Linksys WPC54G manual Wireless Security for New Profile

Page 26

Wireless-G Notebook Adapter

6.The Wireless Security screen will appear. Select WEP, WPA-PSK, WPA Radius, or Radius for the Encryption Method. WEP stands for Wired Equivalent Privacy, WPA-PSK stands for Wi-Fi Protected Access Pre-Shared Key, which is a security standard stronger than WEP encryption, and RADIUS stands for Remote Authentication Dial-In User Service. If you don’t want to use encryption, select Disabled. Then, click Next to continue or Back to return to the previous screen.

WEP

Security - To use WEP encryption, select 64-bits or 128-bit characters from the drop-down menu, and enter a passphrase or key.

Passphrase - Instead of manually entering a WEP key, you can enter a passphrase in the Passphrase field, so a WEP key is automatically generated. It is case-sensitive and should not be longer than 16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)

Transmit Key - The default transmit key number is 1. If your network’s access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the Transmit Key drop-down box.

Key 1- The WEP key you enter must match the WEP key of your wireless network. If you are using 64-bit WEP encryption, then the key must consist of exactly 10 hexadecimal characters. If you are using 128-bit WEP encryption, then the key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Authentication -The default is set to Auto, where it auto-detects for Shared Key or Open system. Shared Key is when both the sender and the recipient share a WEP key for authentication. Open key is when the sender and the recipient do not share a WEP key for authentication. All points on your network must use the same authentication type.

Click Help for more information about this screen and these settings. Click Next to continue, or Cancel to return to the Profiles screen.

Figure 6-13: Wireless Security for New Profile

passphrase: used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products

Figure 6-14: WEP Setting for New Profile

Chapter 6: Using the Wireless Network Monitor

21

Creating a New Profile

Image 26
Contents Wireless- G Copyright and Trademarks Word definitionTable of Contents List of Figures Front Panel21 EAP-MD5 Authentication Adapter a device that adds network functionality to your PC IntroductionWelcome What’s in this Guide? Wireless-G Notebook Adapter Roaming Planning your Wireless NetworkNetwork Topology Topology the physical layout of a networkPlanning your Wireless Network Network LayoutPower Getting to Know the Wireless-G Notebook AdapterLED Indicators LinkSoftware Installation and Configuration Software instructions for the computerInstallation Procedure Setup Wizard’s Wireless Mode ScreenWEP Bit a binary digitSetup Wizard’s Check Settings Screen WPA-PSKSetup Wizard’s Congratulations Screen Hardware Installation Connecting the AdapterLink Information Using the Wireless Network MonitorAccessing the Wireless Network Monitor Encryption encoding data transmitted in a network Internet traffic from your local area networkWireless Network Statistics Byte a unit of data that is usually eight bits longSite Survey Site InformationProfiles Profile Information Creating a New Profile On the Profiles screen, click New to create a new profile11 Ad-Hoc Mode Settings 12 Network Settings 13 Wireless Security for New Profile 15 WPA-PSK Settings 17 WPA Radius Settings WPA RadiusEAP-MD5 EAP-TLSEAP-TTLS EAP-PEAP24 Radius Settings Radius27 EAP-MD5 Authentication 30 Confirm New Settings Wireless-G Notebook Adapter does not work properly Appendix a TroubleshootingCommon Problems and Solutions What is the 802.11g standard? Frequently Asked QuestionsWhat is the 802.11b standard? What 802.11b features are supported?What is roaming? What is ad-hoc mode?What is infrastructure mode? What is ISM band?What is DSSS? What is FHSS? And what are their differences? What is WEP?Security Threats Facing Wireless Networks Appendix B Wireless SecuritySecurity Precautions Appendix B Wireless Security Wireless-G Notebook Adapter Appendix C Windows Help TCP/IPAppendix D Glossary Wireless-G Notebook Adapter Wireless-G Notebook Adapter Wireless-G Notebook Adapter Appendix E Specifications Appendix F Warranty Information Limited WarrantyIndustry Canada Canada Appendix G Regulatory InformationFCC Statement EC Declaration of Conformity Europe Safety Notices Appendix H Contact Information
Related manuals
Manual 50 pages 10.31 Kb