MSCF]d o\,O0Summit WLAN AdapterSDC&X HT( t  w+A A SUMMIT~1.000F@k SETUPDLL.999M?H SUMMIT~1.014M?H 00README.013 A 0CAB2E83.012:@-L SDC30W~1.011J?#r SDC30SRU.010& Aӡ 0CAB2E82.0090&?#r SDC30P~1.008K/0+?H SDC_HELP.007L A 0CAB2E7E.006X Ax 0CAB2E79.005^  A 0CAB2E7A.004` A 0CAB2E7D.003T` A< 0CAB2E75.002b A 0CAB2E76.001Q A _setup.xmlSSMSCE |8~dx|Summit WLAN AdapterSDC%CE11%\Summit%CE2%CertsHelpComm SDCSD30AGLinkage SDCSD30AG1 Parms Drivers SDCARD ClientDrivers Custom MANF-0271-CARDID-0108-FUNC-1 MANF-0271-CARDID-0109-FUNC-1 MANF-0271-CARDID-010a-FUNC-1 MANF-0271-CARDID-010b-FUNC-1 MANF-0271-CARDID-0201-FUNC-1 MANF-0271-CARDID-0200-FUNC-1TcpIp@sdcsd30ag.dll@sdc_gina.exe@ SCUtray.dll@ sdcsupp.exe@ sdcgina.exe@sdc_setup.dll@sdc_help.htm@sdc30patch.bin  @sdcApplet.cpl  @sdc30sru.bin  @sdc30wlan.bin.z77  @scu.exe  @ readme.txt@Summit Client Utility.lnk            ,DisplayNameSummit 30AG Series WLAN Adapter GroupNDISImagePathsdcsd30ag.dll WirelessRouteSDCSD30AG1,DisplayNameSummit 30AG Series WLAN Adapter GroupNDISImagePathsdcsd30ag.dll  Wireless  tcmd  eepromfile Dllsdcsd30ag.dll  PrefixSSIDllsdcsd30ag.dll PrefixSSIDllsdcsd30ag.dll PrefixSSIDllsdcsd30ag.dll PrefixSSI Dllsdcsd30ag.dll PrefixSSI Dllsdcsd30ag.dll PrefixSSI TcpInitialRTT )TcpMaxConnectResponseRetransmissions ConnectDampingInterval DisconnectDampIntervalMZ@ !L!This program cannot be run in DOS mode. $W999W9Wf9kd9896W9C9E9A9Rich9PE3JO!  8   !`!(P-@0D.text   `.rdatav @@.data|0@.pdata@@@.rsrc-P.@@.relocD@BD!O-D ЍP01004AoAO0 `p @4<[+ 8?@`p⊏?   `@P  0 mP AA 0  p[0_ˠ4 Ѝ0Xh0H!O- Ѝ 10ʍ$2AozOP0 `p @P<Z @_`0  pPA0 @P`Z $̠( Ѝ $ h0p@-M@P80 P@"800`0 ` ``P @9P P@@sqЍp@-R@ T H }@0@ ! T(0  !   n ( p -  e A- Mn@5 p0 pp^`VP PL0 | `v X?080 pp7U* Ѝ     !-  $!/0/0/0/ 0/0/0/0/0/ 0/$0/(0A-p`|PV0S /@ 0 @V 0S  /P@A/x0DL! X-  0B/h/ -00P/h00@-\@TP0S/@T:,@$P0S/@T:0@/L0D0T0P0A-pQ0pPP `0@C0S /@DT*l0 0 x@pP0S/@T:H@@P0S/@T:W0B/A/d0`0\0X0l0p0t0- /-Q> /0@-8@0P0S S6P0@/P0@/dh0-00 0b00C 0//@- @ /@//,0/00/40/80/<0Comm\SDCCF10G1_tempComm\SDCCF10G1_temp\Parms\Configs\Comm\SDCCF10G1\Parms\Configs\SBT0:GetServiceHandleSCU0:DeregisterServicecoredll.dllComm\SDCCF10G1x!!0TW$SCOREDLL.dll3JO0"""("`>"K"X"g"SDC_SETUP.dllInstall_ExitInstall_InitUninstall_ExitUninstall_InitTW$StdUdL3@`@@D@@&@l @@@<A@@@\@t@@ @8X H` xF ^ x8xP h(@/Xpp      ( 8 H X h x           ( 8 H X h x f6ffb ^`[p@bd`.\NDZ,[4g(h*ThiTrxonpu4zd|,|B}0Zdg g VWCE_FINDDLG_SPWCE_REPLACEDLG_SPWCE_FINDDLG_PPCWCE_REPLACEDLG_PPCWCE_FINDREPLACEBAR WCE_FINDDLGWCE_REPLACEDLG4VS_VERSION_INFO  ?StringFileInfo040904b0CommentsVCompanyNameSummit Data CommunicationsJFileDescriptionSummit Setup DLL<FileVersion3, 03, 10, 004 InternalNamesdc_setupLLegalCopyrightCopyright 2006-12(LegalTrademarksDOriginalFilenamesdc_setup.dll PrivateBuildn'ProductNameSummit 802.11 Wireless Network Adapter@ProductVersion3, 03, 10, 00 SpecialBuildDVarFileInfo$Translation p Ȁ FNewMS Shell DlgP{&New P}1dP(OKP(CancelP+(F&HelpȀ FMS Shell Dlg@ȀqtFind MS Sans SerifP2Find What:PcP*g Match CaseP7g Match Whole Word Only PL( Up PY( DownPCc"Direction@ȀqtFind MS Sans SerifP2Find What:PcP*2Replace With:P5cPR\ Match Whole Word OnlyPF\ Match CaseȀ FindP 2Find What:P<FP& Match Whole Word OnlyP Match Case PXA( Up PXO( DownPS52+DirectionP9G Find NextPLGCancelP`GHelp@SIPPREFȀ ReplaceP 2Find What:P<FP2Replace With:P<FP5 Match Whole Word OnlyP( Match CasePG< Find NextPHG<ReplacePH[< Replace AllP[<CancelPn<Help@SIPPREF@P NextP$" ReplacePI( Replace AllPu OKȀ FFindP ?Find What:PFr P!w Match Whole Word OnlyP0w Match Case P!> Up P0> DownP{D(DirectionPBFind NextPBCancelP1BHelpȀ JReplaceP ?Find What:PFr P?Replace With:PFr P* Match Whole Word OnlyP9 Match CasePHFind NextPHReplaceP&H Replace AllP7HCancelP7&HelpFindFind NextHelpFindFind NextReplace Replace AllHelp   OpenSave AsAll Files (*.*)Untitledan unnamed file&HideNo error message is available.'An unsupported operation was attempted.$A required resource was unavailable.Out of memory.An unknown error has occurred.$An invalid argument was encountered.Invalid filename.Failed to open document.Failed to save document.Save changes to %1? Failed to create empty document.The file is too large to open.Could not start print job.Failed to launch help.Internal application error.Command failed.)Insufficient memory to perform operation.PSystem registry entries have been removed and the INI file (if any) was deleted.BNot all of the system registry entries (or INI file) were removed.FThis program requires the file %s, which was not found on this system.tThis program is linked to the missing export %s in the file %s. This machine may have an incompatible version of %s.#Unable to read write-only property.#Unable to write read-only property.Unexpected file format.V%1 Cannot find this file. Please verify that the correct path and file name are given.Destination disk drive is full.5Unable to read from %1, it is opened by someone else.AUnable to write to %1, it is read-only or opened by someone else..An unexpected error occurred while reading %1..An unexpected error occurred while writing %1.Please enter an integer.Please enter a number.*Please enter an integer between %1 and %2.(Please enter a number between %1 and %2.(Please enter no more than %1 characters.Please select a button.*Please enter an integer between 0 and 255. Please enter a positive integer. Please enter a date and/or time.Please enter a currency.Please enter a GUID.Please enter a time.Please enter a date.No error occurred.-An unknown error occurred while accessing %1.%1 was not found.%1 contains an invalid path.=%1 could not be opened because there are too many open files.Access to %1 was denied..An invalid file handle was associated with %1.<%1 could not be removed because it is the current directory.6%1 could not be created because the directory is full.Seek failed on %15A hardware I/O error was reported while accessing %1.0A sharing violation occurred while accessing %1.0A locking violation occurred while accessing %1.Disk full while accessing %1..An attempt was made to access %1 past its end.No error occurred.-An unknown error occurred while accessing %1./An attempt was made to write to the reading %1..An attempt was made to access %1 past its end.0An attempt was made to read from the writing %1.%1 has a bad format."%1 contained an unexpected object. %1 contains an incorrect schema.pixelsUncheckCheckMixedAll Files|*.*| All Folders \My Documents Finished searching the document!No matching item found!MenuCancell00T1\1`123333444445(585H5X5h5x555555`6d6h66,7074787$8(8,8084888<88909@9P9`9p99 P1T1X1\10 H0@,0000 0(00080@0H0P0X0`0h0p0x00022#\windows\sdc_help.htmThis directory is the default directory for digital certificates and protected access credentials (PACs) used in conjunction with Extensible Authentication Protocol (EAP) types. When you use PEAP or EAP-TLS, you may provision a certificate authority (CA) certificate for the EAP authentication server and distribute that certificate to every client device. On the device, you can store the certificate in the Microsoft certificate store or in the directory with the path specified as the value for Certs Path on the Summit Client Utility (SCU) Global window. When you dont specify a Certs Path value, SCU uses the path to this directory for the Certs Path value. When you enter a CA certificate name on an SCU Credentials page, you enter only the filename and extension, not the path. The Certs Path global setting provides the path. If you import CA certificates into the Microsoft certificate store and want to use them in SCU, select Use MS store on the Credentials page. When using the Microsoft certificate store, SCU ignores the Certs Path global setting and the value specified in the CA Cert filename field on the Credentials window. User (not CA) certificates for EAP-TLS and PEAP-TLS must be selected from the Microsoft certificate store. When you use EAP-FAST, you may create a PAC for each client device. When you create a PAC manually, you must store it in the directory identified by the Certs Path global setting. To use automatic provisioning, leave the PAC filename field in SCU blank. t= MZ@ !L!This program cannot be run in DOS mode. $W^N?????/?6 ?6[?0?0??>L?L ?4?4?Rich?PE)O  p L}PP - .textȸ `.rdata@@.data,r@.pdata- .@@.rsrcP@@͏ Ώ ˏ0@-@PᲤ0h -pX-`P` `P0@0ᙑ80 0x |PKp-K傪28!ᔰh( -X-@@}oK-Ki0+g Ằ4yO- ЍP104x0S@@S |0Sx1 0 S819 @pJ 7`? ㆯ↟0 &?  