Linksys WUSB300N manual Wireless Security WEP

Page 33

Wireless-N USB Network Adapter

5.If your wireless network doesn’t have wireless security, select Disabled and then click the Next button to continue. Proceed to Step 6.

If your wireless network has wireless security, select the method of security used: WEP, PSK, PSK2, PSK+RADIUS, PSK2+RADIUS, or RADIUS. WEP stands for Wired Equivalent Privacy, and PSK stands for Pre- shared key. PSK2 stands for Pre-shared key 2. PSK is a stronger security method than WEP. PSK2 is a stronger security method than PSK. RADIUS stands for Remote Authentication Dial-In User Service. Click the Next button to continue or the Back button to return to the previous screen.

Proceed to the appropriate section for the security method used on your network: WEP, PSK, PSK2, PSK+RADIUS, PSK2+RADIUS, or RADIUS.

WEP

WEP - Select 64-bit or 128-bit encryption

Figure 5-19: Wireless Security - WEP

Passphrase - Enter a passphrase in the Passphrase field, so a WEP key is automatically generated. It is case- sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your wireless network and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)

WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Advanced Users

TX Key - The default transmit key number is 1. If your network’s access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the TX Key drop-down box.

Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication. If you are not sure which authentication method to select, keep the default, Auto.

Click the Next button to continue, or click the Back button to return to the previous screen.

Chapter 5: Using the Wireless Network Monitor

wep (wired equivalent privacy): a method of encrypting network data transmitted on a wireless network for greater security.

27

Create a New Profile

Image 33
Contents GHz Word definition Copyright and TrademarksTable of Contents Wireless-N USB Network Adapter Front Panel List of Figures10 Creating a Profile Welcome IntroductionWhat’s in this User Guide? Adapter a device that adds network functionality to your PCIntroduction What’s in this User Guide? Network Topology Planning your Wireless NetworkRoaming Topology the physical layout of a networkNetwork Layout LED Indicators Getting to Know the Wireless-N USB Network AdapterUSB Extension Base USB Extension BaseStarting the Setup Setting up and Connecting the Wireless-N USB Network AdapterSetting up the Adapter Connecting the AdapterWEP Key Needed for Connection PSK2 Needed for Connection Advanced Setup WEP PSK PSK+RADIUS PSK2+RADIUS Radius 22 Confirm New Settings Accessing the Wireless Network Monitor Using the Wireless Network MonitorWireless Network Status screen Link InformationWireless Network Status Wireless Network Statistics Site Information ConnectProfile Information Profiles10 Creating a Profile Create a New Profile12 PSK Needed for Connection 15 Available Wireless Networks 17 Wireless Mode 19 Wireless Security WEP 20 Wireless Security PSK 23 Wireless Security PSK+RADIUS Peap Peap 26 Wireless Security Radius EAP-TLS 28 Confirm New Settings Common Problems and Solutions Appendix a TroubleshootingFrequently Asked Questions What is the 802.11b standard?What 802.11b features are supported? What is the Ieee 802.11g standard?What Ieee 802.11g features are supported? What is ad-hoc mode?What is Spread Spectrum? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is WEP?What is WPA? What is WPA2?What is RADIUS? Windows XP Wireless Zero Configuration Appendix B Windows XP Wireless Zero ConfigurationFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Wireless-N USB Network Adapter TCP/IP Appendix D Windows HelpAppendix E Glossary Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter USB Appendix F SpecificationsStorage Temp Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationImportant Note Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N USB Network Adapter Wireless-N Notebook Adapter Appendix I Contact Information