Linksys WUSB54GP manual Ad-Hoc Mode Settings Screen

Page 14

Wireless-G Portable USB Adapter

4.If you chose Infrastructure Mode, go to Step 5 now. If you chose Ad-Hoc Mode, select the correct operating channel for your network from the Channel drop-down menu. Then, select the Network Mode from the drop- down menu. Click the Next button, and go to Step 5. Click the Back button to change any settings.

Channel - The channel you choose should match the channel set on the other devices in your wireless network. If you are unsure about which channel to use, select the default channel (Channel 6).

Network Mode - Keep the default setting, Mixed, if you have Wireless-G and Wireless-B devices in your network. Select G-Only if you have only Wireless-G devices in your network.

5.The Wireless Security screen allows you to set the security level for your network. Enable or disable Wired Equivalent Privacy (WEP) encryption for your wireless network. If you enable WEP, enter a Passphrase or WEP key. Click the Next button to continue or the Back button to return to the previous screen. For more information about the information on this screen, you can also click the Help button.

WEP - If you do not want to use WEP encryption, choose Disabled. To use WEP encryption (recommended to increase network security), select 64-bit or 128-bit WEP from the drop-down menu, and enter either a Passphrase or WEP key.

Passphrase - Instead of manually entering WEP keys, you can enter a Passphrase, so that a WEP key is automatically generated. It is case-sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your wireless network and is compatible with other Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key(s) manually on those products.)

WEP Key - This WEP key must match the WEP key of your wireless network. If you are using 64-bit WEP encryption, then the key must consist of exactly ten hexadecimal characters. If you are using 128-bit WEP encryption, then the key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

TX Key - This allows you to access different WEP keys used by different routers or access points in your network. Choose the TX Key used in that network. For instance, if the device uses TX Key 3, use TX Key 3. If you’re not using multiple WEP Keys, leave this set at 1.

Authentication - Select the Authentication method used by your network. Open Authentication does not employ WEP keys. Shared Authentication employs WEP encryption. Auto (the default setting) chooses the method of the network to which you're connecting.

Figure 3-4: The Ad-Hoc Mode Settings Screen

Figure 3-5: The Wireless Security Screen

Chapter 3: Software Installation and Configuration for Windows 2000

8

Image 14
Contents 4802GHz.11g Wireless-G Copyright and Trademarks Table of Contents Wireless-G Portable USB Adapter Setup Wizard’s Welcome Screen List of FiguresProfiles Confirm New Settings Profiles Congratulations Introduction WelcomeWhat’s in this Guide? Wireless-G Portable USB Adapter Roaming Planning your Wireless NetworkNetwork Topology Planning your Wireless Network Network LayoutSoftware Installation and Configuration for Windows Setup Wizard’s Welcome ScreenWireless Mode Screen Ad-Hoc Mode Settings Screen Software instructions for the computer Connecting the Portable USB Adapter A USB PortUsing the USB Extension Base Windows 2000 Digital Signature ScreenDriver Installation for Windows XP XP Setup Welcome ScreenWindows XP Wireless Zero Configuration Network Connection No WEPNetwork Connection WEP Overview Using the Wlan MonitorAccessing the Wlan Monitor Link Information TabLink Information Tab More Information Site Survey Tab Site Survey TabProfiles Tab Profiles TabImporting a Profile Creating a New Profile Create Connection Profile10 Profiles Network Settings 12 Profiles Ad-Hoc Settings 14 Profiles Confirm New Settings Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard?What is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Portable USB Adapter Appendix C Windows Help TCP/IPAppendix D Glossary Wireless-G Portable USB Adapter Wireless-G Portable USB Adapter Appendix E Specifications WUSB54GPFCC, CE Appendix F Warranty Information Limited WarrantyAppendix G Regulatory Information FCC StatementAppendix H Contact Information