喥x0S 0 ? a< 0P 0  匥@`က -ˠ Ѝ \dp(C-`x0p@S:3Q0 TY?P @Q0 0R^ R0 S^^ 0 ‐p@W .P0 ĎT& P @^0 0RQ R0 SQQ 0 ⷣp@W W0H000000SC-Px0@S5p`0 zV'£P @Q0 0R^ R0 S^^ 0 m뀀@`T TH0@-@P;0C- MP᛬ +0g@ @:x0S  kr0 @0 r0 @0"x@"Q1O <0 "1d@`0@`;d"0`@4 1d<"100)J70 000 6x0S1  *Vx0p@S:0a0 ΍TWP @Q0 0R^ R0 S^^ 0 뀐p@W .`0 ᝍT&P @^0 0RQ R0 SQQ 0 ␢p@W  Ѝ0H颋.x0@-@PUY0@-@@0 0D H L 00?h X-M@HP  0 x00P0;P  0 k00 T0>PD 0 4ޔTH 0K-<-8A-,M@ < 0 aP 0S   <( 0  믔  L0pSPက0 APhN0L0pPW@0 P,N@D@P@PPϦ,Ѝ@0@-QP@TP ߦܦئզҦ0@Φp@-P@` < 0 㚌T1P`0 㐌@U@t ڄաҡ$ 㝌p 㓌pTp@-`P@TPPPPp@^P < 0 \KPp0@-@P00BF0@-@900  -W-4M`@p]$GhlV6`FRP;T T T T0 0 0A00 0( 0, 0C0$0  0 40 (V4Ѝ -_-0M`hlX$ @ P H pV V ( 0@N ,$0@@PA0 P@X0Ѝ -S-0M@X@P` ⮋( 0\pUBPEӋ@Ἃ0 0 ы 0HN廋p@U0Ѝ-P P P "P PP İð배-:18P @-pP`᲋@ ᩋ  T *0Q0@T*0S@0@-@P$20! 㖋P0 0@p@-@P`sT x00 -p@00 R:R<00BSȔ<0 R R <0R <0RȔ$0  R <0RȔp@-P`-ǒ@ - pp@-P`빒@ ߤp@-@멒P T  0@ ߊ0@-M@0 P@6PP l @0 @-P @ @0 @"P0SPЍ000Slp@-@P`H0 0P P 0  plp@-@P`@0P 0 P0 pl8y0@-eM@\001咊,P < | M`eߍ0( 2╊2@%̠D Ѝ(h pX-M0f嗊60ShPU0H0$H 5  T- ; 0Tʛ ;0T ;0T ; 0T ; 0T ;0TL@;0T ;0Tc ;0Tz ; 0TDj< ىpPI *0 3"4 %5"85"<5+030303F03 03030303030 4 0,303?304d0403040 40$40 4"4q$r4"8s4"<t4 44 84/ <4o4Sk 0j|:0T ;0T ;0T ; 0T ; 0T: 0T : 0T ;0T}y: 0Ts : 0Tn ; 0T ; 0Tf ; 0T ;] ; 0T\ ; 0TX ;S; 0TQ ; 0TM ; 0TI ; 0TE 9@; 0T? ; 0T; :60 0Gm0S H pm'AoP" xh "4 0"80"< 0"4 0"80"< 0"4 0"80"< 0"4 0"80"< 00 K0 \P0KS0  v KⲩP  0 K@@@T 0T0K{Kp-Ku- Ph8 P-Q J0 C0Q0 Ӂ0а W-:1A-Pp0@C`00 VP P0 B `喈P0P0@- P10S R 0@P000@-@PP @0@-@Pᬱ0@-Q@1 0 00@-0@C MP0p@-P0@C0`S 0S000 0SPh  0 p ,P00 00pW- 0C0S 0S000Z0S SƒQw0@-@0 0S0000P P00 P00 0000@-@ӷP1 0 00@-0@C ʇP0踰 pX- Ѝ@P D 啇/`# < gKL|< KLr !0d+ " K⽇K:0@C ⊇P0CKp-(Hp@-M`@ 0 pP@PU  B @ b AA>K0 PYЍpp@-0@`p0P0C 0 B0c0AAK0 gpA-@`PA VlY0@ 0F B0c 0pAAKW0  A@W0@-@P <0#  ḶP("(0h( -0X-@@PP1 0 00P_ K0-Kh\ -pX-M@@P00 `00 P 00C 0 b0C0Z 0Ԇ0`SV[P MKp-K0  000 l@yp@-eM`P0010@T < H0 ᗆ@ W 8  P@  @eߍpl(h pX-MP`,ƍ@ , KbK0@C 7P0Kp-K\h pX-MP`뜍@ K>K0 lJ Ѕ 0Q˅0@C P0Kp-K04@- @[00h'ꧤ0@-@Pრ0PC-`P@ p0D 0 N0c0FA@KT0` tCh -0X-PP@ᵵP1 0 00PT wK0-KLp@-M@0 < H0 l[ U    Ѝp踔h pX-MPᐣK L-PK V K;U᨞P ᢞ l@PK T ;0/@ ? 0@C <P0Kp-MK_Ѝ踔@- @㉢00.0@-@PᲟ̄0p@-`-8 90$:0(;0<SSP*Pkx! Մ;JCT@ᦞ 0 㱄 0 㬄P  < . ph 0X-M@0 P PP <K ユ0@C ĄP0ᾟK0-Kh@ X-M;J@KK= @@0S RJ0Rʲ0 00R00 ⍄P0K-KW|0@-@P'0-kl0m n48<Sh -0X-PP 㼡0@|0|00h@@AAK0-Kܞ-K0|-K0⣴tL2(h( -X-@@A┴⒴|ǘṞK-K峞-K0|⸘-K0zp@-P@k{|  WA/p@O-Pᨀ0 @p`㪃P: ,㡃 P|p@0 `┃VW@@00@-@Py0ht _-(TMhKj 0 odK`\d0"@A0!_ 7`040 6Z1!100|僙1p`XMAP? 0 -0 x 坘0S 0 0 xhC 0P 0 x 哘@Pက 4ˠ Ѝ \p(p@-@j0 PP xNP0 PU: 0 p@@-@@dQQ000@-@<e 0 ցx0p PPP 0S  0Sx0@0@0@-@P0A- MP0SFUD4@ @@屗 4 @@媗D0S kg0 w  h0 7i l0 b0@xS 㐛 ㌛ 0]; g@ ; h000  0S  kr0 @I r0 @/0"@"Q1O <0 \"1d@`0x@`T0"0x`@MJ70 000 60S 1@ x @@@@Nw0p@S:/a0 TVx:P @^0 0RQ R0 SQQ 0 xp@W .`0 €T&x P @^0 0RQ R0 SQQ 0 xⵕp@W Ѝ0H颋.dHyG-Lß Ѝ@<304,30P S 0S 0S 0 b : 0 ixⲕ`0sڼ0Vo S 0Stl]\2 0 S819 %S 8p `pp: 0S S < IP31  B ? 00   !Rd! T1L  , ? 00 ہ  !R! Æ✀P< Áἁ#  S S < 0  pd0\  @! PU ˠ Ѝ`H0 \dpT(@- @R00LyC-MQPd200l Kk0 k,r 0S  0 Kl0tl a 0S  0v 0cF @ 0FY ;I0S0S- X10S0 S 0 FD$0S S 0 F600S #& 0 1xX l᱘@ 0 H00S 00SЍ8d`(0@-@;l㇘ 0 ~h P T00S @0 00(PP 0@:@-@;k` 0 ~ 0P   @#@-@`00S L00S 800S< 3͠P P 0@-@Pမ~0PyO-MP:00:0S 8 90$:0(;0<SS`*`X[ \0$]0(^0<S S+ wSS S So  G M"@R 0@ ]~HH Ip0 Dٗ@ qPF`ʗ@gF k@ l    0 L 0  N 0 M 0  0 ` ? ` 0 @ 0 ` 0 p [0 0 7   Gi!c@Ɨ 0@ }  HWL!<O@Თ 0 } 0 }Ip>@ 9֗ᵗ  k@ * l  % 0 L M 0 l0 |; N 0 u [0 o 0 j ;F`0 `u ? o ? `! 0 @ 0 ` 0 p Lh5`%XPH@p@p  G!ὖ@ 0@ +}  H !ᩖ@ 0 } 0 } 0 q  qIpᏖ@, F`ᅖ@   0 | 0 [ [jLg@^@ ὖӖ 0 |M H@Ė;N =@ږṖ 0  <0 Kk0 0 l ? ` 0 ` 0 `? 0 p9y2" @p@p { GH @M 0@ X|  Hh6 <֕@9 0 D| 0 ?| 0 I, 0 F' 0 L" 0 M L0  0 N 0 [ 0  0  0 k 0 l ? ሕ6Ѝhh(h 0X-MPG{P  @@T 00 #K0-h 0X-MPG{P  @@T 00 K0-h  X-M00S$;F@KKc @@0S RJ0Rʲ0 00R00 {P0K-KWhd X-M00S.<۔@KK)[ \0@@$]0(^0<S0S RJ0Rʲ0 00R00 o{P0K-KWhh X-M㚔@KrK @@0S RJ0Rʲ0 00R00 8{P0Kc-K[Wh X-M<e@K=K᳇ @@0S RJ0Rʲ0 00R00 {P0K.-K&Wh0 X-M;N0@KK~ @@0S RJ0Rʲ0 00R00 zP0K-KWlTyp@-M@000P;!l@P0PS <0 ]z l0 Wz 0Rz0PS00QЍp(0@-M@0 @PzPP h @0 @zP < @0 @zP0SPzzЍ0XyA-|Ÿ ЍPl20ʍ2X0  0  z< &̍z WI |PO4 50$60(70<SC {PP2pS@گoIz IvzPF{P@8S2@AoTx I2@SگoIy IWzPF_{P5p2@AoTwx l&\ T.@-,0+ @ z  "̠ Ѝh,D\p(H0@-@4 50$60(70<S P`\z4S`z0@\yO-dȟ ЍppP80$6@0  0 y@ yyyg,  op0p@q0@r0q04 Dy88y@ +D  yyyDk l0$m0(n0g h0$i0(j0 [ \0 D$]0(^0< Vytly@ X+D  y<yzyDTc d0_ D$e0(f0<` a b ,.ygy@ +D  [yXyRyD,-, .+0 /  D yLDEy@ 0+D  9y6y0yD '*P)@(&0%  D P@x!y@ +D  yy yDHG IF0p J  Dx4,x@ +D  xxxDBEPD@CA0@  D P@xx@ +D  xlxxD`  Dx80x@ +D  xxxD{\;\0  D`xx@ +D  xdxxD^< Hw@;P$?`48(45687,< ,p  8"L, "4 $.,< Dmuu@ +D  uxuuDkA@ ED0BF@CP$G`4@(<=>8?,< ,p  8"L, "4 $.,< D/u,  *ucu@ +D  WulTuNuD (54")(26*B7R$%+b4$0(1&28'r3,< $  8"D, "< ,.$4 Dt%u@ +D  utuuD=<"A@2>BB?R$Cb4<(89:8;,< $p  8"D, "< ,.$4 Dtt@ +D  t|tt@Dx,   Dt<4tP ,+D  tttD9"82:-,48 1r0P.;54B6$2 4H3 ((b,)/r d70 4L.PX*2+$$<"$!4$4L0$<., D?txt@ +D  ltitct@D<0 q0 P `0P  4t0 4 sP    s 40  4s0 4 sP0 00s PV  Ds&tP +D  txttDTPHt@ 4t$ts$S̠( Ѝ0LДh̥0Td|,@-@, s@\H4`yO-MpL209` `$`0 @4TP@(`t0Ser X $Pd0@0 q$P 3(p qTq<,S R< d0R .Q 0Q9Q0S< 0@0 < BxR 1000C B.P00 B@T  Rr 0 So  ^l @ Ti @~qA( )0$*0(+0,pq, -0$.0(/0,cqs0 10\$20(30,Vqf0 10$20(30 , -0$.0(/0( )0$*0(+0< 00R0 0@S0 0,00@iqP0d0 < , < 㶒$$!hlЍ L\|8Ȑ(P(lyp@-MP2000'  0p0' 540p0N ^5{ptB000SX0 0sp 4q,04 G0p\ /kEЉ\4#ˉ.-0,+ 000` 4 50$60(70<S  p| =D[ \0$]0(^0<S 0S-.,0+ ( p\ \0kS! 0CS ) ᆉ$၉!~ ytf l gb,00S00ЍpP 0@hH(-0S1 4XpP00@-@(0㖨00P0@-@00 PC oP00@BPhT X-M@KKe|KP00@@0 00S RJ0Rʲ0 00R00 oP0K-KW80@-@PJo0踰 [-$MP 20(0 #KKo#KHoL KTo1L#.KAOkKp2 | d `" \B Hb pPZ `o;@!ᮈ` K 0 PoP9|T8 0 o0A 0 b0C0Z K) 0 n0@ 0b0Z KooPo Ka 0 PnUTo2@C oP0($K- K>(Hpyp@-M`H100n9<@ 0 nӈ0S6PIH0GF 000$刈 #HI@G0F P@on o 0 zn 0 Btn 0 onrЍp(H(u@-@(0I00@tyO-M@@T:0|00N .2dn0& 0^n;<`ʇpƇY也@@2 0S ]<뤙V5 Pt, 0 +l`P0SMP6 0S3 D/,h ,D 0 l` S S S ,l, ,\  0k, 0@ k`,օ;=l@V 0S P Z 4ąم|оЍ@h8ȝ`̕(p@-P;:B`@ 7 bS0k 0k@J00Sx00S #P 0 k@ 0 k 0k 0 kẅph(̕@-P`@pLlP@, U U U U U UPPPPPP1lPP,lP 0R 9R100pCPlU:@@-@0@@-M`0 kPjkkPd p0 ppl1@t0"SQ VO X00k` 8@$;@A70  pppk-S V A70  pppkk0 Plk0 T `v 0k0tkkЍ0 TdxyA-4M@1000 0* 0j;:+P 0 aj@`p  0 j 0j`V:X >0S :S <0 duj0d80u4Ѝ`(p@-P@T l  K;    p0@-@P00?j0@p@-Pៈ < =``\@< ````Dj tj Pj \j j0 jx0h j!1XD$1(1,|j!10h$1(1,rj0@2pp@-@TS0S< p@;<h 0 Gi2`!1R000Xhx d  @`D00P` 0P` P P P (X8}d{m!n1$o1(p1<P` 4mn1 8o1 1$?1(@1<P` 4=>1 8?1 <@1"P P P:A ;! < "4)!*1"8+1"<,1 4AB1 8C1 0s<Q h SS <"0i 49:1 8;1 <<1 0=1i0 h@ iDcicp<R X0PP 41 81 :K3@C ~eP600:K3 K# S3S #:K3@C ceP0:K3S^ :K3SZ :K3SV ?~ 0 ePK KKPE  :K3@C 5eP0t5*K#00Sx ݆:K3@C eP0PR 1L@$@jJP QK PS QKe^JPL*K#P<Uo@:*K#:K3SR S JPJxJPF:K3S*K# KKQP Q 5KPH(0KPDKQ:K3S*K# KRV ST 3 { JPC  z:K3@C dPr0l i:K3@C dPa0[X X:K3@C dPP0J G:K3@C dP?09< 3{!PdKQ KP Q gJP t !:K3@C adP0(g! +dD:K3@C KdP0Kp<} 0 cP10K3 ;su} 0 cPh10K3 ;vg} 0 cP'(1 !0K# 3 <dd3!KL@ddT 㺅:K3@C cP0:K3 SK#  3SL 㝅:K3@C cP0- K(L PX`W(X0 X-ZMP@20 0 aK|aKGpIK @A0S R0J0R-ʲ0 00Rx0 SZ 01 0KIK|1 5@KP:{v|z|!l@]Kc]K(}x||1[@]KS ($c]K}ky|{1[@]KSc]K } 0 z 0 x0y< ! Kz0 0 x0y @A 7cP0 K-aKZh|W(0@-@Pb0yp@-MP00T2LbLbL b0x LLAOk 0R @4` ccP @Tb .||T奵ߍp(@-@(0{00h X-M`A|Pp0S00xbP  @@T 0pW00T00 AS<  Li!j1$k1(l1<S0  >K- ph0@-@0S6P004 50 $60(70<S<  "44 50"860"<70CP H  "44 50"860"<70CP I<b U000@-M40 @06P0S@Ѝh X-MxaP  ,@@T 00K-hT 0X-MPaP  @@T 000K0-@-@{~2{P.{01` 0S"I!J1$K1(L1<0  a 0 a;?0+ a 0 a;?0 0 wa 0 ra [?0 ^ 0 ~Y 0 T 0 O0} @IyG-HMpQ,20D0R 0@ 0\aBQ: Saa0S)G ;?z 0 K*a1 J%a 0Q a0S:s4 0 Ja 0Qa <Yo@AME0S0S00E  _~t"l00@`;2yPy [0 &yPy ;d0 AyaqP< =0$>0(?0<S 0 Aqyyy< P 0A\0 AS<P 0Ri!j1 $k1(l1<S0S;0; 0 @ 0  W_kD;9x0S S S S S L@4(yt%sߍ HLhdh(p@-@;?x 0 G_`P ECP XP 0 GT 40 80 <0!n 0$0(0<S 0S0SOnn8h@-P4a0S< v@q;m@ 0 GfT 0aT@p 0$0(0<S'4p0'80+'<0m 0$0(0<S S S S0S0S@]n@Zn8hH _-(Mp20,0 `<㴢崒Lc oPxTPH  T@@T 0`0Lc VgLTPS Ph3`shhP00" 00 QPP 00 QPr20 P00 Pb Pb00Pp PpPdr0000P<; fQ00<P  R; 00i  mP; kP1 1 @ 1 1P x P APP  PPU 000S=D10S (00sA ;P00! 6P00<! 0P0S 0S  0S 0000! 00Px00S00<; X 00!  P00U0,(K-0H 8(A-Pb0S< qA{QAi@=ip 0 bOP ^ P* P8Aq KK0S4 K00 0Q R  KK #{mP P0S 3@C KP0,lL3@C KP0/LP( +L P$ 50S% *P#K! ZK r ! TK@`(T$4$($((83K7#K6K9CK1K0SK/K.KVR  4 ( (3K'#K&KI K2K4K! 2K!(#K!4 3K?#K0 @3K"403K"8!/3K"<>K.3K!4,3K@!8$+3K!<<K*3K 4(3K 8'3K <&3K0A3K0=3Kp0'T'h**93K$'|*0$L6sKs3K2K453K;K:CK8SK7cK4K1#K-K)KKr0PcRK0@ ༠ʺ<>L0>, " $P DB0>, " $P K⬎>l`&`X぀X 0S hBBh pRB> :K> x xXK@B4 <> W:K> xAW40> P000S  #:K> x/W00 Txp dX\0S 0CS``00S\0|S2:p0 / 0tt0 R): @0 S%* 00 S0(Y0SR : BPX0\ +00SX0\   @0 S:0X`rp0*0x A뼐:K>@C AP0,委(K-M> Ѝ:t|  (\@-@<MBHB GB@AB기 _-(M@40,0 0S$0S!> ༠й>\0>, " #P Bt0>, " #P j0 PNAP xVd0 PBAU*K.>\P%PRKЎ j p0S > *K.SK~ . xnVpd0S S ><0#0A`v P 40R ,P04 > =:K> x'V0 T0R T 00 S22xVdv0S h@h p@> ହ:K> x %WK`gA4 @> :K> xU40> P000S  й:K> xU00 Txp W\0S 0CS``00S\0|S3:p0 0 0tt0 R*: `0 S&* 00 S0(XY R : APX0\ 0YX0\ a `0 S:KЎ*K.j p0KЎ PX&::K>@C @P0,R(K-M> ๸Ѝt|  (A-M`^ < 03A KX e A00X0 ߳@0 @@pC1_00xpAV 0xp9V 0xp1VJ70 ?000 6?H 0 Z޴<@@j@@Ѝh1 0@-@V@MGy0@-MRP@000 YYZY#ZuFu<IJI_0KS0 0?H 0@Y Y^D唒Ѝ0(p@-lAQ  Q ʒP:,,1 ^:,1P03055P3 :0( 00PU0P#010(P `@U 0^ Q03(05:R d@0dPdU:PZ0p0Ȑy0@-MRP@000  Y"0 0#?!UBU<dU@ ?,?PXЍ0@h(h -X-@@(0wl00B@0d1h1l1p1t1x1K-Krv-K0Lh -X-@@00d1S?h1S?l1S?p1S?t1S?x1S?