T8 0 \0A 0 b0C0Z KU 0 K0@ 0b0Z KE  Pf K 0 P-UT2@C hP0($K- KjH,p@-M`H100ܡ9᪉@ 0 A0S6PIH0GF 000 #ꊉHI@G0F P@m ݉ 0  0 B 0 Ѝph(Mw@-@(0㷨00O-M0:000N 230&  0;< `7p 3Y弹@@2 0S ʉᩉ|Éᢉ Pt0 0 `P0Sć$P6 0S3 ệ/0h 0D 0b` S S S 00z 0\u  0I0l 0@ @`0M;= @V 0S P Y 4;PЍDHXHxp@-P;:㹆`@ 7 bS0 0@S00Sx00S ᚆP 0 @ 0  0޿ 0 ٿ1pH @-P`@pP@, U U U U U UPPPPPPPPP 0R 9R100pCPyU:@@-@0@e@-M`0 PjڿPd p0 pp\1@t0"SQ VO X00J` 8@3b@A70  ppp--S V A70  ppp0 Pl0 T `v 00tkЍpL|C-4MP(1000 0* 0;:ᢅ` 0 a@p  0 0߾pW:x <@dP0 05@0S :S <0 \ľ0\804Ѝp@-P@T l  K;    p0@-@P00e0p@-P < =/``˅@< ````咾 t P \ 0 x0h ܾ!1XD$1(1,Ҿ!10h$1(1,Ⱦ0@2p8p@-@S0S< np@;<ׄ 0 G&2`!1R000\l|H $DdH4HHHHHHH@@0P` 0P` P} {Py wPu s(qXo8mdkm!n1$o1(p1<P` 4mn1 8o1 1$?1(@1<P` 4=>1 8?1 <@1$P P P:A ;! < "4)!*1"8+1"<,1 4AB1 8C1 l]K ~ky}{1[@]KS^]K} 0 z 0 x0y<  Kz0 0 x0y @A P0 勺K-aK XlW0@-@P0̌p@-MP00T2L⦶L⣶L ⯶0x LLAOk 0R @4` ~\P @T m!}}T@ߍpd@-@(0n00p X-M`A}Pp0S00xQP  _@@T 0pW00T00 AS<  ~Li!j1$k1(l1<S0  K-  H0@-@0S6P004 50 $60(70<S<  P "44 50"860"<70JFP >K @ "44 50"860"<70:FP qK<㊶6W000@-M40 @037P0S@Ѝp X-MxµP  @@T 00K-pD 0X-MP㠵P  @@T 000K0-p@-@{~%|P!|01` 0S"I!J1$K1(L1<0  b 0 ];?0+ W 0 R;?0 0 I 0 D [?0 0 ~ 0  0 0} @ЌG-HMpQ,20D0R 0@ 0.BQ: %a0SI ;?{ 0 K1 J 0Q0S:5 0 J 0Q <Yo@AH0S0S00EH  ጳ~t"l00;zPtz [0 zPhz ;d0 AyaqP< =0$>0(?0<S 0 Azdz~z< P 0A0 AS<P 0i!j1 $k1(l1<S0S;0; 0  0  F;9y0S S S S S L@4(y`嬶sߍ @h,Hp@-@;?uy 0 GIJ`P G2FPq XP70S7 ϤʤT T  T< }pW PS Ph3`shhP00" 00 nPP 00 dPr20 P00 Pb _b00Pp PpUdr0000P<; 400<P  R; 00u  7; 51 1 @ 1 1P x P P  PPPU 000S=D10S (00sA 00! 00<! 0S 0S  0S 0000! 00x00S00<; X 00! Ԣ00U0,|(K-噽(`| A-Pb0S< qA{Q,i@(ip 0 bwP j P* PhAq Kg0@S4 K00 0Q R $ KK #YmP P0S 3@C pP0,\3@C bP0P8  P4L50SH%0*K.3K!4,3K@!8$+3K!<<K*3K 4(3K 8'3K <&3K0A3K0=3Kp0'T'h**93K$'|*0$L6sKs3K2Kt53K;K:CK8SK7cK4K1#K-K)KK1PDcP0K-K-K08-K01-K0*-K0#-K0<0X 0@-@PP0p@-@0@PCQ 0S000 0R½` P000p ሾpp8" -_-($MPPӀ5 0D ƽĽ½⾽ㄛ@せP@Á`ÂpÃÍ  T@Ө`өpӥӦӅ@Æ`ÈpÇÎÐeP,   000YP,   00줟_0LP,   y 00t0?P,   500|d02P,   u<Pmx 0@K00mD\@0@C VP0Ք@wx0<K@XG<0@C AP0@bx08K@C280@C ,P0@Mx04K@.40@C P0@8x00K@00@C P0՘@#x@o@0 @ƚ00~~~~~(K-KM~Ѝ-KM0ۼЍ-KM0ҼЍ-KM0ɼЍ-KM0Ѝ-KM0ⷼЍ-KM,LЍ-KM,DЍ-KM,<Ѝ-KM,4Ѝ-KM,,Ѝ-KM@K⇼Ѝ-KM<KЍ-KM8KwЍ-KM4KoЍ-KM0KgЍ<X @- @c00#M0@-@P`0p@-M`,100nd10S 8 90$:0(;0<SS@*@_P_ 0@ И 0 ˘ 0 Ƙ@ 0  0㻘 0 㶘͸P ;  zЍpHp$ X-MH_@K޻KR @@0S RJ0Rʲ0 00R00 ŘP0K巷-KǻWD$@- @0c00$``0@-@PY`R00@-MPc00^@ 0 IW_]P ;  Ѝ0p% X-M@Kv^K,R @@0S RJ0Rʲ0 00R:00 [P0KM-K]W%P0P ST0T Sp& -0X-PP bD0@x0F,0 0 K0-K_E&p' -X-@@xY_K-K_0+Xx f"`0@-@P ӘP0 ̘P0 ŘP0 ᾘP0 ᷘP0 ᰘP 0 ᩘP@0 ᢘP0,&0@-@P ◘P0 ᐘP0 ቘP0 ႘P0 {P0 tP 0 mP@0 fP0X&G-`p q Ro:0^l@ATh@8#8Sa@ATPP@DTUT0 @D48#(L 1TIRP@DTB T&0 p48#0D8 S6X@ P0  P0   P 00pPXT 00 Z0 000 0   0  S Z L&O-`pP R:^@GT  ϗPz 048#8Ss@GTPP@DTgT0 @D48#(^ 1T[RP@DTT T.0 48#x@DJ 1TGW#@D ᓗP0  ጗P0  ᅗP0  ~P 00PpWT! T@DT00 0S00Y 00  0SY 000  0S00 &@- <@ƵP' k l0$m0(n0<S 0CSl<@m!n1$o1(p1<S  ༠廷>\ > h0>, " |%P 1433"C@@D0>, " i%jKnV@TP V`V>\P%P 0S hCh pS> ߷:K> x WK@῔4 <> :K> xcV40> P000S  :K> xQV00 Txp W\0S 0CS``00S\0|S2:p0 / 0tt0 R): @0 S%* 00 S0(Y0SR : PX0\ 00SX0\   @0 S:0`VPrp0*0x ⱓ뼐:K>@C P0,q(K-M> Ѝ8D***H Mb \@-@<QLK@E* _-(M`P50,0 0S<> ༠岶>\ > 0>, " u$P *43"C@@D0>, " b$:K>S@TP Z0 @=P xUd0 @1T*K.>\P%PRKЎ J p0S > Ķ*K.SK~ . x~Upd0S S ><0#0@t P 40R HP04 > o:K> x7U0 T0R T 00 S22x*Udt0S hޒh p> zJKN0 ɒ x0 .VK@S4 @> /:K> xT40> P000S  :K> xT00 Txp V\0S 0CS``00S\0|S3:p0 0 0tt0 R*: @0 S&* 00 S0(XY R : ℓPX0\ 0YX0\  @0 S:KЎ*K.J p0KЎ PX::K>@C ⁒P0,(K-M> Ѝ***H Mb A-M`]000 0 KX  A00X0 ㌰0 @@pC1_00xpHU 0xp@U 0xp8UJ70 ޑ000 6ؑH 0 Z㋱<㖒둒D㐒닒ЍH<+0+$+1 0@-@<@TFL+0@-MRP@000 X#ZuFu<_0KS0 0ទH X X^CЍ0`,0,p@-lAQ  Q ʒP:,,1 ^:,1P03055P3 :0( 00PU0P#010(P `@U 0^ Q03(05:R d@0dPdU:PZ0pT 0@-MRP@000 X"0 0 !UBU<dU@ t,qPW垔Ѝ0,,,p - -X-@@(0vl000d1h1l1p1t1x1K-Kyu-K0X-pd. -X-@@00d1Sh1Sl1Sp1St1Sx1SxvGuK-KAu-K0gX-p@-P@k\ ^ ap@^G-p@Q0S^00dW ko0  0 m 0 nG0S km Vn V`0 m Vn` V00 ;o0 د 0 ӯ 0 ί ,r`W  Wx1p1t1 0 S Sl1d1h1 p00 p@-@ P l[ T;  7  3  /  +  o'  G#p0@-@P,00@-@P ׏DasU dT\00@-@t2 , d" 0,0-[H2P   8P ^ d  le 㟐de 㚐he 㕐le 㐐p}e ㋐txe ㆐0dx1 [)0 0 * 0 , 0 / 0 4 0 9 0 : 0 ; 0 < 0 =߮ 0 >ڮ 0 ?ծtV0 0 O-Mp p5020  ̍00  ̍?0O 0 0O  1눴 0 @S@( $,004 0$!$C0^3,o 2#C"k-iUiP( a `0bc4]`\8a@,^p_$4`P" 8 < #<@4 p@@C0k, 0S  ba0` _000000S k l0$m0(n0<S(4 50$60(70,R000 $ 0P4 8@<$4(#<#<40S S SO<#@<"@P O:P < @5P < @0P < @+PO(PP%P<@!00O㋭P ,4 50$60(70<S <@ `x|H <)@<*@ \ 0-, 8jℎ0j010  6S < + c0б0 , + X0 0 \IZ]Xe7P 048 P@<$4(#<#< eL 0P48岰子$@  P 峐`$@ p寀 @<4DP#t0\ (0嫠l!4 , \#D`0" _  p$a0(b04$,&<%,, (h 0P4 8@<$4(#<#<4 eS0$0(0 0$0(0<4#44!,D8RB8 zB<SBT 0@4 8P<$4(#<#<$\B;1SBS 0$0(0 0$0(0<4#44!< S t PRP ú R3?< .B;2RSBS 0$0(0 0$0(0<4#44!,r _r^ "40"80"<0 B3'SBS 0P4 8@<$4(#<#< ^]@\P[`Z0Y  @P`،B|7RBaS0P Snj0 ⽌Ba ;8`0B/`Sp⬌ba`0_ H⢌BF ;8`0B/`ޫ7SXB 姌 夌 ~~/XB⛌~B,;.RB SX9 h([@0@巫 0 5㤫( 0]@嬫 0 G㙫' 0^@填yxwv@u0t @MB6rRBR '0`冫yxwv@u0t L@1B ;50B/`n}|@{ z000,0 @BK69RBR 0 6@& 0`H& 0`A 0@4 8<$4(#K7PB"Q 08`ҩX 00]ǩ X0 0 G㱩X< 00^崩00巍ߍD//X/l//////0/(08,0T0000.8p.../,/ xO-Mp,p4020  ̍0ω0  ̍?Ɖ0O 00O  1帉0 P@0 P@$(?P z7긓0S300 0堉 |C pc0^`3,o 2#C-P^]0\ [0000 0 0S0S k l0$m0(n0<S$0 10$20(30,R000 @ 0P4 8@<$4(#<#<40S S SOP<#@<"@P8p@-@ḣP  [k O  Cp0@-@PK0h2@-p@0 `0C 0P B0c0A}K00p@1p3 pX-M@PK⬦ K⪦H K  JK`\=@ N0ST7J0T4ʄP RR+J00A @ .! K@ N0T FJ 0@C uP00@C kP0Kp(] [-Kk- KgWT3pp3 pX- M`@P$KJI$K=$P@0S SD2 42 P0S[ K3 K1$@ A0STKJ0THʄ0  KW K $@ A0T1NP 1 0Sچ0dAQQ+J0Q(ʲ 0 0Q 0@C P00@C P0$@@ P0Kpסա0 P000Sچ0tPa@Q J0Qʲ 0 0Q0幡-$Kɥ-Kť- KW@D3O-TMp10P0M0N 0pd1`0S L8 90$:0(;0<SS* P<,U U U UB```o01 SH@7I 0 ! 