Harmony House 802.11a manual Harmony Security Protocol

Models: 802.11a

1 76
Download 76 pages 4.8 Kb
Page 45
Image 45

Harmony Utility

45

To create the text file, use a text program such as Microsoft Notepad or WordPad. The text file should have a “.txt” extension. The first line of the text file must read “[WEP_KEY_VALUE]”. Then, enter one to four Keys in the following format: “key#=<key value>”, where # indicates the Key number (1-4) and <key value> is the specified Key’s hexadecimal digits.

Each Key must be contain hexadecimal digits only (0-9 and A-F), and you must use the same number of digits for each Key. The number of digits depends upon the Key Size you select in the WEP Keys Configuration screen:

For 64 Bit, use 10 digits per Key.

For 128 Bit, use 26 digits per Key.

For 152 Bit, use 32 digits per Key.

The following example illustrates the WEP Key file format for 64-bit encryption:

[WEP_KEY_VALUE] key1=1234567890 key2=0987654321 key3=ABCDEF1234 key4=ABCDEFABCD

Harmony Security Protocol

Follow these steps to enable the Harmony Security Protocol:

Note: The Harmony Security Protocol is not available on computers running Windows 2000 Server or Windows NT.

1.Select Use Harmony Security Protocol within the Security Level box.

2.Place a check mark in the Log on to Harmony Security before Windows Logon box if you want to connect to the wireless network before logging on to the Windows operating system.

Note: You should enable the Log on to Harmony Security before Windows Logon option if your computer connects to a Windows Domain Controller, connects to a Novell network, automatically reconnects to shared network drives dur- ing Windows logon, or runs networking software (e.g., PC Anywhere) before connecting to the network.

Page 45
Image 45
Harmony House 802.11a manual Harmony Security Protocol