August 2004
2
Contents
Connecting to an Access Point in Infrastructure Mode
............................................
4-2
How to Configure an Infrastructure Mode Profile
.....................................................
4-3
Connecting to Another PC in Ad-hoc Mode
....................................................................
4-4
How to Configure an Ad-hoc Mode Network
............................................................
4-5
What’s on the Statistics Page?
.................................................................................
4-7
Understanding the Advanced Settings Page
...........................................................
4-8
Chapter 5
Wireless Security Configuration
Understanding the Security Options
...............................................................................
5-1
Using WEP Security
.......................................................................................................
5-2
Basic Requirements for WEP
...................................................................................
5-2
WEP Security Settings Worksheet
...........................................................................
5-3
How to Configure WEP Encryption Security
............................................................
5-4
Using WPA-PSK Advanced Security
..............................................................................
5-5
Basic Requirements for WPA-PSK
..........................................................................
5-5
WPA-PSK Security Settings Worksheet
...................................................................
5-6
How to Configure WPA-PSK Advanced Security
.....................................................
5-6
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
B-1
Infrastructure Mode
.................................................................................................
B-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
B-2
Network Name: Extended Service Set Identification (ESSID)
................................
B-2
Wireless Channels
..................................................................................................
B-2
802.11b/g Wireless Channels
...........................................................................
B-3
802.11a Legal Power Output and Wireless Channels
......................................
B-4
Wireless Security Overview
...........................................................................................
B-6
WEP Overview
..............................................................................................................
B-7
WEP Authentication
................................................................................................
B-7
WEP Keys
...............................................................................................................
B-9
How to Use WEP Parameters
...............................................................................
B-10
802.1x Port Based Network Access Control
.................................................................
B-11
WPA Wireless Security
................................................................................................
B-13