0  0SPU<,<0 R:R bP҅TЍH0@-@ \  ;B 0@NJ 00#SQ 00SQ@-MP`p,804 ^0@@(0 0 @Ѝ0@-@PD0p3 -0X-@PQ0t 00 ,@(@0000K0-KeR-K0R4ςp@-M,(@$P ` @P`ǂЍp-MÂЍpd4 -X-M``00@0S 40<0P8@0N, 3w00A   @P`x(0SR000\00RRK-KM RЍ-KM0NЍQ40@-@P 0@-@(0l0d 005H0T0DL Pg0\0c05`0_0d0[0hX04 00C4@-@50X0\`dh0@-P@ ?PT0S   TP0L PA-M@p -P4 DD@ŀP@D 0BL 0`BP0 @ p0`NPT0 @00X0^  X݁Ѝ蘡0@-@P00Q0Q0@-@P00Q}0Q0@-@P00Qq0Q0@-@P00:Ce045 [-$MpX30(0 P L0R KMP@D 3BL 3`BP0 @KQKK2`@P0 D0 0 ` @ ` @ l 0@P2\ 0KK0 f0` KK0 fT0S` AKUAK :1 0S1 @Y8 1 AKtKO1 1 0 " KQKKOhKO0%P@@ 0KKP KQ0  KQKKOdKO0K@@ 0KP KQ0 K1 P1@C P0K<KP(z$K-MKPЍ-MK,Ѝ-MAKЍ-M KЍQf55p@-M`P 0 0@0 @P @0 @P 00ЍpЍp -0P- M@ 0 00 PP$0 PP Ѝ0 Ѝ0P  0S R0 P  0S R0 p@-}M`P.0 00 uP @0 @nP 0 0Q R U}ߍpP}ߍp@-{M@p`0000P 0P  0@S R0 000  6P 0 P P {ߍ{ߍ0@-M@PPh dP p L04( Ѝ0h6660@-M@PPh dP p L0~4(~ Ѝ0h666O-M`p 00#0,00000400 800@ P !  @<0@P $(@@P 0@T0#0:@@@P0@T!00@ 0Q0#0 @@0C 00BC44B P: @|ЍO-M`p 00#0,00000400 80 P0@ !  P @<0@ $(PQ@@0@ B00BC4B$4@$AP T:@ 0Q0#0@@@P0@T!00%@@P 0@T0#0: @Ѝp@-_M@P`00. p  dP~0~000  ~P  ~ x @0 @}P}_ߍp}_ߍp66@-MP`p0  0 1 p  dP}0}000  }P @0 @}P } 0S  ~ލ}ލ660@-M@PPh dP p L0}4(} )Ѝ0h6660@-M@PPh dP p L0u}4(m} Ѝ0h666p@-CM`@ 0D SV R0 Q} F~0 I}0 0 0  ,}P +~(~%~"~C~~~Q~U~Y~^ ~a ~~| f! bB ^ST0U V48,vWX0Y Z48,Cl[\0] ^48,b_`0a b48,Xcd0e f48,QNgh0i j48,UDkl0m n48,Y:d0o ^L0 a40,o 0, gCߍpxxV4@-Mp`x 0FSuQ <@L$(U $4$ T0VS@}.(.Y Z.4 `X0Wq.(.] ^.4 p\0[e.(.a b.4 `0_Y.(.e f.4 d0cM.(.i j.4 h0gA k ""8",n  m0l! B $ d0o HL0 C40,o =0, 7ЍxxV40@-M@00} R d<Pd.(.U V.4 LT0SP ( Y Z 4W `dX0P ( ] ^ 4[ pd\0P ( a b 4_ d`0P ( e f 4c dd0P (  4i j h0gdP ( m n 4k dl0! dB $dd0o dL0 d40,o d0, dЍ0xxV4Q  0S P:p@-yM@yߍp! #{Q0 `````0````````` `c{ P {` T{ XP  ( 4  0C{ GP  ( 4  02{ U6Pd.(.  .4 0!{ Y%P 4 ( 0  yߍph6O-M@ݍ< z*0+ F P0   0Ld(PPPP P P P PPPPPPPPPPPPPPPP P!P"P#P$P%P&P'PDPEPFPGPH0IPJPKPPPQPRPSPMPNPOPP?P@AP0 ` ,0- ]`BPCP1T 0``Pp. / 2 3 405 6 7 8`)*+0UVWXYZ[\P^_9:;p媀嫀嬀%&'(z0-)1*1`abcdefg+,./012345678]x0  =a>?@AaBCDEFGHIJKLMNOPQaRSTUVWXY1Z[\]^_`efghijkl9:;  ?8< x P W ( 4V T U0x 5P [ ( 4Z X Y0x 6P _| ( 4^ \ ]0x P ;8 ( 4: 8 90xP P 4 c (b ` a0yx }P g ( 4f d e0hx lP pl ( 4o!m n1Wxx [P ,( ( 4+!) *1Fx JP 0 ( 4/!- .15x 9P 4 ( 43!1 21$x (P 8\ ( 47!5 61x P < ( 4;!9 :1x P @ ( 4?!= >1w >P (  4C!DA B1w P HL ( 4G!E F1wL P L ( 4K!I J1w P P ( 4O!M N1w P T ( 4S!Q R1wt P 4 ( V1W!X,U w, P \ ( 4[!Y Z1zw ~P ` ( 4_!] ^1iw JmP hp ( 4g!e f1Xw K\P l, ( 4k!i j1Gw KP 4 ( ts!q r16w :P x ( 4w!u v1%w )Ph.(. {!|.4 z1yw 9}Phw 0 ݍ.6 ȻtX8,ļt\<T@-Mpha`0 C0v0 0 0 C vPv0 P4H v,0 P4H v,0 P4|H v,U0 L4H P v,Y  v 3ߍh6@-Mpjp0 C0v0 0 0 C hvPav0 P4H kv,j0 P4H ]v,m 0 P4H Ov,o~  0 P4TH Av,up0 P4H 3v,{b0 P4H %v,T0 P4H v,F0 P4tH  v,#8 !0" #P4<H u,*()0* +P4H u,',-0. /P4H u,0102 3P4H u,*DE0F GP4\H u,HI0J KP4$H u,PQ0R SP4H u,LM0N OP4H u,4 507P60 Hpu,<=0> ?P4DH }u,XY0Z [P4 H ou,5TU0V WP4H au,@A0B CP4H Su,$%0& 4hH'P Eu,t\]0^ _P4,H 7u,6f890: ;P4H )u,X`a0b cP4H u,Jde0f gP4H  u,1?!@Q4H t, AB1C!DQ4H t,>EF1G!HQ4H t,IJ1K!LQ4lH t,MN1O!PQ44H tH,QR1S!TQ4H t ,UV1W!XQ4H t,YZ1[!\Q4H t,]^1_!`Q4TH tX,ef1g!hQ4H st,Jij1k!lQ4H et,Kqr1s!tQ4H Wt,uv1w!xQ4tH Itp,xyz1{!|Q4<H ;t4,j9:1;!AP8 cd0e f48<S-kl2m"n48~$ 1!48< 0<@0 48< <`S^P@:UVV Uppx@-@M PH 0 48<@JS S S S S 2S40 48<S+0 48<S S S S S S S S$S 0S HS `S lS 0 48<S0@-|M@P ?PUT P L P mU00T -m|Ѝ0xX@-@Pj@-M@,$ P00ЍЍt@-4M@C4ЍBH0 0 P4Ѝ =JC 0  @P 0S*TS T$ 4Ѝ4ЍXp@- Ѝ` <0@ 0@^l@PmP,: PPU m mP 0@T U Nm 0P 10 00C@.R@0@Qˠ Ѝp|@-M@ߍ l?JC0/PLD0 0000hP 4 ( p0q ro *AmED0C B0A0@ 000+~PP!/l(j/l 0$0(0 0$0(0<4#44! 4 ( \0] ^[ߍԶp@-M@00Pߍp0S PolP 0 SPglU:PalUߍp`PV :ElP PUPUߍpt ߍptp@-MP`00ЍpU @@T PT:<Po`UЍpC-`@0DS2PT pP( U  kP  ?48,m 0 48XY0Z [48,\ 0 48TU0V W4h8,K 0 48@A0B C4 8,: 0 48$%0& '48,) 0 48\]0^ _48, 0 48890: ;4H8, 0 48`a0b c48, 0 48mn1o!p48, 0 48de0f g4p8, 0 48=>1?!@4(8, 0 48AB1C!D48, 0 48EF1G!H48, 0 48IJ1K!L4P8, 0 48MN1O!P48, 0 48QR1S!T48,n  0 4(0UAV1W!X4x8,] 0 48YZ1[!\408,L 0 48]^1_!`48,; 0 48ef1g!h48,* 0 48ij1k!l4X8, 0 48qr1s!t48, 0 48uv1w!x48, 0 48yz1{!|48, 0 489:1;!<488, 0 48<h  5 $(,  0 48)*1+!,48, 0 48-.1/!04@8, 0 481213!448, 0 48?`4p8''H'\, 4p56@7PlX Y0Z[`4pT8''H'\, @?PZT U0VW`4p8''H'\, XpYZ@[PH@ A0BC`4p 8''H'\, TpUV@WP6$ %0&'`4pp 8''H'\, @pAB@CP$ 4\%0]0 ( & ^ '_4$ 8, 8 90:;`4p 8''H'\, \p]^@_P` a0bc`4p 8''H'\, 8p9:@;Pd e0fg`4pD 8''H'\, `pab@cPm!n1opa4p 8''H'\, dpef@gP=!>1?@a4p 8''H'\, mqnoApQA!B1CDa4p` 8''H'\, =q>?A@QE!F1GHa4p 8''H'\, AqBCADQI!J1KLa4p 8''H'\, EqFGAHQ 4MJ1N1 (K!O! 4LP8I` , rQ!R1STa4p4 8''H'\, MqNOAPQ`U!V1WXa4p 8''H'\, QqRSATQNY!Z1[\a4p 8''H'\, UqVWAXQ<]!^1_`a4pP 8''H'\, YqZ[A\Q*e!f1gha4p 8''H'\, ^_A`Q]qi!j1kla4p8''H'\, eqfgAhQq!r1sta4pl8''H'\, iqjkAlQu!v1wxa4p 8''H'\, qqrsAtQ 4yv1z1 (w!{! 4x|u8, 9!:1; 0,oP@0S$4$($0 @ ЍxxxV4طD dT0 8p X77xt. ȻtX8,̺\<Tx`\(P4عĹ-M0 0 Ѝ80@-MP00u@&@U 0Uʌ u  U p0^\P^000  ^P_P@^@Ѝ06h6@-M@P@H0 ^P_P@^@Ѝ@-@ 0S   ]P P 1S1S  0 0 D@P0S ` 0\P P 1S1S @ 0 \P p 1S1S -pP-M``P8@0@ ^0T:, `]0 N]Ѝp9O-Mp@0 `S  P P0 S\ j]0 S 0S`P0 &P %P%W ]P0S0@ cWA  \P;0xS   ]^- 00;S)^Ŵ 0?0 B0O0d 3 `^2 B^2@T?0 00;O]\@;J] ]0P0&T&W W *W %TC%WA0@ t\ \P @11 S, c\;]@ D0HS@X\ @E0V\g\]`P;]@@B\ \ *\ZPY W *W\P 0\*W0@t\P \ \0 S 0S0S DR:0 S00Ѝ9gfff9@-p`P(0@ 0S [P 0(0 0@9C-p@P0S &S @PS" [  [P 0` [ [P `1 1S  PG-`@@Ppx\0S Y\0` T[Pc\Pn  J\0  [Pd04H00SF[HH0S 0 /[P H0P!0S1S0$\0 H0([H 01H01H01H01\H01H00S H01 0pS0\H0H011[H0110SH0<41100CI[H011H01a99T399: ::O-M@P`Zxp0pU00#400#800#<0q 0;<S %S 0S0@d  [PR[0@[ [ [ 0P"U 'U > [P/0%S@0S 0S0[0p %S@@@p@ w[P0% 0@ 0 @0P p;U 0 ZPT L[0S <][P0>S D@p0S 0 6ZP D0p!0S>S  @[P0S  [0@ ZP㌣ ZP\[0@0(S)[@([@T ZP kZPZ0P#Q [ 0PC RS @ "Q 'QU ZPP @@D1SWY0Z0D0YD0D01D01@D01@D0@0S D01 0@S0ZD0 YD011 D011 @ D011D01\ZP0S[+ !