Linksys WPC300N manual Wireless Security WEP

Page 32

Wireless-N Notebook Adapter

5.If your wireless network doesn’t have wireless security, select Disabled and then click the Next button to continue. Proceed to Step 6.

If your wireless network has wireless security, select the method of security used: WEP, PSK, PSK2, PSK+RADIUS, PSK2+RADIUS, or RADIUS. WEP stands for Wired Equivalent Privacy.

PSK is a stronger security method than WEP.

PSK2 is a stronger security method than PSK. RADIUS stands for Remote Authentication

Dial-In User Service. Click the Next button to continue or the Back button to return to the previous screen.

Proceed to the appropriate section for your security method: WEP, PSK, PSK2, PSK+RADIUS, PSK2+RADIUS, or RADIUS.

WEP

WEP - Select 64-bit or 128-bit encryption

Figure 5-19: Wireless Security - WEP

Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. It is case- sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)

WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Advanced Users

TX Key - The default transmit key number is 1. If your network’s access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the TX Key drop-down box.

Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication. If you are not sure which authentication method to select, keep the default, Auto.

Click the Next button to continue, or click the Back button to return to the previous screen.

Chapter 5: Using the Wireless Network Monitor

wep (wired equivalent privacy): a method of encrypting network data transmitted on a wireless network for greater security.

26

Create a New Profile

Image 32
Contents GHz Copyright and Trademarks Word definitionTable of Contents Wireless-N Notebook Adapter List of Figures Front Panel10 Creating a Profile Introduction WelcomeWhat’s in this User Guide? Adapter a device that adds network functionality to your PCIntroduction What’s in this User Guide? Planning your Wireless Network Network TopologyRoaming Topology the physical layout of a networkNetwork Layout Getting to Know the Wireless-N Notebook Adapter LED IndicatorsSetting up and Connecting the Wireless-N Notebook Adapter Starting the SetupConnecting the Adapter Setting up the AdapterPSK PSK2 Personal Needed for Connection Advanced Setup WEP PSK PSK+RADIUS PSK2+RADIUS Radius 22 Confirm New Settings Using the Wireless Network Monitor Accessing the Wireless Network MonitorWireless Network Status screen Link InformationWireless Network Status Wireless Network Statistics Connect Site InformationProfiles Profile InformationCreate a New Profile 10 Creating a Profile12 PSK Needed for Connection 15 Available Wireless Networks 17 Wireless Mode 19 Wireless Security WEP 20 Wireless Security PSK 22 Wireless Security PSK+RADIUS EAP Peap 26 Wireless Security Radius EAP-TLS 28 Confirm New Settings Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions Wireless-N Notebook Adapter does not work properlyWhat is the Ieee 802.11g standard? What 802.11b features are supported?What Ieee 802.11g features are supported? What is ad-hoc mode?What is ISM band? What is Spread Spectrum?What is DSSS? What is FHSS? And what are their differences? What is WEP?What is WPA? What is RADIUS?Appendix B Windows XP Wireless Zero Configuration Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Security Threats Facing Wireless Networks Appendix C Wireless SecuritySecurity Precautions Appendix C Wireless Security Wireless-N Notebook Adapter Appendix D Windows Help TCP/IPAppendix E Glossary Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Appendix F Specifications Storage Humidity Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementWireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-N Notebook Adapter Wireless-G Notebook Adapter with RangeBooster Wireless-N Notebook Adapter Appendix I Contact Information
Related manuals
Manual 65 pages 34.29 Kb