Linksys WMP54GR manual Wireless Security WEP

Page 31

Wireless-G PCI Adapter with RangeBooster

WEP

WEP - Select 64-bit or 128-bit encryption

Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. It is case- sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)

WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Advanced Users

TX Key - The default transmit key number is 1. If your network’s access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the TX Key drop-down box.

Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication. If you are not sure which authentication method to select, keep the default, Auto.

Click the Next button to continue, or click the Back button to return to the previous screen.

WPA Personal

WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. Select TKIP or AES for encryption. Then enter a Passphrase that is 8-63 characters in length.

Encryption - Select the type of algorithm you want to use, TKIP or AES, from the Encryption drop-down menu.

Passphrase - Enter a Passphrase, also called a pre-shared key, of 8-63 characters in the Passphrase field.

Click the Next button to continue or the Back button to return to the previous screen.

Chapter 4: Using the Wireless Network Monitor

Figure 4-17: Wireless Security - WEP

Figure 4-18: Wireless Security - WPA Personal

26

Create a New Profile

Image 31
Contents Wireless- G Copyright and Trademarks How to Use This User GuideWord definition Table of Contents Setup Wizard’s License Agreement Setup Wizard’s Welcome Screen10 Import a Profile Welcome IntroductionAdapter a device that adds network functionality to your PC What’s in this Guide? Wireless-G PCI Adapter with RangeBooster Topology the physical layout of a network Planning your Wireless NetworkNetwork Topology RoamingNetwork Layout Setup Wizard’s License Agreement Starting the SetupSetting up the Adapter Connecting the AdapterEncryption encoding data transmitted in a network WEP Key Needed for ConnectionCongratulations 10 Network Settings Manual SetupWEP PSK2 WPA PersonalEAP-TLS WPA EnterpriseRadius 19 Confirm New Settings Link Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Wireless Network Status screenWireless Network Status More Information-Network Statistics Wireless Network StatisticsSite Information Site SurveyWPA-Personal Needed for Connection Profile Information Profiles12 Create a New Profile Create a New ProfileWPA Personal Needed for Connection 13 Available Wireless Network Using Tkip Temporal Key Integrity Protocol encryption Wpa wi-fi protected access a wireless security protocolWhich can be used in conjunction with a Radius server 17 Wireless Security WEP 19 Wireless Security PSK2 EAP-TLS 22 Wireless Security Radius Using EAP-TLS 25 Congratulations Common Problems and Solutions Appendix a TroubleshootingWhat Ieee 802.11b features are supported? Frequently Asked QuestionsWhat is the Ieee 802.11b standard? What is the Ieee 802.11g standard?What is ISM band? What is ad-hoc mode?What is infrastructure mode? What is roaming?What is RADIUS? What is DSSS? What is FHSS? And what are their differences?What is WEP? What is WPA?Select Use Linksys Wireless Network Monitor Appendix B Using Windows XP Wireless ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Precautions Appendix C Wireless SecuritySecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-G PCI Adapter with RangeBooster Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-G PCI Adapter with RangeBooster Wireless-G PCI Adapter with RangeBooster Protocols Appendix F Specifications802.11g Ofdm Operating Humidity Storage TempStorage Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationWireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Wireless-G PCI Adapter with Range Booster Appendix I Contact Information