| H ow to C on figu re a n A d  | . . . 4  | |
| H ow to S ta rt a C om p u te  | . . . 4  | |
| E n a b lin g W ire le ss S e cu rity F e a tu re s | . . . 4  | |
| I d e n tifyin g th e W ire le ss N e twork N a m e ( S S I D ) a n d W E P S e cu rity S e ttin gs | . . . 4  | |
| H ow to C on figu re W E P E n cry p tion S e cu rity | . . . 4  | |
| H ow to C on figu re W P A  | . . . 4  | |
| S ta tistics P a ge | . 4  | |
| A d va n ce d S e ttin gs P a ge | . 4  | |
| Chapter 5 | 
 | 
 | 
| Troubleshooting | 
 | |
| B a sic T ip s | . . 5  | |
| F re qu e n tly A ske d Q u e stion s | . . . 5  | |
| G e n e ra l Q u e stion s | . . . 5  | |
| Appendix A | 
 | 
 | 
| Technical Specifications | . . . . A 1 | |
| Appendix B | 
 | 
 | 
| Wireless Networking Basics | 
 | |
| W ire le ss N e tworkin g O ve rvie w | . . B  | |
| I n fra stru ctu re M od e | . . B  | |
| A d H oc M od e ( P e e  | . . B  | |
| N e twork N a m e : E xte n d e d S e rvice S e t I d e n tifica tion ( E S S I D ) | . . B  | |
| W ire le ss C h a n n e ls | . . B  | |
| W ire le ss S e cu rity O ve rvie w | . . B  | |
| W E P O ve rvie w | . . B  | |
| W E P | A u th e n tica tion | . . B  | 
| W E P | K e y s | . . B  | 
| H ow to U se W E P P a ra m e te rs | B  | |
| 8 02 . 1 x P ort B a se d N e twork A cce ss C on trol | . B  | |
| W P A W ire le ss S e cu rity | B  | |
| H ow D oe s W P A C om p a re to W E P ? | B  | |
| H ow D oe s W P A C om p a re to I E E E 8 02 . 1 1 i? | B  | |
| W h a t a re th e K e y F e a tu re s of W P A S e cu rity? | B  | |
| W P A | D a ta E n cryp tion K e y M a n a ge m e n t | B  | 
| I s W P A P e rfe ct? | B  | |
| P rod u ct S u p p ort for W P A | B  | |
| vi | 
 | C on te n ts | 