%#@vK-K:v-K0p@-P@k\ _ ap@_G-p@Q0S^00dW ko0 X 0 mS 0 nNG0S km Wn W`0 m Wn` W00 ;o0 + 0 & 0 ! ,r`W  Wx1p1t1!> 0 S Sl1d1h1> p00p@-@]P l[ T㎳  ㊳  ㆳ  コ  ~  oz  Gvp0@-@P,=00@-@P =EZtU dT\00@-@t2 , d" 0,0&\H2P   8PXWP ^`O DC<d L; lf >df >hf >l{f >pvf >tqf >0dx1 [)0 _ 0 *Z 0 ,U 0 /P 0 4K 0 9F 0 :A 0 ;< 0 <7 0 =2 0 >- 0 ?(mW0PyO-Mp p5020  ̍06=0  ̍?-=0O 0'=0O  1=눴 0 @S@( $,004 0=$1!$C0^3,o 2#CS!k-bV뼱P( a `0bc4]`\8a@,^p_$4`P" 8 < #<@4 p@@C0k, 0S  ba0` _000000S k l0$m0(n0<S(4 50$60(70,R000 $ 0P4 8@<$4(#<#<40S S SO<#@<"@P O:P < @5P < @0P < @+PO(PP%P<@!00OްP ,4 50$60(70<S <@  h (<)@<*@ \ 0- 8j<0j010  I6S < +H c0 0 , +5 X0 0 \㜰Z]XeP 048 P@<$4(#<#< eL\ 0P48岰子$@  P 峐`$@ p寀 @<4DP#t0\ (0嫠l!4 , \#D`0" _  p$a0(b04$,&<%,, (h 0P4 8@<$4(#<#<4 eS0$0(0 0$0(0<4#44!,D8RB8 ;B<TBT 0@4 8P<$4(#<#<$n;B;1yTBT 0$0(0 0$0(0<4#44!< S t PRP ú RE;?< @;B;2KTBT 0$0(0 0$0(0<4#44!,r _r^ "40"80"<0 ;B3 TBT 0P4 8@<$4(#<#< ^]@\P[`Z0Y  @P`:BT7SBZTN0P S:0 :B9 ;8`0B/`LSp:ba`0_ H:B ;8`0B/`17SXB : : ~~XB:~BB;;.SBTX9 h([@0@ 0 5( 0]@ 0 G' 0^@yxwv@u0t @_:B6kSBS '0`ٮyxwv@u0t L@C:B ;50B/`}|@{ z000,.:0 @':BK62SBS 0 6㓮& 0`囮& 0`售 0@4 8<$4(# @ N0ST7J0T4ʄP RR+J00A @ .! K@ N0T JK 0@C 1P00@C 1P0Kp(廥 幥-KⱩ- K⭩W h  pX- M`@P$K␩J$K>$P@0S SD2 42 P0S[ Ky Kw$@ A0STKJ0THʄ0  K9 K ]$@ A0T1NP 1 0Sچ0dAQQ+J0Q(ʲ 0 0Q 0@C 1Pՙc̒00@C 1P0$@@ 1P0Kp530 P000Sچ0tPa@Q J0Qʲ 0 0Q0-$K-K - KW`d| ľyO-TMp10P0N0N 00d1`0S L8 90$:0(;0<SS* P<,U U U UB```o01 6I@;J 0 F0 0 A0 0SPU<,<0 R:R bP.TЍľh(0@-@ \  ;B 0@RKy0@-FMP@D0010E/00 *1P0 0 Fߍ0(p@-M`@P00000 `80Ѝpp@-,M@P` 0 @P(`30Pg @P0  @PPP 0@R0SM!x!p`$P`0 $P`0(0PS0( (P:`/`/P(0 (P`/(P0 (P`/|(P0 (P`/P H8 0|/ /T,Ѝp,Ѝp,!      D!T!!!!!t!T 00oS= 00jS=@-MP`p,804 ^0@@(0 0 @i0Ѝ0@-@PD /0h! -0X-@PR0t 00 ,@(@0000K0-KR-K08?!<0p@-M,(@$P ` @P`40Ѝp-M00ЍhD" -X-M``00@0S 40<0P8@0N, 3w00A   @P`x(0SR000\00R]RK-KMVRЍ-KM0NЍ=!0@-@P.0@-@t0l0d 005H0T0DL P/0\0/05`0/0d0/0hX0" 00D"@-@50X0\`dh0@-P@ /PT0S  /TP0L PA-M@p /P4 DD@2.P@D 0BL 0`BP0 @ p0`NPT0 @00X0^  XJ/Ѝxtpl0@-@P00"R-0=0@-@P00R-0=0@-@P00 R-0=0@-@P00C-0"h# [-$MpX30(0 P L0R K-P@D 3BL 3`BP0 @KJRKK2`@P0 D0 0 ` @ ` @ l 0@P2\ 0KK0 f0` KK0 fT0S` AKAKY:1 0S1 @Y8 1 AKKO1 1 0 . K!RKKEPhKO0%P@@ 0KKP KgQ0 u. KRKK+PdKO0K@@ 0KP KNQ0 K1 JQ1@C i-P0K<KP($K-MKPЍ-MK,Ѝ-MAK{Ѝ-M KЍ=S#xtpl(#p@-M`P 0 0@0 @E-P @0 @>-P 00,-Ѝp(-Ѝp -0P- M@ 0 00 -PP$0 P-P- Ѝ0- Ѝ0P  0S R0 P  0S R0 yp@-~MP`001.0 0@0 @,P @0 @,P0 0Q R ,d~ߍp,]~ߍp(y@-Mp`0010@000P -0P  0@S R0 000  ,P 0 P~,P~,%ލx,ލ(y0@-M@PP000x dP p \0r,D8,j, h@~Ѝ0H$p$$L(y0@-M@PP000x dP p \0F,D8,>, @~Ѝ0H$p$$L(yO-M`px100 000 00$0!0(0#0,00000400800@P  @<0@ P,,@@P, 0@T0#0:@@@P0@T!00@ 0Q0#0 @@0C 00BC44B P: @,_~Ѝ(yO-M`p100 00 000 00$0!0(0#0,00000400800@  @<0P@ ,@@0@ B00BC4B$4@$AP T:@ 0Q0#0@@@P0@T!00],@@PV, 0@T0#0: @S,}Ѝ(yp@-M@P|00`0 p  dPH+0C+000  0+P  &, m @0 @+P+|}ݍp +|}ݍpLp$$(y@-eMPp0 0`3 p  dP*0*000  *P @0 @*P* 0S  +j}eߍ*d}eߍLp$$(y0@-M@PP000x dP p \0*D8,* @9}Ѝ0H$p$$L(y0@-M@PP000x dP p \0*D8,* A@ }Ѝ0H$p$$L(zp@-M`@30 1 0D SV R0 Y* N+0 Q*0 0 0  4*P 3+0+C-+I*+M'+R$+V!+[+_+c++k+n+* O! KB CGST0U V48,IiWX0Y Z48,M_[\0] ^48,RU_`0a b48,VKcd0e f48,[Agh0i j48,_7kl0m n48,c-l0o eT0 k`<0,o nZ 0, qT D|ލpxxV4L(@-Mp`x 0FSuQ <A@L$(U $4$ T0VS@5.(.Y Z.4 `X0W).(.] ^.4 p\0[.(.a b.4 `0_.(.e f.4 d0c.(.i j.4 h0g k ""8",n  m0l! B $d0o $L0 40,o 0, ЍxxV40@-M@00} R d<Pd.(.U V.4 LT0SP ( Y Z 4W `dX0P ( ] ^ 4[ pd\0P ( a b 4_ d`0P ( e f 4c dd0|P (  4i j h0gdoP ( m n 4k dl06! d2B $d.d0o dL0 d40,o d0, dЍ0xxV4Q  0S P:zp@-M100@{Ѝp!  (XQ0` ````0````````` `P (` P (   4 L0P (   4 p0P (   4 0P 4 ( 0  zЍp(zO-TM\=0P0@PzTЍ< '*00P0+ F  dH0 L(PPPP P P P PPPPPPPPPPPPPPPP P!P"P#P$P%P&P'PDPEPFPGPIPJPKPPPQPRPSPMPNPOPP?P@APBPCP0 `,0- ]`1T 0``Pp. / 2 3 405 6 7 8`)*+0UVWXYZ[\P^_9:;p媀嫀嬀%&'('0-)1*1`abcdefg+,./012345678=a>Zx0  ?@AaBCDEFGHIJKLMNOPQaRSTUVWXY1Z[\]^_`efghijkl9:; ?< [P ( V W 4T jU0P ( Z [ 4X nY0P ( ^ _ 4\ ]0P ( : ; 48 90P ( b c 4` a0P (  4f g e0d~P ( o!p 4m n1qP ( +!, 4) *1dP ( /!0 4- .1WP 4 ( 43!1 21JP ( 7!8 45 !61=P ( ;!< 49 :10P ( ?!@ 4= >1#P ( C!D 4A B1P ( G!H 4E F1 P ( K!L 4I J1P ( O!P 4M )N1P ( S!T 4Q +R1P 4 ( XW!U V1P ( [!\ 4Y Z1P ( _!` 4] ^1P ( g!h 4e f1P ( k!l 4i 2j1P ( s!t 4q r1P 4 (v1w! xu P.(.{!|.4 zz1yNPhO% 0 P]wTЍ.ȧ( z0@-MP010 1 A0 0$0 0 0  $P$0 48,I0 48,V0 48,_0 48,c C wލ0H$(z0@-MP70 1G0 0[$0 0 0  >$P7$0 48,0 48,w 0 48,y 0 48,0 48,0 48,u0 48, k0 48,a !0" #48,W()0* +48,M,-0. /48,+C0102 348,9DE0F G48,/HI0J K48,%PQ0R S48,LM0N O48,14506 748,<=0> ?48,XY0Z [48,TU0V W48,@A0B C48,5$%0& '48,\]0^ _48,890: ;48,:`a0b c48,de0f g4t8,mn1o!p4H8,=>1?!@48,AB1C!D48,EF1G!H48,IJ1K!L48,{MN1O!P4p8,qQ!R1FS1T!8,gUV1W!X48,]YZ1[!\48,S]^1_!`48,Ief1g!h48,?ij1k!l4p8,5qr1s!t48,O+uv1w!x48,!y!z1{4|!8,9:1;!<48,> h 0 A)*1+!,4t8,-.1/!04H8,1213!448, uލ0贫., ЪL4|\t$(0@-@<P 0Pb"PS03D 3C305 55P50茥@-M@P<o !d0p< SpTpUpVpWpXpYpZp[p\p]p^p_0`papbpcpdpepfpgphpipjpklpmpnp2P ( U ĕVĕ 4Sĕ LT0ĕP P P 4 ( X0Y ZW `P P P P P P P P 4 ( \0] ^[ pP P P 4 ( `0a b_ P P P P P P P P P P P 4 ( d0e fc ]P P P P P PP P $P 0P HP `P lP 4 ( h0i jg 5P ( m ĕnĕ 4kĕ l0ĕ! B $<1o _$1 Z 1,o T0, N[\0] ^48cPPPHpߍ0$$$%0%H%d%(zC-M@`pP0 PPu@ WT0@D0000  @t@pЍF|%( z0@-,MP10(0 P/U(|p@,KP !G!P P(jp@P 0@S:X APP 0@T(Np@,Ѝ0(Hp%(@-@`p{ ! !Pv Pt P|Pm !!!Ph BPc ST0U V48<[JS S S S S 2SOWX0Y Z48<SF[\0] ^48\U=_`0a b48<S4cd0e f48 ^+gh0i j48<S S S S S S S S$S 0S HS `S lS  ^00UUkl0m n48 ?48,D 0 48XY0Z [48,3 0 48TU0V W4P8," 0 48@A0B C48, 0 48$%0& '48, 0 48\]0^ _4x8, 0 48890: ;408, 0 48`a0b c48, 0 48mn1o!p48, 0 48de0f g4X8, 0 48=>1?!@48, 0 48AB1C!D48, 0 48EF1G!H48,x 0 48IJ1K!L488,g 0 48MN1O!P48,V 0 48QR1S!T48,E  0 4(0UAV1W!X4`8,4 0 48YZ1[!\48,# 0 48]^1_!`48, 0 48ef1g!h48, 0 48ij1k!l4@8, 0 48qr1s!t48, 0 48uv1w!x48, 0 48yz1{!|4h8, 0 489:1;!<4 8, 0 48<h  5 $(,  0 48)*1+!,4p8, 0 48-.1/!04(8,s 0 481213!448,b 0 48?`4pt8''H'\, 4p56@7P4X Y0Z[`4p(8''H'\, @?P"T U0VW`4p 8''H'\, XpYZ@[P@ A0BC`4p 8''H'\, TpUV@WP$ %0&'`4pD 8''H'\, @pAB@CP 4\%0]0 ( & ^ '_4$ 8, 8 90:;`4p 8''H'\, \p]^@_P` a0bc`4pd 8''H'\, 8p9:@;Pd e0fg`4p 8''H'\, `pab@cPm!n1opa4p 8''H'\, dpef@gP=!>1?@a4p 8''H'\, mqnoApQA!B1CDa4p4 8''H'\, =q>?A@QoE!F1GHa4p 8''H'\, AqBCADQ]I!J1KLa4p 8''H'\, EqFGAHQK 4MJ1N1 (K!O! 4LP8I4 , :Q!R1STa4p 8''H'\, MqNOAPQ(U!V1WXa4p 8''H'\, QqRSATQY!Z1[\a4pp 8''H'\, UqVWAXQ]!^1_`a4p$ 8''H'\, YqZ[A\Qe!f1gha4p8''H'\, ^_A`Q]qi!j1kla4p8''H'\, eqfgAhQq!r1sta4p@8''H'\, iqjkAlQu!v1wxa4p8''H'\, qqrsAtQ 4yv1z1 (w!{! 4x|u8, 9!:1; 0S   P P 1S1S  0 0 D@P0S ` 0 P P 1S1S @ 0 P p 1S1Shz -pP-M``Ph0008@0@ ^0T:4 ` 0 N ^Ѝp\&(O-Mp@0 `S  P P0 S G 0 S 0S`P0 &P %P%W j P0S0@ cWA   P;0xS   ^- 00;S)^Ŵ 0?0 B0O0d 3 `^2 B^2@T?0 00;( k @;#  0P0&T&W W *W %TC%WA0@ M q P @11 S, < ; @ D0HS@1  @E0V @  `P; @@    ZPY W *W P 0\*W0@t P   | 0 S 0S0S DR:0 S00Ѝx&gfff|&@-p`P(0@ 0S  P 0(0 0@&C-p@P0S &S @PS"   P 0`   P `1 1S  PG-`@@PpQ 0S 2 0` - P< Pn  # 0  Pd04H00S HH0S 0  P H0P!0S1S0 0 H0 H 01H01H01H01 H01H00S H01 0pS0 H0H011 H0110SH0<41100C" H011H01a&& &&&&&O-M@P` xp0pU00#400#800#<0q 0;<S %S 0S0@d   PR~ 0@y  p 0P"U 'U > n P/0%S@0S 0S0X 0p %S@@@p@ P P0% 0@ 0 @0P p;U 0  PT % 0S <6 P0>S D@p0S 0  P D0p!0S>S   P0S  0@ g P㌣ ` P\ 0@0(S) @( @T  P D P 0P#Q  0PC RS @ "Q 'QU PP @@D1SW0 0D0D0D01D01@D01@D0@0S D01 0@S0 D0 YD011 D011 @ D011D01\g P0S[+ !&  Pg P P @[ P"  EP <T>B P%TP4S T2X 0z< 0 s$4S00@Ѝ&'&''' '&P'0'('x&D'8'H'X'd'l'4O-Mp0@0s sh 0`0CSX<<Z0 00 0T6;ES0`0CV *Z0 040 040 5X X Y:UPη@ 0U ?0 0B 0ᣏ0h3 U20@  BU2X?000@0`0CV:@ЍЍgfff@-@! 0T 0S  0S1p0S `P0u0@q0PSki4C-@P`VE r0X0 0S"Q Q1 Q Q QWWW&Q <Q >Q 000 D8,0 00`V0x'''''''''O-M`@pP ^808`B 070 00S0 0000S<  0 00P+ 00 0 00S0  0   `E 0000 0S<0P 1S 1SB  0S; 0S 03 00~ 0P+0t00 00S0 K 0  ` 0t:0000 S< 0<-0000 0 ) 0 `0*o0 00S0 0000S Z*0S0 0 Ѝ0 `Ѝ'&''' O-$MP P U@@0+ @0 pU 0S 0 0p XRP`H 0SG  0S  0S03 1 00S>S) @  H00@ P0 00S0$ S22u0PPH0 1` P@ D 0 c` @XTPH 0SN  0S  0S0: 100S<S0 00@ 0 00S >H00 ~@ {`0 00S0 pSd0\0 0``H01P 0 $Ѝ x&''p@-M@;0C 0 P `Ѝp>@ e 0Q0#0:0 0 0 0 0 Ѝp'@-@p  0S]@ P(0S (080P:<0P@ P0S@D00p `P0 0 80P:<0P0SD0`0pD0SH P0S ` 0S1xH0uPH0a 0SH0Sj00s,f 40Sb2@\2XV0@-@Y T0PN@(P0,L(, @0@@0H0D004 A-@0000 0`D 0S 0 0S000@`@PpP 0pPU 0S0 0S0PS00@WU0 0P 0S0 ``R @@p@-@P`p(( _$0 0  Pp@ 4C-pPP`@0S P 0`!0S1S3Xu 1T00000q0101@p0 1 01 0 2  0 1 0 2 x@1S 0!0@S1 ?p0@d2 01 0@0@0X001 100O0D0!0C1? g 2 02 4P202@-p`P(@0S m >@`p(@C-p(@/ ^, R* @ |PQ0SP 2@ F` @` S00NU0S2@02 -_-MP@4P0@`UX',@ 40400@40<08@ѠSC0<S 0S0S& @,܆ pPP_U :U UJ/Up@P>Zo PPP< T@7X P<@ 0>S SS%>Z# &f P |P> @0D Cc0G  P*X>U]UdN00>S D_@P[UU0S>ZX [?p D@P' ?U ?1@ 0S >S0S>Z0D C(0S h)P0P /U >U D00S0 P D00РȃUu /Ur >Up Y 0 Y 1/0? 