202-10076-01
vi Contents
How to Configure an Ad-hoc M ode Profile ...............................................................4-4
How to Start a Computer-to-Compu ter (Ad-Hoc) Network ....................................... 4-6
Enabling W ireless Security Features .............................................................................. 4-7
Identifying the Wireless Network N ame (SS ID) and WE P S ecurity Settings ...........4-7
How to Configure WEP Encryption Security .................................... ........................4-8
How to C onfigure WPA -PSK E ncryption Security ....................................................4-9
Statistics Page ........................................................................................................4-10
Advanced Settings Page ........................................................................ ................4-11
Chapter 5
Troubleshooting
Basic Tips .................................................................................. .....................................5-1
Frequently Asked Qu estions ........................... ...............................................................5-2
General Questions ............. ... .... ... ... .........................................................................5-2
Appendix A
Technical Specifications............................................ ..........................................................A1
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B -1
Infrastructure Mode ................................................................................................. B -1
Ad H oc Mode (P eer-to-Peer Workgroup) .................................. ..............................B -2
Network Nam e: Extended S ervice Set Identification (ES SID ) ................................B -2
Wireless Channels .................................................................................................. B -2
Wireless Security Overview ........................................................................................... B-6
WE P O verview ................................... ... ........................................................................ B-7
WE P A uthentication ............................................................... ... ..............................B -7
WE P K eys .............................................................................. ... ... .... ... ... ... ..............B -9
How to U se WE P P arameters ............................................................................... B-10
802.1x Port Based Network Access Control .................................................................B-11
WP A W ireless Security ................................................................................................ B -13
How D oes WPA Compare to WEP ? ................................................................. .....B -14
How D oes WPA Compare to IEEE 802.11i? ........................................................ B -15
What are the Key Features of WPA Security? ...................................................... B-15
WP A D ata Encryption Key Management .............................................................. B-19
Is WP A P erfect? .............................................................. .... ... ... ... .... ... ... ... ... .... ... .. B -20
Product Support for WP A ............. ......................................................................... B-20