A SERVICE OF

logo

vi Contents
Connecting to Another P C in Ad-H oc M ode ...................................................................4-5
H ow to Configure an Ad-H oc M ode P rofile ..............................................................4-5
E nabling W ireless Security Features ..............................................................................4-8
Identifying the W ireless Security Settings ................................................................4-9
H ow to Configure W E P Encryption Security ..........................................................4-10
H ow to Configure W PA-PSK E ncryption Security .................................................. 4-11
Statistics P age ..............................................................................................................4-1 2
Advanced Settings P age ..............................................................................................4-13
Chapter 5
Troubleshooting
Frequently Asked Questions ..........................................................................................5-1
G eneral Q uestions ...................................................................................................5-1
W i-Fi P rotected Access (W PA) Questions ...............................................................5-3
Appendix A
Technical Specifications ......................................................................................................A1
Appendix B
Wireless Networking Basics
W ireless N etworking Overview ...................................................................................... B-1
Infrastructure M ode ................................................................................................. B-1
Ad-H oc M ode (P eer-to-P eer W orkgroup) ................................................................ B-2
N etwork N ame: E xtended Service Set Identification (E SSID ) ................................ B-2
Authentication and W E P ................................................................................................ B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of W E P P arameters ................................................................................ B-5
Key Size .................................................................................................................. B-6
W EP Configuration Options .................................................................................... B-6
W ireless Channels ......................................................................................................... B-7
W PA W ireless Security .................................................................................................. B-8
H ow D oes W PA C ompare to W E P ? ........................................................................ B-9
H ow D oes W PA Compare to IE E E 802.11i? ........................................................ B-10
W hat are the Key Features of W PA Security? ...................................................... B-10
Is W PA P erfect? .................................................................................................... B-16
P roduct Support for W PA ...................................................................................... B-1 6