SECTION 2
INSTALLATION
2-2
WPCI810G
v2
Small Office/Home Office Users
The access point that communicates with the WPCI810G
v2
has a
pre-assigned network name (SSID) that the WPCI810G
v2
recognizes
upon startup.
!
If you are setting up a new wireless network and want to use
WEP security, use any string of characters for the network key. If
this feature is enabled on the wireless network, you’ll use the
same network key for your WPCI810G
v2
.
!
If you are connecting to an existing WEP enabled network, obtain
the network key from the access point.
!
If you are connecting to a WPA-enabled access point, obtain the
WPA (Wi-Fi Protected Access) wireless network key information
(network authentication type, encryption type, network key) from
the access point.
Security Options
The WPCI810G
v2
is designed for both the home user and business.
WPA (Wi-Fi Protected Access) protocol is designed into the chipset.
WPA is a powerful, standards-based, interoperable security
technology for wireless local area networks (the subset of the future
IEEE Std 802.11i standard) that encrypts data sent over radio waves.
The WPA protocol was developed to overcome the weaknesses of
the WEP (Wired Equivalent Privacy) protocol. Both protocols require
the use of network key information, and either protocol can be
enabled or disabled, depending on the type of network connection
being made.
Various options are available for selecting network authentication and
data encryption. It is important for you to understand these options
when deciding which (if any) security protocol to use.
Security Example
If you want to use a more secure protocol, the wireless network to
which you are connecting must also support that protocol. For
example, you decide to enable WPA-PSK on your WN825G, a good
choice because of the robust security WPA-PSK offers. However, the
slightly older wireless network you want to connect to only supports
WEP, which means that you cannot use WPA (and should use WEP)
because the security protocols must match between the network
adapter and the access point.