&  YPZP YP @ZP"  EP <T>iZP%TP4S TYYX 0< 0 yKY4S00@Ѝ:`:,:L:P:T:X:::|:t:9:::::: O-Mp0@0s sh (Y0`0CSX<<Z0 00 0T6;ES0`0CV *Z0 040 040 5X X YY:UPη@ 0U ?0 0B 0ᣏ0h3 U20@  BU2X?000@0`0CV:@YЍЍgfff@-@! 0T 0S  0S1p0S `P0X0@X0PSXX C-@P`VE r0Y0 0S"Q Q1 Q Q QWWW&Q <Q >Q 000 D8,0 3X00`V0:::::::T::O-M`@pP ^808`B 0Y^X0 00S0 W0000S<  0 00P+ 0X0 5X0 00S0 W 0   `E 0W000 0S<0WP 1S 1SB  0S; 0S 03 00 0P+0X0W0 00S0 vW 0  ` 0teW0000 S< 0<XW0000 0 ) 0 `0QXW0 00S0 .W0000S Z*0S0 0 Ѝ0 `Ѝ;9: ;;T3O-$MP P U@@0+ @0 pWU 0S 0 0p XRP`H 0SG  0S  0S03 1 00S>S) W@ W WH00W@ WP0 00S0$ S22V0PPH0 1` P@ D 0 c` @XTPH 0SN  0S  0S0: 100S<S0 00V@ V0 00S eWH00 V@ V`0 00S0 pSd0\05V0``H01P 0 6W$ЍT39;$;p@-M@0 0PHV`ЍpfV@ e 0Q0#0:0 &W0 !W0 W0 W0 WVUЍp0;@-@p  0S]@ P(0S (080P:<0PU@ P0S@UD00p `P0 0 80P:<0PU0SUD0`0pD0SUH P0S ` 0S1UH0UPH0a 0SH0SU00s,U 40SU2@U2U}U0@-@U TT0PN@(P0U,sU(, @T0@@0H0D00 lT3A-@0000 0`D 0S 0 0S000@`@Pp5UP 0pPU 0S0 0S0PS00@WU0 0P 0S0 ``R @@p@-@P`p( U( T$0 0  Pp@T3 C-pPP`@0S TP 0`!0S1S3Xu 1TT00U00U0q0101@UpU0 1 01 0 2  0 1 0 2 T@1S 0!0@S1 ?p0@T2 01 0@0@0X001 100vT0D0!:U0jU1? g.U2 02T3 P202@-p`P(@0S T >@`p(@C-p(@/ ^, R* @ |PxT0SP 2@ mT` !UgT` $TzT00uTUT0S2@02 -_-MP@4P0@`UX',@ 40400@40<08@ѠSC0<S 0S0S& @,܆ pTPP_U :U UJ/UpT@P>Zo PPTP< TT@7X TP<T@ 0>S SS%>Z# &f TP TP> @0D Cc0G  SP*X>U]UduT00>S DT@P[UU0S>ZX [fTp D@P' ?U ?XT@ 0S >S0S>Z0D C(0S hPT>TP0P /U >U D00S0 SP D00РȃUu /Ur >Up Y 0 TSY 1/0TS? 0 DPPP@T=P SP; PSP"U 'U2@@0S 0S0S 000S P0S RP P 1S00 0@,B,P:P 0/@SP0PРP/U000S >SUS>ZQ 7  >U UC>ZA %PT 0S 0pS <S <S 0S0S &0 D~S|(0 ) 0S    p  \ 0m Y 0( d _`ЍT;4;H;t;;;;;<T3;;;;:;;<;(0 <: @-Mp0 0 0 @'S0 "S0 S0 S RP" 0+S`@ VRPU  V T e 0Q0#0:000ЍЍ0@-0QP @Q0@0$<///// ////////@-@00 0( , 0 4 8 < @ @/=0@-@P00 @0( , 0 4 8 < @ 0@/=/@- MP@p`R  P }R 0S 000 P Ѝ@/-M0 Ѝ/-M0 Ѝ////- 0S0 \0//0//0//@-@P PPT: T0S@/G-Mp`@P@/P0 @ /ЍG/@-,M@, aP,00R0 RPP0@-P@0S000 O000@/@>0@-P@0S000 O000@/h>0@-MP@0S !/Ѝ0@/@-M$p@0S /Ѝ@/-'P 0l0/// -P-P0` 0!r0/1 0SlP0`@`/0000 0@0S 0" `/0@-M@T LP@000`P*q@Ѝ0@/0&4&O-(M0$0 P T 0 ^\pX@LP  BX`0C$ 0 0p@P/(ЍO/O-$MP0 0H L 0 ^T`P@  BXp0CQ 0 0`@P/$ЍO/@-MP`p@0^  0 PO0|0/0S 0 Ow 0 POЍ@/@-`@$ pWPO 8P 0S P P PU@/ 8@/p@-PR`@# T 0Op@/@-MP`@MpT 0S% M MM OP0 TA@ M00MЍ@/p> pX-$M`0$0 , (` "@Dp>-0@, 000/$.10 P A@R000 (<P,Hp(@\|d(H|x@ll4Xh00 S 0 @0/00 S00-o/'8(B(A/////// ///("('8/ /K0lK0 @L P 80S L$0K KP00S00 lK 0K/0 0 L lKcKvdK0 K0 /00 KfTu !(8/J!((/Cd("('8/9/4 /.,0!((/$ // // / /!((/'8(B(A/("('8/("('8/ //Z,/R,'88(C8B(///("('8/'H(8B(C8/ / !(8/z(H(Q (0B(A/k(B(A/b/\ /U /N /H'8(B(A/?/;/5!0((/,'88(C8B(/!'8(B(( (8!C8B(/P1/P +@$,10 0 /0S-MKЍ-MKЍ-MlKЍ-MKЍ C-0MPph&h!HV0/0@ P0 @,`/,0S@phk*PVpPu>0 P  0H]00( E0H]X0PPTKP0 P0>P00(0 ZBh/pD ؉<XEO-MP`p 6P0 @开@0< 840,@(LpH`DPw0 @$0`  @/PQ xPM kP#@0 !8 10 P<0Z>00P0N,@0P /P ` X0T0B40d0\ 0C0C00 % $@(P,`0p48<@0D HL@P` pb@ @ P0 0/T 0 0/ЍO/pE -X-@@,00h/-KEO-(MXT@LPP`\p` 0 L @P` p$=(ЍO/@-(M@  :+0 @=(Ѝ@/@-(M @ :t0@=(Ѝ@/@-(Mp`P@( =< 0 s`p=(Ѝ@/0@-(MP@( = :K0 P= (Ѝ0@//@-M@+Q D00/Ѝ@/G-MPp 0@4P`0  @/ЍG/FC-M`p$P 0@P /P0 <ЍC/pF -X-@@,00Fh/-KGG-MPp 0@4P`0  @/ЍG/GC-M`p$P 0@P /P0 ЍC/p H -X-@@,00h/-KLH/@-M@+Q 00/Ѝ@/p@-M`P,0@ 0>@P `<Ѝp@//LE/hE/E0@- MP,@ 0 t@r000 :a 0 < Ѝ0@/G-(MpHL@PPT` 0 M @P `py<(ЍG/A-M@<@8P4`0p @P`pЍA/@-M@$0 0 PЍ@/p I -Y- ,MPP@`p0( HKL0 W<@@ ^0L0 @@0@ ? H0K s4 *<0DP0SR<\i/-KL0 L 00L0 d_0@-@P :0 <P :0 ;0@/@-@@/@-@ <0 ;P <0 ;@//I/TI/Ip@-PP(0@S!@b04 C R]000 0<Lp@P/Q/@M/J/@F0S /=0S /@3 R 0 /* R 0 /@ `V /0S0@@0`V  ///@@p@/C- M@ptn8 R i8(P 0 @P/t $hH$H<`0(0/ 0 P 0/P0S ЍC/( 0  K/////J/xJ/I/(J/DJ@-@ %0 0/P  %00/@////TJ//,0 0  $     /JO-,MQ@00/ 0 ! 0S 0Q: ,0@P`p0 @P`p $(0 <,ЍO/C- MP`0* <8#^% X pp0 @p/pU 0S0 P@0 @/00/p ЍC/p@-,M@P`, {: ,0   0 0 <P ,Ѝp@/A-0M@Pp , ^:,0 0 0 `<P 0S `0 ;PV PK <P H0 v<0ЍA/@-@-0 0  0 @/@-@0S0/00@//xJ0@-P@ 0  0S# 0Q:I U00+K<0S> U : 0P9 0 (9000@/0@-P@ 0  0S 0Q: U00+<0@/0S 0 9 0  90@/0@-MP@ 0  0S+' 0 ,Q: 0+P50S  Ѝ0@/@-8T@/@/<0SP/-80S 00///-80S 0P0///-80S r9-/80p0//@-@80S a9@/8 0l0/@/0@-P@,0  B8 0(0/0@/ ;0@/-<0S :/<0t0//-<0S :/<0x0//@-<^ M@/<@/@/0@-P@E ;:<0PS= S P;0@/<00/0@/-<0S D;/<00//-<0S :/<00//-<0S 8/<00//-<0S ;~/<00//-<0S80S00//A- M@<^ ,0( Q$  0 0 8 <,`(p $P0@ `pP/ ЍA/0@-MP@ <0S k80 P  R80S0 0/Ѝ0@/-Q8%P 00////JpJ -X-@@(l04 D0588 PP0D00 HD0)8 0H0h/-KKpL -X-@@400 0Sh/-KKpHL X-`M@X000 pK pKlP spK;h/-pKt/t/@-8@8P@/@@/@-@ PP0D0@/0D0 H7 0H0@/0@-P@,00p0/ :0@///@-@4P@/-/@-M@Pp, ^p0S( S& S SgK/K '@PR KKITK@00pL2`C |$P00/W HB@D<0T <0TT|$ %@Tv$,'o/p]-M<0H2 Ѝ-MKYGЍpH^ pX-MPH200 0<2 P4 ` T0S 0K0/P0  @`/42SP0SX \0S10 K.IP0@# KIt! K#K(\ K$02@C $P00/юKH@K0 $PL<0,2 ?K/K ````&0P K. <#82@C #P00/@2@C #P00/L'ph/-M KFЍ-M#KFЍ-MKFЍ_ _@- M@ , @0 @@ Ѝ@/d%p@-P@ U u l`<0S d00d0S<#Ud0Shh0d0#p@/*-T0S 0 0///-T0StT00//-T0S0$0//- 0 #/p@-P`@ U VBP00@ @E Q@10+B0 p@/:- /@-pP@` @/PE&P @U&P T "PEP0@P0 d+A0S"dC@//T0@-@PZ0@/00#P 0 0 P@0@/-#/@-@Z@/0 $P @@//@-@"@/p@-@P`1 AUT \A0 0/P"C00 C0 *p@/WA-M`0p(@,PP@ `p/ЍA/`_px_ -X-@@,00?h/-K_////-/-/0@-M@P+Q1 ,Q) -Q! .Q /Q 9Q )00/0 0%(0!/0%(0!/00/ 00/00/Ѝ0@//D_-FMh001E/!E?0@#0S:0S:%}%Fߍ/p(a X- MQ Qh/p(ax/0@-@P(@%"Px !x0@0@/@-@80 t0 00/t"0t0@/0@-P@"tz8t 00/0@/p@-@`0 P   !P2 !P- U+ \80S P0 P00p@/-00//-00////-0S00 /-P//-/@-MP@`pP0  Ѝ@/@-@P`PU U(@/:  !