Toshiba M400 Toshiba User's Guide for Portege M400 - Page 195

Special considerations for the Windows, operating system, The Windows

Page 195 highlights

If Something Goes Wrong Resolving a hardware conflict 195 ❖ If you have enabled any security provisions (closed system, MAC address filtering, Wired Equivalent Privacy [WEP], etc.), check the access point vendor's Web site for recent firmware upgrades. Problems with WEP keys, in particular, are frequently addressed in new firmware releases. Special considerations for the Windows® operating system Wired Equivalent Privacy (WEP) encryption is not enabled on the wireless access point. When you install a wireless access point device, the Windows® operating system checks whether WEP encryption is enabled on the device. If it is not enabled, the Windows® operating system adds the device to its list of available wireless networks, but does not create a wireless connection using the device, since the connection would not be secure. You can still, however, use the access point. To use an access point without WEP encryption, follow these steps: 1 Double-click the Wireless Network icon in the Notification Area (far-right portion of the Windows® Taskbar). 2 Click Connect to a network. 3 Select the desired network from the list and click Connect. A message informs you that the selected network is not secure, 4 Click Connect Anyway. 5 The Windows® operating system will now try to establish a wireless connection. The Windows® operating system wireless management facility does not work. If you are using an external Wi-Fi® adapter (a PC Card, USB adapter, or other variety), check if the adapter comes with its own management utility. If it does, the utility may be disabling the Windows® operating system wireless management facility, in which case you must use the adapter's management utility. If the documentation that accompanies the adapter does not provide enough information to determine if this is the case, contact that vendor's support group for further advice.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241

195
If Something Goes Wrong
Resolving a hardware conflict
If you have enabled any security provisions (closed system,
MAC address filtering, Wired Equivalent Privacy [WEP], etc.),
check the access point vendor's Web site for recent firmware
upgrades. Problems with WEP keys, in particular, are
frequently addressed in new firmware releases.
Special considerations for the Windows
®
operating system
Wired Equivalent Privacy (WEP) encryption is not enabled
on the wireless access point.
When you install a wireless access point device, the Windows
®
operating system checks whether WEP encryption is enabled on the
device. If it is not enabled, the Windows
®
operating system adds the
device to its list of available wireless networks, but does not create a
wireless connection using the device, since the connection would
not be secure. You can still, however, use the access point. To use an
access point without WEP encryption, follow these steps:
1
Double-click the
Wireless Network
icon in the Notification
Area (far-right portion of the Windows
®
Taskbar).
2
Click
Connect to a network
.
3
Select the desired network from the list and click
Connect
.
A message informs you that the selected network is not secure,
4
Click
Connect Anyway
.
5
The Windows
®
operating system will now try to establish a
wireless connection.
The Windows
®
operating system wireless management
facility does not work.
If you are using an external Wi-Fi
®
adapter (a PC Card, USB
adapter, or other variety), check if the adapter comes with its own
management utility. If it does, the utility may be disabling the
Windows
®
operating system wireless management facility, in which
case you must use the adapter's management utility. If the
documentation that accompanies the adapter does not provide
enough information to determine if this is the case, contact that
vendor's support group for further advice.