Chapter 2
Configuration Tools
30
•
Auth Method
This feature allows the user to select the authentication method
used for the wireless network interface. Depending on the radio
card installed, the options include Open, Shared, Kerberos, and
LEAP.
•
Default WEP Key
The default key must match the Access Point's configuration. If the
Access Point is configured to use "Open System", the default key
should be set to 0. If the Access Point is configured to use 40-bit or
128-bit WEP encryption key, the encryption key must be set to the
same setting as the Access Point's setting. See the following
section on how to set up the encryption key.
Encryption Key Configuration
As previously mentioned, there are four encryption keys that can be
configured through the control panel. For each encryption key x
(where x can be 1 to 4), the following control menu can be used to
configure the key:
•
WEP Key x Format
This is the format of the key. It can be set to either ASCII or
Hexadecimal.
•
WEP Key x Width
This is the number of bits used for encryption. This can be set to
either 40 Bits or 128 Bits and must match the Access Point's
configuration.
•
WEP Key x
This is the key value. If the "WEP Key x Width" is set to 40 Bits, the
key values can be entered in the following 5 sub menus
(BYTE 1, …, BYTE 5). If the "WEP Key x Width" is set to 128 Bits,
the key values can be entered in the following 13 sub menus
(BYTE 1, …, BYTE 13). The key values must configure to match
the corresponding key in the Access Point's key configuration.
Summary of Contents for Integrated Network Interface Card
Page 1: ...Integrated Network Interface Card User s Manual Thermal Line Matrix and Laser Printers...
Page 3: ...Integrated Network Interface Card User s Manual Thermal Line Matrix and Laser Printers...
Page 6: ......
Page 51: ...Wireless 47 Wireless Figure 9 Wireless Network Configuration 802 11b g...
Page 52: ...Chapter 3 Network Configuration 48 Figure 10 Wireless Network Configuration 802 11b...
Page 88: ...Chapter 3 Status Network 84...
Page 146: ...Chapter 6 Handling z OS Connectivity Problems 142...
Page 208: ...Chapter 9 Configuration Screens 204...
Page 216: ...Chapter 10 Font Identifier FONT Help 212...
Page 272: ...Chapter 13 Periodic Ping 268...
Page 290: ...Appendix B Kerberos Enabled Wireless NIC Configuration 286...
Page 298: ...294...
Page 309: ......
Page 310: ...253113 001A 253113 001...