December 2004
vi Contents
How to Configure an Infrastructure Mode Profile .....................................................4-3
Connecting to Another PC in Ad Hoc Mode ...................................................................4-4
How to Configure an Ad Hoc Mode Profile ..............................................................4-5
How to Start a Computer-to-Computer (Ad Hoc) Network .......................................4-6
Statistics Page ..........................................................................................................4-7
Advanced Settings Display ......................................................................................4-9
Chapter 5
Wireless Security Configuration
Understanding the Security Options ...............................................................................5-1
Using WEP Security .......................................................................................................5-1
Basic Requirements for WEP ...................................................................................5-2
WEP Security Settings Worksheet ...........................................................................5-3
How to Configure WEP Encryption Security ............................................................5-4
Using the Wireless Zero Configuration Service for WPA-PSK Advanced Security ........5-5
Enabling Wireless Security Features ..............................................................................5-6
Identifying the Wireless Network Name (SSID) and WEP Security Settings ...........5-6
How to Configure WEP Encryption Security ............................................................5-7
Chapter 6
Troubleshooting
Troubleshooting Basic Tips ......................................................................................6-1
Frequently Asked Questions ..........................................................................................6-2
Appendix A
Technical Specifications ......................................................................................................A1
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-1
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Wireless Channels .................................................................................................. B-2
WEP Wireless Security .................................................................................................. B-3
WEP Authentication ................................................................................................ B-3
WEP Open System Authentication ......................................................................... B-4
WEP Shared Key Authentication ............................................................................ B-5
How to Use WEP Parameters ................................................................................. B-7
WPA Wireless Security .................................................................................................. B-7
Comments to this Manuals