Linksys WMP54GR manual Wpa wi-fi protected access a wireless security protocol

Page 30

Wireless-G PCI Adapter with RangeBooster

3.The Wireless Mode screen shows a choice of two wireless modes. Click the Infrastructure Mode radio button if you want to connect to a wireless router or access point. Click the Ad-Hoc Mode radio button if you want to connect to another wireless device directly without using a wireless router or access point. Enter the SSID for your network.

Infrastructure Mode - Use this mode if you want to connect to a wireless router or access point.

Ad-Hoc Mode - Use this mode if you want to connect to another wireless device directly without using a wireless router or access point.

SSID - This is the wireless network name that must be used for all the devices in your wireless network. It is case- sensitive and should be a unique name to help prevent others from entering your network.

Click the Next button to continue, or click the Back button to return to the previous screen.

4.If you chose Infrastructure Mode, go to Step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear.

Select the correct operating channel for your wireless network. The channel you choose should match the channel set on the other devices in your wireless network. If you are unsure about which channel to use, keep the default setting.

Click the Next button. Click the Back button to change any settings.

5.If your wireless network doesn’t have wireless security, select Disabled and then click the Next button to continue. Proceed to Step 6.

If your wireless network has wireless security, select the method of security used by the other devices on your network: WEP, WPA-Personal, WPA-Enterprise, PSK2, or RADIUS. WEP stands for Wired Equivalent Privacy, and WPA stands for Wi-Fi Protected Access. WPA is a stronger security method than WEP. RADIUS stands for Remote Authentication Dial-In User Service. PSK2 stands for Pre-shared Key 2. Click the Next button to continue or the Back button to return to the previous screen.

Figure 4-15: Wireless Mode

Figure 4-16: Ad-Hoc Mode Settings

wep (wired equivalent privacy): a method of encrypting network data transmitted on a wireless network for greater security.

encryption: encoding data transmitted in a network.

Proceed to the appropriate section for your security method: WEP, WPA-Personal, PSK2, WPA-Enterprise, or

wpa (wi-fi protected access: a wireless security protocol

RADIUS.

using TKIP (Temporal Key Integrity Protocol) encryption,

 

 

which can be used in conjunction with a RADIUS server.

Chapter 4: Using the Wireless Network Monitor

25

Create a New Profile

Image 30
Contents Wireless- G How to Use This User Guide Copyright and TrademarksWord definition Table of Contents Setup Wizard’s Welcome Screen Setup Wizard’s License Agreement10 Import a Profile Introduction WelcomeAdapter a device that adds network functionality to your PC What’s in this Guide? Wireless-G PCI Adapter with RangeBooster Roaming Planning your Wireless NetworkNetwork Topology Topology the physical layout of a networkNetwork Layout Starting the Setup Setup Wizard’s License AgreementConnecting the Adapter Setting up the AdapterWEP Key Needed for Connection Encryption encoding data transmitted in a networkCongratulations Manual Setup 10 Network SettingsWEP WPA Personal PSK2WPA Enterprise EAP-TLSRadius 19 Confirm New Settings Wireless Network Status screen Using the Wireless Network MonitorAccessing the Wireless Network Monitor Link InformationWireless Network Status Wireless Network Statistics More Information-Network StatisticsSite Survey Site InformationWPA-Personal Needed for Connection Profiles Profile InformationCreate a New Profile 12 Create a New ProfileWPA Personal Needed for Connection 13 Available Wireless Network Wpa wi-fi protected access a wireless security protocol Using Tkip Temporal Key Integrity Protocol encryptionWhich can be used in conjunction with a Radius server 17 Wireless Security WEP 19 Wireless Security PSK2 EAP-TLS 22 Wireless Security Radius Using EAP-TLS 25 Congratulations Appendix a Troubleshooting Common Problems and SolutionsWhat is the Ieee 802.11g standard? Frequently Asked QuestionsWhat is the Ieee 802.11b standard? What Ieee 802.11b features are supported?What is roaming? What is ad-hoc mode?What is infrastructure mode? What is ISM band?What is WPA? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is RADIUS?Appendix B Using Windows XP Wireless Configuration Select Use Linksys Wireless Network MonitorFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G PCI Adapter with RangeBooster Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G PCI Adapter with RangeBooster Wireless-G PCI Adapter with RangeBooster Appendix F Specifications Protocols802.11g Ofdm Storage Temp Operating HumidityStorage Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Appendix I Contact Information