0 DPPP@=P P; PP"U 'U2@@0S 0S0S 000S P0S P P 1S00 0@,B,P:P 0/@P0PРP/U000S >SUS>ZQ 7  >U UC>ZA %PT 0S 0pS <S <S 0S0S &0 D~S|(0 ) 0S    p  \ 0g Y 0( ^ Y`Ѝ(''((8(D(X(|(( ((((&(((l((P'4@-Mp0 0 0 @0 0 0  P" 0+`@ VPU  V T e 0Q0#0:000ЍЍ0@-0P @0@0(//// ///// /$/(/,/0/4/8/</@/D/H/L/P/T/X/\/`/d/h/l/p/t/x/|/တ/ᄐ/ሐ/ጐ/ᐐ/ᔐ/ᘐ/ᜐ/᠐/ᤐ/ᨐ/ᬐ/ᰐ/ᴐ/Ḑ/ἐ//Đ/̐/А/Ԑ/ؐ/ܐ//////////// ///// /$/(/,/4/8/</@/D/H/L/P/T/X/\/`/d/h/|/ထ/ᄑ/ሑ/጑/ᐑ/ᔑ/ᘑ/ᜑ/᠑/ᤑ/ᨑ/ᬑ/ᰑ/ᴑ/ḑ/ἑ//đ/ȑ/̑/Б//// /////////@-@00 0( , 0 4 8 < @ @/)0@-@P00 @0( , 0 4 8 < @ 0@/)/@- MP@p`X  P X 0S 000  Ѝ@/-M0 Ѝ/-M0 Ѝ////- 0S0 \0//0//0//@-@P PPT: T0S@/G-Mp`@P@/P0 @ /ЍG/@-,M@, ,00W0 WPЍ)kt]50@-@PR7@0@/p@-@ 0`P X ]OP0 RO@&P P @ `4P D0 Y P 0 PQ0  ЍG/8XO-0M p`\`0 ,V(0$  @P `@ `P T iV000 `O@9 9; 0`0pO0X%XppPU~p hm4P D0pS p U U: UWa0 N@ `T`VX X3O.X$0( 0 %[# Y! NVXp0 P ` @0 N@D0  @9  S 0 d0/ 0ЍO/`p@-`P0@ P 00/PT j@p@/p@/p@-@PEP2`. T 0S @  @*0/P 0P@0p@/& P 0l0/P^ 0@0 @0 0/Pp@/0@-P@00C 0 B0c0,lK@~k0@/p@-`Pp@/@ `0Pkp@/@-Mp20@0P 0L0/0|0/8 `MP HU0P0Ѝ@/v]A-`pP|t0@0S  M0 00 fA/0 NA/]@-`@pP0S T  M0 0000<( P(m T &8 .P$`@/)h - -X-@@00 0S 0T 0T p0Td0TK8000/<0  (0S0(0 h/-K  @)@-@8000/@0 8 S@/p@-P`<0S M@  M0S<jp@/<00/p@/0@-P@0SC/P. t0Sx P$0P P 00/   PP 3PI0@/]@-@|P (0S  P@ @/L @/L@/@-P @0 @0]@/@/hX- pX-LM`P0@@4d0K` KPP'`0Kd KP00S 80S $`0Kd KP@@T \K[\K @ P0@@<0 \K@ph/-\K@-M@A0S 0S@ =   0  Ѝ@/@-M@'P 0l0/PH =   0  Ѝ@/O-MPF ;p.10 P A@R000 (<P,Hp(@\|d(H|x@ll4Xh00 S 0 @0/00 S00-o/'8(B(A/////// ///("('8/ /K0lK0 @L P 80S L$0K KP00S00 lK 0K/0 0 L lKcKvdK0 K0 /00 KfTu !(8/J!((/Cd("('8/9/4 /.,0!((/$ // // / /!((/'8(B(A/("('8/("('8/ //Z,/R,'88(C8B(///("('8/'H(8B(C8/ / !(8/z(H(Q (0B(A/k(B(A/b/\ /U /N /H'8(B(A/?/;/5!0((/,'88(C8B(/!'8(B(( (8!C8B(/P1/P +@$,10 0 /0S-MKЍ-MKЍ-MlKЍ-MKЍ@C-0MPph&h!HV0/0@ P0 @,`/,0S@phk*PV((pPu0 P  0nD.`00( E0gD'`X0PPTKP0 P0P00(0 >h/h1ᤠp)1(O-MP`p 6P0 @开@0< 840,@(LpH`DPw0 @$0`  @/PQ xPM kP#@0 !8 10 P<0{00P0N,@0P /P ` X0T0B40d0\ 0C0C00 % $@(P,`0p48<@0D HL@P` pE @ P0 0/T 0 0/ЍO/h`2 -X-@@,00h/-K2O-(MXT@LPP`\p` 0 L @P` p$(ЍO/@-(M@  :+0 @(Ѝ@/@-(M @ :t0@(Ѝ@/@-(Mp`P@( < 0 s`p(Ѝ@/0@-(MP@(  :K0 P (Ѝ0@//@-M@+Q D00/Ѝ@/G-MPp 0@4P`0  @/ЍG/h3C-M`p$P 0@P /P0 <ЍC/h3 -X-@@,00Fh/-K3G-MPp 0@4P`0  @/ЍG/4C-M`p$P 0@P /P0 ЍC/h4 -X-@@,00h/-K5/@-M@+Q 00/Ѝ@/p@-M`P,0@ 0>@P `Ѝp@//2/ 2/<20@- MP,@ 0 t@r000 :a 0 Ѝ0@/G-(MpHL@PPT` 0 M @P `p(ЍG/A-M@<@8P4`0p @P`pЍA/@-M@$0 0 PЍ@/h5 -Y- ,MPP@`p0( HKL0 x@@ =a0L0 @@0@ ? H0K s4 K0DP0Ss`i/-KL0 L 00L0 a0@-@P :0 'P :0 0@/@-@@/@-@ <0 P <0 @//D6/ 6/D6p@-PP(0@S!@b04 C R]000 0<Lp@P/Q/@M/J/@F0S /=0S /@3 R 0 /* R 0 /@ `V /0S0@@0`V  ///@@p@/C- M@ptn8 R i8(P 0 @P/t $hH$H<`0(0/ 0 P 0/P0S ЍC/( 0  K/////J/07/6/6/6@-@ %0 0/P  %00/@//// 7//,0 0  $     /T7O-,MQ@00/ 0 ! 0S 0Q: ,0@P`p0 @P`p $(0 B,ЍO/C- MP`0* <8#^% X pp0 @p/pU 0S0 P@0 @/00/p ЍC/p@-,M@P`,  ,0   0 0AP ,Ѝp@/A-0M@Pp , ,0 0 0 `AP 0S `0 ~APV PK BP H0 A0ЍA/@-@-0 0  0 @/@-@0S0/00@//070@-P@ 0  0S# 0Q:I U00+A0S> U  0P 0 (000@/0@-P@ 0  0S 0Q: U00+A0@/0S 0  0  0@/0@-MP@ 0  0S+' 0 ,Q: 0+P50S  Ѝ0@/@-8T@/@/<0SP/-80S 00///-80S 0P0///-80S -/80p0//@-@80S @/8 0l0/@/0@-P@,0  B8 0(0/0@/ A0@/-<0S W@/<0t0//-<0S G@/<0x0//@-<^ M@/<@/@/0@-P@E \<0PS= S @0@/<00/0@/-<0S @/<00//-<0S Z@/<00//-<0S /<00//-<0S @~/<00//-<0S80S00//A- M@<^ ,0( Q$  0 0 <,`(p $P0@ `pP/ ЍA/0@-MP@ <0S 0 P  R80S0 0/Ѝ0@/-Q8%P 00////l7h7 -X-@@(l04 D0V8 PP0D00 HD0J 0H0h/-K7h8 -X-@@400 0Sh/-K7h9 X-`M@X000 pK pKlP spK7h/-pK(t/t/@-@P@/@@/@-@ PP0D0@/0D0 H 0H0@/0@-P@,00p0/ ?0@///@-@4P@/-/@-M@Pp, ^p0S( S& S SgЍ@//l7O-,M@@0 YP Pp ?@@  1S  S 0S 0S  S 0S 0SP S 0SP0 48<@ 0SP S 0SP0`SQ 0P `B@0 0 $0(  @>P ( $ 0 BA @  @>0 P`R@ R R@ @0S  S 0S 01PS0Z@s>P`Y`,ЍO/ C-M`p[ @P0@  /ЍC/@-MP<100 @=@0sVP4<  =T0@ T80Ub=000]=0<0M- 00BP D=L0D ca30 @`0C B$0 p0 ,@(`p4 6Ѝ@/(G-P! p`^ @  @@0/00 =x"Pd = @V 0"Pt0 /G/`Թat0@-@PP 0@/0 S0S S< \P P %=P <0 0@/L9A-MpP`@P $U u   V* AP 0 @/PmP 0 @/PЍA/0@-@P<V0@/h`9 -pX-``@P4P04 D0b8#8X0l@TPhph/-K70@-P, 0Sl0pS @0@/@-@prPp0p0 0S@/@-@00/~@/0@-P00/ 80 t0S h R @/$@X /PY@ ,0  <P @0@/p@- M 0S" P 0l0/lP P0 @ FP/P  P0 F @P/ Ѝp@/0@- M@h0S X*P2P  pX- MP@0SU P`P \0T L``e000ph/-MnЍ=D5@-@@/0@-@0P r0S00/000@/-0 0R 7/=hl> -X-@@X00{780 0R i7h/-K=>h> pX- MP/@ 0SU rP`P \0T L``00 0^ ph/-MЍ<=p5@-@ @/0@-@0P  0S6000@/-0S//0@-P@,0 0R b70@/=@-6@@/p@-`6 0P@R 6@0S 6@}p@/p@-@`0PP T6P0S T6Pap@/0@-@P8t0@/@-Q@@/_@0 0/@/hL? -X-M@@ 000 000h00 006P40,K0 5h/-K{X>@-Q@@/@@/-0S00//@-@/@/p@- ЍP`|0040, @/P U: P@-ˠ Ѝp@/(/?/@/$@@-@0  0 P000@/-M00{5|-M00r5D|-M00i5|400//@-`P@ V pSp 0S 0S 0 I3 O@/p@/@/@-@00@/D@@-@00}@/`@@-@00s@/|@/@h@ 0X-MP o@@  80  0@KP@ 5-J|@p@-MSP@`` ; ``5P` 02N A5Ѝp@/@-@00'@/@/-/0@-@ fP0P 00/P0 00/P0@/G-p`@0@<t 0  0@Q :-0P\0 0/ R*0P R:P0000G/Ȑ0@-@00SP PPPPP0@/ 0 0040T0L P/$Ap@-5MP20L320+@`T 00h000T0~0S0y(0 0t0$0o0(0j0,0e00S0  S0000S 0S 0S $0S (0S ,0SP@ ```` `$`(`,`0`3E/0kE?000@0S50S0 40S:<0Q/A4P) QGP0" QAP00S:80S:0 >000,@0 /P0`00L,5ލp@/(AK/K -@PR KKKTK@00pL2`C P00/W HB@D<0T <0TT @T,>$o/hxJ-M<0H2 Ѝ-MKIЍ( (hK pX-MPH200 0<2 P4 ` T0S 0K0/P0  @`/42SP0SX \0S10 KpKP0@ KHKt! K#K(\ K$02@C !P00{/юKH@K0 0PL<0,2 ?K/K ````Z,0P K. <82@C P00/@2@C P00/#ph/-M K IЍ-M#KIЍ-MKIЍKK(@- M@ , @0 @@ Ѝ@/p@-P@ U u l`<0S d00d0S<Ud0Shh0d0p@/-T0S 0 0///-T0StT00//-T0S0$0//- 0 !/p@-P`@ U DP00@ @E Q@10'pD0 p@/:- /@-pP@` @/PE+P @U+P T PGP0@P0 '8D0SAG@//t0@-@PZ0@/0MP 0 0 P@0@/-8/@-@Z@/0*P @@//@-@@/p@-@P`1 CUT \C0 0/PF00F0 W'p@/WA-M`0p(@,PP@ `p/ЍA/Lh0L -X-@@,00?h/-KtL////-/-/0@-M@P+Q1 ,Q) -Q! .Q /Q 9Q )00/0 0%(0!/0%(0!/00/ 00/00/Ѝ0@//K-FMh001E/E?0 0S:0S:!!Fߍ/(hM X- MQ Qh/hMlx/0@-@P(@BPx x0@0@/@-@80 t0 00/t 0t0@/0@-P@tz8t 00/0@/p@-@`0 P   P2 P- U+ \80S P0 P00p@/-00//-00////-0S00 /-P//-/@-MP@`pP0  Ѝ@/@-@P`PU U(@/: -@&( (@/U 04p$P8lV 0 48( <S@/@@@ 4 ( 0 (.4.(.0 @/-0 4 S 0\0//</-00//@-MP@`pP0 I Ѝ@//pM/M0@-P@0S000 |u000@/N0@-MP@0S/Ѝ0@/0@-P@0S000 XQ000@/PN0@-MP@0S/Ѝ0@/0@-P@0S000 4-000@/N0@-MP@0Ss/Ѝ0@/- 0R0#/N0@-P@ $0R00@/Np@-P`@1,S@ 0S0S@ 0S0S0 48<@ @0S0  <@ 1S@ 0S0S@ 0S0("(08#HDPp@/0D D$6Ap@/A-PP$ 0@s! 0pS` 00 0S 0P 0 0 ;00p(`W:pX@A//Np@-P`@P0 0S 0S p@/0sB s8 s0 s% s s 1' P ,00S000/P 00p@/00/00/P000/ <F 0=00/P0M-/p@-`P@( D>(0 D0H PH0D !<H00hX0`` DPH0P<H0p@/0@-@P\P 0@/ ;v0 P0\0/0 S'PZ0 S !S "S ;u0 P0@/A-MpP`@NP $U u   V* P 0 @/PP 0 @/PЍA/@-@P ;v0 P@/@/C-M@00/}0p>0 S PLP %P m'P0 j,00,04@} 0D0H0, ; H0, H0`;H0=V v,00,004`l0/P ` `|` 0S 000 X%U N% 0P2& 0\0/W PЍC/A-p`P&@w  $ P$  $ $ '$ $p(>00/H0 0F!@ p`@/A-@P U0 T t`1b#!@TQA/T t`1b#q W@TPA/p@-`@PZ0T q0ap@/0@-P@0 ^ 0@//N@-@ 0 ;v0 v40@/PJt0Pp01SC-@dt0 d S`QJt0Qp01S x0t 0Q`Pl}|pW*xt0dP`SV Jt0Vp01 U:Ux G0!=  0t `PVt0\0C/?POhN _-(\Mp`xp t` @;P-TJt0T}p01Px x 0  x0 .Pj x0$dKlKdK5l0Sph0xp S`t` dK# @ T:  ]p J 8K XKP00, L8`4pXPT@0N A0CHP D@ @ <  BH0K (T D0-`C@x 00.pP@00t 00@P0  @Ppp0D G0 0 Po/- MdK Ѝ0@-@PP A>=>J! i/-K-K0|\?-K0U?-K0N?OhLS -[-$pp`P@l0@00 00>PV ? |k/-K;-K0lj-K0 ?NQ0@-M@P0ST 0  @Ѝ0@/@-@0S 00@/0@-P@ 0S " 0 R0 00BC0@/w@-M ;@ 0@!@Ѝ@/0@-MPx000@9@O 0S 8(P@@%Ѝ0@/S(@-DM@@00@0 !P@@@DЍ@/(p@-M@002P6T3&<`  V , P!P  ߍp@/(0@-@P U PPU P T  P P0S P@P$00S P$@P 0S @0/0 @ 0@/G-P P>PXP+PdP`` p @0 / LG/]A-M`pP;P P'0S @W0/W W0/P H@Pd ` 0S@@TW`V T T  1.! ЍO/ON a(p@-`@@Q *p@/@ PP  0 (P000p@/O-M 0Sp@< 04SPPU00`U 0 48<@ 4 (  0  0 48<@ 4 ( 0 [ ᗳ P0pWZ 0 0 0 U0 40W S  0BQ0 c '0 G00G [ '0   0C00ЍO/A-`MPp00\0` @aP ]P \X P `W0ZS0cB0Ec0l H@ ?/ H0$H2UP I@\`ЍA/a(0@-P@00000@/F Pp@-`P@Pp@/0,0 04S00@ +p@/ha 0X-MP@0S X 8#8 8@BD B1  Kv* 0$ K K2KK=0 [ PL 0@C ŲP00/0h/-M K*ЍO-`Y0P@0%S01S:9SAS:ZS 9S80C10C@ S1S |P@P0S00C 0 B0c0AA`*K0pS) ? %R01S:9SAS:ZS9S80C10C SᲰǠ` @1S L @ &PEp `PE0S 0GpR4|)O/ha X-MP`@p0 K)P  K *P 0 o 0@C "P00/ 0@C P00/h/- K9* -P-0 `/@-@ Q 0S 0S0S R P@/@-@ Q 0S 0S0S RP@/@-@P`pPCT1@C0eS0 C0R@CU@UT)00u0 @/%WhLb -0X-PP@3)*PTx Y*0h/-K.)G-@P`Z%T 0S 0p W*f0 P*@z0000 0 0Y0 00(G/Whb 0X- M@ 0K K4 0 0S000 c 0KK4 KKh0PC P00/4( 0@C P00/0h/- K*)-K&)-0S<0S//G-MP`lU 0( ,0@CX@10w$(0pX0(0S X1 0/G P@$ 000/P@PE UpW: T80S 0S @W@0P$ 000/PP@D T U:0 0,0 $ ,P00D@P/0 ,0 @CW@10( !$(0pG0(0HЍG/Ȑp@-M`0 ,0( S $ B0/$@/,0%00S (0S $ C040/( R $P B0D@P/$ ,P00D@P/00(0Ѝp@/A-MP`0,( 0@ApS'0R;TA0;$00,0( 0S 0PEPC$ 000/P@PE U T:0 0,0( T $ d0/$@/$ ,P00D@P/00(0, (00BS*ЍA/0@-P@0 (0, 0SV( %4P0(00(00@/0@-P@0 j(0, 0S=(%4%(P0%< 0(00(00@/0@-P@0M( ,0S0B](0 040(00(00@/0@-P@01( ,0S0BA(0 48<0(00(00@/C-MPp`J WH 0  (,0 CU@1@!0p#(0PU0(02 0 0/$E@0 40/0 pES $ ,P00D@P/00(0 0W:(00P 0 :#(00(0ЍC/Ȑ0@-P@<U*!.0@/+A0@/@-M@W<0PkЍ@//bhXc Y- M`pP@ ^0<00,Kp& 0C&@(@ 0S000   (Kr'(@0 ,K<, 0"@D ⯮P00/,0@C ⤮P00/i/hXc -,K&-(K&hc -X-``P@`0p 0t&U@` A'h/-K0 &d@- 00 @C ]P00/@/d0@-@P0@/h8d 0X-M@PP   00K0 - }Q3R@ 0 0/@-@00 0@/@-@00 0@/@-@ 0S 0 C01!RJ 0 R00 AZ 0 0@/@-@P0 \S /S :S0S^ P ˭@/@/ 08!@/p@- Ѝ@106y@0`A/0@0 0@P APBP> 0A/0P4X0S PXL0S , 5PX0SLu0N̠ Ѝp@/(p@-P`@3@ @0Q@@D`HP(0Sg p@/ᤸz X-M@P`pa0 0 @ @ @h/-0 䤸z X-  0B/h/ -00P/(p@-@P`P B 0B0P*Q340 P@ 00BC1!