Linksys WUSB54GC manual Wep

Page 24

Compact Wireless-G USB Adapter

4.The Wireless Security screen will appear. This step will configure wireless security.

If your wireless network doesn’t use wireless security, select Disabled and then click the Next button to continue. Proceed to Step 5.

Select WEP, WPA-Personal, PSK2, WPA Enterprise, Radius, or LEAP for the Encryption Method. WEP stands for Wired Equivalent Privacy, WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption, PSK2 stands for Pre-Shared Key 2, which is a security standard stronger than WPA-Personal, RADIUS stands for Remote Authentication Dial-In User Service, and LEAP stands for Lightweight Extensible Authentication Protocol. If you don’t want to use encryption, select Disabled.

Then, click the Next button to continue or the Back button to return to the previous screen.

WEP

WEP - To use WEP encryption, select 64-bits or 128-bit characters from the drop-down menu, and enter a passphrase or key.

WEP Key- The WEP key you enter must match the WEP key of your wireless network. If you are using 64-bit WEP encryption, then the key must consist of exactly 10 hexadecimal characters. If you are using 128-bit WEP encryption, then the key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.

Passphrase - Instead of manually entering a WEP key, you can enter a passphrase in the Passphrase field, so a WEP key is automatically generated. This case-sensitive passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non- Linksys wireless products, enter the WEP key manually on those products.)

TX Key - The default transmit key number is 1. If your network’s access point or wireless router uses transmit key number 2, 3, or 4, select the appropriate number from the TX Key drop-down box.

Authentication -The default is set to Auto, where it auto-detects for Shared Key or Open system. Shared Key is when both the sender and the recipient share a WEP key for authentication. Open key is when the sender and the recipient do not share a WEP key for authentication. All points on your network must use the same authentication type.

Click the Next button to continue to the Confirm New Settings screen or the Back button to return to the previous screen.

Figure 4-18: Wireless Security

encryption: encoding data transmitted in a network.

Figure 4-19: Wireless Security - WEP

wep (wired equivalent privacy): a method of encrypting network data transmitted on a wireless network for greater security.

Chapter 4: Setting up and Connecting the USB Adapter

17

Setting Up the Adapter

Image 24
Contents 4802GHz.11gWireless-G How to Use this User Guide Copyright and TrademarksTable of Contents Compact Wireless-G USB Adapter List of Figures Front PanelMore Information Wireless Network Status 39 Leap Introduction WelcomeWhat’s in this Guide? Compact Wireless-G USB Adapter Planning your Wireless Network Network TopologyRoaming Planning your Wireless Network Network LayoutGetting to Know the Compact Wireless-G USB Adapter LED IndicatorsSetting up and Connecting the USB Adapter Starting the Setup WizardConnecting the Adapter Connecting the Adapter ScreenSetting Up the Adapter Available Wireless NetworkSetting Up the Adapter with SecureEasySetup SecureEasySetup Logo and LocationChanges, refer to Using the Wireless Network Monitor Setting Up the Adapter with Available Networks Encryption encoding data transmitted in a network12 PSK2 Needed for Connection Changes, refer to Using the Wireless Network Monitor Setting Up the Adapter with Manual Setup 15 Network Settings16 Wireless Mode WEP WPA Personal PSK2WPA Enterprise EAP-TLSRadius Leap 27 Confirm New Settings Using the Wireless Network Monitor Accessing the Wireless Network MonitorLink Information Screens Wireless Network Status Wireless Network Statistics SecureEasySetup SecureEasySetup ButtonSecureEasySetup is Complete Site Survey Site InformationProfiles Profile InformationCreating a New Profile 15 Export a Profile19 The SecureEasySetup Logo and Location 21 SecureEasySetup Complete 22 Available Wireless Network 25 PSK2 Needed for Connection 26 The Congratulations Screen 28 Network Settings 31 Wireless Security 32 Wireless Security WEP 33 Wireless Security WPA Personal 35 Wireless Security WPA Enterprise EAP-TLS 37 Wireless Security Radius EAP-TLS 39 Leap 41 The Congratulations Screen Appendix a Troubleshooting Common Problems and SolutionsFrequently Asked Questions What is the Ieee 802.11b standard?What is ad-hoc mode? What is DSSS? What is FHSS? And what are their differences? Appendix B Using Windows XP Wireless Configuration Figure B-1 Wireless Network Monitor IconFigure B-4 Available Wireless Network Figure B-6 Network Connection Wireless Security Appendix C Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix C Wireless Security Compact Wireless-G USB Adapter Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Appendix F Warranty Information Limited WarrantyAppendix G Specifications ModelStandards Dbpsk 1 Mbps 802.11g OfdmStorage Temp Operating HumidityStorage Humidity Appendix H Regulatory Information FCC StatementCompact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Compact Wireless-G USB Adapter Dual-Band Wireless Access Point Appendix I Contact Information