Netgear MA401 MA401 Reference Manual - Page 52

Configuring WEP Encryption Security, A larger encryption key requires more processing to encode/decode

Page 52 highlights

Reference Guide for the Model MA401 802.11b Wireless PC Card Configuring WEP Encryption Security The MA401 PC Card allows you to restrict access to your wireless network based on WEP keywords. Following the steps below to perform this procedure. 1. Run the Config Utility and select the Encryption tab page. Figure 3-2: Configuring WEP Encryption 2. Select the WEP encryption strength you will use. The choices are: • 64-bit WEP data encryption • 128-bit WEP data encryption Note: A larger encryption key requires more processing to encode/decode the messages. Larger encryption key lengths may slow the communications process response times. 3-4 Protecting Your Wireless Connection

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84

Reference Guide for the Model MA401 802.11b Wireless PC Card
3-4
Protecting Your Wireless Connection
Configuring WEP Encryption Security
The MA401 PC Card allows you to restrict access to your wireless network based
on WEP keywords. Following the steps below to perform this procedure.
1.
Run the Config Utility and select the Encryption
tab page.
Figure 3-2:
Configuring WEP Encryption
2.
Select the WEP encryption strength you will use. The choices are:
64-bit WEP data encryption
128-bit WEP data encryption
Note:
A larger encryption key requires more processing to encode/decode
the messages. Larger encryption key lengths may slow the
communications process response times.