@ p@/-P/0@-\@TP0S/@T:,@$P0S/@T:0@/p xtA-pQ0pPP `0@C0S /@DT*0 0 x@pP0S/@T:H@@P0S/@T:W0B/A/|- /- /0@-8@0P0S SVP0@/P0@/d(z -[-$M ``ppA/AP4P / 000/ 0W0/P4P D1/0 0U u 010S 1/pp0 @10/ `p4P0Q4P k/K-0/ 0Sx0/ 00C0-K0 00P 0,0 ,00S00/ 0@ @/@(@ (䔿HcsmX$0@-Q@p1P /0TP/0SL <1/0TTD 1/0S> 1/0T8 0/0 0R00/0 0R(0/0S# T! 0/0S t0/0 0ST0/0 0S 40/(0@/ 0S P0@/Hz -X- P 00S /(0/h/-K0S䔿p@-P@`00/U0E@ 0Sp@/H@-@,0/00S 0@/H@-@,0/00S 0@/H@-@ 0 RR ^:0 @/0 00@/ᤸz -_-(8Mp``8C\ /@$SX@ /@T@ /0 P0 /0`/p2PV2 Q0 ^00P5 TPp  p~00S  R 00S  R ^^pR~0pCPP "PX@0 pp/ P,@P0 /PЍ@/ဵ0@-P@t0/@0 /pp0/@T0/P80$@/P 0/0@/᤾tT,O-S Ѓ p/FFxGO/0@-P@00/00S@ 0 0@/H0@-@P40/ TR 0P 0@/H (0R: 0(0$ 0B0@/"@-0@  0T:Q :Q1@/@/@-M @/Ѝ@/ᬵ@-@0 7/@/ᄸ@-@Q p0S /P L0@@/Q 0 0S  /P@/DH0@-@0P 0/PPP0@/Q@-@00 /0 (   @/O@-@$0/0(/@/p0@-@0/x04 Q\0/D0< [0 P/P0E C E0@/H\\kԸH//////// ///// /$/(/,/0/4/8/</@/D/H/L/P/T/X/\/`/d/h/l/p/t/x/|/ဒ/ᄒ/ሒ/ጒ/ᐒ/ᔒ/ᘒ/ᜒ/᠒/ᤒ/ᨒ/ᬒ/ᰒ/ᴒ/Ḓ/ἒ//Ē/Ȓ/̒/В/Ԓ/ؒ/ܒ/////////// ///// /$/(/,/0/4/8/</@/D/H/L/P/T/X/\/`/d/h/l/p/t/x/|/ဓ/ᄓ/ሓ/ጓ/ᐓ/ᔓ/ᘓ/ᜓ/᠓/ᤓ/ᨓ/ᬓ/ᰓ/ᴓ/ḓ/ἓ//ē/ȓ/̓/Г/ԓ/ؓ/////ܑ-+/-oY/0@-!M@Pl00 2P A/P /PP  !ލ0@/(C- Ÿ ЍPp`@@0 ePh T 00/P_ P P;A/!P 0!/@ \^@P00  Σ@ ǣP ⍣,!>0?`PB0S , ,P(U.0L0/P 0S0\0/0d0/ ʣ0P0/? ˠ ЍC/(/ؑ/ԑ/ܓ@-0 p@i00@P4@-$@00@C\ @-d@ɻT0 0 0(,00000400800<00@0(@/h)@@-d@ᬻT0 0 0(,00000400800<00@0 @/)@-d@ᏻT0 0 0(,00000400800<00@0@/)@-d@rT0 0 0(,00000400800<00@0@/) @-D@ ,0  0"01@/=X@-D@ ,0  0$01@/=p-/-/-/(-/@-/X@-EP@AA$0P ! @/-Dm/-0/Dd-,$0/ 0//D(L- 0  J 00/Ŀ@-@P Y00 -咮/@-匮/-冮/-倮/  0 /X= 0 /p= 0 /D@ 0 /`@ 0 /4|@-D/-g/-/- 0P</- 0//L",8tXlt|,$@8dXlbaHw<\[\DjL\X0 8(Y cpX$L\ ]D]4\|" L CARootMYhNgg8 No cert. selectedIssued ByIssued To\tXlt|L,$@8dXlbaHw<\[\DjL\X X(Y cpX|L\\ ]D]\\Xx"ht(N84Summit Client UtilityDisabledComm\NetworkPolicy\Wi-Fi%s%s.\Ȯlt|.,$@8'<0XX\ h0 H,,"L+P+d,,,,configMaskCF10GSUMMITscu_es.dllscu_fr.dllscu_tw.dllscu_cn.dllscu_pt.dllscu_ru.dllscu_kr.dllscu_jp.dllp2"1X25" L46"Td5???7"t77d8"8T8Global\{DEADDEAD-CAFE-DEAD-CAFE-DEADCAFEDEAD}8tXlt|8,$@8dXlbaHw<\[\DjL\X8 8(Y cpX$L\ ]D]4:8|hX8+89"9;":;;tXlt||>,$@8dXlbaHw<\[\DjL\X; 8(Y cpX$L\ ]D]4<<;|="(L=t=d>"8d=L>\>hJJ4=;L?d??" ?(?8?@AtXlt|C,$@8dXlbaHw<\[\DjL\X@@ 8(Y cpX$L\ ]D]4C|?@$@"L????C"lBCProfileh  4lA4@%dPDhD"D0D@DHtXlt|P,$@8dXlbaHw<\[\DjL\XE 8(Y cpX$L\ ]D]4H|DD"@tDDDMiddleh4Ghh44MGTtXlt|xe,$@8dXlbaHw<\[\DjL\XP 8(Y cpX$L\ ]D]4THT|[Installed cert.][MS cert. store][Full trusted store][Installed cert]User Cert:L`"_``"``a"DHaaab"\0bbbc"4cccd"dtdd`e"(TdHeXehxFF4a4a4c4cNN4dPll4XSkk4S4_4d`EnableDHCPComm\SDCCF10G1\Parms\TcpIp---End Release/Renew---Static Address%d.%d.%d.%dRadio is disabledRenew--No adapterRenew OS call failedRenew OS call successRelease--No adapterRelease OS call failedRelease OS call successSDCCF10G***Release/Renew***---End Reconnect---disabling radioenabling radio***Reconnect***---End Diagnostics---%d Configs found%s\network_%d%s\Config%02d authType %d eapType %d wepType %d SSID %s bitrate %d radioMode %d PowerSave %d TxPower %d client name %sConfig Dump %s DriverFullVersion: --DriverFullVersion v%1d.%02d.%02d.%02dDriverFullVersion IRQs disabledSwitchedIRQ Polled Mode %d Probe Delay %d Roam Avg Window %d Limited Chan Set 0x%X Cert path %s RadioState %d FCCtest %d AdminOverride %d PING payload %d timeout %d delay %d BTcoexist %d LEDused %d RegDomain %d txMax %d Roam trig %d delta %d period %d frag %d RTS %d RX div %d, TX div %d auth %dGlobal Settings Dump:%d configs, current %d, name %sProfile Name: %sAP MAC: %02x.%02x.%02x.%02x.%02x.%02xAP Name:%s IP: %d.%d.%d.%dClient MAC: %02x.%02x.%02x.%02x.%02x.%02xClient Name:%s IP: %d.%d.%d.%dchannel %d, rssi %d cardstate %d, eapType %d, bitRate %d, txPower %d%sSCU v%s Driver v%1d.%02d.%02da***Diagnostics*** w+\windows\_sdc_diag.txt***Update Driver***not implemented yet---End Update Driver---(%d) %d.%d.%d.%d fail(%d) %d.%d.%d.%d success %d msInvalid ICMP handlePing test haltedNo successful pingsAvg. Successful Ping time %d ms%d tries, %d good %d%% success0 tries*---Diagnostics Output---*Invalid addressCouldn't create Ping thread!IP address %d.%d.%d.%dPayload %d bytesTimeout %d mSecDelay %d mSecInvalid characters in ping addressNo address!***Start Ping***----End Ping----ginaVal---.---.---.---Profile: %stXlt|T,$@8dXlbaHw<\[\DjLXe (Y cpX$L\ ]D]4p8<|h\"Lx8ܑ̑,"L w\Windowssdc_diags.txtText files*.txtAll files*.*P  4g44i48j4  444(%d.%d.%d.%d tXlt|,$@8dXlbaHw<\[\DjLX (Y cpX$L\ ]D]4P8<|XChanging this setting will reset the connection.Changing this setting requires a power-cycle.>?{GetServiceHandleDeregisterServiceSCUtrayActivateServiceSCU0:coredll.dllServicesdisplayPWDS%dInvalid Frag Threshold Range is %d - %dInvalid RTS Threshold Range is %d - %dInvalid Ping Timeout Range is %d - %dInvalid Ping Delay Range is %d - %dInvalid Auth Timeout Range is %d - %dInvalid DFS Scan Time Range is %d - %dPower-cycle for diversity changes to take effectPower-cycle for DFS changes to take effectPower-cycle for DFS and WMM changes to take effect"T| "HT"xdش::4l<<4444ȕExport[%d in SCU]ImportProfiles\Windows\Programs\Summit\tXlt|,$@8dXlbaHw<\[\DjL\X 8(Y cpX$L\ ]D]4p |""dpx8`<Lp$<hԾ,Tx pError in exporting fileNothing to export!Error in importing third party config settingsError in importing global config settingsError in importing third party settingsError in importing global settingsError in importing profiles (144)Too many profiles. Delete profiles or use Replace option.Error in importing profile settingsError in importing fileNothing to import!Invalid config file"(X[absent][present][%d in file]SummitSettings.sdcSDC files*.sdcAll files*.*h 4p484T  4 ww4tXlt|,$@8dXlbaHw<\[\DjLX( (Y cpX$L\ ]D]4T8<|Ph8"hlBeWireless"<"LxHhThirdPartyConfigradioStateCard Not InsertedCard Not AssociatedCard AssociatedCard AuthenticatedCard Not SDC v%s--v%1d.%02d.%02d"444P??444  4~~44%02xhash://ptXlt|t),$@8dXlbaHw<\[\DjLX$ (Y cpX$L\ ]D]48<|0123456789abcdef"<\switch statement mega blues!t"@p$Invalid NameInvalid ProfileFailed to DeleteInvalid, %dTd"0PttPSK must be hexadecimal chars only (0-9,a-f)Passphrase must be 8-63 charsHex digits are '0123456789abcdef' onlyHex keys are 10 or 26 digits. ASCII keys are 5 or 13 characters.Ad hoc mode cannot be used with ThirdPartyConfig!For ad hoc mode, Encryption must be none or Manual WEP!For ad hoc mode, EAP type must be none!"8h  |,0hash://microsoft$"" $Confirm Profile DeleteDelete Profile?<L"4TInvalid profile name!Invalid profile name, use a unique, non-blank nameOnly 20 profiles allowed. Delete one and try again." '"( X !!"&Invalid profile name Use a unique non-blank nameChanges to '%s' NOT saved. Commit changes?X(p("8 l x''(<(P(T(`)"  (P) %%44T444`  4L  4  4X4  44(4h QQ4048AA4YY4buttonX/ P*ȕ D,,@, /tXlt|L,,$@8dXlbaHw<\[ Dj%\X +(Y cpX$L\\ ]D]\\#!))T.l....." D,---.<.H.334$4H4l44444505P5p555"(X0\0000001$1<1 X1p1 11 1 2 02`2 2223,36tXlt|P8,$@8dXlbaHw<\[\DjL\X6 8(Y cpX$L\ ]D]4<6|88"7 808h47 68tXlt|9,$@8dXlbaHw<\[\DjL\X8 8(Y cZ-pX$L\ ]D]4888|9"HtT999h409t8PPPP@@@@PPPPP@@@@:"@l:BtXlt|P,$@8dXlbaHw<\[\DjL\X; 8(Y cpX$L\ ]D]4pN,;|:"`::%s_%dDEE"BBBDClCCCDCreate a new profile? SSID: %s Encryption: %s EAP Type: %s You may be prompted to enter credentials or keys.Create a new profile? SSID: %s Encryption: %s EAP Type: %s Mode: Ad Hoc You may be prompted to enter credentials or keys.H"4dEHPfalsetrue4N"8JNSSIDRSSISecurehAA4$IOZZ4,BNXX8@NXX8AANXX8ANXX8HESignal Strength: %d dBmSignal Strength: -- dBmSignal Quality: --Signal Quality: %d %%Signal Quality: -- %8TPT"T TWtXlt|l,$@8dXlbaHw<\[\DjLXPU (Y cpX$L\ ]D]4X8<|hU0U"8TU UDTIM: %dAP Name: IBSS Name: AP Name: [Unknown]IBSS Name: [Unknown]Signal Strength: %d dBmDTIM: ----:--:--:--:--:--%02x.%02x.%02x.%02x.%02x.%02xBit Rate: -- MbpsBit Rate: %d MbpsBit Rate: 5.5 MbpsIP:MAC:---.---.---.---ID:--:--:--:--:--:----AP Name: [Unknown]IBSS Name: [Unknown]Tx Power: -- mWTx Power: 30 mWTx Power: %d mW-- Mbps%d Mbps5.5 Mbps30 mW-- mW10%%25%%50%%75%%%d mW100%% W \0tXlt|,$@8dXlbaHw<\[\DjL\X 8(Y cpX$L\ ]D]48|h 4444(<`p"<@P" D T0Xhx%02XKeepOrderFlagsSCUtray ServiceDisplayNameSummit signal strength tray iconDescriptionContextServiceContextSCUtray.dllDLLSCUPrefixIndex<T"!8xxL xĔ"4"h"p ԗ\tXlt|,$@8dXlbaHw<\[\DjL\X X(Y cpX$L\\ ]D]\\84L"H##pܚ%d%%# %s\ThirdPartyConfig%s\DefaultConfigSettings%s\GlobalConfigDefault%S\%sAppLocationsdcWLANon.exesdcWLANoff.exesdcgina.exesdc_gina.exesdcsupp.exeSSI1:GlobalConfigsuppRunningnumConfigsProfilesSDKVERSIONSummitConfigsProfileSummitSettingsDontDoFlush&amp;'apos;"quot;>gt;<lt;[error near line %d]: %s &#unexpected closing tag <> ='"yesstandalonexml unclosed Summit Client Utility Help
Main

