December 2004
vi Contents
How to Configure an Infrastructure Mode Profile ..................................................... 4-3
Connecting to Another PC in Ad Hoc Mode ...................................................................4-4
How to Configure an Ad Hoc Mode Profile ..............................................................4-5
How to Start a Computer-to-Computer (Ad Hoc) Network .................. ... ... ... .... ........4-6
Statistics Page ..........................................................................................................4-7
Advanced Settings Display ......................................................................................4-9
Chapter 5
Wireless Security Configuration
Understanding the Security Options ...............................................................................5-1
Using WEP Security .......................................................................................................5-1
Basic Requirements for WEP ...................................................................................5-2
WEP Security Settings Worksheet ......................... ..................................................5-3
How to Configure WEP Encryption Security ............................................................5-4
Using the Wireless Zero Configuration Service for WPA-PSK Advanced Security ........5-5
Enabling Wireless Security Features ..................... .................... ................... ..................5-6
Identifying the Wireless Network Name (SSID) and WEP Security Settings ...........5-6
How to Configure WEP Encryption Security ............................................................5-7
Chapter 6
Troubleshooting
Troubleshooting Basic Tips ......................................................................................6-1
Frequently Asked Questions ..........................................................................................6-2
Appendix A
Technical Specifications ......................................................................................................A1
Appendix B
Wireless Networking Basics
Wireless Networking Overview ..................... ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... .... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ........................ .... ... ................................. B-1
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Wireless Channels .................... ... ... ... .... ... ... ... ... .... ... ................................... .... ... ... . B-2
WEP Wireless Security ............. ... .... ... ... ... .... ... ... ... ... .... ... ................................... .... ... ... . B-3
WEP Authentication .............. .... ... ... ... .... ... ................................... .... ... ... ... ... ........... B-3
WEP Open System Authentication ......................................................................... B-4
WEP Shared Key Authentication ............................................................................ B-5
How to Use WEP Parameters ................................................................................. B-7
WPA Wireless Security .................................................................................................. B-7