H ow to C on figu re a n A d | . . . 4 | |
H ow to S ta rt a C om p u te | . . . 4 | |
E n a b lin g W ire le ss S e cu rity F e a tu re s | . . . 4 | |
I d e n tifyin g th e W ire le ss N e twork N a m e ( S S I D ) a n d W E P S e cu rity S e ttin gs | . . . 4 | |
H ow to C on figu re W E P E n cry p tion S e cu rity | . . . 4 | |
H ow to C on figu re W P A | . . . 4 | |
S ta tistics P a ge | . 4 | |
A d va n ce d S e ttin gs P a ge | . 4 | |
Chapter 5 |
|
|
Troubleshooting |
| |
B a sic T ip s | . . 5 | |
F re qu e n tly A ske d Q u e stion s | . . . 5 | |
G e n e ra l Q u e stion s | . . . 5 | |
Appendix A |
|
|
Technical Specifications | . . . . A 1 | |
Appendix B |
|
|
Wireless Networking Basics |
| |
W ire le ss N e tworkin g O ve rvie w | . . B | |
I n fra stru ctu re M od e | . . B | |
A d H oc M od e ( P e e | . . B | |
N e twork N a m e : E xte n d e d S e rvice S e t I d e n tifica tion ( E S S I D ) | . . B | |
W ire le ss C h a n n e ls | . . B | |
W ire le ss S e cu rity O ve rvie w | . . B | |
W E P O ve rvie w | . . B | |
W E P | A u th e n tica tion | . . B |
W E P | K e y s | . . B |
H ow to U se W E P P a ra m e te rs | B | |
8 02 . 1 x P ort B a se d N e twork A cce ss C on trol | . B | |
W P A W ire le ss S e cu rity | B | |
H ow D oe s W P A C om p a re to W E P ? | B | |
H ow D oe s W P A C om p a re to I E E E 8 02 . 1 1 i? | B | |
W h a t a re th e K e y F e a tu re s of W P A S e cu rity? | B | |
W P A | D a ta E n cryp tion K e y M a n a ge m e n t | B |
I s W P A P e rfe ct? | B | |
P rod u ct S u p p ort for W P A | B | |
vi |
| C on te n ts |