The Main window displays the following properties or options:
  • Admin Login/Logout button - To log in as an administrator, click Admin Login and enter the administrator password in the dialog box. The default password is SUMMIT (case sensitive). Click Admin Logout to log out as an administrator, leaving access to end-user functions only.
       Note: The administrator password can be changed through the Admin Password function on the Global window.
  • Enable/Disable Radio button - When the radio is enabled, select Disable Radio to disable it; when the radio is disabled, select Enable Radio to enable it.
  • Active Profile - Displays the name of the active profile. Use the drop-down menu to select a different profile. If ThirdPartyConfig is selected (and after the device goes through a power cycle), WZC (Windows Zero Configuration) or another application is used to configure the SSID, Auth Type, EAP Type, and Encryption settings. See "ThirdPartyConfig" for more information.
  • Status - Indicates if the radio is associated to an AP and, if not, indicates the radios current status. Potential values include: Down (not recognized), Disabled, Not Associated, Associated, or <EAP type> Authenticated.
  • Radio Type - Indicates the device's radio type including:
    • BG - Summit 802.11g radio (supports 802.11b and 802.11g)
    • ABG - Summit 802.11 a/g radio (supports 802.11a, 802.11b, and 802.11g)
    • ABGN - Summit 802.11n radio (supports 802.11a, 802.11b, 802.11g, and 802.11n)
      Note: Currently only applies to the PE15N module for XP
  • Regulatory domain - Indicates the regulatory domain(s) for which the radio is configured. The domain(s) cannot be configured by an administrator or user. For more information on regulatory domains, see Section 5.0 of the Summit Data Communications, Inc. User's Guide for 802.11g and 802.11a/g Radios (for Windows XP).
  • Auto Profile - Enables the user to activate or deactivate an automatic profile selection facility. Click List and use the dialog box to select a created profile. When the facility is active and the Summit radio makes its first attempt to associate to an AP (after a device startup or resume), SCU tries each profile, in order, until the radio associates to an AP. That profile becomes the active profile and remains the active profile until one of the following occurs:
    • The device is suspended and resumed, power-cycled, or restarted, which causes the automatic profile selection facility to restart the selection process.
    • The user turns off the automatic profile selection facility and manually selects a different profile on the SCU Main window.
               Note: The profile list should not include any profiles with an Ad Hoc Radio Mode setting.
               Note: Auto Profile is not available for the MSD30AG and SSD30AG modules.
  • Driver - Indicates the current version of the device driver.
  • SCU - Indicates the SCU version currently running on the device. Displays only if space permits.
  • Import/Export - Displays only if the radio is programmed to allow import/export functions and if you are logged in as an administrator.
    Click Import/Export and use the dialog box to do one of the following:
    • Export global settings, all standard SCU profiles, and the special ThirdPartyConfig profile from the SCU area of a devices registry to a file that can be transferred to another device.
    • Import global settings, all standard SCU profiles, and the special ThirdPartyConfig profile from a file (created using the Export facility) to the SCU area of a devices registry to enable SCU to use the information.
Note: When importing information, select Add to existing to merge new information with current registry information. Select Replace to overwrite the current registry information with the newly-imported information.
  • About SCU - Click About SCU to view SCU information including driver and the SCU version.



