Figure 4-5

Choose the Authorization Modes and Encryption Method in the drop-down box.

Figure 4-5

Click the Configure WEP Keys button to continue.

Figure 4-6

18