@" "@/U 04p$P8lV 0 48( <S@/@@@ 4 ( 0 (.4.(.0 @/-0 4 S 0\0//</-00//@-MP@`pP0 I Ѝ@//`/`0@-P@0S000 |X!000@/da0@-MP@0S/Ѝ0@/0@-P@0S000 X4!000@/a0@-MP@0S/Ѝ0@/0@-P@0S000 4!000@/a0@-MP@0Ss/Ѝ0@/- 0R0 /a0@-P@ $0R00@/ap@-P`@1,S@ 0S0S@ 0S0S0 48<@ @0S0  <@ 1S@ 0S0S@ 0S0("(08#HDPp@/0D Db(>p@/A-PP$ 0@s! 0pS` 00 0S 0P 0 0 ;00p(`W:pX@A//ap@-P`@P0 0S {0S p@/0sB s8 s0 s% s s f1' P ,00S000/P 00p@/00/00/P000/ <F 000/P0`-/p@-`P@( D(0 D0H PH0D !<H00hX0`` DPH0P<H0p@/\ 0@-@P\P 0@/ ;v0 P0\0/0 S"PZ0 S !S "S ;u0 P0@/A-MpP`@NP $U u   V* P 0 @/PP 0 @/PЍA/@-@P ;v0 xP@/@/C-M@00/}0p>0 S PLP m P L!P0 I,00,04@} 0D0H0, ; H0, H0`;H0=V v,00,004`l0/P ` `|` 0S 000 XU  0P 0\0/W PЍC/A-p`P&@w  $ P$  $ $ '$ $p(>00/H0 -K0>>-K07>P0S P@P$00S P$@P 0S @0/0 @ 0@/G-P P>PXP+PdP`` p @0 / LG/(gA-M`pP;P P'0S @W0/W W0/P H@Pd ` 0S@@TW`V T T  1.! x ЍO/ONhtp@-`@@Q *p@/@ PP  0E%P000p@/O-M 0Sp@< 04SPPU00`U 0 48<@ 4 (  0  0 48<@ 4 ( 0 [ v P0pWZ g0 0 0 U0 40W S  0BQ0 K%0 G00G C%0   0C00ЍO/A-`MPp00\0` @P P \P `0ZS0cB0E0l H@ ?/ H0$HUP I@\ `ЍA/t0@-P@00000@/F Pp@-`P@Pp@/0,0 04S00@ )p@/pt 0X-MP@0S X 8#8 8@BD B1  K4( 0$ K K2KK=0 [ PL 0@C P00/0h/-M K(ЍO-`Y0P@0%S01S:9SAS:ZS 9S80C10C@ S1S [P@P0S00C 0 B0c0AA(K0pS) ? %R01S:9SAS:ZS9S80C10C SᲰǠ` @1S + @9&$PEp `PE0S 0GpR%O/p@u X-MP`@p0 K'P  K (P 0 o 0@C P00/ 0@C P00/h/- K' -P-0 `/@-@ Q 0S 0S0S R P@/@-@ Q 0S 0S0S RP@/@-@P`pPCT1@C0eS0 C0R@CU@UTi'00u0 @/|#Wpu -0X-PP@&G(PTW (0h/-K&G-@P`ZP#T 0S 0p W*f0 P*@z0000 0 0Y0 00&G/Wpu 0X- M@ 0K K4 0 0S000  0KK4 Kh0PC P00/4& 0@C P00/0h/- K&-K&-0S<0S//G-MP`lU 0( ,0@CX@10 "(0pX0(0S X1 0/G P@$ 000/P@PE UpW: T80S 0S @W@0P$ 000/PP@D T U:0 0,0 $ ,P00D@P/0 ,0 @CW@10( C"(0pG0(0HЍG/p@-M`0 ,0( S $ B0/$@/,0%00S (0S $ C040/( R $P B0D@P/$ ,P00D@P/00(0Ѝp@/A-MP`0,( 0@ApS'0R;TA0 !00,0( 0S 0PEPC$ 000/P@PE U T:0 0,0( T $ d0/$@/$ ,P00D@P/00(0, (00BS*ЍA/0@-P@0 (0, 0SV( %4P0(00(00@/0@-P@0 j(0, 0S=(%4%(P0%< 0(00(00@/0@-P@0M( ,0S0B](0 040(00(00@/0@-P@01( ,0S0BA(0 48<0(00(00@/C-MPp`J WH 0  (,0 CU@1@!0 !(0PU0(02 0 0/$E@0 40/0 pES $ ,P00D@P/00(0 0W:(00P 0 f (00(0ЍC/0@-P@<U*!.0@/+A0@/@-M@W<0PkЍ@//8vpv Y- M`pP@ ^0<00,K.$ 0C$@(@ 0S000   (K0%(@0 ,K<, 0 ~ @D P00/,0@C P00/i/pv -,K$-(K{$lp(w -X-``P@`0p 0t#U@? $h/-K0 V$`w@- 00 @C <P00/@/`w0@-@P0@/pw 0X-M@PP   00K0 -輏Q3R@ 0 0/@-@00 0@/@-@00 0@/@-@ 0S 0 C01!RJ 0 R00 AZ 0 0@/@-@P0 \S /S :S0S^ P @/@/ 0 @/p@- Ѝ@106y@0`A/0@0 0@P APBP> 0A/0P4X0S WPXL0S , 5PXH0SLu0̠ Ѝp@/p@-P`@3@ @0Q@@D`HP(0Sg p@// /$/(/,/0/4/8/</@/D/H/L/P/T/X/\/`/d/h/l/p/t/x/|/ဠ/ᄠ/ሠ/ጠ/ᐠ/ᔠ/ᘠ/ᜠ/ᠠ/ᤠ/ᨠ/ᬠ/ᰠ/ᴠ/Ḡ/ἠ//Ġ/Ƞ/̠/Р/Ԡ/ؠ/ܠ/////////// ///// /$/(/,/0/4/8/</@/D/H/L/P/X/\/`/d/h/l/p/t/x/|/အ/ᄡ/ሡ/ᜡ/ᠡ/ᤡ/ᨡ/ᬡ/ᰡ/ᴡ/ḡ/ἡ//ġ/ȡ/̡/С/ԡ/ء/ܡ//////////// ///// /$/(/,/0/4/8/</@/D/H/L/P/T/X/\/`/d/h/l/p/t/x/|/ဢ/ᄢ/ሢ/ጢ/ᐢ/ᔢ/ᘢ/ᜢ/ᠢ/ᤢ/ᨢ/ᬢ/ᰢ/ᴢ/Ḣ/ἢ//Ģ/Ȣ/̢/Т/Ԣ/آ/ܢ//////////// //// /$/(/,/0/4/8/</@/D/H/L/P/T/X/\/`/d/h/l/p/t/x/|/ဣ/ᄣ/ሣ/ጣ/ᐣ/ᔣ/ᘣ/ᜣ/ᠣ/ᤣ/ᨣ/ᬣ/ᰣ/ᴣ/ḣ/ἣ//ģ/ȣ/̣/У/ԣ/أ/ܣ/0 X-M@P`pa0 4@ @ @h/-0D X-  0B/h/ -00P/p@-@P`P  0B0P*Q0 vP@ 00BC1!@ p@/d-h--P/0@-\@TP0S/@T:,@$P0S/@T:0@/t$|xA-pQ0pPP `0@C0S /@DT*f0 0 x@pP0S/@T:H@@P0S/@T:W0B/A/d-h-l-- /- /0@-8@0P0S S(P0@/P0@/dX -[-$M ``ppA/AP4P / 000/ 0W0/P4P D1/0 0U u 010S 1/pp0 @10/ `p4P0Q4P k/K-0/ 0Sx0/ 00C0-K0 00P 0,0 ,00S00/ 0@ @/@(@ (Pcsm`,0@-Q@p1P /0TP/0SL <1/0TTD 1/0S> 1/0T8 0/0 0R00/0 0R(0/0S# T! 0/0S t0/0 0ST0/0 0S 40/(0@/ 0S P0@/P| -X- P 00S /(0/h/-K0Sp@-P@`00/U0E@ 0Sp@/P@-@,0/00S 0@/P@-@,0/00S 0@/P@-@ 0 RR ^:0 @/0 00@/ -_-(8Mp``8C\ /@$SX@ /@T@ /0 P0 /0`/p2PV2 Q0 ^00P5 TPp  p~00S  R 00S  R ^^pR~0pCPP "PX@0 pp/ P,@P0 /PЍ@/0@-P@t0/@0 /pp0/@T0/P80$@/P 0/0@/ȱ O-S Ѓ p/FFxGO/0@-P@00/00S@ 0 0@/P0@-@P40/ TR 0P 0@/P (0R: 0(0$ 0B0@/"@-0@  0T:Q :Q1@/@/@-M @/Ѝ@/@-@0 7/@/ث@-@Q p0S /P L0@@/Q 0 0S  /P@/$-(-0@-@0P 0/PPP0@/ᘦ@-@00 /0 (   @/ᨤ@-@$0/0(/@/x0@-@0/x04 Q\0/D0< [0 P/P0E C E0@/(8f~((--+/-/0@-!M@Pl00 2P A/P PP  !ލ0@/C- Ÿ ЍPp`@@0 Ph T 00/P_ P P;A/!P 0!/@ \^@P00  @ P ,!>0S`PV0S ,C,P(UB0L0/P 0S0\0/0d0/ *0P0/; ˠ ЍC////// ///@-0 @00@8@-$@ 00@+@-d@ T0 0 0(,00000400800<00@0@/= %@-d@T0 0 0(,00000400800<00@0@/=d%@-d@ϹT0 0 0(,00000400800<00@0@/=%@-d@ᲹT0 0 0(,00000400800<00@0@/=%@-D@ ,0  0"01@/0P8&@-D@ ,0  0$01@/HPP'-/`-/x-{/-u/-o/@-P@A$0P ! @/*-U/*-0/$+w-,$0/ 0//L 0,--M0  2 00/`-@-@P x00-Ҭ/ %-̬/d%-Ƭ/%-/% 0 /8&P 0 /P'P 0 /S 0 /S 0 /S-/(-/(-/l(- 0P|/*- 0//,-", 8`aԷܷ $ak"@l0>X>H?"|>0?@?JJ4><0@H@d@"L? @@ $B`aԷܷD $ak?{GetServiceHandleDeregisterServiceSCUtrayActivateServiceSCU0:coredll.dllServicesdisplayPWDSnoPromptForCreds%dInvalid Frag Threshold Range is %d - %dInvalid RTS Threshold Range is %d - %dInvalid Ping Timeout Range is %d - %dInvalid Ping Delay Range is %d - %dInvalid Auth Timeout Range is %d - %dInvalid DFS Scan Time Range is %d - %dPower-cycle for diversity changes to take effectPower-cycle for DFS changes to take effectPower-cycle for DFS and WMM changes to take effectInvalid default ad hoc channel. In outdoor use mode, ad hoc channels must be 1 - 14. 5GHzOutdoorMaskInvalid default ad hoc channel. Ad hoc channels can't use channel 14 with this regulatory domain. Invalid default ad hoc channel. In FCC use mode, ad hoc channels can't use channels 12, 13, and 14. "̵D\"<طܷ08"Dp(l&::4<<4L44xExport[%d in SCU]ImportProfiles\Windows\Programs\Summit\ |`aԷܷ $ak0>T>x>>>>? ?@?`?????"!`":::::; ;8;T;l; ;; ;; <<< `<< <<=8=\= @@`aԷܷB $ak<> ='"yesstandalonexml unclosed Summit Client Utility Help
Main

