A SERVICE OF

logo

202-10076-01
vi Contents
H ow to Configure an Ad-hoc M ode P rofile ...............................................................4-4
H ow to Start a C omputer-to-C omputer (Ad-H oc) N etwork .......................................4-6
E nabling W ireless Security Features ..............................................................................4-7
Identifying the W ireless Network N ame (SSID ) and W E P Security Settings ...........4-7
H ow to Configure W E P E ncryption Security ............................................................4-8
H ow to Configure W PA-PSK E ncryption Security ....................................................4-9
Statistics P age ........................................................................................................4-10
Advanced Settings P age ........................................................................................ 4-11
Chapter 5
Troubleshooting
Basic Tips .......................................................................................................................5-1
Frequently Asked Q uestions ..........................................................................................5-2
G eneral Questions ...................................................................................................5-2
Appendix A
Technical Specifications ......................................................................................................A1
Appendix B
Wireless Networking Basics
W ireless N etworking Overview ...................................................................................... B-1
Infrastructure M ode ................................................................................................. B-1
Ad H oc M ode (P eer-to-P eer W orkgroup) ................................................................ B-2
N etwork N ame: E xtended Service Set Identification (E SSID ) ................................ B-2
W ireless Channels .................................................................................................. B-2
W ireless Security Overview ........................................................................................... B-6
W E P Overview .............................................................................................................. B-7
W E P Authentication ................................................................................................ B-7
W E P Keys ............................................................................................................... B -9
H ow to U se W E P P arameters ............................................................................... B-1 0
802.1x P ort Based N etwork Access Control .................................................................B-11
W PA W ireless Security ................................................................................................ B-1 3
H ow D oes W PA Compare to W E P ? ...................................................................... B-1 4
H ow D oes W PA Compare to IE E E 802.11i? ........................................................ B-15
W hat are the Key Features of W PA Security? ...................................................... B-1 5
W PA D ata E ncryption Key M anagement .............................................................. B-1 9
Is W PA P erfect? .................................................................................................... B-20
P roduct Support for W PA ...................................................................................... B-20