![Hama 00062764 V2 Operating Instructions Manual Download Page 23](http://html1.mh-extra.com/html/hama/00062764-v2/00062764-v2_operating-instructions-manual_3569163023.webp)
6
If your network uses encryption, switch to the
Authentication and Security
tab and continue configuration
under
Setting wireless LAN encryption
.
If your network is not encrypted, click
OK
to accept the settings. To activate the profile created, switch to
the
Profiles
tab, select the profile and then click
Activate.
2.2.1.2 Ad-hoc mode
First enter a name for your profile
(Profile name)
, e.g. “PROF1”.
If you have selected
version 1
to create the profile, you must enter the network ID (SSID) of the target
network in the
SSID
field. This is in the wireless LAN settings in your router or access point or you can ask
the person in charge. If you have selected
version 2
, the
SSID
has already been copied automatically from
the network overview.
To reduce the energy consumption, you can run the stick in
Power saving mode
. In this mode, certain
functions are deactivated or run at a lower setting if they are not fully used. Select
Constantly Awake Mode
if you want to work at full power all the time.
Select
Ad-hoc
under network type. This mode allows you to connect to other wireless LAN client devices,
e.g. USB sticks, PCI cards or cardbus.
The settings for
TX Power, Preamble, RTS Threshold
and
Fragment Threshold
can be left at the default
settings.
Ad-hoc WLAN
mode allows you to set the standard to be used. This depends on the other devices
used in your network. You can then select either
802.11b
(11Mbps) only: Then this standard only is used;
802.11g
(54Mbps) only: Then this standard only is used; or
802.11b/g
: If this is selected, both standards are
supported. If you are unsure which standards your devices support, you should use the mixed mode. You
must also set the wireless LAN channel used under
Channel
. In Europe, there are 13 channels in the 2.4 GHz
frequency range.
If your network uses encryption, switch to the
Authentication and Security
tab and continue configuration
under
Setting wireless LAN encryption.
If your network is not encrypted, click
OK
to accept the settings. To activate the profile created, switch to the
Profiles
tab, select the profile and then click
Activate
.
2.2.2 Setting the wireless LAN encryption
First, it is important to understand a range of terms. The next section will explain the main terms
used here:
Authentication:
Authentication is a process in which the identity, e.g. of a person is determined based on a
certain characteristic. This can be done by fingerprint, password or any other proof of authorisation.