Linksys WUSB54GP manual Profiles Ad-Hoc Settings

Page 28

Wireless-G Portable USB Adapter

5.The Ad-Hoc Mode Settings screen, for those who chose an Ad-hoc network, will appear next. Select the correct operating channel for your network from the Channel drop-down menu. Then, select the Network Mode from the drop-down menu. Click the Next button to continue or click the Back button to change any settings.

Channel - The channel you choose should match the channel set on the other devices in your wireless network. If you are unsure about which channel to use, select the default channel (Channel 6).

Network Mode - Select Mixed Mode, and both Wireless-G and Wireless-B computers will be allowed on the network, but the speed will be reduced. Select G-Only Mode for maximum speed, but no Wireless-B users will be allowed on the network.

6.The Security Settings screen allows you to set the security level for your network. Enable or disable Wired Equivalent Privacy (WEP) encryption for your wireless network. If you enable WEP, enter a Passphrase or WEP key. Click the Next button to continue or the Back button to return to the previous screen. For more information about the information on this screen, you can also click the Help button.

WEP - If you do not want to use WEP encryption, choose Disabled. To use WEP encryption (recommended to increase network security), select 64-bit or 128-bit WEP from the drop-down menu, and enter either a Passphrase or WEP key.

Passphrase - Instead of manually entering WEP keys, you can enter a Passphrase, so that a WEP key is automatically generated. It is case-sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your wireless network and is compatible with other Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key(s) manually on those products.)

WEP Key - This WEP key must match the WEP key of your wireless network. If you are using 64-bit WEP encryption, then the key must consist of exactly ten hexadecimal characters. If you are using 128-bit WEP encryption, then the key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

TX Key - This allows you to access different WEP keys used by different routers or access points in your network. Choose the TX Key used in that network. For instance, if the device uses TX Key 3, use TX Key 3. If you’re not using multiple WEP Keys, leave this set at 1.

Authentication - Select the Authentication method used by your network. Open Authentication does not employ WEP keys. Shared Authentication employs WEP encryption. Auto (the default setting) chooses the method of the network to which you're connecting.

Chapter 5: Using the WLAN Monitor

Figure 6-12: Profiles - Ad-Hoc Settings

Figure 6-13: Profiles - Security Settings

22

Creating a New Profile

Image 28
Contents 4802GHz.11g Wireless-G Copyright and Trademarks Table of Contents Wireless-G Portable USB Adapter Setup Wizard’s Welcome Screen List of FiguresProfiles Confirm New Settings Profiles Congratulations Introduction WelcomeWhat’s in this Guide? Wireless-G Portable USB Adapter Network Topology Planning your Wireless NetworkRoaming Planning your Wireless Network Network LayoutSoftware Installation and Configuration for Windows Setup Wizard’s Welcome ScreenWireless Mode Screen Ad-Hoc Mode Settings Screen Software instructions for the computer Connecting the Portable USB Adapter A USB PortUsing the USB Extension Base Windows 2000 Digital Signature ScreenDriver Installation for Windows XP XP Setup Welcome ScreenWindows XP Wireless Zero Configuration Network Connection No WEPNetwork Connection WEP Using the Wlan Monitor Accessing the Wlan MonitorOverview Link Information TabLink Information Tab More Information Site Survey Tab Site Survey TabProfiles Tab Profiles TabImporting a Profile Creating a New Profile Create Connection Profile10 Profiles Network Settings 12 Profiles Ad-Hoc Settings 14 Profiles Confirm New Settings Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard?What is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Security Precautions Appendix B Wireless SecuritySecurity Threats Facing Wireless Networks Appendix B Wireless Security Wireless-G Portable USB Adapter Appendix C Windows Help TCP/IPAppendix D Glossary Wireless-G Portable USB Adapter Wireless-G Portable USB Adapter Appendix E Specifications WUSB54GPFCC, CE Appendix F Warranty Information Limited WarrantyAppendix G Regulatory Information FCC StatementAppendix H Contact Information