Back to Contents
Set Up Profile Security: Intel(R) PRO/Wireless 3945ABG Network Connection User Guide
Use Intel(R) PROSet/Wireless Software
Personal Security
Personal Security Settings
Set up Data Encryption and Authentication
Configure Profiles for Device to Device (Ad Hoc) Networks
Set up a Client with Open Authentication and No Data Encryption (None)
Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption
Configure Profiles for Infrastructure Networks
Set up a Client with No Data Encryption and No Network Authentication (None)
Set up a Client with WEP 64-bit or WEP 128-bit Data Encryption
Set up a Client with WPA-Personal (TKIP) or WPA2-Personal (TKIP) Security Settings
Set up a Client with WPA-Personal (AES-CCMP) or WPA2-Personal (AES-CCMP) Security Settings
Enterprise Security
Enterprise Security Settings
Configure Profiles for Device to Device (Ad Hoc) Networks
Set up a Client with Open Network Authentication and No Data Encryption (None)
Set up a Client with Open Network Authentication and WEP Data Encryption
Configure Profiles for Infrastructure Networks
Network Authentication
Set up a Client with Shared Network Authentication
Set up a Client with WPA-Personal or WPA2 Personal Network Authentication
Set up a Client with WPA-Enterprise or WPA2-Enterprise Network Authentication
802.1x Authentication Types
Set up a Client with MD5 Network Authentication
Set up a Client with WEP Data Encryption and EAP-SIM Network Authentication
Set up a Client with TLS Network Authentication
Set up a Client with TTLS Network Authentication
Set up a Client with PEAP Network Authentication
Set up a Client with LEAP Network Authentication
Set up a Client with EAP-FAST Network Authentication

Use Intel(R) PROSet/Wireless Software

The following sections describe how to use Intel(R) PROSet/Wireless to set up the required security settings for
your wireless adapter. Refer to Personal Security.
It also provides information about how to configure advanced security settings for your wireless adapter. This
requires information from a systems administrator (corporate environment) or advanced security settings on