Profile

Profile settings are radio and security settings that are stored in the registry as part of a configuration profile. When a profile is selected as the active profile on the Main window, the settings for that profile become active.

Notes: When the ThirdPartyConfig profile is selected, a power cycle must be performed. See "ThirdPartyConfig" for more information on ThirdPartyConfig profiles.

If the Default profile is not modified, it does not specify an SSID, an EAP type, or a data encryption method. As a result, if the Default is the active profile, then the radio associates only to an AP that broadcasts its SSID and requires no EAP type and no encryption.

From the Profile window, an administrator can:
  • Define up to 20 profiles, in addition to the special ThirdPartyConfig profile.
  • Change profile settings.
  • Delete any profile except the special ThirdPartyConfig and the active profile.
Profile changes are not saved to the profile until you click Commit.

The Profile window displays the following properties and options:
  • Edit Profile - Use the drop-down menu to select the profile to be viewed or edited. Only an administrator can edit a profile.
  • Actions - Actions included New, Rename, Delete, and Scan. New, Rename, and Delete are only available to an administrator.
    • New - Create a new profile with default settings. Assign a unique name (a string of up to 32 characters). Edit profile settings using other Profile window selections.
    • Rename - Change the profile name to one that is not assigned to another profile.
    • Delete - Delete a non-active profile. You cannot delete an active profile.
    • Scan - Click to view a list of APs that are broadcasting SSIDs; select an SSID and create a profile for it. See "Using Scan to Create a Profile" for more information.
  • Radio - Select a radio attribute from the list on the left to view its value or setting in the box on the right. Only an administrator can edit these values or settings. See "Radio Settings" for more information.
  • Security - Values for the two primary security attributes, EAP type and encryption type, are displayed in separate drop-down lists with the current values highlighted. Only an administrator can edit these security settings. See "Security Settings" for more information.
    • Encryption - When the administrator selects an encryption type that requires the definition of WEP keys or a pre-shared key (PSK), the WEP keys/PSKs button becomes active. Click WEP keys/PSKs to define WEP keys or a PSK.
    • EAP Type - When the administrator selects an EAP type, the Credentials button becomes active. Click Credentials to define authentication credentials for the selected EAP type.
  • Save Changes - To save changes for the selected profile, you must click Commit. If you make changes without clicking Commit and attempt to move to a different SCU window, a warning message displays and provides the option of saving your changes before you leave the Profile window.

Radio Settings
  • SSID - Service set identifier for the WLAN to which the radio connects.
    • Value - A string of up to 32 characters
    • Default - None (WARNING! Thissetting allowsassociation to thestrongest unsecured detected network.)
  • Client Name - The name assigned to the Summit radio and the client device that uses it.
    • Value - A string of up to 16 characters
    • Default - None
  • Power Save - Indicates the radio's power save mode.
    • Value:
      • CAM - Constantly Awake Mode
      • Maximum - Maximum power savings
      • Fast - Fast power save mode
    • Default - Fast
  • Tx Power - Indicates transmit power. Transmit power can be overridden by a Cisco AP if the CCX Support global setting is set to Full and the AP defines maximum transmit power for the client as a lower value.
    • Value:
      • Maximum - Maximum defined for current regulatory domain
      • One of the following values in milliwatts (mW): 50, 30, 20, 10, 5, 1
    • Default - Maximum
Note: The device manufacturer should use the Summit Manufacturing Utility (SMU) to ensure that the transmit power value reported by SCU is EIRP, or the total effective transmit power of the radio (including gains that the antenna provides and losses from the antenna cable).
  • Bit Rate - Indicates the bit rate used by a radio when interacting with a WLAN AP.
    • Value - Auto (rate negotiated automatically with AP) or one of the following rates in megabits per second (Mbps): 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54.
    • Default - Auto
Note: If you select a specific bit rate, then the radio connects to an AP only if that AP has the specified SSID configured with the selected bit rate as the only required rate.
Note: This feature is not supported when using the SDC-MSD30AG and SDC-SSD30AG wireless LAN modules. When using the SDC-MSD30AG or SDC-SSD30AG modules, the Bit Rate option is unavailable. It defaults to Auto.
  • Radio Mode - Use of 802.11a, 802.11g, 802.11b, and 802.11n frequencies and data rates when interacting with AP, or use of ad hoc mode to associate to a client radio instead of an AP.

When SCU operates with a Summit 802.11g radio, an administrator can select from among the following Radio Mode values:
    • Value:
      • B rates only - 1, 2, 5.5, and 11 Mbps
      • G rates only - 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
      • BG rates full - All B and G rates.
      • BG rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps. This should only be used with Cisco APs running IOS in autonomous mode (without controllers). For Cisco APs that are tied to controllers and for non-Cisco APs, Summit recommends BG rates full.
Note: BG rates optimized is not supported when using the SDC-MSD30AG and SDC-SSD30AG wireless LAN modules. When using the SDC-MSD30AG or SDC-SSD30AG modules, BG rates full is used.
      • Ad Hoc - See "Ad Hoc" for more information. Rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps.
    • Default - BG rates full
    When SCU operates with a Summit 802.11a/g radio, an administrator can select from among the following Radio Mode values:
    • Value:
      • B rates only (see above)Rdf
      • G rates only (see above)
      • BG rates full - All B and G rates.
      • A rates only - 6, 9, 12, 18, 24, 36, 48, and 54 Mbps (same as G rates)
      • ABG rates full - All A rates and all B and G rates, with A rates (the .11a radio) preferred. See "Preferred Band for 802.11a/g Radio" for more information.
      • BGA rates full - All B and G rates and all A rates, with B and G rates (the .11g radio) preferred. See "Preferred Band for 802.11a/g Radio" for more information.
      • Ad Hoc - See "Ad Hoc" for more information. Rates optimized - 1, 2, 5.5, 6, 11, 24, 36, and 54 Mbps.
    • Default - ABG rates full
  • Auth Type - 802.11 authentication type, used when associating to AP
    • Value - Open, shared-key, or LEAP (Network-EAP)
    • Default - Open
Note: See http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml for a Cisco explanation of 802.11 authentication using Open and Network-EAP. The Summit Client Utility refers to Network-EAP as LEAP.

Preferred Band for 802.11a/g Radio

The radio has a Preferred Band for the following radio modes:
  • ABG rates full - 5 GHz (preferred band)
  • BGA rates full 2.4 GHz (preferred band)
When attempting to associate, the radio first considers APs in the applicable preferred band. The radio will attempt to associate to a non-preferred band AP only if the radio is not currently associated and there is no AP available in the preferred band.
Note: When roaming, the radio only considers APs in the band to which the radio is currently associated.
When an administrator attempts to create or edit a profile, SCU determines which radio is operating in the device and populates the available radio mode values according to the radio type.
Example: Suppose an 802.11a/g card profile is loaded onto a device with an 802.11g card with a set radio mode of A rates only, ABG rates full, or BGA rates full. SCU will display a radio mode value of BG rates full. If the administrator does not save any changes to the profile, then the profile does not change. If the administrator saves any changes to the profile, SCU saves the radio mode values as BG rates full.

Ad Hoc

If the administrator selects Ad Hoc for radio mode, then the Summit radio uses ad hoc mode instead of infrastructure mode. In infrastructure mode, the radio associates to an AP. In ad hoc mode, the radio associates to another client radio that is in ad hoc mode and has the same SSID and, if configured, static WEP key.

Security Settings
  • EAP type - Extensible Authentication Protocol type used for 802.1X authentication to AP.
    • Value - None, LEAP, EAP-FAST, PEAP-MSCHAP, PEAP-GTC, PEAP-TLS, EAP-TLS, EAP-TTLS
    • Default - None
    • Value:
      • None - No encryption.
      • WEP - WEP with up to four static keys (40-bit or 128-bit in ASCII or hex) defined under WEP/PSK Keys.
      • WEP EAP - WEP with key generated during EAP authentication.
      • CKIP - WEP with up to four static keys (40-bit or 128-bit in ASCII or hex) defined under WEP/PSK Keys, plus Cisco TKIP and/or Cisco MIC, if configured on AP.
      • CKIP EAP - WEP with key generated during EAP authentication, plus Cisco TKIP and/or Cisco MIC, if configured on AP.
      • WPA-PSK (WPA Personal) - TKIP with PSK (ASCII passphrase or hex PSK) defined under WEP/PSK Keys.
      • WPA-TKIP (WPA Enterprise) - TKIP with key generated during EAP authentication.
      • WPA CCKM (WPA Enterprise) - TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication.
      • WPA2-PSK (WPA2 Personal) - AES with PSK (ASCII passphrase or hex PSK) defined under WEP/PSK Keys.
      • WPA2-AES (WPA2 Enterprise) - AES with key generated during EAP authentication.
      • WPA2-CCKM (WPA2 Enterprise) - TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication.
       
       Note: For ABGN radios, CKIP and CKIP EAP are unavailable.

    • Default: None

Using Scan To Create a Profile

When you click Scan on the Profile window, SCU opens a window that lists APs that are broadcasting their SSIDs.
Each row in the list shows an AP's SSID, its received signal strength indication (RSSI), and whether or not data encryption is in use (true or false). You can sort the list by clicking on the column headers. If the scan finds more than one AP with the same SSID, the list displays the AP with the strongest RSSI and the least security. Every five seconds, the Scan window updates the RSSI value for each of the APs in the list. To scan for new APs and view an updated list, click Refresh.

If you are authorized as an administrator in SCU, you can create a profile for any SSID in the list. To do so, double-click the row for the SSID or click the row and click Configure. SCU displays a dialog box that asks you if you want to create a profile for that SSID.

If you click Yes on the dialog box, then SCU creates a profile for that SSID, with the profile name being the same as the SSID (or the SSID with a suffix such as "_1" if a profile with the SSID as its name exists already). If the AP is using WEP, then SCU opens a dialog box in which you can specify WEP keys. If the AP is using EAP, then SCU opens a dialog box in which you can specify login credentials for the EAP type (which SCU assumes is LEAP). After you enter information on a dialog box, SCU returns you to the Profile window where you can view and edit profile settings. If you edit the profile, then you must click Commit to save the changes.

EAP Credentials
  • LEAP:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
  • EAP-FAST:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
    • PAC Filename - Protected Access Credentials filename (up to 32 characters)
    • PAC Password (up to 32 characters)
  • PEAP-MSCHAP, PEAP-GTC, PEAP-TLS, and EAP-TTLS:
    • User - Username or Domain\Username (up to 64 characters)
    • Password (up to 32 characters)
    • CA Cert - Filename of root certificate authority (CA) digital certificate (up to 32 characters). Leave blank if the Use MS store checkbox is selected.
    • Validate server checkbox - Select this checkbox if you are using a CA certificate to validate an authentication server. When this box is selected, you must enter a certificate filename in the CA Cert field or select the Use MS store checkbox.
    • Use MS store checkbox - Select this checkbox if the Microsoft certificate store should be use for a CA certificate. This is applicable only when Validate server is selected.
  • EAP-TLS:
    • User - Username or Domain\Username (up to 64 characters)
    • User Cert - Click the ... button to select a user (or client) certificate from the Microsoft certificate store. You may not enter a filename because the user certificate must reside in the Microsoft certificate store. When you browse for a certificate, the pop-up box displays two fields: Issued By and Issued To. Click on a certificate to highlight it and click Select.
    • CA Cert - Filename of root CA digital certificate (up to 32 characters). Unavailable if the Use MS store checkbox is selected.
    • Validate server checkbox - Select this checkbox if you are using a CA certificate to validate an authentication server. When this box is selected, you must enter a certificate filename in the CA Cert field or select the Use MS store checkbox.
    • Use MS store checkbox - Select this checkbox if the Microsoft certificate store should be use for a CA certificate. This is applicable only when Validate server is selected.
Note: There are no default values for credentials. If the credentials are not specified in the profile then, when the radio tries to associate using that profile, Summit software displays a dialog box that prompts the user to enter the credentials. Summit software populates the dialog box with the username and password supplied for the previous EAP authentication.
When entering credentials for EAP authentication:
  • If the credentials specified in the profile do not match those in the authentication database, the following occurs when that profile is used:
    • For EAP-FAST and EAP-TLS: Authentication fails.
    • For LEAP, PEAP-MSCHAP, PEAP-GTC, and EAP-TTLS: Summit software tries the credentials three times and then prompts the user to enter valid credentials. Once EAP authentication is passed, Summit software stores the valid credentials in the profile.
  • When prompted with a dialog box, the user can do one of the following:
    • Enter valid credentials and click OK - The radio associates and authenticates.
    • Enter invalid credentials and click OK - The radio associates but does not authenticate. The user is prompted to re-enter credentials.
    • Click Cancel or clear the credentials fields and click OK - The radio does not attempt to associate with that profile until the user performs one of the following actions (while the profile is active):
      • Causes the device to go through a power cycle or suspend/resume.
      • Disables and enables the radio or clicks Reconnect on the Diags window.
      • Modifies the profile and clicks Commit.
The user can also select a different profile as the active profile and then switch back to the profile for which the EAP authentication was canceled.
  • If the password stored in the profile or provided in the dialog box has expired in the authentication database, then the authentication server may send an "Expired Password" (RFC 2759) message to the client. If the EAP type is PEAP-MSCHAP, PEAP-GTC, or EAP-TTLS, then Summit software handles that message by displaying a dialog box that prompts the user to enter the expired password and a new password. Summit software then uses the entered information to respond to the RFC 2759 message. If EAP authentication succeeds and the expired password was saved in the profile, then Summit software updates the profile with the new password.
  • Any password provided for EAP authentication, whether in a profile or in an authentication dialog box, should not contain parentheses. Neither SCU nor the dialog box flags a parenthesis as an invalid character, but the integrated supplicant treats parentheses as delimiters and interprets the characters between a left parenthesis and a right parenthesis as the "true" password.

