Security Settings
If you are configuring a Device to Device (ad hoc) profile, select one of the following
data encryption settings:
●
: No authentication required.
●
or
A network key or password is used for encryption.
If you are configuring a Network (Infrastructure) profile, select:
●
Temporal Key Integrity Protocol (TKIP) for data encryption.
●
or
a new method for privacy protection of wireless transmissions specified in the
IEEE 802.11i standard, AES-CCMP.
Advanced button
Select to access the
to configure the following options:
●
: Select to automatically or manually connect to a profile.
●
: Network administrator can export a profile on another computer.
●
: Select to associate the wireless adapter with a specific
access point.
●
: Select to password protect a profile.
●
: Specify a program to be started when a wireless connection is
made.
●
: Select to maintain the wireless connection with a user profile
after log off.
Back
View the prior page in the Profile manager.
OK
Closes the Profile manager and saves the profile.
Cancel
Closes the Profile manager and cancels any changes made.
Help?
Provides the help information for the current page.
Set up Data Encryption and Authentication
In a home wireless network, you can use a variety of simple security procedures to protect your wireless
connection. These include:
●
Enable Wi-Fi Protected Access (WPA)
●
Change your password
●
Change the network name (SSID)
Wi-Fi Protected Access (WPA) encryption provides protection for your data on the network. WPA uses an
encryption key called a Pre-Shared Key (PSK) to encrypt data before transmission. Enter the same password in
all of the computers and access points in your home or small business network. Only devices that use the same
encryption key can access the network or decrypt the encrypted data transmitted by other computers. The
password automatically initiates the Temporal Key Integrity Protocol (TKIP) for the data encryption process.
Network Keys
WEP encryption provides two levels of security:
●
64-bit key (sometimes referred to as 40-bit)
●
128-bit key (also known as 104-bit)
For improved security, use a 128-bit key. If you use encryption, all wireless devices on your wireless network
Summary of Contents for Wireless WiFi Link 4965AGN
Page 31: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 36: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 144: ...Back to Contents Trademarks and Disclaimers ...
Page 152: ...Back to Top Back to Contents Trademarks and Disclaimers ...
Page 174: ......
Page 175: ......
Page 183: ......