TP-Link TL-WN322G manual Examples for application, Configuration of WEP Encryption

Page 29
Chapter 5 Examples for application

TL-WN322G54M Wireless USB Adapter User Guide

Chapter 5 Examples for application

5.1 Configuration of WEP Encryption

Suppose you have an installed and using AP, the SSID is TEST and it adopts 64 bit WEP encryption with the key “1111111111”.

To establish a connection with this AP, you should follow five steps below

Double click “TEST” in available network taskbar to connect this network.

Step 1Double click ”TEST” to connect this network.

Figure 5-1

Click “No” to continue.

Step 2Click ”No” to continue.

Figure 5-2

- 24 -

Image 29
Contents Page All rights reserved COPYRIGHT & TRADEMARKSFCC RF Radiation Exposure Statement FCC STATEMENTIMPORTANT NOTE FCC Radiation Exposure Statement CE Declaration of Conformity¾ EN 301 489-1 V.1.4.1 2002 / EN 301 489-17 V.1.2.1 ¾ EN 60950-1 ¾ EN 300 328 V.1.4.1Chapter y Drivers and Utility Package ContentsTL-WN322G 54M Wireless USB Adapter User Guide LED Indicator 1.1 FeaturesChapter 1 Introduction 1.2 LED StatusInfrastructure Mode 1.4 Network ConfigurationAd-hoc peer-to-peer Mode Figure 1-2 Infrastructure mode 2.1 Before You Begin Chapter 2 Installation Guide2.2 Installing the Drivers ¾ Wait a few moments until the files are copied to the computer Figure 2-2 Install Shield-Choose Destination LocationFigure 2-3 Install Shield-Setup Status Figure 2-4 Installation Complete 3.1 Through Control Panel Chapter 3 Uninstall Guide1. Click on Start Settings Control Panel Add or Remove Programs 3.2 Through Programs TL-WN322G Wireless UtilityFigure 3-6 Uninstalling TL-WN322G Wireless Utility and the drivers Figure 3-5 Confirm the Uninstalling processFigure 3-7 Uninstalling process finished 4.1 Station Mode Configuration Chapter 4 Software Configuration4.1.1.1 General Connection Setting ¾ Current Network Information¾ You can click “Change” button to change general connection settings Figure 4-2 More settingFigure 4-3 More setting-Click Change Figure 4-4 More setting-WEP 4.1.1.2 WEP Encryption 4.1.1.3 WPA/WPA2 Authentication with TKIP/AES Encryption ¾ Click on the WPA Encryption Setting button Figure 4-8 WPA setting ¾ Protocol Select TLS from the drop-down list 4.1.1.5 Profiles 4.1.1.4 WPA-PSK Authentication4.1.1.6 Advanced Settings 4.2 Wireless network mode configuration Figure 4-15 Access point setting Chapter 5 Examples for application 5.1 Configuration of WEP EncryptionStep Step 3:ClickStep 6 : There is two parts of this setting: 5.2 Configuration of PSP ModePart 1:Configuration of our TL-WN322G 54M Wireless USB Adapter Step One: Select “Access Point” from the drop down listRemark Step Six:Select address settings mode-Easy Step Ten: Select ”Test Connection” Step Nine: ”Proxy Server” select ”Do Not Use”Appendix A Glossary ¾ RADIUS- Remote Authentication Dial In User Service ¾ PEAP- Protected Extended Authentication Protocol¾ PSK- Pre-Shared Key ¾ TKIP- Temporal Key Integrity Protocol ¾ AES- Advanced Encryption Standard ¾ TLS- Transport Layer SecurityMedia Access Appendix B SpecificationsTransmit Power Safety& EmissionsAppendix C Contact Information