Linksys WPC300N manual Wireless Security WEP

Page 30

Wireless-N Notebook Adapter

5.If your wireless network doesn’t have wireless security, select Disabled and then click the Next button to continue. Proceed to Step 6.

If your wireless network has wireless security, select the method of security used: WEP, WPA Personal, WPA2 Personal, or RADIUS. WEP stands for Wired Equivalent Privacy, and WPA stands for Wi-Fi Protected Access. WPA2 stands for Wi-Fi Protected Access 2. WPA is a stronger security method than WEP. WPA2 is a stronger security method than WPA. RADIUS stands for Remote Authentication Dial-In User Service. Click the Next button to continue or the Back button to return to the previous screen.

Proceed to the appropriate section for your security method: WEP, WPA Personal, WPA2 Personal, or RADIUS.

WEP

WEP - Select 64-bit or 128-bit encryption

Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. It is case- sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)

WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Advanced Users

TX Key - The default transmit key number is 1. If your network’s access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the TX Key drop-down box.

Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication. If you are not sure which authentication method to select, keep the default, Auto.

Click the Next button to continue, or click the Back button to return to the previous screen.

Chapter 5: Using the Wireless Network Monitor

Figure 5-19: Wireless Security - WEP

wep (wired equivalent privacy): a method of encrypting network data transmitted on a wireless network for greater security.

24

Create a New Profile

Image 30
Contents GHz How to Use this User Guide Copyright and TrademarksWord definition Table of Contents Wireless-N Notebook Adapter Setup Wizard’s Welcome Screen Front Panel11 WEP Key Needed for Connection What’s in this User Guide? IntroductionWelcome Adapter a device that adds network functionality to your PCIntroduction What’s in this User Guide? Roaming Planning your Wireless NetworkNetwork Topology Topology the physical layout of a networkNetwork Layout Getting to Know the Wireless-N Notebook Adapter LED IndicatorsSetting up and Connecting the Wireless-N Notebook Adapter Starting the SetupConnecting the Adapter Setting up the AdapterWPA Personal Needed for Connection WPA2 Personal Needed for Connection Advanced Setup Available Wireless NetworkWEP WPA Personal WPA2 PersonalRadius 18 Confirm New Settings Wireless Network Status screen Using the Wireless Network MonitorAccessing the Wireless Network Monitor Link InformationWireless Network Status Wireless Network Statistics More Information Network StatisticsConnect Site InformationProfiles Profile InformationCreate a New Profile 10 Creating a Profile12 WPA Personal Needed for Connection 15 Available Wireless Networks 17 Wireless Mode 19 Wireless Security WEP 20 Wireless Security WPA Personal 22 Wireless Security Radius EAP-TLS 24 Confirm New Settings Frequently Asked Questions Appendix a TroubleshootingCommon Problems and Solutions Wireless-N Notebook Adapter does not work properlyWhat Ieee 802.11g features are supported? What is the Ieee 802.11g standard?What 802.11b features are supported? What is ad-hoc mode?What is DSSS? What is FHSS? And what are their differences? What is ISM band?What is Spread Spectrum? What is WEP?What is WPA? What is RADIUS?Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-N Notebook Adapter Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix F Specifications Channels most of Europe and AsiaOperating Humidity Storage HumidityAppendix G Warranty Information Appendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Wireless-N Notebook Adapter Applicable Power Levels in France Open the Wireless Network Connection window Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix I Contact Information Europe Mail AddressOutside of Europe Mail Address
Related manuals
Manual 64 pages 26.06 Kb