background image

6

Select 

Ad-hoc

 under network type. This mode allows you to connect to other wireless LAN client devices, e.g. USB sticks, PCI cards 

or cardbus.

The settings for 

TX Power, Preamble, RTS Threshold

 and 

Fragment Threshold

 can be left at the default settings. You must also set the 

wireless LAN channel used under 

Channel

. In Europe, there are 13 channels in the 2.4 GHz frequency range.

If your network uses encryption, switch to the 

Authentication and Security

 tab and continue confi guration under 

Setting wireless 

LAN encryption.

  

If your network is not encrypted, click 

OK

 to accept the settings. To activate the profi le created, switch to the 

Profi les

 tab, select the 

profi le and then click 

Activate

3.2.2 Setting the wireless LAN encryption

First, it is important to understand a range of terms. The next section will explain the main terms used here:

Authentication:

 Authentication is a process in which the identity, e.g. of a person is determined based on a certain characteristic. 

This can be done by fi ngerprint, password or any other proof of authorisation.

Encryption:

 Encryption is a process in which a plain text is transformed into a coded text via an encryption process (algorithm). One or 

more codes can be used for this.

It must also be mentioned that each individual encryption process offers one or more authentication options.

Please switch to the 

Authentication and Security

 tab.

This device can be used with the following encryption types:

64 and 128 bit WEP encryption WPA and WPA2 encryption

 

Note!!! Encryption is deactivated by default. However, for security reasons, 

 

we recommend that you always use encryption.

3.2.2.1 WEP encryption

Wired Equivalent Privacy 

(WEP)

 is a standard encryption algorithm for WLAN. It both controls the access to the network and guaran-

tees the integrity of the data. This method is considered vulnerable due to a range of weaknesses.

If you want to use WEP encryption, select 

WEP

 under encryption.

Two options are available for the Authentication type under WEP.

Select 

Open

 if all clients are to be enabled for WLAN. Now there is virtually no 

other authentication.

Select 

Shared

 if you want to use authentication with the challenge response 

process. A shared code is used for authentication in this method. All WLAN users must know this code.

All other selection options under Authentication type are meaningless under WEP.

You can now store four codes in the lower section of the window. The selected code is always used. 64 bit or 128 bit encryption is 

supported. 128 bit encryption is more secure. First select whether you want to use 

Hex

 (allows characters from 0-9 and a-f to be used) 

or 

ASCII

 characters (You can use any characters). The setting and the selection of either 64 or 128 bit encryption determines the 

length of the code to be entered.

WEP 64 bit ASCII requires 5 characters

WEP 64 bit HEX requires 10 characters

WEP 128 bit ASCII requires 13 characters

WEP 128 bit HEX requires 26 characters

Examples:  64 bit Hex (10 characters) = 231074a6ef

 

 

64 bit ASCII (5 characters) = j31n.

 

 

128 bit Hex (26 characters) = 231074a6b9773ce43f91a5bef3

 

 

128 bit ASCII (13 characters) = urla0

00062742bda_GB.indd   Abs2:6

00062742bda_GB.indd   Abs2:6

17.09.2007   7:26:22 Uhr

17.09.2007   7:26:22 Uhr

Summary of Contents for 62742

Page 1: ...Automatic con guration Page 08 4 2 Operation of the Windows Vista con guration program Page 08 4 3 Setting up an Ad hoc network Page 09 5 Con guring the operating system and computer Windows Seite 09...

Page 2: ...rt the mains plug into the socket and start the PC 2 Installing the driver and con guration program on Windows 2000 XP After you start the operating system the Windows New Hardware Wizard dialogue box...

Page 3: ...n entered here applies to all users of the network There are two methods a Con guration using the button Press the WPS button on the router access point Within two minutes you must press the PBC butto...

Page 4: ...work overview To reduce the energy consumption you can run the device in power saving mode PSM In this mode certain functions are deactivated or run at a lower setting if they are not fully used Selec...

Page 5: ...t WEP encryption WPA and WPA2 encryption Note Encryption is deactivated by default However for security reasons we recommend that you always use encryption 3 2 2 1 WEP encryption Wired Equivalent Priv...

Page 6: ...nd punctuation marks can be used 64 characters are required for HEX whereby only characters from 0 9 and a f can be used If you do not have this code it can be found in your router access point or you...

Page 7: ...PS tab page in the WLAN adapter s con guration program The connection is now established automatically b Pin code Make a note of the pin code which is displayed in the WLAN adapter s con guration prog...

Page 8: ...you are asked to enter data concerning the network name and the security type More information is shown if you move the mouse cursor towards the appropriate eld Additional remarks concerning the netwo...

Page 9: ...from your computer After the software is removed you may have to restart the system Save all open documents and close all programs before restarting the PC 7 Installing the driver and con guration pr...

Page 10: ...select the hard drive where you installed the driver and the utility earlier The utility is installed in the Programs directory by default Double click the icon The following window opens This screen...

Page 11: ...f the required network Encryption Type Encryption used in the target network Network Type type of network Infrastructure or ad hoc Open the Wireless Utility Using the Network overview Site survey tab...

Page 12: ...a standard encryption algorithm for WLAN It both controls the access to the network and guaran tees the integrity of the data This method is considered vulnerable due to a range of weaknesses If you...

Page 13: ...under Encryption Now enter the code used in the WPA preshared key eld The code entered must be absolutely identical with that used in the network It must be min 8 and max 63 random characters for ASCI...

Page 14: ...15...

Reviews: