4.àÅ×Í¡ Security Settings ·Õè¡Ó˹´äÇéÊÓËÃѺ¨Ø´àª×èÍÁµèÍ (ËÃ×Íà¤Ã×Í¢èÒÂẺà¤Ã×èͧµèÍà¤Ã×èͧ) ·Õè¨Ðàª×èÍÁµèÍã¹ÇÔ¹â´ÇìSecurity ¤ÅÔ¡·ÕèSettings à¾×èÍ¡Ó˹´µÑÇàÅ×Í¡¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑÂẺÅÐàÍÕ´ÊÓËÃѺ Security Setting

ËÁÒÂà˵ءÒõÃǨÊͺÊÔ·¸Ôì¢Í§à¤Ã×Í¢èÒ »ÃÐàÀ·¡ÒÃà¢éÒÃËÑÊ

áÅÐÃËÑʼèÒ¹¢Í§¨Ø´àª×èÍÁµèͨСÓ˹´¼èÒ¹â»Ãá¡ÃÁ¨Ñ´¡Òâͧ¨Ø´àª×èÍÁµèÍ ÊÓËÃѺ¢éÍÁÙÅ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ â»Ã´´Ù¡ÒõÑ駤èÒ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ¢ͧ¨Ø´àª×èÍÁµèÍ ËÃ×ͶÒÁ¼Ùé´ÙáÅÃкºà¤Ã×Í¢èÒÂäÃéÊÒÂ

¡ÒõÑ駤èÒ WEP Key:

¡ÒÃà¢éÒÃËÑÊ¢éÍÁÙÅ: Áҵðҹ IEEE 802.11 WEP (Wired Equivalent Privacy) ÁÕÃдѺ¡ÒÃÃÑ¡ÉÒ¤ÇÒÁ»ÅÍ´ÀÑ 2

ÃдѺ: ¡ÒÃà¢éÒÃËÑÊ´éǤÕÂì64 ºÔµ (ºÒ§¤ÃÑé§à»ç¹ 40 ºÔµ) áÅÐ 128 ºÔµ »ÃÐàÀ·¢Í§¤ÕÂì»ÃСͺ´éÇÂàÅ¢°Ò¹ÊԺˡáÅÐÍÑ¡¢ÃÐ ASCII ÊÓËÃѺ ASCII: ¤ÅÔ¡·ÕèUse Encryption à¾×èÍãªé¤Ø³ÊÁºÑµÔ¡ÒÃà¢éÒÃËÑÊ

»é͹µÑÇàÅ¢áÅеÑÇÍÑ¡Éà 5 (ÊÓËÃѺ 64 ºÔµ) ËÃ×Í 13 µÑÇ (0-9, a-z ~ A-Z) (ÊÓËÃѺ 128 ºÔµ)

ÊÓËÃѺàÅ¢°Ò¹ÊԺˡ: »é͹ÍÑ¡¢ÃÐàÅ¢°Ò¹ÊԺˡ 10 µÑÇ (ÊÓËÃѺ 64 ºÔµ) ËÃ×Í 26 µÑÇ (0-9, A-F) (ÊÓËÃѺ 128 ºÔµ) 㹿ÔÅ´ìWEP key

ËÁÒÂà˵Øà¤Ã×Í¢èÒÂẺà¤Ã×èͧµèÍà¤Ã×èͧ¨ÐÃͧÃѺ੾ÒФÕÂìWEP

¹Í¡¨Ò¡¹Õé¤Ø³ÊÒÁÒö¡Ó˹´¤ÕÂì152 ºÔµ (32 µÑÇÍÑ¡ÉÃÊÓËÃѺàÅ¢°Ò¹ÊԺˡ áÅÐ 16 ÊÓËÃѺ ASCII) 㹡ÒÃàª×èÍÁµè͡Ѻ¨Ø´àª×èÍÁµèÍ Atheros

5.¤ÅÔ¡·Õè»ØèÁ OK áÅФÅÔ¡·Õè»ØèÁ OK ã¹ÇÔ¹â´ÇìProfile Management

6.àÁ×èÍÊÃéÒ§â»Ãä¿ÅìãËÁèáÅéÇ â»Ãä¿Åì¹Ñ鹨лÃÒ¡¯ã¹ÅÔʵì¢Í§á·çº Profile Management áÅСÒÃàª×èÍÁµèÍä»Âѧâ»Ãä¿Åì¹Ñ鹨ÐàÃÔèÁµé¹¢Öé¹

• 㹡ÒÃÊÃéÒ§à¤Ã×Í¢èÒÂẺà¤Ã×èͧµèÍà¤Ã×èͧ (Ad Hoc):

㹡ÒÃÊÃéÒ§à¤Ã×Í¢èÒÂẺà¤Ã×èͧµèÍà¤Ã×èͧ (Ad Hoc) ãËÁèËÃ×Íàª×èÍÁµè͡Ѻ¨Ø´àª×èÍÁµèÍ·Õè«è͹ÍÂÙè(Stealth/Closed Mode) ãË黯ԺѵԵÒÁ¢Ñ鹵͹µèÍ仹Õé

ËÁÒÂà˵بشàª×èÍÁµèÍ·Õè«è͹¤×ͨشàª×èÍÁµèÍ·ÕèÁÕÍÂÙèáµèä´éÃѺ¡ÒõÑ駤èÒà¾×èÍ äÁèãËéÊÒÁÒöÊ᡹¾º à¾×èÍ»éͧ¡Ñ¹¡ÒÃà¢éÒãªé¨Ò¡

¼Ùéãªé·ÕèäÁèä´éÃѺ͹Ø-Òµ1.ã¹ÇÔ¹â´ÇìProfile Management ãËé¤ÅÔ¡·ÕèÊÃéÒ§2.»é͹ª×èÍâ»Ãä¿Åì㹿ÔÅ´ìProfile Name3.»é͹ª×èÍà¤Ã×Í¢èÒ·Õè¨Ðàª×èÍÁµèÍ SSID1

¡ÒÃàª×èÍÁµè͡ѺÍÔ¹àµÍÃìà¹çµ 85