Encryption - Cisco TKIP

If the active profile has an Encryption setting of CKIP Manual or CKIP Auto, then the Summit radio successfully associates or roams to an AP that is configured with:
  • The SSID and other RF settings of the active profile
  • The authentication method of the active profile
  • For Manual WEP, the static WEP keys of the active profile
  • Any of the following encryption settings:
    • WEP only (no CKIP or CMIC)
    • WEP with CKIP
    • WEP with CMIC
    • WEP with CKIP and CMIC


Summit radios support two special AP settings:
  • WPA Migration Mode - WPA Migration Mode enables both WPA and non-WPA clients to associate to an AP using the same SSID, provided that the AP is configured for Migration Mode (WPA optional with TKIP+WEP128 or TKIP+WEP40 cipher). In other words, WPA Migration Mode means WPA key management with TKIP for the pairwise cipher and TKIP, 128-bit WEP, or 40-bit WEP for the group cipher. When WPA Migration Mode in use, you can select WPA TKIP or WEP EAP for your Summit radio encryption type.
  • WPA2 Mixed Mode - WPA2 Mixed Mode operation enables both WPA and WPA2 clients to associate to an AP using the same SSID. WPA2 Mixed Mode is defined by the Wi-Fi Alliance and support for the feature is a part of Wi-Fi certification testing. When WPA2 Mixed Mode is configured, the AP advertises the encryption ciphers (TKIP, CCMP, other) that are available for use and the client selects the encryption cipher it wants to use. In other words, WPA Mixed Mode means WPA key management with AES for the pairwise cipher and AES or TKIP for the group cipher. When WPA2 Mixed Mode in use, you can select WPA2 AES or WPA TKIP for your Summit radio encryption type.

ThirdPartyConfig

If the profile named ThirdPartyConfig is selected as the active profile, then SCU works in tandem with WZC or another third-party application for configuration of all radio and security settings for the radio. The third-party application must be used to define the SSID, Auth Type, EAP Type, and Encryption settings. SCU can be used to define the Client Name, Power Save, Tx Power, Bit Rate, and Radio Mode settings. Those SCU profile settings, all SCU global settings, and the third-party application settings are applied to the radio when ThirdPartyConfig is selected as the active profile and a power cycle is performed.
On some devices that run Pocket PC or Windows Mobile, the radio will not associate if WPA with pre-shared keys, or WPA-PSK, is used with WZC. If that is the case for your device, then to use WPA-PSK you must use an SCU profile other than ThirdPartyConfig.

EAP-FAST

The 802.1X authentication types PEAP and EAP-FAST use a client-server security architecture that encrypts EAP transactions within a TLS tunnel. PEAP relies on the provisioning and distribution of a digital certificate for the authentication server. With EAP-FAST, tunnel establishment is based upon strong shared-secret keys that are unique to users. These secrets are called protected access credentials (PACs) and can be created automatically or manually. With automatic or in-band provisioning, the PAC is created and distributed to the client device in one operation. With manual or out-of-band provisioning, the PAC is created in one step and then must be distributed to the client device separately.
SCU supports PACs created automatically or manually. When you create a PAC manually, you must load it to the certs directory on the device that runs SCU. Be sure that the PAC file does not have read-only permissions set or SCU will not be able to use the PAC.


Main | Profile | Status | Diags | Global | About


Status

The Status window displays the following radio status information:
  • Name of active profile
  • Status - Potential association status values include: Down (not recognized), Disabled, Not Associated, Associated, or <EAP type> Authenticated
  • Information on the client device with the Summit radio:
    • Client name, if defined in active profile
    • IP address
    • MAC address
  • Information on access point to which the Summit radio is associated:
    • Name
    • IP address
    • MAC address
    • Beacon period - The amount of time between access point beacons in Kilomicroseconds, where one Ksec equals 1,024 microseconds
    • DTIM interval - A multiple of the beacon period that specifies how often the beacon contains a delivery traffic indication message (DTIM), which tells power-save client devices that a packet is waiting for them (e.g. a DTIM interval of 3 means that every third beacon contains a DTIM)
  • Information on the WLAN connection between the Summit radio and AP:
    • Connection Channel
    • Data (bit) rate
    • Transmit power
    • Signal strength (RSSI), displayed graphically and in dBm:
      • A green color indicates that the RSSI for the current AP is stronger than -70 dBm, which means that the Summit radio should operate consistently at 54 Mbps
      • A yellow color indicates that the RSSI for the current AP is stronger than -90 dBm but not stronger than -70 dBm, which means that a Summit radio will operate at 802.11g or 802.11a data rates that are less than 54 Mbps
      • A red color indicates that the RSSI for the current AP (to which the radio is associated) is -90 dBm or weaker, which means that a Summit 802.11b/g radio will operate at 802.11b data rates only
    • Signal strength (%) - A measure of the clarity of the signal, displayed graphically and in dBm.
Note: This value will be lower with a ThirdPartyConfig profile (under Windows Zero Config) than with a standard profile.
Radio association state is shown on both the Status window and the Main window. The following status items display on the Main window but not on the Status window:
  • SCU software version
  • Driver software version
  • Regulatory domain for radio: FCC, ETSI, TELEC, KCC, or Worldwide
When a ping initiated on the Diags window is active, the Status window displays a ping indicator consisting of two "lights" that alternative in "flashing" green (for a successful ping) or red (for an unsuccessful ping).


Main | Profile | Status | Diags | Global | About


Diags

The following functions are available from the Diags window:
  • (Re)connect - Disable and enable the radio, apply or reapply the current profile, and attempt to associate and authenticate to the wireless LAN, logging all activity in the output area at the bottom.
  • Release/Renew - Obtain a new IP address through DHCP release/renew and log all activity in the output area at the bottom.
  • Start Ping - Start a continuous ping to the address in the edit box next to the button. Once the button is clicked, its name and function change to Stop Ping. Pings continue until you click Stop Ping, move to an SCU window other than Diags or Status, exit SCU, or remove the radio.
  • Diagnostics - Attempt to (re)connect to an AP and provide a more thorough dump of data than is obtained with (Re)connect. The dump includes radio state, profile settings, globF ?{Z{Zal settings, and a BSSID list of APs in the area.
  • Save To... - Save the diagnostics output to a file.


Main | Profile | Status | Diags | Global | About


Global

Global settings include radio and security settings that apply to all profiles and settings that apply to SCU itself. An administrator can define and change most global settings on the Global window in SCU.

Note: If SCU displays Custom for a global setting, then the operating system registry has been edited to include a value that is not selectable on the Global window.
         If you select Custom from the drop-down menu (and commit the changes), SCU reverts to the previous value. Selecting Custom has no effect to the Global settings.

The following radio global settings, which apply to all configuration profiles, can be changed in SCU:
  • Roam Trigger - When moving average RSSI from the current AP is weaker than Roam Trigger, the radio performs a roam scan where it probes for an AP with a signal that is at least Roam Delta dBm stronger.
    • Value: -50, -55, -60, -65, -70, -75, -80, -85, -90, or Custom (see note on Custom below the list)
    • Default: -70
  • Roam Delta - When Roam Trigger is met, a second AP's signal strength (RSSI) must be Roam Delta dBm stronger than moving average RSSI for current AP before radio will attempt to roam to the second AP.
    • Value: 5, 10, 15, 20, 25, 30, 35, or Custom (see note on Custom below the list)
    • Default: 15
  • Roam Period - After association or roam scan (with no roam), radio will collect RSSI scan data for Roam Period seconds before considering roaming.
    • Value: 5, 10, 15, 20, 25, 30, 35, 40, 45, 50, 55, 60, or Custom (see note on Custom below the list)
    • Default: 10
  • BG Channel Set - Defines the 2.4 GHz channels to be scanned when the radio is contemplating a roam and needs to determine what APs are available.
    • Value: Full (all channels); 1,6,11 (the most commonly used 2.4 GHz channels); 1,7,13 (for ETSI and TELEC radios only); or Custom (see note on Custom below the list)
    • Default: Full
  • DFS Channels - Support for 5 GHz (802.11a) channels where support for dynamic frequency selection (DFS) is required. Supported in v2.0 and later.
    • Value: On, Off, Optimized
       Note: When set to Optimized and scanning for the first time, the radio scans all active channels and all available DFS channels. From this scan, the radio creates and maintains a list of up to three DFS channels where beacons were detected. During subsequent scans, the radio still scans all active channels but only scans the DFS channels listed from the first scan (where beacons were detected).
       When the radio loses or resets the connection, the radio returns to scanning all available DFS channels as it did when scanning for the first time after being set to Optimized. From this scan, the radio again creates a list of DFS channels where beacons were detected.
       Note: The Optimized setting is not supported in the MSD30AG and SSD30AG radios. If DFS Channels is set to Optimized directly in the registry, the setting will function as On (versus Optimized).
    • Default: Off
  • DFS Scan Time - Because passive scanning consumes a longer period of time, this feature enables you to determine the dwell (listen) time when passively scanning on a DFS channel.
    • Value: A number between 20-500 milliseconds (ms)
    • Default: 120 ms
Note:  When decreasing the scan time (to a value lower than the default) for DFS channels, corresponding changes in the infrastructure's beacon period are recommended. For optimal performance and reliability, Summit recommends a dwell time that is 1.5 times that of the beacon period. For example, if the DFS scan time is set to 30 ms, the beacon period should be adjusted to 20 ms.
Note:  If you adjust this parameter directly in the registry, and configure it to a number outside of the 20-500 ms range, the setting value will return to the default (120 ms).
  • Ad Hoc Channel - The channel to be used for an ad hoc connection if the active profile has an Ad Hoc radio mode value.
    • Value: One of the 2.4 GHz channels (1-14) or UNII-1 channels (36, 40, 44, 48). If you select a channel that is not supported by your radio, then SCU uses the default value for this setting.
    • Default: 1
  • Aggressive Scan - When this setting is On and the current connection to an AP becomes tenuous, the radio scans for available APs more aggressively. Aggressive scanning complements and works in conjunction with the standard scanning that is configured through the Roam Trigger, Roam Delta, and Roam Period settings. Summit recommends that the Aggressive Scan global setting be On unless there is significant co-channel interference because of overlapping coverage from APs that are on the same channel.
    • Value: On or Off
    • Default: On
  • CCX Features - Use of Cisco information element (IE) and CCX version number; support for CCX features.
    • Value:
      • Full: Use Cisco IE and CCX version number; support all CCX features
      • Optimized: Use Cisco IE and CCX version number; support all CCX features except AP-assisted roaming, AP-specified maximum transmit power, and radio management
      • Off: Do not use Cisco IE and CCX version number
    • Default: Optimized
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled. The default is Optimized.
  • WMM - Use of Wi-Fi Multimedia Extensions, also known as WMM.
    • Value: On or Off
    • Default: Off
Note: For ABGN radios, the ability to change this parameter is disabled. It is always set to Enabled.
  • Auth Server - Type of authentication server being used for EAP authentication
    • Value:
      • Type 1 - Cisco Secure ACS or another server that uses PEAPv1 for PEAP with EAP-MSCHAPV2 (PEAP-MSCHAP)
      • Type 2 - A different authentication server, such as Juniper Networks Steel Belted RADIUS, that uses PEAPv0 for PEAP-MSCHAP
    • Default: Type 1
  • TTLS Inner Method - Authentication method used within secure tunnel created by EAP-TTLS:
    • Value:
      • Auto-EAP - Any available EAP method
      • MSCHAPV2
      • MSCHAP
      • PAP
      • CHAP
      • EAP-MSCHAPV2
    • Default: Auto-EAP
  • PMK Caching - When WPA2 is in use, type of Pairwise Master Key (PMK) caching to use -- See the section on PMK Caching.
    • Value: Standard or OPMK
    • Default: Standard
             Note: When switching from Standard to OPMK, you must initiate a suspend resume of the device. Only tapping Commit does not cause the change to take effect.
  • TX Diversity - How to handle antenna diversity when transmitting data to AP.
    • Value:
      • Main only: Use main antenna only
      • Aux only: Use auxiliary antenna only
       Note: Summit does not support the AUX antenna as a single-antenna solution.
      • On: Use diversity
    • Default: On
Note: To enable diversity (for MSD30AG and SSD30AG radio modules), set Tx Diversity to On. To disable diversity, set Tx Diversity to Main Only.You must power-cycle for these changes to take effect.
  • RX Diversity - How to handle antenna diversity when receiving data from AP.
    • Value:
      • On-Start on Main: On startup use main antenna
      • On-Start on Aux: On startup, use auxiliary antenna
      • Main only: Use main antenna only
      • Aux only: Use auxiliary antenna only
       Note: Summit does not support the AUX antenna as a single-antenna solution.
    • Default: On-Start on Main
Note: To enable diversity (for MSD30AG and SSD30AG radio modules), set RX Diversity to On. To disable diversity, set Rx Diversity to Main Only.You must power-cycle for these changes to take effect.
  • Frag Thresh - If packet size (in bytes) exceeds threshold, then packet is fragmented.
    • Value: An integer from 256 to 2346
    • Default: 2346
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled.
  • RTS Thresh - Packet size above which RTS/CTS is required on link.
    • Value: An integer from 0 to 2347
    • Default: 2347
Note: For 30AG (MSD30AG and SSD30AG) radio modules, this parameter is disabled.
  • LED - Use of LED; available only with MCF10G.
    • Value: On, Off
    • Default: Off

The following SCU global settings, which apply to SCU itself, can be changed in SCU:
  • Tray Icon - Enabling of System Tray icon, which is described in detail in Section 4 of the SDC User Guide. Note: This option is not available for the XP version.
    • Value - On, Off
    • Default - On
  • Hide Passwords - If this is On, then SCU as well as EAP authentication dialog boxes mask passwords and other sensitive information, such as WEP keys.
    • Value - On, Off
    • Default - Off
  • Admin Password - Password that must be specified when Admin Login button pressed.
    • Value - A string of up to 64 characters
    • Default - SUMMIT
  • Certs Path - Directory where certificate(s) for EAP authentication are stored.
    • Value - A valid directory path of up to 64 characters
    • Default - Depends on device
  • Auth Timeout - Specifies the number of seconds that Summit software waits for an EAP authentication request to succeed or fail. If authentication credentials are specified in the active profile and the authentication times out, then association fails. If authentication credentials are not specified in the active profile and the authentication times out, then the user is prompted to re-enter authentication credentials.
    • Value - An integer from 3 to 60
    • Default - 8
  • Ping Payload - Amount of data in bytes to be transmitted on a ping
    • Value - 32, 64, 128, 256, 512, 1024
    • Default - 32
  • Ping Timeout ms - Amount of time in milliseconds that transpires without a response before ping request is consider a failure
    • Value - An integer from 1 to 30000
    • Default - 5000
  • Ping Delay ms - Amount of time in milliseconds between successive ping requests
    • Value - An integer from 0 to 7200000
    • Default - 1000