The Main window displays the following properties or options:
  • Admin Login/Logout button - To log in as an administrator, click Admin Login and enter the administrator password in the dialog box. The default password is SUMMIT (case sensitive). Click Admin Logout to log out as an administrator, leaving access to end-user functions only.
       Note: The administrator password can be changed through the Admin Password function on the Global window.
  • Enable/Disable Radio button - When the radio is enabled, select Disable Radio to disable it; when the radio is disabled, select Enable Radio to enable it.
  • Active Profile - Displays the name of the active profile. Use the drop-down menu to select a different profile. If ThirdPartyConfig is selected (and after the device goes through a power cycle), WZC (Windows Zero Configuration) or another application is used to configure the SSID, Auth Type, EAP Type, and Encryption settings. See "ThirdPartyConfig" for more information.
  • Status - Indicates if the radio is associated to an AP and, if not, indicates the radios current status. Potential values include: Down (not recognized), Disabled, Not Associated, Associated, or <EAP type> Authenticated.
  • Radio Type - Indicates the device's radio type including:
    • BG - Summit 802.11g radio (supports 802.11b and 802.11g)
    • ABG - Summit 802.11 a/g radio (supports 802.11a, 802.11b, and 802.11g)
    • ABGN - Summit 802.11n radio (supports 802.11a, 802.11b, 802.11g, and 802.11n)
      Note: Currently only applies to the PE15N module for XP
  • Regulatory domain - Indicates the regulatory domain(s) for which the radio is configured. The domain(s) cannot be configured by an administrator or user. For more information on regulatory domains, see Section 5.0 of the Summit Data Communications, Inc. User's Guide for 802.11g and 802.11a/g Radios (for Windows XP).
  • Auto Profile - Enables the user to activate or deactivate an automatic profile selection facility. Click List and use the dialog box to select a created profile. When the facility is active and the Summit radio makes its first attempt to associate to an AP (after a device startup or resume), SCU tries each profile, in order, until the radio associates to an AP. That profile becomes the active profile and remains the active profile until one of the following occurs:
    • The device is suspended and resumed, power-cycled, or restarted, which causes the automatic profile selection facility to restart the selection process.
    • The user turns off the automatic profile selection facility and manually selects a different profile on the SCU Main window.
               Note: The profile list should not include any profiles with an Ad Hoc Radio Mode setting.
               Note: Auto Profile is not available for the MSD30AG and SSD30AG modules.
  • Driver - Indicates the current version of the device driver.
  • SCU - Indicates the SCU version currently running on the device. Displays only if space permits.
  • Import/Export - Displays only if the radio is programmed to allow import/export functions and if you are logged in as an administrator.
    Click Import/Export and use the dialog box to do one of the following:
    • Export global settings, all standard SCU profiles, and the special ThirdPartyConfig profile from the SCU area of a devices registry to a file that can be transferred to another device.
    • Import global settings, all standard SCU profiles, and the special ThirdPartyConfig profile from a file (created using the Export facility) to the SCU area of a devices registry to enable SCU to use the information.
Note: When importing information, select Add to existing to merge new information with current registry information. Select Replace to overwrite the current registry information with the newly-imported information.
  • About SCU - Click About SCU to view SCU information including driver and the SCU version.



