Actiontec electronic 11 Mbps user manual Default Key, Mode, Authentication Type

Page 20

Chapter 3 Using the Wireless LAN Monitor Utility

Default Key

When 64 Bit or 128 Bit encryption is selected, the “Default Key” text box activates. Click the arrow next to the text box to reveal a list box with four options: Key #1, Key #2, Key #3, and Key #4. Some networks use a default key when using encryp- tion (rather than using all the keys available) If connecting to a network using a default key, click on the default key number used by the network

Mode

When 64 Bit or 128 Bit encryption is selected, the “Mode” text box activates. Click the arrow next to the text box to reveal a list box with two options: Mandatory and Optional. Select the option by clicking on it.

Mandatory - When Mandatory is selected, all other computers trying to con- nect to the Adapter must use the same encryption scheme used on the wireless network to which the Adapter is currently connected.

Optional - When Optional is selected. other computers can connect to the Adapter without using the encryption scheme used on the wireless network to which the Adapter is currently connected.

Authentication Type

When 64 Bit or 128 Bit encryption is selected, the “Authentication Type” text box activates. Click the arrow next to the text box to reveal a list box with three options: Open System, Shared Key, and Optional. Select the option by clicking on it.

Open System - When Open System is selected, the Adapter and the wireless device to which it is connected send and accept randomly generated keys that last only a short time before new keys are generated and sent. This is the highest level of authentication.

Shared Key - When Shared Key is selected, the Adapter and wireless device to which it is connected send and accept a single key. This key is used indefinitely, and if an outside user discover the key, he can eavesdrop on the network traffic between the Adapter and wireless device.

Optional - When Optional is selected. other computers can connect to the Adapter without using any type of authentication.

17

Image 20
Contents Wireless USB Adapter Table of Contents Page Package Contents Safety PrecautionIntroduction1 Minimum System RequirementsTechnical Support Technical SupportActiontec Electronics, Inc Setting Up USB Adapter Connecting the AdapterPage Setting Up the USB Adapter Page Setting Up the USB Adapter Page Setting Up the USB Adapter Page Using the Wireless LAN Monitor Utility Opening the Monitor Utility WindowStatus Using the Wireless LAN MonitorOperating Mode Signal Strength, Link Quality ChannelTX Rate RadioStatistics Site Survey Key #1 Key #4 EncryptionEncryption Types Mode Default KeyAuthentication Type Advanced Preamble TypeFragmentation Threshold RTS/CTS ThresholdPower Save InfoWindows XP Configuration Utility Opening the Configuration Utility WindowCurrent TX Rate Using the Wireless LAN Configuration UtilityState Disable/Enable Radio Current ChannelThroughput bytes/sec RescanConfiguration ProfileNetwork Type Network NameTransmit Rate Ad Hoc ChannelCreate Keys with Passphrase Encryption WEP securityCreate Keys Manually About Windows XP Reference Locating Computer InformationWindows Me Locating Windows Operating System FilesWindows 98, 98 SE Windows NT Windows XP General Specifications BWireless Operating Range Environmental Glossary ISP Internet Service Provider MAC Media Access Control AddressFirewall GatewayWeca Wireless Ethernet Compatibility Alliance Wlan Wireless Local Area NetworkSubnet Mask TCP/IP Transmission Control Protocol/Internet ProtocolPage Class B Equipment Regulatory Compliance NoticesModifications Page Limited Warranty Actiontec Electronics, Inc North Mary Avenue Sunnyvale, CA Limited Warranty

11 Mbps specifications

Actiontec's 11 Mbps wireless product line represents a key advancement in the realm of home and small office networking, primarily intended to offer improved connectivity through the use of wireless technology. These devices leverage the IEEE 802.11b standard, which is one of the earliest specifications for wireless local area networks (WLANs), enabling data transfer rates of up to 11 Mbps. This standard has paved the way for seamless connectivity, particularly during a time when wired connections were the norm.

One of the principal features of Actiontec's 11 Mbps offerings is their user-friendly installation process. The devices are designed to facilitate quick setup, allowing users—regardless of their tech-savviness—to establish a wireless network in mere minutes. This ease of installation is amplified by the inclusion of intuitive software that guides users through the setup process, making networking accessible to a larger audience.

Another notable characteristic is the device’s range capability. With a typical operational range of up to 300 feet indoors and even farther outdoors, Actiontec's wireless devices reduce the clutter of wires while providing flexibility in device placement. This range is sufficient for most home and small office environments, allowing users to connect various wireless devices such as laptops, smartphones, and printers without being tethered to a central hub.

In terms of security, Actiontec integrates robust encryption protocols, such as WEP (Wired Equivalent Privacy), to protect the network from unauthorized access. Although WEP has been largely surpassed by more advanced security protocols, its implementation represented a significant step forward in securing wireless communications in the early days of consumer wireless technology.

Moreover, Actiontec’s 11 Mbps devices are equipped with several ports to support wired connections for devices that benefit from a stable, high-speed link, such as gaming consoles or desktop computers. This dual connectivity feature allows users to enjoy the best of both worlds, merging the convenience of wireless access with the reliability of wired connections.

In summary, Actiontec's 11 Mbps wireless products offer a blend of simplicity, flexibility, and basic security features that cater primarily to home users and small office setups. While newer technologies have emerged since their introduction, the founding principles of ease of use, range, and connectivity remain relevant as a testament to the evolution of networking technology.