Profile

Profile settings are radio and security settings that are stored in the registry as part of a configuration profile. When a profile is selected as the active profile on the Main window, the settings for that profile become active.

Notes: When the ThirdPartyConfig profile is selected, a power cycle must be performed. See "ThirdPartyConfig" for more information on ThirdPartyConfig profiles.

If the Default profile is not modified, it does not specify an SSID, an EAP type, or a data encryption method. As a result, if the Default is the active profile, then the radio associates only to an AP that broadcasts its SSID and requires no EAP type and no encryption.

From the Profile window, an administrator can:
  • Define up to 20 profiles, in addition to the special ThirdPartyConfig profile.
  • Change profile settings.
  • Delete any profile except the special ThirdPartyConfig and the active profile.
Profile changes are not saved to the profile until you click Commit.

The Profile window displays the following properties and options:
  • Edit Profile - Use the drop-down menu to select the profile to be viewed or edited. Only an administrator can edit a profile.
  • Actions - Actions included New, Rename, Delete, and Scan. New, Rename, and Delete are only available to an administrator.
    • New - Create a new profile with default settings. Assign a unique name (a string of up to 32 characters). Edit profile settings using other Profile window selections.
    • Rename - Change the profile name to one that is not assigned to another profile.
    • Delete - Delete a non-active profile. You cannot delete an active profile.
    • Scan - Click to view a list of APs that are broadcasting SSIDs; select an SSID and create a profile for it. See "Using Scan to Create a Profile" for more information.
  • Radio - Select a radio attribute from the list on the left to view its value or setting in the box on the right. Only an administrator can edit these values or settings. See "Radio Settings" for more information.
  • Security - Values for the two primary security attributes, EAP type and encryption type, are displayed in separate drop-down lists with the current values highlighted. Only an administrator can edit these security settings. See "Security Settings" for more information.
    • Encryption - When the administrator selects an encryption type that requires the definition of WEP keys or a pre-shared key (PSK), the WEP keys/PSKs button becomes active. Click WEP keys/PSKs to define WEP keys or a PSK.
    • EAP Type - When the administrator selects an EAP type, the Credentials button becomes active. Click Credentials to define authentication credentials for the selected EAP type.
  • Save Changes - To save changes for the selected profile, you must click Commit. If you make changes without clicking Commit and attempt to move to a different SCU window, a warning message displays and provides the option of saving your changes before you leave the Profile window.

Radio Settings
  • SSID - Service set identifier for the WLAN to which the radio connects.
    • Value - A string of up to 32 characters
    • Default - None (WARNING! Thissetting allowsassociation to thestrongest unsecured detected network.)
  • Client Name - The name assigned to the Summit radio and the client device that uses it.
    • Value - A string of up to 16 characters
    • Default - None
  • Power Save - Indicates the radio's power save mode.
    • Value:
      • CAM - Constantly Awake Mode
      • Maximum - Maximum power savings
      • Fast - Fast power save mode
    • Default - Fast
  • Tx Power - Indicates transmit power. Transmit power can be overridden by a Cisco AP if the CCX Support global setting is set to Full and the AP defines maximum transmit power for the client as a lower value.
    • Value:
      • Maximum - Maximum defined for current regulatory domain
      • One of the following values in milliwatts (mW): 50, 30, 20, 10, 5, 1
    • Default - Maximum
Note: The device manufacturer should use the Summit Manufacturing Utility (SMU) to ensure that the transmit power value reported by SCU is EIRP, or the total effective transmit power of the radio (including gains that the antenna provides and losses from the antenna cable).
  • Bit Rate - Indicates the bit rate used by a radio when interacting with a WLAN AP.
    • Value - Auto (rate negotiated automatically with AP) or one of the following rates in megabits per second (Mbps): 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54.
    • Default - Auto
Note: If you select a specific bit rate, then the radio connects to an AP only if that AP has the specified SSID configured with the selected bit rate as the only required rate.
Note: This feature is not supported when using the SDC-MSD30AG and SDC-SSD30AG wireless LAN modules. When using the SDC-MSD30AG or SDC-SSD30AG modules, the Bit Rate option is unavailable. It defaults to Auto.
  • Radio Mode - Use of 802.11a, 802.11g, 802.11b, and 802.11n frequencies and data rates when interacting with AP, or use of ad hoc mode to associate to a client radio instead of an AP.

When SCU operates with a Summit 802.11g radio, an administrator can select from among the following Radio Mode values:
    • Value:
      • B rates only - 1, 2, 5.5, and 11 Mbps
      • G rates only - 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
      • BG rates full - All B and G rates.
      • BG rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps. This should only be used with Cisco APs running IOS in autonomous mode (without controllers). For Cisco APs that are tied to controllers and for non-Cisco APs, Summit recommends BG rates full.
Note: BG rates optimized is not supported when using the SDC-MSD30AG and SDC-SSD30AG wireless LAN modules. When using the SDC-MSD30AG or SDC-SSD30AG modules, BG rates full is used.
      • Ad Hoc - See "Ad Hoc" for more information. Rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps.
    • Default - BG rates full
    When SCU operates with a Summit 802.11a/g radio, an administrator can select from among the following Radio Mode values:
    • Value:
      • B rates only (see above)
      • G rates only (see above)
      • BG rates full - All B and G rates.
      • A rates only - 6, 9, 12, 18, 24, 36, 48, and 54 Mbps (same as G rates) ) }L
      • ABG rates full - All A rates and all B and G rates, with A rates (the .11a radio) preferred. See "Preferred Band for 802.11a/g Radio" for more information.
      • BGA rates full - All B and G rates and all A rates, with B and G rates (the .11g radio) preferred. See "Preferred Band for 802.11a/g Radio" for more information.
      • Ad Hoc - See "Ad Hoc" for more information. Rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps.
    • Default - ABG rates full
  • Auth Type - 802.11 authentication type, used when associating to AP
    • Value - Open, shared-key, or LEAP (Network-EAP)
    • Default - Open
Note: See http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml for a Cisco explanation of 802.11 authentication using Open and Network-EAP. The Summit Client Utility refers to Network-EAP as LEAP.

Preferred Band for 802.11a/g Radio

The radio has a Preferred Band for the following radio modes:
  • ABG rates full - 5 GHz (preferred band)
  • BGA rates full 2.4 GHz (preferred band)
When attempting to associate, the radio first considers APs in the applicable preferred band. The radio will attempt to associate to a non-preferred band AP only if the radio is not currently associated and there is no AP available in the preferred band.
Note: When roaming, the radio only considers APs in the band to which the radio is currently associated.
When an administrator attempts to create or edit a profile, SCU determines which radio is operating in the device and populates the available radio mode values according to the radio type.
Example: Suppose an 802.11a/g card profile is loaded onto a device with an 802.11g card with a set radio mode of A rates only, ABG rates full, or BGA rates full. SCU will display a radio mode value of BG rates full. If the administrator does not save any changes to the profile, then the profile does not change. If the administrator saves any changes to the profile, SCU saves the radio mode values as BG rates full.

Ad Hoc

If the administrator selects Ad Hoc for radio mode, then the Summit radio uses ad hoc mode instead of infrastructure mode. In infrastructure mode, the radio associates to an AP. In ad hoc mode, the radio associates to another client radio that is in ad hoc mode and has the same SSID and, if configured, static WEP key.

Security Settings
  • EAP type - Extensible Authentication Protocol type used for 802.1X authentication to AP.
    • Value - None, LEAP, EAP-FAST, PEAP-MSCHAP, PEAP-GTC, PEAP-TLS, EAP-TLS, EAP-TTLS
    • Default - None
    • Value:
      • None - No encryption.
      • WEP - WEP with up to four static keys (40-bit or 128-bit in ASCII or hex) defined under WEP/PSK Keys.
      • WEP EAP - WEP with key generated during EAP authentication.
      • CKIP - WEP with up to four static keys (40-bit or 128-bit in ASCII or hex) defined under WEP/PSK Keys, plus Cisco TKIP and/or Cisco MIC, if configured on AP.
      • CKIP EAP - WEP with key generated during EAP authentication, plus Cisco TKIP and/or Cisco MIC, if configured on AP.
      • WPA-PSK (WPA Personal) - TKIP with PSK (ASCII passphrase or hex PSK) defined under WEP/PSK Keys.
      • WPA-TKIP (WPA Enterprise) - TKIP with key generated during EAP authentication.
      • WPA CCKM (WPA Enterprise) - TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication.
      • WPA2-PSK (WPA2 Personal) - AES with PSK (ASCII passphrase or hex PSK) defined under WEP/PSK Keys.
      • WPA2-AES (WPA2 Enterprise) - AES with key generated during EAP authentication.
      • WPA2-CCKM (WPA2 Enterprise) - TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication.
       
       Note: For ABGN radios, CKIP and CKIP EAP are unavailable.

    • Default: None

Using Scan To Create a Profile

When you click Scan on the Profile window, SCU opens a window that lists APs that are broadcasting their SSIDs.
Each row in the list shows an AP's SSID, its received signal strength indication (RSSI), and whether or not data encryption is in use (true or false). You can sort the list by clicking on the column headers. If the scan finds more than one AP with the same SSID, the list displays the AP with the strongest RSSI and the least security. Every five seconds, the Scan window updates the RSSI value for each of the APs in the list. To scan for new APs and view an updated list, click Refresh.

If you are authorized as an administrator in SCU, you can create a profile for any SSID in the list. To do so, double-click the row for the SSID or click the row and click Configure. SCU displays a dialog box that asks you if you want to create a profile for that SSID.

If you click Yes on the dialog box, then SCU creates a profile for that SSID, with the profile name being the same as the SSID (or the SSID with a suffix such as "_1" if a profile with the SSID as its name exists already). If the AP is using WEP, then SCU opens a dialog box in which you can specify WEP keys. If the AP is using EAP, then SCU opens a dialog box in which you can specify login credentials for the EAP type (which SCU assumes is LEAP). After you enter information on a dialog box, SCU returns you to the Profile window where you can view and edit profile settings. If you edit the profile, then you must click Commit to save the changes.

EAP Credentials
  • LEAP:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
  • EAP-FAST:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
    • PAC Filename - Protected Access Credentials filename (up to 32 characters)
    • PAC Password (up to 32 characters)
  • PEAP-MSCHAP, PEAP-GTC, PEAP-TLS, and EAP-TTLS:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
    • CA Cert - Filename of root certificate authority (CA) digital certificate (up to 32 characters). Leave blank if the Use MS store checkbox is selected.
    • Validate server checkbox - Select this checkbox if you are using a CA certificate to validate an authentication server. When this box is selected, you must enter a certificate filename in the CA Cert field or select the Use MS store checkbox.
    • Use MS store checkbox - Select this checkbox if the Microsoft certificate store should be use for a CA certificate. This is applicable only when Validate server is selected.
  • EAP-TLS:
    • User - Username or Domain\Username (up to 64 characters)
    • User Cert - Click the ... button to select a user (or client) certificate from the Microsoft certificate store. You may not enter a filename because the user certificate must reside in the Microsoft certificate store. When you browse for a certificate, the pop-up box displays two fields: Issued By and Issued To. Click on a certificate to highlight it and click Select.
    • CA Cert - Filename of root CA digital certificate (up to 32 characters). Unavailable if the Use MS store checkbox is selected.
    • Validate server checkbox - Select this checkbox if you are using a CA certificate to validate an authentication server. When this box is selected, you must enter a certificate filename in the CA Cert field or select the Use MS store checkbox.
    • Use MS store checkbox - Select this checkbox if the Microsoft certificate store should be use for a CA certificate. This is applicable only when Validate server is selected.
Note: There are no default values for credentials. If the credentials are not specified in the profile then, when the radio tries to associate using that profile, Summit software displays a dialog box that prompts the user to enter the credentials. Summit software populates the dialog box with the username and password supplied for the previous EAP authentication.
When entering credentials for EAP authentication:
  • If the credentials specified in the profile do not match those in the authentication database, the following occurs when that profile is used:
    • For EAP-FAST and EAP-TLS: Authentication fails.
    • For LEAP, PEAP-MSCHAP, PEAP-GTC, and EAP-TTLS: Summit software tries the credentials three times and then prompts the user to enter valid credentials. Once EAP authentication is passed, Summit software stores the valid credentials in the profile.
  • When prompted with a dialog box, the user can do one of the following:
    • Enter valid credentials and click OK - The radio associates and authenticates.
    • Enter invalid credentials and click OK - The radio associates but does not authenticate. The user is prompted to re-enter credentials.
    • Click Cancel or clear the credentials fields and click OK - The radio does not attempt to associate with that profile until the user performs one of the following actions (while the profile is active):
      • Causes the device to go through a power cycle or suspend/resume.
      • Disables and enables the radio or clicks Reconnect on the Diags window.
      • Modifies the profile and clicks Commit.
The user can also select a different profile as the active profile and then switch back to the profile for which the EAP authentication was canceled.
  • If the password stored in the profile or provided in the dialog box has expired in the authentication database, then the authentication server may send an "Expired Password" (RFC 2759) message to the client. If the EAP type is PEAP-MSCHAP, PEAP-GTC, or EAP-TTLS, then Summit software handles that message by displaying a dialog box that prompts the user to enter the expired password and a new password. Summit software then uses the entered information to respond to the RFC 2759 message. If EAP authentication succeeds and the expired password was saved in the profile, then Summit software updates the profile with the new password.
  • Any password provided for EAP authentication, whether in a profile or in an authentication dialog box, should not contain parentheses. Neither SCU nor the dialog box flags a parenthesis as an invalid character, but the integrated supplicant treats parentheses as delimiters and interprets the characters between a left parenthesis and a right parenthesis as the "true" password.

Encryption - Cisco TKIP

If the active profile has an Encryption setting of CKIP Manual or CKIP Auto, then the Summit radio successfully associates or roams to an AP that is configured with:
  • The SSID and other RF settings of the active profile
  • The authentication method of the active profile
  • For Manual WEP, the static WEP keys of the active profile
  • Any of the following encryption settings:
    • WEP only (no CKIP or CMIC)
    • WEP with CKIP
    • WEP with CMIC
    • WEP with CKIP and CMIC


Summit radios support two special AP settings:
  • WPA Migration Mode - WPA Migration Mode enables both WPA and non-WPA clients to associate to an AP using the same SSID, provided that the AP is configured for Migration Mode (WPA optional with TKIP+WEP128 or TKIP+WEP40 cipher). In other words, WPA Migration Mode means WPA key management with TKIP for the pairwise cipher and TKIP, 128-bit WEP, or 40-bit WEP for the group cipher. When WPA Migration Mode in use, you can select WPA TKIP or WEP EAP for your Summit radio encryption type.
  • WPA2 Mixed Mode - WPA2 Mixed Mode operation enables both WPA and WPA2 clients to associate to an AP using the same SSID. WPA2 Mixed Mode is defined by the Wi-Fi Alliance and support for the feature is a part of Wi-Fi certification testing. When WPA2 Mixed Mode is configured, the AP advertises the encryption ciphers (TKIP, CCMP, other) that are available for use and the client selects the encryption cipher it wants to use. In other words, WPA Mixed Mode means WPA key management with AES for the pairwise cipher and AES or TKIP for the group cipher. When WPA2 Mixed Mode in use, you can select WPA2 AES or WPA TKIP for your Summit radio encryption type.

ThirdPartyConfig

If the profile named ThirdPartyConfig is selected as the active profile, then SCU works in tandem with WZC or another third-party application for configuration of all radio and security settings for the radio. The third-party application must be used to define the SSID, Auth Type, EAP Type, and Encryption settings. SCU can be used to define the Client Name, Power Save, Tx Power, Bit Rate, and Radio Mode settings. Those SCU profile settings, all SCU global settings, and the third-party application settings are applied to the radio when ThirdPartyConfig is selected as the active profile and a power cycle is performed.
On some devices that run Pocket PC or Windows Mobile, the radio will not associate if WPA with pre-shared keys, or WPA-PSK, is used with WZC. If that is the case for your device, then to use WPA-PSK you must use an SCU profile other than ThirdPartyConfig.

EAP-FAST

The 802.1X authentication types PEAP and EAP-FAST use a client-server security architecture that encrypts EAP transactions within a TLS tunnel. PEAP relies on the provisioning and distribution of a digital certificate for the authentication server. With EAP-FAST, tunnel establishment is based upon strong shared-secret keys that are unique to users. These secrets are called protected access credentials (PACs) and can be created automatically or manually. With automatic or in-band provisioning, the PAC is created and distributed to the client device in one operation. With manual or out-of-band provisioning, the PAC is created in one step and then must be distributed to the client device separately.
SCU supports PACs created automatically or manually. When you create a PAC manually, you must load it to the certs directory on the device that runs SCU. Be sure that the PAC file does not have read-only permissions set or SCU will not be able to use the PAC.


Main | Profile | Status | Diags | Global | About


Status

The Status window displays the following radio status information:
  • Name of active profile
  • Status - Potential association status values include: Down (not recognized), Disabled, Not Associated, Associated, or <EAP type> Authenticated
  • Information on the client device with the Summit radio:
    • Client name, if defined in active profile
    • IP address
    • MAC address
  • Information on access point to which the Summit radio is associated:
    • Name
    • IP address
    • MAC address
    • Beacon period - The amount of time between access point beacons in Kilomicroseconds, where one Ksec equals 1,024 microseconds
    • DTIM interval - A multiple of the beacon period that specifies how often the beacon contains a delivery traffic indication message (DTIM), which tells power-save client devices that a packet is waiting for them (e.g. a DTIM interval of 3 means that every third beacon contains a DTIM)
  • Information on the WLAN connection between the Summit radio and AP:
    • Connection Channel
    • Data (bit) rate
    • Transmit power
    • Signal strength (RSSI), displayed graphically and in dBm:
      • A green color indicates that the RSSI for the current AP is stronger than -70 dBm, which means that the Summit radio should operate consistently at 54 Mbps
      • A yellow color indicates that the RSSI for the current AP is stronger than -90 dBm but not stronger than -70 dBm, which means that a Summit radio will operate at 802.11g or 802.11a data rates that are less than 54 Mbps
      • A red color indicates that the RSSI for the current AP (to which the radio is associated) is -90 dBm or weaker, which means that a Summit 802.11b/g radio will operate at 802.11b data rates only
    • Signal strength (%) - A measure of the clarity of the signal, displayed graphically and in dBm.
Note: This value will be lower with a ThirdPartyConfig profile (under Windows Zero Config) than with a standard profile.
Radio association state is shown on both the Status window and the Main window. The following status items display on the Main window but not on the Status window:
  • SCU software version
  • Driver software version
  • Regulatory domain for radio: FCC, ETSI, TELEC, KCC, or Worldwide
When a ping initiated on the Diags window is active, the Status window displays a ping indicator consisting of two "lights" that alternative in "flashing" green (for a successful ping) or red (for an unsuccessful ping).


Main | Profile | Status | Diags | Global | About


Diags

The following functions are available from the Diags window:
  • (Re)connect - Disable and enable the radio, apply or reapply the current profile, and attempt to associate and authenticate to the wireless LAN, logging all activity in the output area at the bottom.
  • Release/Renew - Obtain a new IP address through DHCP release/renew and log all activity in the output area at the bottom.
  • Start Ping - Start a continuous ping to the address in the edit box next to the button. Once the button is clicked, its name and function change to Stop Ping. Pings continue until you click Stop Ping, move to an SCU window other than Diags or Status, exit SCU, or remove the radio.
  • Diagnostics - Attempt to (re)connect to an AP and provide a more thorough dump of data than is obtained with (Re)connect. The dump includes radio state, profile settings, global settings, and a BSSID list of APs in the area.
  • Save To... - Save the diagnostics output to a file.

Main | Profile | Status | Diags | Global | About


Global

Global settings include radio and security settings that apply to all profiles and settings that apply to SCU itself. An administrator can define and change most global settings on the Global window in SCU.

Note: If SCU displays Custom for a global setting, then the operating system registry has been edited to include a value that is not selectable on the Global window.
         If you select Custom from the drop-down menu (and commit the changes), SCU reverts to the previous value. Selecting Custom has no effect to the Global settings.

The following radio global settings, which apply to all configuration profiles, can be changed in SCU:
  • Roam Trigger - When moving average RSSI from the current AP is weaker than Roam Trigger, the radio performs a roam scan where it probes for an AP with a signal that is at least Roam Delta dBm stronger.
    • Value: -50, -55, -60, -65, -70, -75, -80, -85, -90, or Custom (see note on Custom below the list)
    • Default: -70
  • Roam Delta - When Roam Trigger is met, a second AP's signal strength (RSSI) must be Roam Delta dBm stronger than moving average RSSI for current AP before radio will attempt to roam to the second AP.
    • Value: 5, 10, 15, 20, 25, 30, 35, or Custom (see note on Custom below the list)
    • Default: 15
  • Roam Period - After association or roam scan (with no roam), radio will collect RSSI scan data for Roam Period seconds before considering roaming.
    • Value: 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, or Custom (see note on Custom below the list)
    • Default: 10
  • BG Channel Set - Defines the 2.4 GHz channels to be scanned when the radio is contemplating a roam and needs to determine what APs are available.
    • Value: Full (all channels); 1,6,11 (the most commonly used 2.4 GHz channels); 1,7,13 (for ETSI and TELEC radios only); or Custom (see note on Custom below the list)
    • Default: Full
  • DFS Channels - Support for 5 GHz (802.11a) channels where support for dynamic frequency selection (DFS) is required. Supported in v2.0 and later.
    • Value: On, Off, Optimized
       Note: When set to Optimized and scanning for the first time, the radio scans all active channels and all available DFS channels. From this scan, the radio creates and maintains a list of up to three DFS channels where beacons were detected. During subsequent scans, the radio still scans all active channels but only scans the DFS channels listed from the first scan (where beacons were detected).
       When the radio loses or resets the connection, the radio returns to scanning all available DFS channels as it did when scanning for the first time after being set to Optimized. From this scan, the radio again creates a list of DFS channels where beacons were detected.
       Note: The Optimized setting is not supported in the MSD30AG and SSD30AG radios. If DFS Channels is set to Optimized directly in the registry, the setting will function as On (versus Optimized).
    • Default: Off
  • DFS Scan Time - Because passive scanning consumes a longer period of time, this feature enables you to determine the dwell (listen) time when passively scanning on a DFS channel.
    • Value: A number between 20-500 milliseconds (ms)
    • Default: 120 ms
Note:  When decreasing the scan time (to a value lower than the default) for DFS channels, corresponding changes in the infrastructure's beacon period are recommended. For optimal performance and reliability, Summit recommends a dwell time that is 1.5 times that of the beacon period. For example, if the DFS scan time is set to 30 ms, the beacon period should be adjusted to 20 ms.
Note:  If you adjust this parameter directly in the registry, and configure it to a number outside of the 20-500 ms range, the setting value will return to the default (120 ms).
  • Ad Hoc Channel - The channel to be used for an ad hoc connection if the active profile has an Ad Hoc radio mode value.
    • Value: One of the 2.4 GHz channels (1-14) or UNII-1 channels (36, 40, 44, 48). If you select a channel that is not supported by your radio, then SCU uses the default value for this setting.
    • Default: 1
  • Aggressive Scan - When this setting is On and the current connection to an AP becomes tenuous, the radio scans for available APs more aggressively. Aggressive scanning complements and works in conjunction with the standard scanning that is configured through the Roam Trigger, Roam Delta, and Roam Period settings. Summit recommends that the Aggressive Scan global setting be On unless there is significant co-channel interference because of overlapping coverage from APs that are on the same channel.
    • Value: On or Off
    • Default: On
  • CCX Features - Use of Cisco information element (IE) and CCX version number; support for CCX features.
    • Value:
      • Full: Use Cisco IE and CCX version number; support all CCX features
      • Optimized: Use Cisco IE and CCX version number; support all CCX features except AP-assisted roaming, AP-specified maximum transmit power, and radio management
      • Off: Do not use Cisco IE and CCX version number
    • Default: Optimized
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled. The default is Optimized.
  • WMM - Use of Wi-Fi Multimedia Extensions, also known as WMM.
    • Value: On or Off
    • Default: Off
Note: For ABGN radios, the ability to change this parameter is disabled. It is always set to Enabled.
  • Auth Server - Type of authentication server being used for EAP authentication
    • Value:
      • Type 1 - Cisco Secure ACS or another server that uses PEAPv1 for PEAP with EAP-MSCHAPV2 (PEAP-MSCHAP)
      • Type 2 - A different authentication server, such as Juniper Networks Steel Belted RADIUS, that uses PEAPv0 for PEAP-MSCHAP
    • Default: Type 1
  • TTLS Inner Method - Authentication method used within secure tunnel created by EAP-TTLS:
    • Value:
      • Auto-EAP - Any available EAP method
      • MSCHAPV2
      • MSCHAP
      • PAP
      • CHAP
      • EAP-MSCHAPV2
    • Default: Auto-EAP
  • PMK Caching - When WPA2 is in use, type of Pairwise Master Key (PMK) caching to use -- See the section on PMK Caching.
    • Value: Standard or OPMK
    • Default: Standard
             Note: When switching from Standard to OPMK, you must initiate a suspend resume of the device. Only tapping Commit does not cause the change to take effect.
  • TX Diversity - How to handle antenna diversity when transmitting data to AP.
    • Value:
      • Main only: Use main antenna only
      • Aux only: Use auxiliary antenna only
       Note: Summit does not support the AUX antenna as a single-antenna solution.
      • On: Use diversity
    • Default: On
Note: To enable diversity (for MSD30AG and SSD30AG radio modules), set Tx Diversity to On. To disable diversity, set Tx Diversity to Main Only.You must power-cycle for these changes to take effect.
  • RX Diversity - How to handle antenna diversity when receiving data from AP.
    • Value:
      • On-Start on Main: On startup use main antenna
      • On-Start on Aux: On startup, use auxiliary antenna
      • Main only: Use main antenna only
      • Aux only: Use auxiliary antenna only
       Note: Summit does not support the AUX antenna as a single-antenna solution.
    • Default: On-Start on Main
Note: To enable diversity (for MSD30AG and SSD30AG radio modules), set RX Diversity to On. To disable diversity, set Rx Diversity to Main Only.You must power-cycle for these changes to take effect.
  • Frag Thresh - If packet size (in bytes) exceeds threshold, then packet is fragmented.
    • Value: An integer from 256 to 2346
    • Default: 2346
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled.
  • RTS Thresh - Packet size above which RTS/CTS is required on link.
    • Value: An integer from 0 to 2347
    • Default: 2347
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled.
  • LED - Use of LED; available only with MCF10G.
    • Value: On, Off
    • Default: Off

The following SCU global settings, which apply to SCU itself, can be changed in SCU:
  • Tray Icon - Enabling of System Tray icon, which is described in detail in Section 4 of the SDC User Guide. Note: This option is not available for the XP version.
    • Value - On, Off
    • Default - On
  • Hide Passwords - If this is On, then SCU as well as EAP authentication dialog boxes mask passwords and other sensitive information, such as WEP keys.
    • Value - On, Off
    • Default - Off
  • Admin Password - Password that must be specified when Admin Login button pressed.
    • Value - A string of up to 64 characters
    • Default - SUMMIT
  • Certs Path - Directory where certificate(s) for EAP authentication are stored.
    • Value - A valid directory path of up to 64 characters
    • Default - Depends on device
  • Auth Timeout - Specifies the number of seconds that Summit software waits for an EAP authentication request to succeed or fail. If authentication credentials are specified in the active profile and the authentication times out, then association fails. If authentication credentials are not specified in the active profile and the authentication times out, then the user is prompted to re-enter authentication credentials.
    • Value - An integer from 3 to 60
    • Default - 8
  • Ping Payload - Amount of data in bytes to be transmitted on a ping
    • Value - 32, 64, 128, 256, 512, 1024
    • Default - 32
  • Ping Timeout ms - Amount of time in milliseconds that transpires without a response before ping request is consider a failure
    • Value - An integer from 1 to 30000
    • Default - 5000
  • Ping Delay ms - Amount of time in milliseconds between successive ping requests
    • Value - An integer from 0 to 7200000
    • Default - 1000